Network administrators are usually familiar with network components, traffic, performance and utilization, network topology, location of each system, security policy, etc. This intensive training will prepare Network administrators with the fundamental understanding of the true construct of data transfer, network technologies, software technologies so that the they understand how networks operate, understand what software is automating and how to analyse the subject material.


Module 01: Network Security Threats, Vulnerabilities, and Attacks

Module 02: Network Security Controls, Protocols, and Devices

Module 03: Network Security Policy Design and Implementation

Module 04: Physical Security

Module 5: Host Security

Module 06: Secure Firewall Configuration and Management

Module 07: Secure IDS Configuration and Management

Module 08: Secure VPN Configuration and Management

Module 9: Wireless Network Defence

Module 10: Network Traffic Monitoring and Analysis

Module 11: Network Risk and Vulnerability Management

Module 12: Data Backup and Recovery

Module 13: Network Incident Response and Management



Cyber Security: Attack & Countermeasures is the primary course you will need to take if your job responsibilities include securing network services, network devices, and network traffic.


In this course, you will build on your knowledge and professional experience with computer hardware, operating systems, networks and cyber as you acquire the specific skills required to implement basic security services on any type of computer network.

Module 1 : Cyber Security Fundamentals

Module 2 : Security Threats

Module  3 : Securing Network Communications

Module 4 : Securing Web Applications

Module 5 : Managing Public Key Infrastructure (PKI)

Module 6 : Managing Certificates

Module 7 : Monitoring & Managing Security Incident in Infrastructure Environment



The Cyber Security - Attack & Countermeasures Strategist (CSACS), enables participants to understand the importance of Cyber Security, Network Security and latest Cyber Attack by providing industry knowledge and skills. In doing so, the Cyber Security - Attack & Countermeasures Strategist (CSACS) participants is able to understand how latest Cyber Attack been discovered using some very vast techniques. In addition, the Cyber Security - Attack & Countermeasures Strategist (CSACS) training helps participants learn how to implement counter response and preventative measures when it comes to a Cyber Hacking.


The Cyber Security - Attack & Countermeasures Strategist (CSACS) training provides in-depth Virtualization & Cloud labs that focus on both open source and commercial based tools with industry best practices. These hands-on labs emulate real world hacking scenarios and equip the participants to assess your company’s security posture, help implement controls to better secure your company’s network infrastructure and how to combat against hackers and/or viruses, etc.


Module 1 - Cyber Security Fundamentals

Module 2 : Building your “Hacking Lab”

odule 3 : Get Familiar with Kali Linux “The Attacker”

Module 4 : Hiding your Identity - Escape route

Module 5 : Footprinting and Reconnaissance (Information Gathering)

Module 6 : Network Scanning

Module 7 : Enumeration

Module 8 : Password Cracking

Module 9 : Malware Threat & Countermeasures

Module 10 : Sniff your Victim

Module 11 : Social Engineering Attack

Module 12 : Hacking WEB Server

Module 13 : SQL Injection

Module 14 : WiFi (Wireless) Cracking

Module 15 : Evading IDS, Firewalls and Honeypots



This 2-day intensive training has been designed to provide with the knowledge and skills needed to support firms and organizations in Cyber Governance, Risk and Compliance Management.


Module 1: Introduction

Module 2: Attacks and Modus Operandi

Module 3: Information Warfare, Cyber Espionage

Module 4: Defense

Module 5: The Future


CYBER SECURiTY FOR management & boardroom

This 1 day workshop prepares members of the board, senior executives, and management to understand, assess, and take a proactive posture in cyber security.

With this training, you gain the fundamental knowledge and skills to investigate risk assessment and management frameworks that help mitigate dangers, as well as identify potential security gaps that could prove a liability.


