Courses / Training

OUR COURSES

CND v2

Certified Network Defender
$ 2795 5 Day/Course
  • Learn about various network security controls, protocols, and devices
  • Students will able to troubleshoot their network for various network problems
  • Student will able identify various threats on organization network
  • Duration: 5 days - 9am to 5pm
NEW

CEH v11

Certified Ethical Hacker
$ 2795 5 Day/Course
  • Various types of footprinting, footprinting tools, and countermeasures.
  • Network scanning techniques and scanning countermeasures.
  • Enumeration techniques and enumeration countermeasures.
  • Duration: 5 days - 9am to 5pm
NEW

CEH Practical

Two Day Hands On
$ 1595 2 Day/Course
  • Session hijacking techniques and countermeasures.
  • Different types of webserver attacks, attack methodology, and countermeasures.
  • Different types of web application attacks, web application hacking methodology, and countermeasures.
  • Duration: 2 days - 9am to 5pm
New

CEH Master

Certified Ethical Hacker Master
$ 3995 6 Day/Course
  • Includes CEH Written Courseware, iLabs, test voucher. Plus extra day concentrating on the CEH Practical Exam
  • To acheive the Master Certification you must succesfully pass the written and practical exam
  • This is very hands on training with expert guidance in Reconaissance, Scanning, Eumeration, Explotation using the tools needed in the Exam
  • Prove to others and most importantly to yourself that you have what it takes to be a CEH MASTER
POPULAR

CTIA

Certified Threat Inteligence Analyst
$ 1995 3 Day/Course
  • Compliant with JTA listed under the ‘Analyze’ category of NICE 2.0
  • The cyber threat intelligence training empowers you with the latest techniques
  • A comprehensive cyber intelligence course, covering the A to Z of threat intelligence
  • The ideal threat intelligence course for professionals to excel in the cybersecurity domain.
NEW

C\PENT & LPT

Certified Penetration Tester
$ 2995 5 Day/Course
  • Multi-level Pivoting
    SQL Injection
  • OS Vulnerabilities Exploitation
  • Host-Based Application Exploitation
  • Exploit and Payload Customization
NEW