EC – Council Certification Training

Online Instructor-led (5 days)

Online Self-paced (40 hours)

Computer Hacking Forensics Investigator Certification Exam

Computer Hacking Forensics Investigator Certification Course Outline

  • Module 1: Computer Forensics in Today’s World
  • Module 2: Computer Forensics Investigation Process
  • Module 3: Understanding Hard Disks and File Systems
  • Module 4: Data Acquisition and Duplication
  • Module 5: Defeating Anti-forensics Techniques
  • Module 6: Windows Forensics
  • Module 7: Linux and Mac Forensics
  • Module 8: Network Forensics
  • Module 9: Investigating Web Attacks
  • Module 10: Dark Web Forensics
  • Module 11: Database Forensics
  • Module 12: Cloud Forensics
  • Module 13: Investigating Email Crimes
  • Module 14: Malware Forensics
  • Module 15: Mobile Forensics
  • Module 16: IoT Forensics

Show moredown

Who should attend this Computer Hacking Forensics Investigator Certification Course?

This CHFI Certification Training is meticulously designed to provide comprehensive training on digital forensics and investigation processes. This course is suitable for many professionals involved in, affected by, or interested in the intricacies of cybercrime investigation and the enforcement of information security. Professionals who will benefit from this training include:

  • Digital Forensics Analysts
  • Cyber Crime Investigators
  • Incident Responders
  • Information Security Officers
  • Police and Law Enforcement Personnel
  • Defence and Military Personnel
  • Legal Professionals

Prerequisites of the Computer Hacking Forensics Investigator Certification Course

There are no formal prerequisites for attending this CHFI Course.

Computer Hacking Forensics Investigator Certification Course Overview

The CHFI Certification plays a vital role in the fight against cybercrime. It focuses on extracting, preserving, and analysing digital evidence. This discipline is crucial for investigating various cyber offences, from data breaches to complex network attacks. As the digital landscape expands, so does the need for skilled Forensic Investigators who can uncover the footprints left by attackers and provide a clear chain of evidence to support legal proceedings.

The CHFI Course is designed for IT professionals in information system security, computer forensics, and incident response. This includes Digital Forensic Analysts, Cybersecurity Team Members, Law Enforcement Officers, and Defense and Military Personnel. This certification is essential for these professionals to respond to cyber incidents effectively, ensure legal standards are met, and help prosecute offenders based on digital evidence.

The Knowledge Academy’s 5-day Computer Hacking Forensics Investigator Certification Training helps understand and conduct digital investigations. The course is structured to provide theoretical knowledge and practical skills through scenario-based learning, ensuring that delegates are well-prepared to undertake forensic investigations in their organisations.

Course Objectives

  • To introduce the fundamentals of computer forensics and its significance in cybersecurity
  • To train delegates in the latest forensic tools and methods for evidence collection and analysis
  • To enhance understanding of the legal aspects of digital forensics
  • To equip professionals with the skills to conduct thorough digital investigations
  • To demonstrate practical techniques for securing and analysing electronic evidence
  • To prepare delegates for roles as Forensic Investigators in various sectors

Upon obtaining this Computer Hacking Forensics Investigator Certification, delegates will have the necessary skills to perform detailed forensic investigations and provide essential evidence for cybersecurity breaches. They will be equipped to handle complex digital investigations, ensuring compliance with legal standards and contributing effectively to the judicial process.

Show moredown

What's included in this Computer Hacking Forensics Investigator Certification Course?

  • Certified Computer Hacking Forensics Investigator – CHFI Examination 
  • World-Class Training Sessions from Experienced Instructors 
  • Computer Hacking Forensics Investigator (CHFI) Certificate 
  • Digital Delegate Pack

Show moredown

Computer Hacking Forensics Investigator Certification Exam Information

The CHFI Certification exam, offered by EC-Council, evaluates a candidate proficiency in detecting hacking attacks and properly extracting evidence to report the crime and conduct audits to prevent future attacks. The exam format is as follows:

  • Type of Questions: Multiple Choice 
  • Total Questions: 150
  • Duration: 4 Hours

Show moredown

Online Instructor-led (3 days)

Online Self-paced (24 hours)

Certified Incident Handler Certification Exam

Certified Incident Handler Certification Course Outline

Module 1: Introduction to Incident Handling and Response

  • Understand Information Security Threats and Attack Vectors
  • Explain Various Attack and Defence Frameworks
  • Understand Information Security Concepts
  • Understand Information Security Incidents
  • Understand the Incident Management Process
  • Understand Incident Response Automation and Orchestration
  • Describe Various Incident Handling and Response Best Practices
  • Explain Various Standards Related to Incident Handling and Response
  • Explain Various Cyber Security Frameworks
  • Understand Incident Handling Laws and Legal Compliance

Module 2: Incident Handling and Response Process

  • Understand Incident Handling and Response (IH&R) Process
  • Explain Preparation Steps for Incident Handling and Response
  • Understand Incident Recording and Assignment
  • Understand Incident Triage
  • Explain the Process of Notification
  • Understand the Process of Containment
  • Describe Evidence Gathering and Forensics Analysis
  • Explain the Process of Eradication
  • Understand the Process of Recovery
  • Describe Various Post-Incident Activities
  • Explain the Importance of Information Sharing Activities

Module 3: First Response

  • Explain the Concept of First Response
  • Understand the Process of Securing and Documenting the Crime Scene
  • Understand the Process of Collecting Evidence at the Crime Scene
  • Explain the Process for Preserving, Packaging, and Transporting Evidence

Module 4: Handling and Responding to Malware Incidents

  • Understand the Handling of Malware Incidents
  • Explain Preparation for Handling Malware Incidents
  • Understand Detection of Malware Incidents
  • Explain Containment of Malware Incidents
  • Describe How to Perform Malware Analysis
  • Understand Eradication of Malware Incidents
  • Explain Recovery after Malware Incidents
  • Case Study: Understand the Handling of Malware Incidents
  • Describe Best Practices against Malware Incidents

Module 5: Handling and Responding to Email Security Incidents

  • Understand Email Security Incidents
  • Explain Preparation Steps for Handling Email Security Incidents
  • Understand Detection and Containment of Email Security Incidents
  • Understand Analysis of Email Security Incidents
  • Explain Eradication of Email Security Incidents
  • Understand the Process of Recovery after Email Incidents
  • Case Study: Understand the Handling of Email Security Incidents
  • Explain Best Practices against Email Security Incidents

Module 6: Handling and Responding to Network Security Incidents

  • Understand the Handling of Network Security Incidents
  • Prepare to Handle Network Security Incidents
  • Understand Detection and Validation of Network Security Incidents
  • Understand the Handling of Unauthorised Access Incidents
  • Understand the Handling of Inappropriate Usage Incidents
  • Understand the Handling of Denial-of-Service Incidents
  • Understand the Handling of Wireless Network Security Incidents
  • Case Study: Understand the Handling of Network Security Incidents
  • Describe Best Practices against Network Security Incidents

Module 7: Handling and Responding to Web Application Security Incidents

  • Understand the Handling of Web Application Incidents
  • Explain Preparation for Handling Web Application Security Incidents
  • Understand Detection and Containment of Web Application Security Incidents
  • Explain Analysis of Web Application Security Incidents
  • Understand Eradication of Web Application Security Incidents
  • Explain Recovery after Web Application Security Incidents
  • Case Study: Understand the Handling of Web Application Security Incidents
  • Describe Best Practices for Securing Web Applications

Module 8: Handling and Responding to Cloud Security Incidents

  • Understand the Handling of Cloud Security Incidents
  • Explain Various Steps Involved in Handling Cloud Security Incidents
  • Understand How to Handle Azure Security Incidents
  • Understand How to Handle AWS Security Incidents
  • Understand How to Handle Google Cloud Security Incidents
  • Case Study: Understand the Handling of Cloud Security Incidents
  • Explain Best Practices against Cloud Security Incidents

Module 9: Handling and Responding to Insider Threats

  • Understand the Handling of Insider Threats
  • Explain Preparation Steps for Handling Insider Threats
  • Understand Detection and Containment of Insider Threats
  • Explain Analysis of Insider Threats
  • Understand Eradication of Insider Threats
  • Understand the Process of Recovery after Insider Attacks
  • Case Study: Understand the Handling of Insider Threats
  • Describe Best Practices against Insider Threats

Module 10: Handling and Responding to Endpoint Security Incidents

  • Understand the Handling of Endpoint Security Incidents
  • Explain the Handling of Mobile-based Security Incidents
  • Explain the Handling of IoT-based Security Incidents
  • Explain the Handling of OT-based Security Incidents
  • Case Study: Understand the Handling of Endpoint Security Incidents

Show moredown

Who should attend this EC-Council Certified Incident Handler (ECIH) Certification Course?

The ECIH Training is designed to equip participants with the skills necessary to manage and mitigate the impact of various security incidents. This training course is ideal for a diverse range of professionals who are involved in, affected by, or interested in incident response and handling within their organisations. This certification course benefits a wide range of professionals, including:

  • Incident Handlers
  • Risk Assessment Administrators
  • System Administrators
  • Firewall Administrators
  • Network Managers
  • Operations Managers
  • Technical Support Engineers
  • Cybersecurity Professionals

Prerequisites of the EC-Council Certified Incident Handler (ECIH) Certification Course

There are no formal prerequisites for attending this ECIH Course.

