Advanced penetration testing

This course aims to provide participants with the necessary skills and knowledge to obtain the ethical hacking and penetration testing techniques, specifically targeting those with prior experience in this field of cyber security.

Cyber security fundamentals for IT

The objective of the course is to enable participants to focus on the fundamental concepts of cyber security and raise the awareness of IT professionals.

Cyber security threats and vulnerabilities

The objective of the course is to enable participants to gain an understanding of the cyber threats, to learn and use common ethical hacking techniques in order to assess the impacts of hacking...

Cyber threat intelligence

This course aims to provide participants with the knowledge and techniques to understand and counter cyber security threats and attacks effectively.

Digital forensics and investigation

This course provides participants with the necessary skills and knowledge to understand digital forensic and related incident response and investigation methodologies.

IDS/ IPS deployment and operation

The objective of the course is to deliver technical knowledge, awareness and hands-on Intrusion Detection and Prevention Systems (IDS/IPS).

Introduction to malware analysis

This course aims to builds a strong foundation for participants to understand malicious software behaviours, analysis methods, signatures, foundational malware reverse engineering, and detect and protecting environments from malwares.

Malware analysis and reverse engineering

This course builds a strong foundation for participants who want to learn how malware analysis and reverse engineering of software occurs.

SIEM implementation

The objective of the course is to highlight the benefits of deploying a Security Incident and Event Management (SIEM) within an IT environment.

Web security vulnerabilities analysis

This course aims to improve participants understanding of web application vulnerabilities and providing education on how to apply the correct security measures to defend web assets.
Filters
Availability
All Scheduled Unscheduled
Duration
All 2 Days 3 Days 4 Days 5 Days
Prerequisite
All Yes No