Courses

What is cybersecurity
the CIA triad
A bit of history and cybersecurity standards
Cyber Threats
Encryption
Authentication & Authorizations
Network security
Home security
Business Security
Pentest & VA
Governance
Iot
At the end of the course you will have the fundamentals of cybersecurity
Prerequisites: Basic computer usage
Course duration 12 hours 

Fundamentals of cybersecurity
Governance
Networks and protocols
Operating systems
Encryption
Firewall and security devices
Iot
Expires
Malware / Ransomware Attacks and Defense
Attacks on the net and defense
Attacks on the web and defense
Host security
Security of wifi networks
Mobile Device Security
Monitoring
Pentest & VA
Social Engineering
At the end of the course you will have the fundamentals of advanced cybersecurity
Prerequisites: basic knowledge of security systems and procedures, at the end of the course the user will have increased their cybersecurity skills.
Course duration 60 hours

Linux OS
File management and manipulation
File, Directory and Permissions
Grep
Locate
Kernel Enumeration and Information
Shell
Bash configuration
Discs
Compression and archiving
Users, groups and permissions
Networking
Tor and proxychains
Services and processes
Curl
Firewalling
Logs
Linux secure server - laboratory
At the end of the course you will acquire the basics to understand the Linux System from a security point of view and how to create a secure server
Prerequisites: basic knowledge of Linux
Duration of the course 48 hours 

Networking
Web applications
Penetration test
Information gathering
Footprint and scanning
Vulnerability Assessment
Web Application Attacks
Attacks on systems
Attacks on the network
Report
At the end of the course you will have the fundamentals to conduct a penetration test
Prerequisites: knowledge of cybersecurity and the most common systems
Course duration 120 hours, including the laboratory

Application security
Cyber Threats
Security Trends
Data security
Network security
Security architecture
Network administration
Wireless network security
System security
Access control
Windows Security
Database Security
Security Policies
Risk management
Advanced defense
Disaster recovery
Application security configuration and management
Encryption
Public key infrastructure
Advanced monitoring
At the end of the course, practical concepts of advanced cybersecurity will be acquired
Prerequisites: Linux, Windows, cybersecurity
Course duration 190 hours

Linux Basic
Network Hacking
Pre connection attacks
WEP cracking
WPA / WPA2 cracking
Get access
Post connection attacks
Information gathering
MITM attacks
Detection
Log in to hosts
Server side attacks
Client side attacks
Social engineering
Post exploitation
Website Hacking
Code execution
XSS
SQL injection
Bug Bounty
Fuzzing
At the end of the course you will have the fundamentals of practical ethical hacking
Prerequisites: basic knowledge of: Linux, cybersecurity, networks
Course duration 140 hours 

Basic concepts of cybersecurity
Responsibility for corporate data
Correct safety posture in the company
Commonly used tools, how to best use them
Communication in the company
Smart passwords and 2-factor authentication
Security policies
Common attacks - from phishing to social engineering
How to defend yourself
At the end of the course you will have the basics of cybersecurity to limit the risk of compromise
Prerequisites: Basic computer usage
Course duration 12 hours

Business search
Safe data
Basic security
Browser configuration
Maltego (basic and advanced)
Identity creation for OSINT
WEBINT
Internet archives
Google OSINT
Search for images
E-mail
Search for people
Social media
Youtube
Dark Web
Token Canary
False positives
Reporting
At the end of the course you will have the fundamentals of Open Source Intel
Prerequisites: Basic computer usage
Course duration 12 hours

Basic concepts
Least privilege
Cloud delivery models
Cloud shared responsibility
Risk management
Data management and protection
Protect your data in the cloud
Cloud management and protection
Cloud access management
Life cycle
Authentication
Metadata
Secrets Management
Authorization
Vulnerability Management
Attack surface
Vulnerability audit
DAST - SAST
SCA
IAST
RASP
Risk management processes
Change management
Network security
Software-defined Networking
Overlay Network
Encryption
Service endpoint security & design
VPN
Anti-DDoS
IDS & IPS
Egress Filtering
Data loss prevention
Respond and recover effectively to incidents in the cloud
Monitoring
At the end of the course you will have the fundamentals of operational Cloud Security
Prerequisites: network, Linux, cybersecurity base
Course duration 120 hours

Request information:

Course information

Request information on the course you prefer, we will contact you and help you to create the right solution