EC-Council Certified Incident Handler (ECIH) Certification Course Overview

Incident Handling is critical in Cybersecurity, focusing on preparing for, managing, and recovering from security breaches and cyber-attacks. In an age where data breaches and security incidents are commonplace, effectively handling these situations is crucial for maintaining the integrity, confidentiality, and availability of information systems.

This Certified Incident Handler Certification is vital for Cybersecurity Professionals, System Administrators, and Network Engineers who protect an organisation’s IT infrastructure. Understanding incident handling is essential for these professionals to quickly contain and mitigate the effects of incidents, thereby reducing the potential damage and recovery time.

The Knowledge Academy’s 3-day Certified Incident Handler Certification provides comprehensive training in the strategies and actions necessary for effective incident handling and response. Delegates will learn through theoretical knowledge and practical exercises, covering incident response preparation, detection, and recovery processes.

Course Objectives

  • To equip delegates with the skills to prepare for and respond to cybersecurity incidents
  • To understand the lifecycle of incident handling, from detection to recovery
  • To teach practical skills in system forensics, response, and analysis
  • To enable professionals to mitigate the impact of security incidents effectively
  • To instil best practices in documenting and reporting incidents
  • To prepare participants for the Certified Incident Handler examination

Upon obtaining this certification, delegates will possess a robust framework for incident handling that enhances their organisation's resilience against cyber threats. They will be prepared to manage and mitigate incidents efficiently, ensuring rapid recovery and minimal impact on business operations.

Show moredown

What's included in this Certified Incident Handler (ECIH) Certification Course?

  • Certified Incident Handler Examination (ECIH 212-89)
  • World-Class Training Sessions from Experienced Instructors 
  • Certified Incident Handler (ECIH) Certificate 
  • Digital Delegate Pack

Show moredown

Certified Incident Handler Certification Exam Information

The ECIH Certification exam, offered by EC-Council, assesses a candidate expertise in handling and responding to various types of cybersecurity incidents. The exam format is as follows:

  • Type of Questions: Multiple Choice
  • Total Questions: 100

Show moredown

Online Instructor-led (3 days)

Online Self-paced (24 hours)

Certified Encryption Specialist Certification Exam

Certified Encryption Specialist Certification Course Outline

  • Module 1: Introduction and History of Cryptography
  • Module 2: Symmetric Cryptography & Hashes
  • Module 3: Number Theory and Asymmetric Cryptography
  • Module 4: Applications of Cryptography
  • Module 5: Cryptanalysis

Show moredown

Who should attend this Certified Encryption Specialist Certification Course?

This ECES Course is crafted to impart a deep understanding of cryptographic solutions and their practical applications. This training is ideal for a broad spectrum of professionals who are engaged in, impacted by, or keen on enhancing their knowledge of data security through encryption technologies. Professionals who will benefit from this course include:

  • Security Managers
  • Network Administrators
  • IT Security Consultants
  • Data Privacy Managers
  • Software Developers
  • Compliance and Risk Officers
  • Chief Information Security Officers (CISOs)
  • Government and Defense IT Professionals

Prerequisites of the Certified Encryption Specialist Certification Course

There are no formal prerequisites for attending this E|CES Training.

Certified Encryption Specialist Certification Course Overview

Encryption is a critical component of digital security. It protects data by transforming it into a secure format only authorised parties can access and read. As cyber threats continue to evolve, encryption's role in safeguarding sensitive information becomes increasingly significant. Learning about encryption techniques is essential for understanding overall cybersecurity strategies. 

Knowledge of encryption is crucial for Cybersecurity Professionals, IT Managers, and Software Developers responsible for securing data transmission and storage. These professionals must be proficient in various encryption methods and understand regulatory compliance requirements related to data security. Mastery of encryption ensures that organisations can protect their intellectual property and customer data and prevent unauthorised access to sensitive information. 

The Knowledge Academy’s 3-day Certified Encryption Specialist Certification training provides an intensive overview of encryption technologies and their practical applications. Delegates will explore symmetric and asymmetric encryption, key management, and best practices for secure cryptographic design.

Course Objectives

  • To provide a comprehensive understanding of modern encryption technologies
  • To explore key management and the practical applications of symmetric and asymmetric encryption
  • To educate on the compliance and security standards related to encryption
  • To demonstrate secure cryptographic design and implementation
  • To enhance the ability to apply encryption techniques effectively in various organisational contexts
  • To prepare delegates for the Certified Encryption Specialist examination

Upon completing this Certified Encryption Specialist Certification Training, delegates will have a deep understanding of encryption technologies and practical skills in applying these techniques. They will be better equipped to enhance their organisations' security posture and effectively meet compliance standards.

Show moredown

What's included in this Certified Encryption Specialist Certification Course?

  • EC-Council Certified Encryption Specialist Examination 
  • World-Class Training Sessions from Experienced Instructors 
  • Certified Encryption Specialist Certificate 
  • Digital Delegate Pack

Show moredown

Certified Encryption Specialist Certification Exam Information

The Certified Encryption Specialist (ECES) exam, offered by EC-Council, assesses a candidate knowledge in the field of cryptography. This certification is designed to provide the foundational understanding necessary for professionals working with encryption in various aspects of information security. The exam format is as follows:

  • Type of Questions: Multiple Choice
  • Total Questions: 50
  • Pass Mark: 70%
  • Duration: 2 Hours

Show moredown

Online Instructor-led (5 days)

Online Self-paced (40 hours)

Certified Network Defender Exam

Certified Network Defender Certification Course Outline

Module 1: Network Attacks and Defence Strategies

  • Attack
  • Threat
  • Threat Sources
  • Threat Actors
  • Vulnerability
  • Risk
  • Network Attacks
  • Application Attacks
  • Social Engineering Attacks
  • Email Attacks
  • Mobile Attacks
  • Cloud Attacks
  • Supply Chain Attacks
  • Wireless Attacks
  • Hacking Methodologies and Frameworks
  • Adaptive Security Strategy
  • Defence-in-depth Security

Module 2: Administrative Network Security

  • Compliance
  • Regulatory Frameworks
  • Security Policies
  • Security Awareness
  • Asset Management
  • Recent Cybersecurity Trends

Module 3: Technical Network Security

  • Access Controls
  • Authentication
  • Authorisation
  • Accounting (AAA)
  • IAM
  • Cryptography
  • Network Segmentation
  • Zero Trust
  • Network Security Controls
  • Network Security Protocols

Module 4: Network Perimeter Security

  • Firewalls
  • Firewall Types
  • Firewall Topologies
  • Firewall Selection
  • Firewall Implementation and Deployment
  • Firewall Administration
  • IDS/IPS
  • IDS/IPS Classification
  • IDS/IPS Selection
  • False Positives
  • False Negatives
  • Router Security
  • Switch Security
  • Software-defined Perimeter (SDP)

Module 5: Endpoint Security-Windows Systems

  • Windows Security Risks
  • Windows Security Components
  • Windows Security Features
  • Windows Security Baseline Configurations
  • User Account and Password Management
  • Windows Patch Management
  • Windows User Access Management
  • Active Directory Security
  • Windows Network Services and Protocol Security
  • Windows Security Best Practices

Module 6: Endpoint Security-Linux Systems

  • Linux Security Risks
  • Linux Installation and Patching
  • Linux User Access and Password Management
  • Linux OS Hardening Techniques
  • Linux Network and Remote Access Security
  • Linux Security Tools and Frameworks

Module 7: Endpoint Security- Mobile Devices

  • Bring Your Own Device (BYOD)
  • Choose Your Own Device (CYOD)
  • Corporate Owned, Personally Enabled (COPE)
  • Company Owned, Business Only (COBO)
  • Mobile Device Management (MDM)
  • Mobile Application Management (MAM)
  • Mobile Threat Defence (MTD)
  • Unified Endpoint Management (UEM)
  • Mobile Email Management (MEM)
  • Mobile Content Management (MCM)
  • Enterprise Mobility Management (EMM)
  • Mobile Device Security
  • Android Security
  • iPhone Security

Module 8: Endpoint Security-IoT Devices

  • IoT Devices
  • IoT Application Areas
  • IoT Ecosystem
  • IoT Communication Models
  • IoT-Enabled Environments
  • IoT Security Risk and Challenges
  • IoT Security in IoT-Enabled IT Environments
  • IoT Security Tools
  • IoT Security Best Practices
  • IoT Security Standards, Initiatives, and Efforts

Module 9: Administrative Application Security

  • Application Whitelisting
  • Application Blacklisting
  • Application Sandboxing
  • Application Patch Management
  • Web Application Firewalls (WAFs)

Module 10: Data Security

  • Data Security
  • Data Encryption Data at Rest
  • Data Encryption at Transit
  • Data Masking
  • Data Backup
  • Data Retention
  • Data Destruction
  • Data Loss Prevention (DLP)
  • Data Integrity

Module 11: Enterprise Virtual Network Security

  • Network Virtualisation (NV)
  • Software-defined Network (SDN)
  • Network Function Virtualisation (NFV) Security
  • OS Virtualisation Security
  • Container Security
  • Docker Security
  • Kubernetes Security

Module 12: Enterprise Cloud Network Security

  • Cloud Computing
  • Cloud Security
  • Shared Responsibility Model
  • Amazon Cloud (AWS) Security
  • Microsoft Azure Cloud Security
  • Google Cloud Platform (GCP) Security

Module 13: Enterprise Wireless Network Security

  • Wireless Network
  • Wireless Standards
  • Wireless Topologies
  • Wireless Network Components
  • Wireless Network Encryption
  • Wireless Network Authentication
  • Wireless Network Security Measures
  • Wi-Fi Security Tools

