Please click on the course title to see the course description.
Our Career Management course will introduce students to and teach them how to apply the most effective strategies to achieve employment in the career of their choice. Topics that are covered; effective job search strategies, cover letter and strategic resume writing, interview preparation and effective interviewing skills.
This course will cover various cloud concepts that will teach the skills needed to maintain, optimize and secure cloud infrastructure services.
Coding for Pentesters
This course will cover various coding languages and concepts to allow penetration testers to develop customer code/scripts. Languages such as Perl, Python, Ruby, Powershell, PHP are covered. Concepts such as scanner scripting, information gathering, exploitation scripting and post-exploitation scripting are taught.
Computer Hardware and Host Based Security Foundations
This course will cover the hardware and software foundations utilized within a host-based computing environment. Topics covered will include assembly, installation, configuration, upgrading and troubleshooting of PC-based hosts. Students will develop & hands experience within a scenario-based lab environment in order to identify software and hardware host-based vulnerability issues and will execute industry best of practiced remediation procedures.
Cybersecurity Operations and Threat Analysis
As attackers have learned to evade traditional signature-based solutions such as firewalls, an analytics-based approach within the IT security industry is increasingly important for most organizations. The behavioural analytics skills covered in this course will provide students with security skills to identify and combat malware, advanced persistent threats (APTs) across a broad attack surface. Trained within an operational style lab environment students will develop the required skills to perform, network reconnaissance, threat identification, threat mitigation, vulnerabilities analysis, security incidents investigation, security issues monitoring and cyber security threat analysis.
This course will cover various digital forensic concepts that will introduce the student to Digital Forensics - its tools, methods and procedures. Digital Forensics allows security experts to detect subtle attacks that don’t display any easily noticeable evidence that they are occurring or have occurred. Digital Forensics allows security experts to gather proof and actionable evidence in the event legal action must be taken as a result of the cybersecurity attack. Digital Forensics knowledge gives security experts a deeper understanding of the operations of computers, software, protocols, security methods and hardware.
Ethical Hacking and Countermeasures
This course will provide students with the knowledge and hands-on skills in Ethical Hacking, Red Team / Blue Team and Cyber Defense Countermeasures. With exposure to various live lab attack scenarios, students will gain a solid understanding of Hacker attack vectors, techniques, methodologies and tools. Working within Blue Teams / Red Teams, students will participate in complex threat scenarios with a focus on Foot Printing and Reconnaissance, Social Engineering, Network Scanning, Enumeration and Cryptography. Through secure live lab simulations, you will "Hack to Learn" in order to better understand and defend against the "Hacker Mindset". Real-world attack simulations include System Hacking, Denial of Service and Session Hijacking, Web Application / Server Attacks, SQL injections, Wireless / Mobile Hacking, Evasion of IDS / Firewalls / Honeypots and offensive security tactics. Upon completion of this course, you will possess the necessary knowledge and skills within the domain of H.
This course will cover the deployment and use of helpdesk IT support software that provides IT support services to end-users. Additionally, tools needed for identifying and managing computer resources as it relates to Helpdesk activity will be covered.
Linux Systems Administration and Security
Linux has grown into an industry-leading software and service delivery platform that is used for everything from supercomputers and Web servers to virtualized systems and your Android phone. This growth creates a high demand for qualified Linux professionals. Students will acquire the fundamental knowledge and hands-on experience with Linux systems architecture, package management, system services, file systems, administrative tasks, security, data, and accessibility.
Network Architecture Design and Operations
This course will provide students with the foundational knowledge and skills required to configure, manage, and troubleshoot today's wired and wireless network devices. This course will also provide students with an understanding of emerging technologies such as unified communications, mobile, cloud, and virtualization technologies. Within a lab environment, students will design and implement a secure and trusted network infrastructure and will gain a solid understanding of network operations and management.