Module 1 : Introduction

Module 2 : Major Issues in Cyber Security

Module 3 : Cyber Security Risk Management Process

Module 4 : Guidance for Board Members and the C-Suite



This 2 days highly intensive training of CyberHacker : Penetration Testing The Right Way is built firmly upon proven, hands-on, Penetration Testing methodologies utilized by our Elite Group of Penetration Testing consultants.

This training also enhances your business skills needed to identify protection opportunities, justify testing activities and optimize security controls to reduce risk associated to working with the internet. The student will be using the latest tools, such as Saint, Metasploit through Kali Linux and Microsoft PowerShell.


Module 1 : Information Gathering

Module 2 : Detecting Live System

Module 3 : Enumeration

Module 4 : Vulnerability Assessments

Module 5 : Malware Goes Undercover

Module 6 : Windows Hacking

Module 7 : Hacking UNIX/Linux

Module 8 : Pen Testing Wireless Networks

Module 9 : Networks, Sniffing, IDS

Module 10 : Injecting the Database

Module 11 : Attacking Web Technologies

Module 12 : Project Documentation



Far too often, people end up being the weak point in an organization's overall cybersecurity plan. Protect your people and your organization.

Even with millions spent on security infrastructure, all it takes is one employee clicking on one wrong link to compromise critical data and information systems. End-user security awareness is a major issue in the business world today. The threat landscape is complicated, and the typical end-users are unaware of the ways in which they could adversely affect their organization.

With organizations being put under a microscope when it comes to their cybersecurity practices, the costs are too high to overlook the importance of effectively equipping end-users with the skills they need to combat the growing threat of cybercrime.


Lesson 1 : Identifying the Need for Security

Lesson 2 : Securing Devices

Lesson 3 : Using the Internet Securely

1/2 DAY


This intensive 4 days hands-on training is an Advance Level Training (ALT) for IT professionals with previous experience of working in the field of IT & Cyber Security.


This intensive training is designed for IT security analysts, vulnerability analysts, or threat intelligence analysts.

The training also will certify that the successful candidate has the knowledge and skills required to configure and use threat detection tools, perform data analysis, and interpret the results to identify vulnerabilities, threats, and risks to an organization with the end goal of securing and protecting applications and systems within an organization.


Module 1 – Threat Management 01

Module 2 – Threat Management 02

Module 3 – Vulnerability Management

Module 4 – Cyber Incident Response

Module 5 – Security Architecture



Data breaches. Ransomware. State-of-the-art attacks, advanced persistent threat (APT) targeting big organization and small businesses alike. Rarely a day goes by without another reminder in the headlines that improving security should be a top priority.

Of course, there's a big difference between knowing you should improve security and knowing how to get started.

Take your basic knowledge of cyber security to a whole new level with this exciting course that promises to be educational, informative and fun filled.

Module 1 : know Yourself - The Threat and Vulnerability Landscape

Module 2 : Know Your Enemy - The Current Threat and Vulnerability Landscape

Module 3 : Encryption Crash Course

Module 4 : Setting up a Testing Environment Using Virtual Machines (Lab)

Module 5 : Operating System Security & Privacy (Windows vs Mac OS X vs Linux)

Module 6 : Security Bugs and Vulnerabilities

Module 7 : Social Engineering and Social Media Offence and Defence

Module 8 : Security Through Isolation and Compartmentalization



Why Your Organization Needs Security Awareness Training

Your employees are not able to stay ahead of modern cyber threats on their own. Any company, from large to small, is susceptible to being hacked and exploited. The damage is pretty much always severe.


Module 1 : What Is Cybersecurity?

Module 2 : What is Social Engineering?

Module 3 : Emails and Links

Module 4 : Basics of Online Security




Network and IT security is no joke. In a matter of minutes cyber criminals can access protected networks, view encrypted files, accounts, and even steal identities. This 3 days Mega Intensive Training is designed to introduce these concepts and the real-world tactics that hackers use, so that you can protect yourself and your network.

This training is ideal for everyone, regardless of their skills and expertise. The arrangement and presentation of learning resources will let both novices and more advanced students broaden their knowledge of IT security, ethical hacking and penetration testing.