Module 14: Network Traffic Monitoring and Analysis

  • Network Traffic Monitoring
  • Baseline Traffic Signatures
  • Suspicious Network Traffic Signatures
  • Threat Detection with Wireshark
  • Bandwidth Monitoring
  • Performance Monitoring
  • Network Anomaly Detection
  • Behaviour Analysis

Module 15: Network Logs Monitoring and Analysis

  • Logs
  • Windows Log Analysis
  • Linux Log Analysis
  • Mac Log Analysis
  • Firewall Log Analysis
  • Router Log Analysis
  • Web Server Log Analysis
  • Centralised Log Management

Module 16: Incident Response and Forensic Investigation

  • First Responder
  • Incident Handling and Response Process
  • SOAR
  • Endpoint Detection and Response (EDR)
  • Extended Detection and Response (XDR)
  • Forensics Investigation

Module 17: Business Continuity and Disaster Recovery

  • Business Continuity (BC)
  • Disaster Recovery (DR)
  • Business Continuity Management (BCM)
  • BC/DR Activities
  • Business Impact Analysis (BIA)
  • Recovery Time Objective (RTO)
  • Recovery Point Objective (RPO)
  • Business Continuity Plan (BCP)
  • Disaster Recovery Plan (DRP)

Module 18: Risk Anticipation with Risk Management

  • Risk Management
  • Risk Identification
  • Risk Assessment
  • Risk Treatment
  • Risk Treatment Steps
  • Risk Tracking and Review
  • Risk Management Frameworks (RMFs)
  • Vulnerability Management
  • Vulnerability Scanning
  • Vulnerability Reporting
  • Privacy Impact Assessment (PIA)

Module 19: Threat Assessment with Attack Surface Analysis

  • Attack Surface
  • Attack Surface Analysis
  • System Attack Surface
  • Network Attack Surface
  • Software Attack Surface
  • Physical Attack Surface
  • Human Attack Surface
  • Indicators of Exposures (IoEs)
  • Attack Simulation
  • Attack Surface Reduction
  • Attack Surface Monitoring Tools
  • Cloud and IoT Attack Surface Analysis

Module 20: Threat Prediction with Cyber Threat Intelligence

  • Cyber Threat Intelligence
  • Threat Intelligence Types
  • Indicators of Compromise (IoCs)
  • Indicators of Attack (IoA)
  • Threat Intelligence Layers
  • Threat Intelligence Sources
  • Threat Intelligence Feeds
  • Threat Intelligence Platforms (TIP)
  • Threat Hunting

Show moredown

Who should attend this Certified Network Defender Certification Course?

This CND Course is specifically designed for individuals who are focused on strengthening their capabilities in network defence against cyber threats. It is particularly beneficial for:

  • Network Security Professionals
  • System Administrators
  • Cybersecurity Analysts
  • IT Managers and Directors
  • Security Engineers
  • Network Architects

Prerequisites of the Certified Network Defender Certification Course

There are no formal prerequisites to attend this CND Training Course.

Certified Network Defender Certification Course Overview

A Network Defender is a cybersecurity professional who specialises in protecting networks from intrusion, attacks, and vulnerabilities. Their role is critical as they safeguard information systems from potential threats that can disrupt or damage operations. This training provides organisations with the expertise needed to secure their network infrastructure against cyber threats.

A CND Course is highly beneficial for IT professionals, Network Administrators, and Cybersecurity Analysts who aim to enhance their skills in protecting, detecting, and responding to network threats. It is also valuable for network engineers and security consultants seeking to deepen their knowledge in network defence strategies.

In The Knowledge Academy’s 5-day Certified Network Defender Certification Course, delegates will learn the essential components of network defence, including the implementation of secure architectures and the management of security policies. The course covers a broad range of topics from securing endpoint devices to managing cloud and virtual network environments.

Course Objectives

  • To understand network vulnerabilities and implement defence strategies
  • To manage and secure endpoint, mobile, and IoT environments
  • To deploy and maintain reliable network perimeter defences
  • To perform network monitoring and analyse security logs
  • To respond to and recover from network security incidents
  • To apply risk management principles and practices effectively

After attending this Certified Network Defender Certification Training, delegates will be equipped with the skills to effectively monitor, detect, and respond to network security threats. They will be able to apply best practices in network defence, manage risks associated with cyber threats, and ensure compliance with regulatory requirements.

Show moredown

What’s included in this Certified Network Defender Training Course?

  • Certified Network Defender Exam (312-38)
  • World-Class Training Sessions from Experienced Instructors
  • Certified Network Defender Certification
  • Digital Delegate Pack

Show moredown

Certified Network Defender Exam Information

The EC-Council Certified Network Defender (CND) exam evaluates a candidate knowledge and skills in network security. The exam format is as follows:

  • Question Type: Multiple Choice
  • Total Questions: 100 Questions
  • Duration: 4 Hours

Show moredown

Online Instructor-led (3 days)

Online Self-paced (24 hours)

Certified DevSecOps Engineer Certification Exam

Certified DevSecOps Engineer Certification Course Outline

Module 1: Understanding DevOps Culture

  • Evolution of DevOps
  • Role of DevOps in Software Development Life Cycle
  • Implementing DevOps in Various Environments
  • On-Premises
  • AWS
  • Azure
  • DevOps Frameworks and Maturity Models
  • Integrating Security in DevOps
    • Security Silos
    • DevOps Culture

Module 2: Introduction to DevSecOps

  • Security Challenges in DevOps Processes
  • Essence and Cultural Aspects of DevSecOps
  • Continuous Security Integration in DevSecOps Pipeline
  • DevSecOps Tools and Strategies
  • Bridging the Gap Between Development, Operations, and Security

Module 3: DevSecOps Pipeline-Plan Stage

  • Fortifying the CI/CD Pipeline
  • Continuous Threat Modeling Practices
  • Gathering Security Requirements from Business Functionalities
  • Addressing Technical Security Debts
  • Pre-Commit Checks and Secure Code Practices

Module 4: DevSecOps Pipeline-Code Stage

  • Integrating Security in Code-Writing Process
  • Security Plugins in Integrated Development Environments (IDEs)
  • Configuring Code Scanning for GitHub Repositories
  • Implementing and Scanning Source Code Repositories
  • Integrating Software Composition Analysis (SCA) Tools

Module 5: DevSecOps Pipeline-Build and Test Stage

  • Integrating Security Testing Tools and Frameworks
  • Static Application Security Testing (SAST) Tools
  • Manual Secure Code Review Techniques
  • Dynamic Application Security Testing (DAST) Tools
  • Interactive Application Security Testing (IAST) Tools

Module 6: DevSecOps Pipeline—Release and Deploy Stage

  • Strengthening Security During Software Release and Deployment
  • Integrating Security Tools
    • RASP
    • Penetration Testing
  • Vulnerability Scanning and Bug Bounty Programs
  • Infrastructure as Code (IaC) Principles
    • Terraform
    • AWS CloudFormation
  • Configuration Orchestration Tools
    • Ansible
    • Chef
    • Puppet
    • Azure Resource Management

Module 7: DevSecOps Pipeline—Operate and Monitor Stage

  • Maintaining Security During Software Operations and Monitoring
  • Scanning for Vulnerabilities in Infrastructure as Code (IaC)
  • Securing Containers and Integrating Monitoring Tools
  • Compliance as Code (CaC) Practices
  • Monitoring Features in AWS and Azure, Web Application Firewall (WAF), Continuous Feedback

Show moredown

Who should attend this Certified DevSecOps Engineer Certification Course?

This ECDE Training Course is tailor-made for individuals who are eager to integrate security seamlessly within DevOps environments. It is particularly beneficial for the following professionals:

  • Cloud DevSecOps Engineer
  • Azure DevSecOps Engineer
  • AWS DevSecOps Engineer
  • DevSecOps Analyst
  • DevSecOps Specialist
  • DevSecOps Operations Engineer
  • DevSecOps Consultant

Prerequisites of the Certified DevSecOps Engineer Certification Course

There are no formal prerequisites to attend this ECDE Training Course.

Certified DevSecOps Engineer Certification Course Overview

A DevSecOps Engineer is a key player in integrating security seamlessly into DevOps practices, ensuring that security considerations are embedded throughout the development, deployment, and maintenance of software systems. Their role is crucial in today’s fast-paced software development environments, as they bridge the gap between development, operations, and security.

Professionals such as DevOps Engineers, Software Developers, and Security Analysts can greatly benefit from attending a Certified DevSecOps Engineer Certification Course. By integrating security practices into the DevOps pipeline, these professionals can ensure that applications are secure from development to deployment.

The Knowledge Academy’s 3-day Certified DevSecOps Engineer Training teaches delegates to implement DevSecOps strategies effectively to promote better collaboration between development, operations, and security teams. They will gain hands-on experience with tools and techniques for continuous security monitoring and integrating security at every phase of the software development lifecycle.

Course Objectives

  • To integrate security practices effectively into DevOps workflows
  • To utilise tools for continuous security monitoring and compliance
  • To implement vulnerability management strategies efficiently
  • To develop secure code using integrated development environments
  • To manage security in software release and deployment stage
  • To ensure operational security in live DevOps environments.

After attending this Certified DevSecOps Engineer Training, delegates will be able to develop and implement security measures within the DevOps pipeline effectively.

Show moredown

What’s included in this Certified DevSecOps Engineer Certification Course?

