Cyber Security

Cyber Security

Get Started in Cyber Security

Cyber security careers are complex, and many roles can be found with banks, retailers, and government organizations. On the job, you can expect to safeguard an organization’s files and network, install firewalls, create security plans, and monitor activity. If a breach occurs, you’ll be responsible for identifying the problem and finding a solution quickly.

Cyber security is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. It’s also known as information technology security or electronic information security. The term applies in a variety of contexts, from business to mobile computing.

Courses Available

  • Security +
  • CySA +
  • PenTest +
  • Casp +
  • Certified Network Defender
  • Certified Ethical Hacker
  • CEH Master
  • Certified Threat Intelligence Analyst
  • Certified Penetration Testing Expert
  • Advanced Penetration Testing
  • Licensed Penetration Tester
  • Incident Handler
  • Computer Hacking Forensic Investigator
  • Certified Chief Information Security Officer
  • Certified Network Defence Architect
  • Certified Encryption Specialist
  • Advanced Network Defence
  • Certified Secure Computer User
  • Certified Application Security Engineer – Java
  • Certified Application Security Engineer – .NET
  • Certified Security Specialist
  • Disaster Recovery Professional
  • Certified SOC Analyst
  • Information Security Foundation based on ISO IEC 27001
  • Information Security Management Professional based on ISO/IEC 27001
  • Information Security Management Expert based on ISO/IEC 27001
  • EXIN Secure Programming Foundation
  • EXIN Ethical Hacking Foundation
  • Cyber and IT Security Foundation
  • EXIN Privacy and Data Protection Foundation
  • EXIN Privacy and Data Protection Practitioner
  • EXIN Privacy and Data Protection Essentials

Cyber Security Salary Examples

Need More Info?

Instructor-led Course Details

CompTIA Security+ (Sec+)

CompTIA Security+ is a global certification that validates the baseline skills necessary to perform core security functions and pursue an IT security career

What do you learn?

Attacks, Threats and Vulnerabilities, Architecture and Design, Implementation, Operations and Incident Response, Governance, Risk and Compliance.
Download PDF

CompTIA PenTest+ (PenTest+)

CompTIA PenTest+ is for cybersecurity professionals tasked with penetration testing and vulnerability management.

What do you learn?

Planning & Scoping, Information Gathering & Vulnerability,Identification, Attacks & Exploits, Penetration Testing Tools, Reporting & Communication.
Download PDF

Certified Network Defender (CND)

Certified Network Defender v2 has been designed by industry experts to help IT Professionals play an active role in the Protection of digital business assets and Detection and Response to Cyber Threats.

What do you learn?

Protect – Defence-In-Depth Security – Properly Designed, Implemented and Enforced Security Policies – Security Policies – Security Architectures – Appropriate Configuration – Right Selection of Security Controls Detect – Traffic Monitoring Read More?
Download PDF

Certified Ethical Hacker (CEH Master)

C|EH Master, is the next evolution for the world-renowned Certified Ethical Hacker credential, and a logical ‘next step’ for those holding the prestigious certification.

What do you learn?

Demonstrate the understanding of attack vectors Perform network scanning to identify live and vulnerable machines in a network Perform system hacking, steganography, steganalysis attacks, and cover tracks. Read More?
Download PDF

Certified Penetration Tester (CPENT)

EC-Council’s Certified Penetration Tester (CPENT) program teaches you how to perform an effective penetration test in an enterprise network environment that must be attacked, exploited, evaded, and defended.

What do you learn?

Access active directories. Power your way through network defences using PowerShell Use IoT devices to gain access to the network, identify the firmware of the IoT device, extract it, and reverse engineer it Read More?
Download PDF

EC-Council Certified Incident Handler (ECIH)

Comprehensive specialist-level program that imparts knowledge and skills that organizations need to effectively handle post breach consequences by reducing the impact of the incident, from both a financial and a reputational perspective.

What do you learn?

Understand the key issues plaguing the information security world Learn to combat different types of cybersecurity threats, attack vectors, threat actors and their motives. Read More?
Download PDF

Certified Chief Information Security Officer (CCISO)

The CCISO Certification is an industry-leading program that recognizes the real-world experience necessary to succeed at the highest executive levels of information security.

What do you learn?

Do you feel comfortable defending your security risk analysis methodology to your board? What’s your long-term security strategy? How mature is your security program? Are you compliant yet still at risk for a major, brand-damaging breach?
Download PDF

EC-Council Certified Encryption Specialist (ECES)

The EC-Council Certified Encryption Specialist (ECES) program introduces professionals and students to the field of cryptography.