Module 1 : Real-World Ethical Hacking: Hacking Windows OS!

Module 2 : Create Your Own Virtual Hacking Lab! A.K.A CyberRange Lab

Module 3 : Linux Terminal and Windows PowerShell Commands

Module 4 : Create a Virtual Network for Ethical Hacking!

Module 5 : Social Engineering: Capturing Usernames and Passwords via Phishing

Module 6 : Recon: Information Gathering, Scanning and Enumeration

Module 7 : Remote Hacking Windows Server 2019 & Windows 10 : Attack Phase

Module 8 : Hacking Windows Server & Windows 10: Command & Control Phase

Module 9 : Password Problems - Cracking, Snacking & Hijacking

Module 10 : Web Hacking - Testing and Securing Web Applications

Module 11 : Mobile Hacking on Android



In this 2 days intensive training, we’re going through the Hacking & Cracking Lifecycle using the most advanced live disk available today, Kali Linux 2020.

After brief introduction, students will learn the details on how to find, download, install, and customize Kali Linux.

Trainer will guide students on basic Linux configurations and settings to ensure basic commands and settings are understood.

Once all the basic covered, the rest of the module devoted to the penetration testing lifecycle, Reconnaissance, Scanning, Exploitation, Maintaining Access, and Reporting.

The reporting phase will detail reports that can be used to present findings to management and leadership and a Rules of Engagement (ROE) template that can be used before beginning a penetration test.

Module 1 : Getting Comfortable with Kali Linux

Module 2 : The Essential Tools

Module 3 : Passive Information Gathering

Module 4 : Active Information Gathering

Module 5 : Vulnerability Scanning

Module 6 : Win32 Buffer Overflow Exploitation

Module 7. - Working with Exploits

Module 8. – File Transfers

Module 9. – Privilege Escalation

Module 10 : Client Side Attacks

Module 11. – Web Application Attacks

Module 12 : Password Attacks

Module 13 : The Metasploit Framework

Module 14 : Bypassing Antivirus Software



This intensive 3 days Technical Session aimed at people who are new to the world of hacking and penetration testing, for those with little or no previous experience, for those who are frustrated by the inability to see the big picture (how the various tools and phases fit together), for a person who wants to quickly get up-to-speed on with the seminal tools and methods for penetration testing, or for anyone looking to expand their knowledge of offensive security. 

 Module 1 : What is Penetration Testing? 

 Module 2 : Reconnaissance 

 Module 3 : Scanning 

 Module 4 : Exploitation 

Module 5 : Social Engineering 

Module 6 : Web-Based Exploitation 

Module 7 : Post Exploitation and Maintaining Access with Backdoors, Rootkits, and Meterpreter 

Module 8 : Wrapping Up the Penetration



In this 2 days Highly Intensive Training, we’re going through the Penetration Testing Lifecycle using the most advanced live disk available today, Kali Linux 2020.

After brief introduction, students will learn the details on how to find, download, install, and customize Kali Linux.

Trainer will guide students on basic Linux configurations and settings to ensure basic commands and settings are understood.

Once all the basic covered, the rest of the module devoted to the penetration testing lifecycle, Reconnaissance, Scanning, Exploitation, Maintaining Access, and Reporting.

The reporting phase will detail reports that can be used to present findings to management and leadership and a Rules of Engagement (ROE) template that can be used before beginning a penetration test.


Module 1 : Installing and Configuring Kali Linux

Module 2 : Pre-penetration Testing Checklist

Module 3 : Information Gathering

Module 4 : External Pen-testing

Module 5 : Website Penetration Testing

Module 6 : Internal Network Penetration Testing

Module 7 : Network Sniffing

Module 8 : Exploitation

Module 9 : Social Engineering

Module 10 : Wi-Fi Penetration Testing

Module 11 : Brute Force Attack Testing

Module 12 : Advanced Penetration Testing



The Certified Incident Handling Practitioner vendor neutral training is designed to help Incident Handlers, System Administrators, and any General Security Engineers understand how to plan, create and utilize their systems in order to prevent, detect and respond to attacks.