  • EC-Council Certified DevSecOps Engineer (ECDE) Exam
  • World-Class Training Sessions from Experienced Instructors
  • Certified DevSecOps Engineer Certificate
  • Digital Delegate Pack

Show moredown

Certified DevSecOps Engineer Certification Exam Information

The Certified DevSecOps Engineer (ECDE) exam evaluates a candidate proficiency in integrating security into DevOps processes. The exam format is as follows:

  • Type of Questions: Multiple Choice
  • Total Questions: 100
  • Pass Mark: 70%
  • Duration: 4 Hours

Show moredown

Online Instructor-led (3 days)

Online Self-paced (24 hours)

Certified SOC Analyst Certification Exam

Certified SOC Analyst Certification Course Outline

Module 1: Security Operations and Management

  • Understand the SOC Fundamentals
  • Discuss the Components of SOC
    • People
    • Processes
    • Technology
  • Understand the Implementation of SOC

Module 2: Understanding Cyber Threats, IoCs, and Attack Methodology

  • Describe the term Cyber Threats and Attacks
  • Understand the Network Level Attacks
  • Understand the Host Level Attacks
  • Understand the Application Level Attacks
  • Understand the Indicators of Compromise (IoCs)
  • Discuss the Attacker’s Hacking Methodology

Module 3: Incidents, Events, and Logging

  • Understand the Fundamentals of Incidents, Events, and Logging
  • Explain the Concepts of Local Logging
  • Explain the Concepts of Centralized Logging

Module 4: Incident Detection with Security Information and Event Management (SIEM)

  • Understand the Basic Concepts of Security Information and Event Management (SIEM)
  • Discuss the Different SIEM Solutions
  • Understand the SIEM Deployment
  • Learn Different Use Case Examples for Application Level Incident Detection
  • Learn Different Use Case Examples for Insider Incident Detection
  • Learn Different Use Case Examples for Network Level Incident Detection
  • Learn Different Use Case Examples for Host Level Incident Detection
  • Learn Different Use Case Examples for Compliance
  • Understand the Concept of Handling Alert Triaging and Analysis

Module 5: Enhanced Incident Detection with Threat Intelligence

  • Learn Fundamental Concepts on Threat Intelligence
  • Learn Different Types of Threat Intelligence
  • Understand How Threat Intelligence Strategy is Developed
  • Learn Different Threat Intelligence Sources from which Intelligence can be Obtained
  • Learn Different Threat Intelligence Platform (TIP)
  • Understand the Need of Threat Intelligence-driven SOC

Module 6: Incident Response

  • Understand the Fundamental Concepts of Incident Response
  • Learn Various Phases in Incident Response Process
  • Learn How to Respond to Network Security Incidents
  • Learn How to Respond to Application Security Incidents
  • Learn How to Respond to Email Security Incidents
  • Learn How to Respond to Insider Incidents
  • Learn How to Respond to Malware Incidents

Show moredown

Who should attend this Certified SOC Analyst Certification Course?

The Certified SOC Analyst Certification Course is ideal for those seeking to enhance their skills in security operations and incident response. This course is particularly beneficial for the following professionals:

  • Security Analysts
  • Network Security Engineers
  • IT Administrators
  • Incident Responders
  • Threat Hunters
  • Security Operations Center (SOC) Team Members
  • System Administrators
  • Cybersecurity Enthusiasts

Prerequisites of the Certified SOC Analyst Certification Course

There are no formal prerequisites for attending this CSA Certification Course.

Certified SOC Analyst Certification Course Overview

The Certified SOC Analyst Certification Course is designed for individuals aiming to build a strong foundation in Security Operations Centre (SOC) operations. This course is pivotal for enhancing skills in monitoring, detecting, and responding to cybersecurity threats effectively. It provides essential knowledge for those involved in the management and analysis of security operations, contributing to robust organisational security frameworks.

Proficiency in Certified SOC Analyst Certification Course is crucial for Security Analysts, Incident Responders, and IT Security Professionals. Mastery in this domain enables professionals to detect and mitigate threats efficiently, ensuring the integrity and safety of an organisation’s digital assets. It is vital for those looking to advance their careers in cybersecurity and contribute to the resilience of their organisations against sophisticated cyber threats.

This comprehensive 3-day course by The Knowledge Academy equips delegates with fundamental concepts and practical skills required for effective SOC operations. Through interactive workshops and expert-led sessions, delegates gain an in-depth understanding of SOC roles, incident response procedures, and threat intelligence. They learn to use SOC tools, analyse security alerts, and develop strategies to manage and mitigate security incidents.

Course Objectives

  • To understand the fundamental roles and responsibilities within a Security Operations Centre (SOC)
  • To explore incident detection and response methodologies and best practices
  • To apply threat intelligence and security monitoring tools for effective threat management
  • To analyse and respond to security incidents using established procedures and protocols
  • To develop strategies for continuous improvement and optimisation of SOC operations
  • To comprehend the regulatory and compliance aspects relevant to SOC functions

Upon completing this course, delegates will have acquired the knowledge and skills necessary to operate effectively within a SOC environment. They will be proficient in managing security incidents and contributing to the overall security posture of their organisations.

Show moredown

What’s included in this Certified SOC Analyst Certification Course?

  • Certified SOC Analyst (CSA Examination)
  • World-Class Training Sessions from Experienced Instructors
  • Certified SOC Analyst (CSA) Certificate
  • Digital Delegate Pack

Show moredown

Certified SOC Analyst Certification Exam Information

The Certified SOC Analyst Certification Course evaluates delegate understanding of the principles and practices of Security Operations Center (SOC) operations. This certification focuses on equipping individuals with practical knowledge and terminology essential for SOC environments, aiming to enhance their ability to detect, analyse, and respond to security incidents effectively.

  • Type of Questions: Multiple Choice
  • Total Questions: 100
  • Duration: 3 Hours

Show moredown

Online Instructor-led (3 days)

Online Self-paced (24 hours)

Certified Application Security Engineer Certification Exam

Certified Application Security Engineer Certification Course Outline

Module 1: Understanding Application Security, Threats and Attacks

  • What is a Secure Application?
  • Need for Application Security
  • Most Common Application Level Attacks
  • Why Applications become Vulnerable to Attacks?
  • What Constitutes Comprehensive Application Security?
  • Insecure Application: A Software Development Problem
  • Software Security Standards, Models and Frameworks

Module 2: Security Requirements Gathering

  • Importance of Gathering Security Requirements
  • Security Requirement Engineering (SRE)
  • Abuse Case and Security Use Case Modelling
  • Abuser and Security Stories
  • Security Quality Requirements Engineering (SQUARE)
  • Operationally Critical Threat, Asset and Vulnerability Evaluation (OCTAVE)

Module 3: Secure Application Design and Architecture

  • Relative Cost of Fixing Vulnerabilities at Different Phases of SDLC
  • Secure Application Design and Architecture
  • Goal of Secure Design Process
  • Secure Design Actions
  • Secure Design Principles
  • Threat Modelling
  • Decompose Application
  • Secure Application Architecture

Module 4: Secure Coding Practices for Input Validation

  • Input Validation
  • Why Input Validation?
  • Input Validation Specification
  • Input Validation Approaches
  • Input Filtering
  • Secure Coding Practices for Input Validation: Web Forms
  • Secure Coding Practices for Input Validation: ASP.NET Core
  • Secure Coding Practices for Input Validation: MVC

Module 5: Secure Coding Practices for Authentication and Authorisation

  • Authentication and Authorisation
  • Common Threats on User Authentication and Authorisation
  • Authentication and Authorisation: Web Forms
  • Authentication and Authorisation: ASP .NET Core
  • Authentication and Authorisation: MVC
  • Authentication and Authorisation Defensive Techniques: Web Forms
  • Authentication and Authorisation Defensive Techniques: ASP .NET Core
  • Authentication and Authorisation Defensive Techniques: MVC

Module 6: Secure Coding Practices for Cryptography

  • Cryptographic
  • Ciphers
  • Block Ciphers Modes
  • Symmetric Encryption Keys
  • Asymmetric Encryption Keys
  • Functions of Cryptography
  • Use of Cryptography to Mitigate Common Application Security Threats
  • Cryptographic Attacks
  • Techniques Attackers Use to Steal Cryptographic Keys
  • What should you do to Secure .Net Applications for Cryptographic Attacks?
  • .NET Cryptographic Name Spaces
  • .NET Cryptographic Class Hierarchy
  • Symmetric Encryption
  • Symmetric Encryption: Defensive Coding Techniques
  • Asymmetric Encryption
  • Asymmetric Encryption: Defensive Coding Techniques
  • Hashing
  • Digital Signatures
  • Digital Certificates
  • XML Signature
  • ASP.NET Core Specific Secure Cryptography Practices

Module 7: Secure Coding Practices for Session Management

  • What are Exceptions/Runtime Errors?
  • Need for Secure Error/Exception Handling
  • Consequences of Detailed Error Message
  • Exposing Detailed Error Messages
  • Considerations: Designing Secure Error Messages
  • Secure Exception Handling
  • Handling Exceptions in an Application
  • Defensive Coding practices against Information Disclosure
  • Defensive Coding practices against Improper Error Handling
  • ASP .NET Core: Secure Error Handling Practices
  • Secure Auditing and Logging
  • Tracing .NET
  • Auditing and Logging Security Checklists

Module 8: Static and Dynamic Application Security Testing (SAST and DAST)

  • Static Application Security Testing
  • Manual Secure Code Review for Most Common Vulnerabilities
  • Code Review: Check List Approach
  • SAST Finding
  • SAST Report
  • Dynamic Application Security Testing
  • Automated Application Vulnerability Scanning Tools
  • Proxy-Based Security Testing Tools
  • Choosing between SAST and DAST

Module 9: Secure Deployment and Maintenance

  • Secure Deployment
  • Prior Deployment Activity
  • Deployment Activities: Ensuring Security at Various Levels
  • Ensuring Security at Host Level
  • Ensuring Security at Network Level
  • Ensuring Security at Application Level
  • Web Application Firewall (WAF)
  • Ensuring Security at IIS Level
  • Sites and Virtual Directories
  • ISAPI Filters
  • Ensuring Security at .NET Level
  • Ensuring Security at SQL Server Level
  • Security Maintenance and Monitoring

Show moredown

Who should attend this Certified Application Security Engineer Certification Course?