What do you learn?

Protect critical data in organizations with encryption Understand essential cryptography algorithms and their applications Make informed decisions about applying encryption technologies
Download PDF

EC-Council Certified Security Specialist (ECSS)

EC-Council Certified Security Specialist (ECSS) allows students to enhance their skills in three different areas namely information security, network security, and computer forensics.

What do you learn?

Download PDF

Certified SOC Analyst (CSA)

The Certified SOC Analyst (CSA) program is the first step to joining a security operations center (SOC). It is engineered for current and aspiring Tier I and Tier II SOC analysts to achieve proficiency in performing entry-level and intermediate-level operations.

What do you learn?

Download PDF

Licensed Penetration Tester

What do you learn?

Download PDF

Certified Application Security Engineer .NET

What do you learn?

Download PDF

CompTIA Cybersecurity Analyst (CySA+)

CompTIA Cybersecurity Analyst (CySA+) is an IT workforce certification that applies behavioral analytics to networks and devices to prevent, detect and combat cybersecurity threats through continuous security monitoring.

What do you learn?

Threat and Vulnerability Management, Software and Systems Security, Compliance and Assessment, Incident Response, Network Troubleshooting & Tools.
Download PDF

CompTIA CASP+ (CASP+)

CompTIA Advanced Security Practitioner (CASP+) is the ideal certification for technical professionals who wish to remain immersed in technology, as opposed to strictly managing.

What do you learn?

Risk Management, Enterprise Security Architecture, Enterprise Security Operations, Technical Integration of Enterprise Security, Research, Development & Collaboration.
Download PDF

Certified Ethical Hacker (CEH)

Certified Ethical Hacker CEH v11 will teach you the latest commercial-grade hacking tools, techniques, and methodologies used by hackers and information security professionals to lawfully hack an organization.

What do you learn?

Emerging Attack Vectors – Detect various types of compromise in cloud, IoT and OT environments that are critical to modern businesses. Modern Exploit Techniques – Improve your exploit development by learning about existing and new vulnerabilities. Read More?
Download PDF

Certified Threat Intelligence Analyst (CTIA)

The Certified Threat Intelligence Analyst (CTIA) program is designed and developed in collaboration with cybersecurity and threat intelligence experts across the globe.

What do you learn?

Key issues in the InfoSec domain Importance of threat intelligence in risk management, SIEM, and incident response Various cyber threats, threat actors, and their objectives for cyberattacks Read More?
Download PDF

Advanced Penetration Testing

Access active directories. Power your way through network defences using PowerShell Use IoT devices to gain access to the network, identify the firmware of the IoT device, extract it, and reverse engineer it

What do you learn?

Access active directories. Power your way through network defences using PowerShell Use IoT devices to gain access to the network, identify the firmware of the IoT device, extract it, and reverse engineer it Read More?
Download PDF

Computer Hacking Forensic Investigator (CHFI)

EC-Council’s CHFI certifies individuals in the specific security discipline of computer forensics from a vendor-neutral perspective.

What do you learn?

Play a role of the first responder by securing and evaluating a cybercrime scene, conducting preliminary interviews, documenting a crime scene, collecting, and preserving electronic evidence, packaging, and transporting electronic evidence, reporting of the crime scene
Download PDF

Certified Network Defence Architect (CNDA)

The CNDA, which stands for Certified Network Defense Architect, is specially designed for Government Agencies or Military Agencies around the world.

What do you learn?

Do you feel comfortable defending your security risk analysis methodology to your board? What’s your long-term security strategy? How mature is your security program? Are you compliant yet still at risk for a major, brand-damaging breach?
Download PDF

Certified Secure Computer User (CSCU)

The purpose of the CSCU training program is to provide individuals with the necessary knowledge and skills to protect their information assets.

What do you learn?

Introduction to Security Securing Operating Systems Malware and Antivirus Internet Security Security on Social Networking Sites Securing Email Communications Securing Mobile Devices Securing the Cloud Securing Network Connections Data Backup and Disaster Recovery
Download PDF

EC-Council Disaster Recovery Professional (EDRP)

The EDRP certification is aimed at educating and validating a candidate’s ability to plan, strategize, implement, and maintain a business continuity and disaster recovery plan

What do you learn?

Download PDF

Disaster Recovery Professional

What do you learn?

Download PDF

Engineer – Java

What do you learn?

Download PDF

Advanced Network Defence

What do you learn?

Download PDF
Facebook
LinkedIn
Share
Phone
Email
Phone
Email