Network Security and Defense Foundations and Advanced Report Writing
IT security is paramount to organizations as cloud computing and mobile devices have changed the way we do business. With large amounts of data transmitted and stored on networks throughout the world, it is essential to have effective security practices in place. Students will gain a solid understanding of network security practices including control fundamentals, security threats, network attacks, vulnerability assessment, penetration testing, security controls, wireless security and Computer Forensics. Students will also learn to create advanced reports such as Penetration Testing and Vulnerability Analysis Reports.
Network Security and Unified Threat Management
In this course, students will gain the knowledge and understanding of commercial network security and Unified Threat Management (UTM) Solutions. Students will install and configure a live security environment implementing firewall policies, VPNs, virus detection, web filtering, application control, user authentication. Advanced level design threat management lab scenarios will include threat malware mitigation, firewall policies, SSL, IPsec and VPN tunnelling.
Network Security Technology – Routing & Switching
The student learns basic network design and troubleshooting, routed and routing protocols, router configurations, LAN switching theory, virtual LANs, Novell IPX, WAN theory and design, WAN technology, PPP, frame relay, and ISDN. IT follows the track for the Cisco CCNA certification.
Report Writing and Documentation
This course will teach students how to generate various technical reports that they may have to create as part of their technical careers. The ability to gather technical information and express it in a well-organized and intelligible format that can be understood by management and technical peers alike is key for the dissemination of vital information. The types of reports covered will include: Network Asset Reports, Physical and Logical Network Topologies, Vulnerability Assessment Reports and Penetration Testing Reports.
Security Operations Centre Analysis
As the security landscape is expanding, a SOC team offers high-quality IT security services to detect potential cyber threats/ attacks actively and quickly respond to security incidents. Organizations need skilled SOC Analysts who can serve as the front-line defenders, warning other professionals of emerging and present cyber threats. The lab-intensive SOC Analyst training program emphasizes the holistic approach to delivering elementary as well as advanced knowledge of how to identify and validate intrusion attempts. Through this, the candidate will learn to use SIEM solutions and predictive capabilities using threat intelligence. The program also introduces the practical aspect of SIEM using advanced and the most frequently used tools. The candidate will learn to perform enhanced threat detection using the predictive capabilities of Threat Intelligence.
Threat Intelligence Analysis
Traditional approaches to malicious attacks are slowly dying out, with new malware formed every four seconds. However, many organizations today still follow the basic, traditional methods to address these evolving techniques. Reacting to threats is extremely important but reacting also signifies that the damage is already done. Having a threat intelligence analyst will give organizations the chance to fight the unforeseen battles that are constantly arising in the cyber world. A skilled threat intelligence analyst will be able to gather large amounts of relevant threat information from a multitude of intelligence sources which will then be analyzed to provide threat intelligence that accurately predicts the potential threats that an organization may encounter.
Windows Administration Security I – Core Infrastructure
The course is intended for students who have good Windows operating system knowledge and experience and want to acquire the skills and knowledge necessary to implement the core infrastructure services in an existing Windows Server environment.
Windows Administration Security II – Active Directory Services
This course provides the student with the knowledge and skills to configure Active Directory Domain Services in a distributed environment, implement Group Policies, perform backup and restore, and monitor and troubleshoot Active Directory related issues.
Windows Administration Security III – Advanced Services
This Advanced Windows Server® Services training allows students to learn how to provision and configure advanced services using Windows Server.
Windows Applications Security I – Databases
This course will help introduce new features and functionality in Windows SQL day-to-day management, networking infrastructure, storage, and access control. Specific technologies covered will include Dynamic Access Control (DAC), Failover Clustering, Microsoft Online Backup, Security and Hyper-V.
Windows Applications Security II – Messaging Services
In this course, students will learn to configure and manage a Microsoft Exchange Server messaging environment. This course will teach students guidelines, best practices, and considerations that will help them optimize their Exchange server deployment. It will also provide the knowledge and skills to plan, install, and manage the mailbox role, client access, transport, and Exchange infrastructure.