This CASE .NET Training Course is perfectly suited for individuals who are focused on enhancing their abilities in securing .NET applications and understanding the intricacies of application security within the .NET framework. It is especially beneficial for:

  • Software Developers
  • Security Engineers
  • IT Managers
  • IT Directors
  • Application Architects
  • Cybersecurity Analysts
  • System Administrators

Prerequisites of the Certified Application Security Engineer Certification Course

There are no formal prerequisites to attend this CASE .NET Training Course. 

Certified Application Security Engineer Certification Course Overview

A Certified Application Security Engineer (CASE .NET) is an expert dedicated to bolstering the security of .NET applications against a variety of security threats and vulnerabilities. This expertise is paramount for ensuring that sensitive data is protected, and business applications operate reliably. Organisations benefit from this training as it enhances their security measures.

This certification opens doors to new career opportunities, including roles like Security Analysts, Developers, and Application Architects, enhancing their marketability and professional growth. It provides a competitive edge in the job market, showcasing their commitment to maintaining secure software development practices.

The Knowledge Academy’s 3-day Certified Application Security Engineer Certification training helps delegates understand the layers of .NET security, and the knowledge to identify and mitigate vulnerabilities efficiently. The training covers a broad spectrum of topics, from secure coding practices and threat modelling to sophisticated cryptographic techniques.

Course Objectives

  • To identify common security vulnerabilities in .NET applications
  • To apply best practices in secure coding for authentication and authorisation
  • To implement cryptographic techniques in application security
  • To perform thorough security testing using SAST and DAST methodologies
  • To deploy .NET applications securely and maintain security post-deployment
  • To understand .NET frameworks for risk management and mitigation

After attending this Certified Application Security Engineer Certification Training, delegates will be equipped to proactively secure .NET applications from the ground up. They will be able to implement effective security measures throughout the software development lifecycle, from design to deployment.

Show moredown

What’s included in this Certified Application Security Engineer Certification?

  • Certified Application Security Engineer Certification Examination
  • World-Class Training Sessions from Experienced Instructors
  • Certified Application Security Engineer Certificate
  • Digital Delegate Pack

Show moredown

Certified Application Security Engineer Certification Exam Information

The CASE .NET exam evaluates a candidate proficiency in application security within the .NET framework. To be eligible for the exam, candidates must complete the CASE .NET Training Course and typically have one to two years of experience in software development, particularly with the .NET framework. The exam format is as follows:

  • Type of Questions: Multiple Choice Questions
  • Total Questions: 50
  • Pass Mark: 70%
  • Duration: 2 Hours

Show moredown

Online Instructor-led (5 days)

Online Self-paced (40 hours)

Certified Chief Information Security Officer Certification Exam

Certified Chief Information Security Officer Certification Course Outline

Domain 1: Governance and Risk Management

Module 1: Define, Implement, Manage, and Maintain an Information Security Governance Program

  • Form of Business Organisation
  • Industry
  • Organisational Maturity

Module 2: Information Security Drivers

Module 3: Establishing an Information Security Management Structure

  • Organisational Structure
  • Where does the CISO fit within the Organisational Structure
  • The Executive CISO
  • Nonexecutive CISO

Module 4: Laws/Regulations/Standards as Drivers of Organisational Policy/Standards/Procedures

Module 5: Managing an Enterprise Information Security Compliance Program

  • Security Policy
  • Necessity of a Security Policy
  • Security Policy Challenges
  • Policy Content
    • Types of Policies
    • Policy Implementation
  • Reporting Structure
  • Standards and Best Practices
  • Leadership and Ethics
  • EC-Council Code of Ethics

Module 6: Introduction to Risk Management

  • Organisational Structure
  • Where does the CISO fit within the Organisational Structure
  • The Executive CISO
  • Nonexecutive CISO

Domain 2: Information Security Controls, Compliance, and Audit Management

Module 7: Information Security Controls

  • Identifying the Organisation’s Information Security Needs
    • Identifying the Optimum Information Security Framework
    • Designing Security Controls
    • Control Lifecycle Management
    • Control Classification
    • Control Selection and Implementation
    • Control Catalogue
    • Control Maturity
    • Monitoring Security Controls
    • Remediating Control Deficiencies
    • Maintaining Security Controls
    • Reporting Controls
    • Information Security Service Catalogue

Module 8: Compliance Management

  • Acts, Laws, and Statutes
  • FISMA
  • Regulations
  • GDPR
  • Standards
    • ASD—Information Security Manual
    • Basel III
    • FFIEC
    • ISO 00 Family of Standards
    • NERC-CIP
    • PCI DSS
    • NIST Special Publications
    • Statement on Standards for Attestation Engagements No. 16 (SSAE 16)

Module 9: Guidelines, Good and Best Practices

  • CIS
    • OWASP

Module 10: Audit Management

  • Audit Expectations and Outcomes
  • IS Audit Practices
    • ISO/IEC Audit Guidance
    • Internal versus External Audits
    • Partnering with the Audit Organisation
    • Audit Process
    • General Audit Standards
    • Compliance-Based Audits
    • Risk-Based Audits
    • Managing and Protecting Audit Documentation
    • Performing an Audit
    • Evaluating Audit Results and Report
    • Remediating Audit Findings
    • Leverage GRC Software to Support Audits

Domain 3: Security Program Management & Operations

Module 11: Program Management

  • Defining a Security Charter, Objectives, Requirements, Stakeholders, and Strategies
    • Security Program Charter
    • Security Program Objectives
    • Security Program Requirements
    • Security Program Stakeholders
    • Security Program Strategy Development
  • Executing an Information Security Program
  • Defining and Developing, Managing and Monitoring the Information Security Program
    • Defining an Information Security Program Budget
    • Developing an Information Security Program Budget
    • Managing an Information Security Program Budget
    • Monitoring an Information Security Program Budget
  • Defining and Developing Information Security Program Staffing Requirements
  • Managing the People of a Security Program
    • Resolving Personnel and Teamwork Issues
    • Managing Training and Certification of Security Team Members
    • Clearly Defined Career Path
    • Designing and Implementing a User Awareness Program
  • Managing the Architecture and Roadmap of the Security Program
    • Information Security Program Architecture
    • Information Security Program Roadmap
  • Program Management and Governance
    • Understanding Project Management Practices
    • Identifying and Managing Project Stakeholders
    • Measuring the Effectives of Projects
  • Business Continuity Management (BCM) and Disaster Recovery Planning (DRP)
  • Data Backup and Recovery
  • Backup Strategy
  • ISO BCM Standards
    • Business Continuity Management (BCM)
    • Disaster Recovery Planning (DRP)
  • Continuity of Security Operations
    • Integrating the Confidentiality, Integrity and Availability (CIA) Model
  • BCM Plan Testing
  • DRP Testing
  • Contingency Planning, Operations, and Testing Programs to Mitigate Risk and Meet Service Level Agreements (SLAs)
  • Computer Incident Response
    • Incident Response Tools
    • Incident Response Management
    • Incident Response Communications
    • Post-Incident Analysis
    • Testing Incident Response Procedures
  • Digital Forensics
    • Crisis Management
    • Digital Forensics Life Cycle

Module 12: Operations Management

  • Establishing and Operating a Security Operations (SecOps) Capability
  • Security Monitoring and Security Information and Event Management (SIEM)
  • Event Management
  • Incident Response Model
    • Developing Specific Incident Response Scenarios
  • Threat Management
  • Threat Intelligence
    • Information Sharing and Analysis Centres (ISAC)
  • Vulnerability Management
    • Vulnerability Assessments
    • Vulnerability Management in Practice
    • Penetration Testing
    • Security Testing Teams
    • Remediation
  • Threat Hunting

Module 13: Summary

Domain 4: Information Security Core Competencies

Module 14: Access Control

  • Authentication, Authorisation, and Auditing
  • Authentication
  • Authorisation
  • Auditing
  • User Access Control Restrictions
  • User Access Behaviour Management
  • Types of Access Control Models
  • Designing an Access Control Plan
  • Access Administration

Module 15: Physical Security

  • Designing, Implementing, and Managing Physical Security Program
    • Physical Risk Assessment
  • Physical Location Considerations
  • Obstacles and Prevention
  • Secure Facility Design
    • Security Operations Centre
    • Sensitive Compartmented Information Facility
    • Digital Forensics Lab
    • Datacentre
  • Preparing for Physical Security Audits

Module 16: Network Security

  • Network Security Assessments and Planning
  • Network Security Architecture Challenges
  • Network Security Design
  • Network Standards, Protocols, and Controls
    • Network Security Standards
    • Protocols

Module 17: Certified Chief

  • Network Security Controls
  • Wireless (Wi-Fi) Security
    • Wireless Risks
    • Wireless Controls
  • Voice over IP Security