In this in-depth training, students will learn step-by-step approaches used by hackers globally, the latest attack vectors and how to safeguard against them, Incident Handling procedures (including developing the process from start to finish and establishing your Incident Handling team), strategies for each type of attack, recovering from attacks and much more.


Module 1 - Incident Handling Explained

Module 2 - Threats, Vulnerabilities and Exploits

Module 3 – Preparation

Module 4 - First Response

Module 5 – Containment

Module 6 – Eradication

Module 7 – Recovery

Module 8 – Advanced - Computer Security Incident Response Team

Module 10 – Advanced - Log File Analysis

Module 11 – Advanced - Malware, Rootkits and Botnets

Module 12 – Advanced - Artifact Analysis



This 2 days intensive training is focused on the practical side of IoT Ethical Hacking with Raspberry Pi4 without neglecting the theory behind each attack.

Before jumping into the hacking, you will first learn how to set up Ethical hacking lab and install needed software into Raspberry Pi4 to practice ethical hacking on your own machine. 

Once you understand how Raspberry Pi4 are working, we will discuss about how these can be exploited by hackers and what we can do to protect them.

This training will take you from a beginner to a more advanced level - by the time you will complete the training, you will be able to identify the hacking attacks against your network and take the necessary steps to protect it.


Module 1 : A look at the Raspberry Pi 4 and Kali Linux 2020

Module 2 : Step by Step - Combining a Raspberry Pi with Kali Linux

Module 3 : Powering up the Raspberry Pi 4

Module 4 : A look at Kali Linux 2020 most popular Penetration Tools (Wireless Tech)

​Module 5 : Advanced Tweaks and Recommended Settings


IoT security

The ability to connect, communicate with, and remotely manage an incalculable number of networked, automated devices (approximately 26 Billion by 2020) via the Internet is becoming pervasive, from the factory floor to the hospital operating room to the residential basement.

The transition from closed networks to enterprise IT networks to the public Internet is accelerating at an alarming pace—and justly raising alarms about security. As we become increasingly reliant on intelligent, interconnected devices in every aspect of our lives, how do we protect potentially billions of them from intrusions and interference that could compromise personal privacy or threaten public safety?

This training covers the basics of IoT landscape and takes you thru on the Security Challenges and vulnerabilities and teaches you the steps to hack and harden the IoT devices, applications and ecosystem.


Module 1 : IoT an Overview

Module 2 : IoT Security

Module 3 : OWASP Top 10 IoT Vulnerabilities

Module 4 : Hacking IoT Devices – Case Studies



As the amount of cyber threats continue to grow, so does the Cyber Security industry. The need for capable Ethical Hackers is a global need. Ethical Hackers are “white-hat” hackers (aka the good guys) that penetrate secured systems to highlight flaws and weaknesses in a system.

They help government agencies, private businesses and public organizations identify what is secure and what needs to be fixed. If the idea of hacking as a career excites you, you’ll benefit greatly from this Network Penetration Testing and Ethical Hacking training.

You’ll learn how to exploit networks in the manner of an attacker, in order to find out how protect the system from them. Learning objectives include Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation.

At the conclusion of this training class, you’ll be able to create an effective vulnerability prevention strategy to prevent the attackers from entering your system.



Module 1 - Ethical Hacking & Penetration Testing

Module 2 - Methodology Overview

Module 3 - Reconnaissance (Footprinting)

Module 4 - Scanning

Module 5 - Port & Service Enumeration

Module 6 - Data Enumeration

Module 7 - Vulnerability Assessment

Module 8 - Penetration/Access/Compromise

Module 9 - Evading Defenses & Erasing Tracks

Module 10 - Hacking Techniques