top of page
placeholder-100x100.png

Cyber Security

Security +

placeholder-100x100.png
Prepare for the Junior IT Auditor/Penetration Tester job role

At the end of this training, you will be able to:

  • Develop  hands-on practical skills, ensuring that you as a  security professional is to solve a wide range of problems

  • Ready to take Department of Defense (DoD) 8570 compliance  certification.

  • Focus on  latest trends and techniques in risk management, risk mitigation, threat management and intrusion detection.

Cost
January'2021 session:
$2000
$2000
Future sessions:
$3000

Network +

placeholder-100x100.png
Prepare for IT infrastructure troubleshooting, configuring, and managing networks.

At the end of this training, you will be able to:

  • Design and implement functional networks

  • Configure, manage, and maintain essential network devices

  • Use devices such as switches and routers to segment network traffic and create resilient networks

  • Identify benefits and drawbacks of existing network configurations

  • Implement network security, standards, and protocols

  • Troubleshoot network problems

  • Support the creation of virtualized networks

Cost
January'2021 session:
$2000
$2000
Future sessions:
$3000

Linux +

placeholder-100x100.png
Prepare for Linux certifications and build proficiency in Linux command-line interface users

What you will learn:

  • Performing Basic Linux Tasks

  • Users, Groups and Permissions

  • File system

  • Kernel Modules

  • Linux Boot Process

  • System Components

  • Networking

  • Packages and Software

  • Securing Linux Systems

  • Scripting and automation

  • Installing Linux

Cost
January'2021 session:
$2000
$2000
Future sessions:
$3000

Hacker Pro

placeholder-100x100.png
Prepare for the EC-Council Certified Ethical Hacker certifications.

The purpose of this course is to allow students and IT professionals to move into the cybersecurity field. The course covers the five phases of ethical hacking:

  • Reconnaissance: also known as the preparatory phase, the reconnaissance phase is the phase in which the hacker gathers information about a target before launching an attack. This task is completed in phases prior to exploiting system vulnerabilities.

  • Scanning: in the scanning phase, the hacker identifies a quick way to gain access to the network and look for information.

  • Gain access: hackers gain access to the system, applications, and network, and then escalate user privileges to take control of systems.

  • Maintain access: the hacker continues accessing the organization's systems to launch additional attacks on the network.

  • Cover your tracks: after the hacker gains access, it is necessary to cover evidence of the system having been hacked to avoid being detected by security personnel.

Cost
January'2021 session:
TBA
TBA
Future sessions:
$4500

Courses come with

True-to-Life Simulations

Students are challenged with real-world scenarios. In one simulation, students can install hardware in a PC, boot it up, and then configure that hardware in the operating system. The scenarios they encounter in the course replicate everyday situations they will experience on the job as an IT technician.

Capstone and Sandbox Simulations
Most courses include capstone simulations that allow students to demonstrate mastery of specific skills. Course also provides sandbox simulations that give students an environment where they can experiment using a variety of hardware.

Multiple Operating Systems
Where it applies, we teach students how to complete tasks in several popular operating systems, including Windows 10, Windows 8, Windows 7, Linux, macOS, BIOS/UEFI, and more.

Unlimited Certification Practice Exams
Most courses include practice exams for relevant certification exams. Students can build confidence and testing acumen by practicing as many times as they like.

Everything You Need In One Resource
All courses include live instructor-led classes via zoom, on-demand instructional videos, text lessons, quizzes, and certification exam preparation materials.

bottom of page