Module 18: Endpoint Protection

  • Endpoint Threats
  • Endpoint Vulnerabilities
  • End User Security Awareness
  • Endpoint Device Hardening
  • Endpoint Device Logging
  • Mobile Device Security
    • Mobile Device Risks
    • Mobile Device Security Controls
  • Internet of Things Security (IoT)
    • Protecting IoT Devices

Module 19: Application Security

  • Secure SDLC Model
  • Separation of Development, Test, and Production Environments
  • Application Security Testing Approaches
  • DevSecOps
  • Waterfall Methodology and Security
  • Agile Methodology and Security
  • Other Application Development Approaches
  • Application Hardening
  • Application Security Technologies
  • Version Control and Patch Management
  • Database Security
  • Database Hardening
  • Secure Coding Practices

Module 20: Encryption Technologies

  • Encryption and Decryption
  • Cryptosystems
    • Blockchain
    • Digital Signatures and Certificates
    • PKI
    • Key Management
  • Hashing
  • Encryption Algorithms
  • Encryption Strategy Development
    • Determining Critical Data Location and Type
    • Deciding What to Encrypt
    • Determining Encryption Requirements
    • Selecting, Integrating, and Managing Encryption Technologies

Module 21: Virtualisation Security

  • Virtualisation Overview
  • Virtualisation Risks
  • Virtualisation Security Concerns
  • Virtualisation Security Controls
  • Virtualisation Security Reference Model

Module 22: Cloud Computing Security

  • Overview of Cloud Computing
  • Security and Resiliency Cloud Services
  • Cloud Security Concerns
  • Cloud Security Controls
  • Cloud Computing Protection Considerations

Module 23: Transformative Technologies

  • Artificial Intelligence
  • Augmented Reality
  • Autonomous SOC
  • Dynamic Deception
  • Software-Defined Cybersecurity

Domain 5: Strategic Planning, Finance, Procurement and Vendor Management

Module 24: Strategic Planning

  • Understanding the Organisation
    • Understanding the Business Structure
    • Determining and Aligning Business and Information Security Goals
    • Identifying Key Sponsors, Stakeholders, and Influencers
    • Understanding Organisational Financials
  • Creating an Information Security Strategic Plan
    • Strategic Planning Basics
    • Alignment to Organisational Strategy and Goals
    • Defining Tactical Short, Medium, and Long-Term Information Security Goals
    • Information Security Strategy Communication
    • Creating a Culture of Security

Module 25: Designing, Developing, and Maintaining an Enterprise Information Security Program

  • Ensuring a Sound Program Foundation
  • Architectural Views
  • Creating Measurements and Metrics
  • Balanced Scorecard
  • Continuous Monitoring and Reporting Outcomes
  • Continuous Improvement
  • Information Technology Infrastructure Library (ITIL) Continual Service Improvement (CSI)

Module 26: Understanding the Enterprise Architecture (EA)

  • EA Types
    • The Zachman Framework
    • The Open Group Architecture Framework (TOGAF)
    • Sherwood Applied Business Security Architecture (SABSA)
    • Federal Enterprise Architecture Framework (FEAF)

Module 27: Finance

  • Understanding Security Program Funding
  • Analysing, Forecasting, and Developing a Security Budget
    • Resource Requirements
    • Define Financial Metrics
    • Technology Refresh
    • New Project Funding
    • Contingency Funding
  • Managing the information Security Budget
    • Obtain Financial Resources
    • Allocate Financial Resources
    • Monitor and Oversight of Information Security Budget
    • Report Metrics to Sponsors and Stakeholders
    • Balancing the Information Security Budget

Module 28: Procurement

  • Procurement Program Terms and Concepts
    • Statement of Objectives (SOO)
    • Statement of Work (SOW)
    • Total Cost of Ownership (TCO)
    • Request for Information (RFI)
    • Request for Proposal (RFP)
    • Master Service Agreement (MSA)
    • Service Level Agreement (SLA)
    • Terms and Conditions (T&C)
  • Understanding the Organisation’s Procurement Program
    • Internal Policies, Processes, and Requirements
    • External or Regulatory Requirements
    • Local Versus Global Requirements
  • Procurement Risk Management
    • Standard Contract Language

Module 29: Vendor Management

  • Understanding the Organisation’s Acquisition Policies and Procedures
    • Procurement Life cycle
  • Applying Cost-Benefit Analysis (CBA) During the Procurement Process
  • Vendor Management Policies
  • Contract Administration Policies
    • Service and Contract Delivery Metrics
    • Contract Delivery Reporting
    • Change Requests
    • Contract Renewal
    • Contract Closure
  • Delivery Assurance
    • Validation of Meeting Contractual Requirements
    • Formal Delivery Audits
    • Periodic Random Delivery Audits
    • Third-Party Attestation Services (TPRM)

Show moredown

Who should attend this Certified Chief Information Security Officer Certification?

This CCISO Training is tailored for experienced professionals aiming to elevate their careers by leading cybersecurity strategies at an organisational level. It's ideal for those looking to gain a comprehensive understanding of the complexities of information security management and governance. It is particularly beneficial for:

  • Chief Information Security Officers
  • IT Directors
  • Security Analysts
  • Network Architects
  • Security Architects
  • Senior IT Managers
  • Compliance Officers

Prerequisites of the Certified Chief Information Security Officer Certification

To attend the CCISO Training, delegates should meet the following prerequisites:

  • Professional Experience: Delegates must have five years of experience in three of the five CCISO Domains:
  1. Governance, Risk, Compliance
  2. Information Security Controls and Audit Management
  3. Security Program Management & Operations
  4. Information Security Core Competencies
  5. Strategic Planning, Finance, Procurement, and Third-Party Management
  • Educational Background: A bachelor's degree or higher in Information Technology, Computer Science, or a related field is highly recommended, though extensive relevant experience may substitute for formal education in some cases.

Certified Chief Information Security Officer Course Overview

The role of a Chief Information Security Officer (CISO) is pivotal in shaping the cybersecurity landscape of modern enterprises. As cyber threats evolve in complexity and scale, the need for strategic and knowledgeable leadership in the field of information security has never been more critical. The Certified Chief Information Security Officer Training Course equips professionals with the necessary skills to assume top-tier security roles within organisations.

Understanding the full scope of information security management is essential for those who protect organisations from cyber threats. The CCISO Course is designed for senior-level professionals committed to advancing their expertise in cybersecurity management, strategy, and governance. It's particularly crucial for those aspiring to leadership roles where they will dictate security policies and frameworks.

This 5-day Certified Chief Information Security Officer Course provided by The Knowledge Academy offers intensive, focused instruction that prepares delegates for high-stakes roles in cybersecurity leadership. Delegates will gain insights into the latest security challenges and best practices, enhancing their strategic decision-making and leadership capabilities in information security, all condensed into an efficient one-day format.

Course Objectives

  • To deepen understanding of strategic cybersecurity leadership
  • To master governance, risk management, and compliance
  • To develop skills for managing robust security programs
  • To apply strategies in real-world scenarios
  • To prepare for senior roles and certification success

Upon completion of the Certified Chief Information Security Officer Course, delegates will have acquired the strategic insights and practical tools necessary for leading complex security initiatives. They will be better positioned to influence their organisations' security strategies and contribute effectively at the highest levels of leadership.

Show moredown

What’s included in this Certified Chief Information Security Officer Certification?

  • Certified Chief Information Security Officer Exam
  • World-Class Training Sessions from Experienced Instructors
  • CCISO Certification
  • Digital Delegate Pack

Show moredown

Certified Chief Information Security Officer Certification Exam Information

The CCISO Exam assesses a candidate knowledge and skills in areas crucial for a Chief Information Security Officer. It is designed to validate comprehensive leadership abilities in managing an organisation’s information security.

Eligibility requirements: Candidates can sit for the CCISO Exam without training if they have five years of experience in each of the five CCISO domains. Alternatively, those who opt for training must have five years of experience in three of the five domains.

  • Question Type: Multiple-Choice 
  • Total Questions: 150
  • Pass Marks: 60%
  • Duration: 2.5 Hours 
  • Exam Mode: ECC Exam Portal

Show moredown

Online Instructor-led (5 days)

Online Self-paced (40 hours)

Certified Cybersecurity Technician Certification Exam

Certified Cybersecurity Technician Certification Course Outline

Module 1: Information Security Threats and Vulnerabilities

  • Identifying Common Threats
  • Vulnerability Assessment
  • Risk Evaluation

Module 2: Information Security Attacks

  • Social Engineering Attacks
  • Network Attacks
  • Application-Level Attacks

Module 3: Network Security Fundamentals

  • Basics of Network Layers
  • Security Protocols
  • Network Architecture Security

Module 4: Identification, Authentication, and Authorisation

  • Types of Authentication Methods
  • Role-Based Access Control (RBAC) Systems
  • Biometric Systems

Module 5: Network Security Controls – Administrative Controls

  • Security Policies and Procedures
  • Compliance and Auditing
  • User Training and Awareness Programs

Module 6: Network Security Controls – Physical Controls

  • Access Control Mechanisms
  • Surveillance and Monitoring
  • Environmental Controls

Module 7: Network Security Controls – Technical Controls

  • Firewalls and Intrusion Detection Systems
  • Encryption Technologies
  • Endpoint Security

Module 8: Network Security Assessment Techniques and Tools

  • Penetration Testing
  • Vulnerability Scanning
  • Security Audits

Module 9: Business Continuity and Disaster Recovery

  • Disaster Recovery Planning
  • Business Continuity Strategies
  • Data Backup and Recovery Solutions

