Master the fundamentals of networking, operating systems, and offensive & defensive security with an industry-aligned curriculum.
Master the fundamentals of cybersecurity with an industry-aligned curriculum designed for market needs.
Practical exercises covering networking, OS, offensive and defensive security techniques.
Gain essential cybersecurity skills to start your journey as a professional immediately.
Understand networking, ethical hacking, security operations, and digital forensics.
Covers fundamental cybersecurity concepts, networking, OS security, and security operations.
Engage in hands-on offensive and defensive security scenarios on our Cyber Range.
Gain essential skills for real-world cybersecurity challenges recognized by employers.
Choose between live instructor-led, self-paced, and in-person training modes.
Click modules to expand details
Understand cybersecurity fundamentals, its real-world impact, and the growing need for security professionals. Explore career opportunities and the skills required to excel.
Gain foundational knowledge of networking concepts, protocols, OSI & TCP/IP models. Hands-on labs cover firewall configurations, IDS/IPS, and Wireshark.
Explore Windows and Linux operating systems, user management, and command-line utilities. Develop hands-on skills in OS administration and security.
Learn the principles of ethical hacking and penetration testing. Explore tools like Nmap, Metasploit, and Burp Suite to identify and exploit vulnerabilities.
Understand threat detection, incident response, and digital forensics. Learn about SOC, IDS/IPS, and patch management.
Learn how to scope penetration tests by identifying organizational requirements and compliance considerations like OWASP, NIST, and MITRE ATT&CK.
Focuses on intelligence gathering techniques (active/passive) using tools like theHarvester, Maltego, and Shodan.
Learn host discovery, port scanning, and vulnerability scanning using Nmap and Nessus. Covers evasion tactics for bypassing firewalls.
Explains vulnerability classification, CVSS scoring, and scanning using Nessus, OpenVAS, and Nikto.
Learn how to exploit vulnerabilities to gain access using Metasploit, Mimikatz, and CrackMapExec.
Examines psychological and technical social engineering techniques like phishing using SET and ShellPhish.
Explore attacks on wired and wireless networks (ARP spoofing, DNS poisoning, WPA cracking) using Aircrack-ng and Bettercap.
Covers OWASP Top 10 vulnerabilities (SQL injection, XSS) using Burp Suite and Nikto. Introduces bug hunting.
Explores security threats in IoT and Operational Technology. Hands-on exercises on IoT devices and SCADA systems.
Focuses on cloud security threats, misconfigurations, and attacks targeting AWS, Kubernetes, and serverless computing.
Emphasizes the importance of effective communication, documenting findings, and crafting detailed reports.
Mapped to Cybersecurity Job Roles