Training Program:

All modules include hands-on practice and are updated according to modern threats
Linux Fundamentals

This module introduces GNU/Linux operating systems, principles of working in the command line, working with directories, and core commands executed in Bash.

Key topics:
  • Command-line interface
  • Initialization files
  • Pipelines
  • Command history and substitution
  • Grep and sorting
  • Stream redirection
  • Network configuration
  • File transfer
  • Text editors Nano and Vim (Vi Improved)
  • The kill command in Linux
  • Searching, filtering, and manipulating text data in Linux
100 000 т
price per module
IT & Networking Fundamentals

This course provides a systematic understanding of IT infrastructure and networking technologies required to begin a career in system administration, DevOps, or cybersecurity.

Key topics:
  • Hardware and virtualization
  • Hypervisors and virtual machines
  • OSI model
  • Services and interactions
  • Web server and proxy
  • Logging
  • DNS
  • Websites and web services
200 000 т
price per module
Cybersecurity Fundamentals

This module builds an understanding of the core areas of information security. The course provides essential knowledge and skills needed to begin learning cybersecurity.

Key topics:
  • Linux basics
  • Recon / OSINT
  • Cryptography
  • Password cracking
  • Log analysis
  • Scanning
  • Network analysis
  • Digital forensics
  • Web application security
  • Enumeration and exploitation
300 000 т
price per module
Red Team
Ethical Hacking

Fundamentals of ethical hacking and vulnerability exploitation.

This is an uncontrolled environment with no detection capabilities. The main goal is to demonstrate common vulnerabilities found in corporate networks and the techniques used to attack them.

This allows specialists to practice attacking virtual infrastructure, including the latest Windows versions, test new tools, and gain a new perspective on their company’s infrastructure.

Key topics:
  • Bug Bounty fundamentals
  • Linux exploitation
  • Network security
  • Attacks on Active Directory infrastructure
  • Web application security
600 000 т
price per module
Blue Team
Cyber Threat Response

This module is designed to train reliable security analysts and incident response specialists focused on infrastructure protection and attack analysis.

You will practice testing attacker tools, monitoring modern attack techniques, and improving detection skills using various solutions including SIEM, IDS/IPS, Honeypot, and more.

The module provides hands-on experience with advanced attacks and adversary techniques.

Key topics:
  • Reconnaissance and intelligence gathering
  • Attacker movement across the network
  • Exploitation, hardening, and C2 environment
  • Malware delivery and execution
  • Threat hunting and incident response
600 000 т
price per module
Digital Forensics
Cyber Forensic Analysis

Methods of digital forensics and malware analysis.

This module provides a comprehensive understanding of the principles and methods used in digital forensics and malware analysis.

The module aims to develop the essential skills required for investigating malicious software and digital evidence at a professional and systematic level.

Key topics:
  • Digital forensics
  • Incident response process
  • Network forensics
  • Malware analysis
  • Statistical property analysis
800 000 т
price per module