Module 10: Application Security

  • Secure Software Development Lifecycle (SDLC)
  • Application Vulnerability Testing
  • Code Review and Security Testing

Module 11: Virtualisation and Cloud Computing

  • Securing Virtual Environments
  • Cloud Security Architectures
  • Cloud Service Models and Security

Module 12: Wireless Network Security

  • Wireless Protocols and Encryption
  • Securing Wireless Networks
  • Wireless Vulnerability Assessments

Module 13: Mobile Device Security

  • Mobile Security Best Practices
  • Mobile Device Management (MDM)
  • Securing Mobile Applications

Module 14: IoT and OT Security

  • Security Challenges in IoT
  • Securing IoT Devices
  • Security in Operational Technology

Module 15: Cryptography

  • Fundamentals of Cryptography
  • Cryptographic Algorithms
  • Cryptography Applications

Module 16: Data Security

  • Data Encryption
  • Data Masking Techniques
  • Secure Data Storage

Module 17: Network Troubleshooting

  • Troubleshooting Methodologies
  • Common Network Problems
  • Tools for Troubleshooting

Module 18: Network Traffic Monitoring

  • Techniques for Monitoring Traffic
  • Tools and Applications for Traffic Analysis
  • Real-Time Traffic Analysis

Module 19: Network Logs Monitoring and Analysis

  • Log Management and Analysis Techniques
  • Security Information and Event Management (SIEM)
  • Log Analysis Tools

Module 20: Incident Response

  • Incident Response Lifecycle
  • Preparation and Identification
  • Containment, Eradication, and Recovery

Module 21: Computer Forensics

  • Fundamentals of Computer Forensics
  • Forensic Analysis Techniques
  • Legal Considerations in Forensics

Module 22: Risk Management

  • Risk Assessment Methods
  • Mitigation Strategies
  • Continuous Monitoring and Review

Show moredown

Who should attend this Certified Cybersecurity Technician Certification?

This Certified Cybersecurity Technician Course Training is ideal for IT professionals seeking to improve their cybersecurity knowledge and skills. Anyone looking to specialise in cybersecurity can transition into a security-focused role or update their expertise in defending against cyber threats. It is particularly beneficial for:

  • IT Security Analysts
  • Network Administrators
  • System Administrators
  • IT Managers
  • Security Consultants
  • Risk Management Professionals
  • Technical Support Engineers

Prerequisites of the Certified Cybersecurity Technician Certification

There are no formal prerequisites to attend this Certified Cybersecurity Technician Training.

Certified Cybersecurity Technician Certification Course Overview

Cybersecurity is essential for organisations of all sizes and sectors. The Certified Cybersecurity Technician Course (CCT) Certification provides the knowledge and skills to protect networks and data from cyber threats. Understanding cybersecurity tools, identifying vulnerabilities, and executing strong security measures are crucial components.

The C|CT Course is pivotal for IT professionals who aim to protect their organisations against cyber incidents. With cyber threats evolving rapidly, mastering cybersecurity techniques is essential for professionals responsible for maintaining the integrity and confidentiality of data. This C|CT Training is necessary for those in IT security, network management, and systems administration.

The Knowledge Academy’s Certified Cybersecurity Technician Course is a comprehensive 5-day course designed to equip delegates with practical skills and the latest cybersecurity strategies. Through interactive sessions and hands-on labs, delegates will learn how to detect vulnerabilities, respond to cyber incidents, and ensure continuous security compliance. This training prepares individuals for real-world challenges and enhances their credentials as cybersecurity technicians.

Course Objectives

  • To develop a thorough understanding of cybersecurity principles and practices
  • To enhance skills in identifying, analysing, and mitigating cybersecurity threats
  • To provide hands-on experience with the latest security tools and techniques
  • To prepare delegates for successful CCT certification
  • To foster a deep comprehension of network, application, and operational security

Upon completing the C|CT Training, delegates will be well-prepared to manage current and future cybersecurity challenges. They will gain confidence in implementing strong security measures, ensuring they are valuable to their organizations in maintaining data integrity and security.

Show moredown

What’s included in this Certified Cybersecurity Technician Certification?

  • Certified Cybersecurity Technician Exam (212-82)
  • World-Class Training Sessions from Experienced Instructors
  • Certified Cybersecurity Technician Certification
  • Digital Delegate Pack

Show moredown

Certified Cybersecurity Technician Certification Exam Information 

The Certified Cybersecurity Technician Certification exam is a comprehensive assessment that tests a candidate understanding of cybersecurity principles and practices. The exam format is as follows: 

  • Question Type: Multiple-Choice  
  • Total Questions: 60   
  • Pass Marks: 60% 
  • Duration: 3 Hours  
  • Exam Mode: EC-Council Exam Portal 

Show moredown

Online Instructor-led (2 days)

Online Self-paced (16 hours)

Certified Secure Computer User Certification Exam

Certified Secure Computer User Certification Course Outline

  • Module 1: Introduction to Data Security
  • Module 2: Securing Operating Systems
  • Module 3: Malware and Antivirus
  • Module 4: Internet Security
  • Module 5: Security on Social Networking Sites
  • Module 6: Securing Email Communications
  • Module 7: Securing Mobile Devices
  • Module 8: Securing the Cloud
  • Module 9: Securing Network Connections
  • Module 10: Data Backup and Disaster Recovery
  • Module 11: Securing IoT Devices and Gaming Consoles
  • Module 12: Secure Remote Work

Show moredown

Who should attend this Certified Secure Computer User Certification Course

The CSCU Course is ideal for individuals seeking to enhance their cybersecurity skills and knowledge. This course can be particularly beneficial for the following professionals:

  • IT Technicians
  • Network Administrators
  • Security Analysts
  • Help Desk Professionals
  • System Administrators
  • Technical Support Specialists
  • End Users

Prerequisites of the Certified Secure Computer User Certification Course

There are no formal prerequisites for attending this Certified Secure Computer User Certification Course.

Certified Secure Computer User Certification Course Overview

Cybersecurity is more crucial than ever. With increasing reliance on technology, both individuals and organisations are at risk of cyber threats. Understanding how to protect sensitive information and maintain secure online practices is essential for everyone, regardless of their role or industry.

Knowing the basics of cybersecurity is vital for various professionals. IT Technicians, Network Administrators, and Security Analysts need this knowledge to safeguard their systems. Additionally, end users must be aware of cybersecurity practices to protect personal data from cyber threats. Mastering these skills helps in preventing data breaches and ensuring a secure digital environment.

The Knowledge Academy’s 2-days Certified Secure Computer User Certification Course offers delegates the skills to identify, analyse, and counteract cyber threats. Through practical sessions and expert guidance, attendees will learn effective strategies to maintain digital security. This course is designed to provide a comprehensive understanding of cybersecurity fundamentals, empowering delegates to protect themselves and their organisations.

Course Objectives

  • To understand the fundamental concepts of cybersecurity
  • To identify various types of cyber threats and attacks
  • To learn how to secure personal and professional data
  • To gain skills in implementing security measures and best practices
  • To recognise social engineering tactics and how to avoid them
  • To develop the ability to respond to security incidents effectively

Upon completion of this CSCU Course, delegates will be equipped with essential cybersecurity skills, enabling them to protect their digital assets and environments. They will have the confidence to apply these practices in both personal and professional contexts, ensuring robust cybersecurity measures are in place.

Show moredown

What’s included in this Certified Secure Computer User Certification Course?

  • Certified Secure Computer User (CSCU) Examination
  • World-Class Training Sessions from Experienced Instructors
  • Certified Secure Computer User (CSCU) Certificate
  • Digital Delegate Pack

Show moredown

Certified Secure Computer User Certification Exam Information

The Certified Secure Computer User Certification Exam evaluates delegate understanding of fundamental cybersecurity concepts and practices. This certification aims to equip individuals with essential knowledge and skills to safeguard information and secure online environments. The exam focuses on assessing practical abilities in identifying threats, implementing security measures, and maintaining data integrity.

  • Type of Questions: Multiple Choice
  • Total Questions: 50
  • Duration: 2 Hours
  • Exam Name: CSCU (112-12) Exam

Show moredown

Online Instructor-led (5 days)

Online Self-paced (40 hours)

Certified Ethical Hacker Certification Exam

Certified Ethical Hacker Course Outline

Module 1: Introduction to Ethical Hacking

  • Elements of Information Security
  • Cyber Kill Chain Methodology
  • MITRE ATT&CK Framework
  • Hacker Classes
  • Ethical Hacking
  • Information Assurance (IA)
  • Risk Management
  • Incident Management
  • PCI DSS
  • HIPPA
  • SOX
  • GDPR

Module 2: Foot Printing and Reconnaissance

  • Foot printing
  • Advanced Google Hacking Techniques
  • Deep and Dark Web Foot printing
  • Competitive Intelligence Gathering
  • Website Foot printing
  • Website Mirroring
  • Email Foot printing
  • Whose Lookup
  • DNS Foot printing
  • Traceroute Analysis
  • Foot printing Tools

Module 3: Scanning Networks

  • Network Scanning
  • Host Discovery Techniques
  • Port Scanning Techniques
  • Service Version Discovery
  • OS Discovery
  • Banner Grabbing
  • OS Fingerprinting
  • Packet Fragmentation
  • Source Routing
  • IP Address Spoofing
  • Scanning Tools

Module 4: Enumeration

  • Enumeration
  • NetBIOS Enumeration
  • SNMP Enumeration
  • LDAP Enumeration
  • NTP Enumeration
  • NFS Enumeration
  • SMTP Enumeration
  • DNS Cache Snooping
  • DNSSEC Zone Walking
  • IPsec Enumeration
  • VoIP Enumeration
  • RPC Enumeration
  • Unix/Linux User Enumeration
  • Enumeration Tools

