The world revolves around cybersecurity and during our time being in business, this has become a big part of who we are. Offering both certification training and hand-on, in depth training on various cybersecurity tools, we have created a following that has benefit from our offerings around the world. In addition to the courses listed below, we have others and can also create custom courses based on your needs and the skillsets of your team.
Certification Training:
- Security+ Training
- CASP CompTIA Advanced Security Practitioner
- Cybersecurity Analyst (CYSA+)
- CISSP
- CCSP Certified Cloud Security Professional
- Cybersec First Responder
- CEH – Certified Ethical Hacker
- CISA – Certified Information Systems Auditor
- CISM – Certified Information Security Manager
- CRISC Preparation Training
Other Cybersecurity training is available. If you are looking for something not listed, please reach out to us.
In-Depth Cybersecurity Tools Training:
- Configuring IP Networking and Services using Raspberry Pi and Bash
- Integrating Raspberry Pi, Kali Linux and Python3 for Cybersecurity Professionals
- Introduction to Python Scripting for the Security Analyst
- Network Analysis & Surveillance: Open-Source Tools & Techniques
- Kali Linux Pentesting
- Offensive Wifi and Mitigation Techniques: Wifi Security
- Cyber Threat Intelligence
- Introductory Pentesting Training
- Basic Hacking and Penetration Testing
- Kali Linux Pentesting
- Kali Linux Training
- Metasploit Hacking Both the free version and pro versions of Metasploit are available.
- Metasploit Pentesting
- Hacking Devices
- Intro to Programming
- Offensive Programming
- Machine Learning Programming
- Cryptography
- Wireless IP Network Analysis Using Wireshark
- Mobile Device Fundamentals
- Digital Forensics
- Cybersecurity Investigations and Network Forensics Analysis
- Mobile Phone Forensics
- Custom Metasploit/Android Exploit Course
- Android Deep Dive/Android for Analysts
- Dark Web Investigations
- Virtual Infrastructure Forensics
- Risk Management Framework
- STIGs
There are many other cybersecurity courses available. Custom course development is also possible. If you are looking for something other than what is listed above, please let us know.