Cybersecurity
bootcamp

Gain the technical skills and tactical insights to enter the cybersecurity field

service-main mob-service-main

Length

6 months

Format

Online or offline

Training form

Group sessions or corporate

Learn cybersecurity basics for beginners and acquire the essentials for starting a career in cybersecurity

ellipse ellipse

During the course, you'll study skills aligned with certifications* such as

  • CompTIA CySA+
  • CompTIA Network+
  • CompTIA Security+
  • AWS Certified Cloud Practitioner
  • LPI Linux Essentials

*No exam prep or tests are included in the program

Program structure

Microsoft Security

Learn configuring GPOs on various Windows Server versions and setting up domains with Active Directory. Manage DNS, DHCP servers, and secure systems through security server configurations

  • Introduction to Windows Client
  • Windows Server 2012 and Enterprise Creation
  • Domain Name System
  • Active Directory
  • PowerShell
  • Group Policy
  • Shares and Permissions
  • DHCP
  • Disk Management
  • Microsoft Endpoint Security
  • Security Policies and Authentication
40 hours

Computer Networking

Learn essential networking concepts for cybersecurity careers. Explore devices, layers, and protocols shaping computer networks

  • Introduction to Networks
  • Network Fundamentals
  • iOS Fundamentals
  • Switch Security
  • IP and Routing Concepts
  • Subnetting
  • IPv4 and IPv6 Static Rounding
  • Dynamic Routing
  • VLAN and Trunk
  • Diagnostics and Troubleshooting
  • Access-Control List
  • Infrastructure Services
50 hours

Cloud Security

Learn to leverage AWS, Google Cloud, and Azure for infrastructure needs securely. Essential for cybersecurity, this course provides comprehensive understanding of major cloud platforms

  • Cloud Fundamentals
  • Virtualization and Containers
  • Securing the Cloud 
  • Advanced Cloud Computing
15 hours

Linux Security

Master Linux security with Kali Linux. Gain hands-on experience in file management, commands, networking, permissions, and exploit defense

  • Introduction to Linux
  • CLI Fundamentals
  • Users and Permissions 
  • Networking and System Management
  • Services and Hardening
  • Bash Scripting
  • Host Security 
  • Network Security
30 hours

Network Security

This course helps you specialize in securing, managing, and operating network communications equipment and systems, making you valuable to employers seeking nimble cybersecurity professionals

  • Network Security Systems and Architecture
  • Secure Management and Access
  • Network Attacks and Mitigation
  • Network Traffic Analysis
  • Practical Cryptography
  • Firewall Fundamentals
  • VPN Technologies
  • Network Monitoring
  • IPS and IDS Concepts
35 hours

Cyber Infrastructure and Technology

Explore defensive infrastructure deeply in this course. Design secure architecture for networks, devices, and cloud using Splunk, a popular open-source SIEM solution

  • Endpoint Security Measures
  • Honeypots
  • Data Loss Prevention
  • Mail Security
  • SIEM Introduction
  • Advanced SIEM
  • SIEM and SOAR
  • IIoT and ICS
  • Physical Security
  • Security Architecture
40 hours

Introduction to Python for Security

This course offers practical Python training for cybersecurity tasks. Gain hands-on experience setting up Python environments in Windows and Linux, using external libraries, and insights into working as a cybersecurity specialist

  • Introduction to Programming
  • Data Types and Conditions
  • Loops
  • File System and Error Handling
  • Functions
  • Network Communications
  • Python for Security 
25 hours

Offensive Security: Ethical Hacking

Learn to anticipate and counter criminal hacker tactics in this course. Discover exploiting system vulnerabilities and defending against various attacks like application, cryptographic, and social engineering threats

  • Introduction to Ethical Hacking
  • Network Scanning
  • On-Path Attacks
  • Brute Force
  • Social Engineering
  • Infrastructure Attacks
  • Windows Privilege Escalation
  • Linux Privilege Escalation
  • Web Application Security Fundamentals
  • XSS and File Inclusion
  • SQL Injection
  • Vulnerability Scanners and Reporting
50 hours

DFIR and Threat-Hunting

Master cybersecurity job hunt with advanced threat-hunting. Learn DFIR techniques in machine learning, user behavior, and situational awareness. Investigate attacks and reverse-engineer malware, understand SOC dynamics

  • Introduction to DFIR
  • Incident Response Preparation
  • Incident Response Implementation
  • Data Acquisition
  • Windows Live Analysis
  • Windows Dead Analysis
  • Memory Analysis
  • Linux Forensics
  • Log Analysis and Timeline
  • DFIR Simulation
  • Threat-Hunting
  • Static Malware Analysis
  • Dynamic Malware Analysis
  • Network Forensics
  • Network Defense and Persistence
60 hours

Game Theory in Cybersecurity

Learn to apply game theory in cybersecurity. Understand hacker mindset through crisis scenarios. Defend networks using game theory in network architecture

  • Introduction to Game Theory
  • Game Theory Application in Cybersecurity
10 hours

Want to enhance your skills? Check out our cybersecurity trainings

job-page mob-job-page