
Cyber Security
Security +

Prepare for the Junior IT Auditor/Penetration Tester job role
At the end of this training, you will be able to:
Develop hands-on practical skills, ensuring that you as a security professional is to solve a wide range of problems
Ready to take Department of Defense (DoD) 8570 compliance certification.
Focus on latest trends and techniques in risk management, risk mitigation, threat management and intrusion detection.
Cost
January'2021 session:
$2000
$2000
Future sessions:
$3000
Network +

Prepare for IT infrastructure troubleshooting, configuring, and managing networks.
At the end of this training, you will be able to:
Design and implement functional networks
Configure, manage, and maintain essential network devices
Use devices such as switches and routers to segment network traffic and create resilient networks
Identify benefits and drawbacks of existing network configurations
Implement network security, standards, and protocols
Troubleshoot network problems
Support the creation of virtualized networks
Cost
January'2021 session:
$2000
$2000
Future sessions:
$3000
Linux +

Prepare for Linux certifications and build proficiency in Linux command-line interface users
What you will learn:
Performing Basic Linux Tasks
Users, Groups and Permissions
File system
Kernel Modules
Linux Boot Process
System Components
Networking
Packages and Software
Securing Linux Systems
Scripting and automation
Installing Linux
Cost
January'2021 session:
$2000
$2000
Future sessions:
$3000
Hacker Pro

Prepare for the EC-Council Certified Ethical Hacker certifications.
The purpose of this course is to allow students and IT professionals to move into the cybersecurity field. The course covers the five phases of ethical hacking:
Reconnaissance: also known as the preparatory phase, the reconnaissance phase is the phase in which the hacker gathers information about a target before launching an attack. This task is completed in phases prior to exploiting system vulnerabilities.
Scanning: in the scanning phase, the hacker identifies a quick way to gain access to the network and look for information.
Gain access: hackers gain access to the system, applications, and network, and then escalate user privileges to take control of systems.
Maintain access: the hacker continues accessing the organization's systems to launch additional attacks on the network.
Cover your tracks: after the hacker gains access, it is necessary to cover evidence of the system having been hacked to avoid being detected by security personnel.
Cost
January'2021 session:
TBA
TBA
Future sessions:
$4500
Courses come with
True-to-Life Simulations
Students are challenged with real-world scenarios. In one simulation, students can install hardware in a PC, boot it up, and then configure that hardware in the operating system. The scenarios they encounter in the course replicate everyday situations they will experience on the job as an IT technician.
Capstone and Sandbox Simulations
Most courses include capstone simulations that allow students to demonstrate mastery of specific skills. Course also provides sandbox simulations that give students an environment where they can experiment using a variety of hardware.
Multiple Operating Systems
Where it applies, we teach students how to complete tasks in several popular operating systems, including Windows 10, Windows 8, Windows 7, Linux, macOS, BIOS/UEFI, and more.
Unlimited Certification Practice Exams
Most courses include practice exams for relevant certification exams. Students can build confidence and testing acumen by practicing as many times as they like.
Everything You Need In One Resource
All courses include live instructor-led classes via zoom, on-demand instructional videos, text lessons, quizzes, and certification exam preparation materials.