Module 5: Vulnerability Analysis

  • Enumeration
  • NetBIOS Enumeration
  • SNMP Enumeration
  • LDAP Enumeration
  • NTP Enumeration
  • NFS Enumeration
  • SMTP Enumeration
  • DNS Cache Snooping
  • DNSSEC Zone Walking
  • IPsec Enumeration
  • VoIP Enumeration
  • RPC Enumeration
  • Unix/Linux User Enumeration
  • Enumeration Tools

Module 6: System Hacking

  • Password Cracking
  • Password Attacks
  • Wire Sniffing
  • Password-Cracking Tools
  • Vulnerability Exploitation
  • Buffer Overflow
  • Privilege Escalation
  • Privilege Escalation Tools
  • Keylogger
  • Spyware
  • Anti-Keyloggers
  • Anti-Spyware
  • Rootkits
  • Anti-Rootkits
  • Steganography
  • Steganography Tools
  • Steganalysis
  • Steganography Detection Tools
  • Maintaining Persistence
  • Post Exploitation
  • Clearing Logs
  • Covering Tracks
  • Track-Covering Tools

Module 7: Malware Threats

  • Malware
  • Components of Malware
  • APT
  • Trojan
  • Types of Trojans
  • Exploit Kits
  • Virus
  • Virus Lifecycle
  • Types of Viruses
  • Ransomware
  • Computer Worms
  • File less Malware
  • Malware Analysis
  • Static Malware Analysis
  • Dynamic Malware Analysis
  • Virus Detection Methods
  • Trojan Analysis
  • Virus Analysis
  • File less Malware Analysis
  • Anti-Trojan Software
  • Antivirus Software
  • File less Malware Detection Tools

Module 8: Sniffing

  • Network Sniffing
  • Wiretapping
  • MAC Flooding
  • DHCP Starvation Attack
  • ARP Spoofing Attack
  • ARP Poisoning
  • ARP Poisoning Tools
  • MAC Spoofing
  • STP Attack
  • DNS Poisoning
  • DNS Poisoning Tools
  • Sniffing Tools
  • Sniffer Detection Techniques
  • Promiscuous Detection Tools

Module 9: Social Engineering

  • Social Engineering
  • Types of Social Engineering
  • Phishing
  • Phishing Tools
  • Insider Threats/Insider Attacks
  • Identity Theft

Module 10: Denial-of-Service

  • DoS Attack
  • DDoS Attack
  • Botnets
  • DoS/DDoS Attack Techniques
  • DoS/DDoS Attack Tools
  • DoS/DDoS Attack Detection Techniques
  • DoS/DDoS Protection Tools

Module 11: Session High jacking

  • Session Hijacking
  • Types of Session Hijacking
  • Spoofing
  • Application-Level Session Hijacking
  • Man-in-the-Browser Attack
  • Client-side Attacks
  • Session Replay Attacks
  • Session Fixation Attack
  • CRIME Attack
  • Network Level Session Hijacking
  • TCP/IP Hijacking
  • Session Hijacking Tools
  • Session Hijacking Detection Methods
  • Session Hijacking Prevention Tools

Module 12: Evading IDS, Firewalls, and Honeypots

  • Intrusion Detection System (IDS)
  • Intrusion Prevention System (IPS)
  • Firewall
  • Types of Firewalls
  • Honeypot
  • Intrusion Detection Tools
  • Intrusion Prevention Tools
  • IDS Evasion Techniques
  • Firewall Evasion Techniques
  • Evading NAC and Endpoint Security
  • IDS/Firewall Evading Tools
  • Honeypot Detection Tools

Module 13: Hacking Web Servers

  • Web Server Operations
  • Web Server Attacks
  • DNS Server Hijacking
  • Website Defacement
  • Web Cache Poisoning Attack
  • Web Server Attack Methodology
  • Web Server Attack Tools
  • Web Server Security Tools
  • Patch Management
  • Patch Management Tools

Module 14: Hacking Web Applications

  • Web Application Architecture
  • Web Application Threats
  • OWASP Top 10 Application Security Risks – 2021
  • Web Application Hacking Methodology
  • Web API
  • Webhooks
  • Web Shell
  • Web API Hacking Methodology
  • Web Application Security

Module 15: SQL Injection

  • SQL Injection
  • Types of SQL injection
  • Blind SQL Injection
  • SQL Injection Methodology
  • SQL Injection Tools
  • Signature Evasion Techniques
  • SQL Injection Detection Tools

Module 16: Hacking Wireless Networks

  • Wireless Terminology
  • Wireless Networks
  • Wireless Encryption
  • Wireless Threats
  • Wireless Hacking Methodology
  • Wi-Fi Encryption Cracking
  • WEP/WPA/WPA2 Cracking Tools
  • Bluetooth Hacking
  • Bluetooth Threats
  • Wi-Fi Security Auditing Tools
  • Bluetooth Security Tools

Module 17: Hacking Mobile Platforms

  • Mobile Platform Attack Vectors
  • OWASP Top 10 Mobile Risks
  • App Sandboxing
  • SMS Phishing Attack (SMiShing)
  • Android Rooting
  • Hacking Android Devices
  • Android Security Tools
  • Jailbreaking iOS
  • Hacking iOS Devices
  • iOS Device Security Tools
  • Mobile Device Management (MDM)
  • OWASP Top 10 Mobile Controls
  • Mobile Security Tools

Module 18: IoT and OT Hacking

  • IoT Architecture
  • IoT Communication Models
  • OWASP Top 10 IoT Threats
  • IoT Vulnerabilities
  • IoT Hacking Methodology
  • IoT Hacking Tools
  • IoT Security Tools
  • IT/OT Convergence (IIOT)
  • ICS/SCADA
  • OT Vulnerabilities
  • OT Attacks
  • OT Hacking Methodology
  • OT Hacking Tools
  • OT Security Tools

Module 19: Cloud Computing

  • Cloud Computing
  • Types of Cloud Computing Services
  • Cloud Deployment Models
  • Fog and Edge Computing
  • Cloud Service Providers
  • Container
  • Docker
  • Kubernetes
  • Serverless Computing
  • OWASP Top 10 Cloud Security Risks
  • Container and Kubernetes Vulnerabilities
  • Cloud Attacks
  • Cloud Hacking
  • Cloud Network Security
  • Cloud Security Controls
  • Cloud Security Tools

Module 20: Cryptography

  • Cryptography
  • Encryption Algorithms
  • MD5 and MD6 Hash Calculators
  • Cryptography Tools
  • Public Key Infrastructure (PKI)
  • Email Encryption
  • Disk Encryption
  • Cryptanalysis
  • Cryptography Attacks
  • Key Stretching

Show moredown

Who should attend this Certified Ethical Hacker Certification Course?

This CEH Course is ideal for individuals aiming to deepen their understanding and practical skills in the art of ethical hacking. It is particularly beneficial for the following professionals:

  • Cyber Red Team Operator
  • System Administrators
  • Cybersecurity Analysts
  • IT Managers and Directors
  • Information Security Engineer
  • Network Architects
  • CND Cyber Analyst

Prerequisites of the Certified Ethical Hacker Certification Course

There are no formal prerequisites to attend this CEH Course. 

Certified Ethical Hacker Certification Course Overview

An Ethical Hacker is a skilled professional who understands how to look for weaknesses in target systems and use that knowledge to assess the security posture of a target system. The importance of Ethical Hackers continue to grow as they provide an essential service in securing systems from nefarious activities.

IT professionals such as Network Administrators, Cybersecurity Analysts, and Security Consultants can greatly benefit from attending this C|EH Training. By gaining advanced Ethical Hacking skills, these professionals can better identify and mitigate security vulnerabilities within their organisations.

The Knowledge Academy’s 5-day Certified Ethical Hacker Course will help delegates learn the skills required to perform effective Ethical Hacking operations. This Certified Ethical Hacker Course will be conducted by our highly professional and skilled trainer, who has years of experience in teaching.

Course Objectives

  • To understand the latest hacking tools, techniques, and methodologies used by cybercriminals
  • To conduct comprehensive network scanning and enumeration
  • To analyse vulnerabilities and perform effective Ethical Hacking
  • To identify and mitigate malware and other malicious software
  • To understand and apply ethical hacking to mobile and IoT devices
  • To develop skills in evading IDS, firewalls, and honeypots

After attending this Certified Ethical Hacker Course, delegates will be equipped with the knowledge to identify vulnerabilities across a variety of operating systems and effectively exploit these vulnerabilities to test system defences.

Show moredown

What’s included in this Certified Ethical Hacker Course?

  • Certified Ethical Hacker Certification Examination [312-50 (ECC EXAM), 312-50 (VUE)]
  • We provide 1-year lab access and access to eBooks as part of the course package.
  • World-Class Training Sessions from Experienced Instructors
  • Certified Ethical Hacker (CEH) Certificate
  • Digital Delegate Pack

Show moredown

Certified Ethical Hacker Certification Exam Information

The Certified Ethical Hacker (C|EH) exam evaluates a candidate proficiency in Ethical Hacking techniques and cybersecurity principles. The exam format is as follows:

  • Type of Questions: Multiple Choice
  • Total Questions: 125
  • Duration: 4 Hours

Show moredown

Online Instructor-led (5 days)

Online Self-paced (40 hours)

Certified Cloud Security Engineer Certification Exam

Certified Cloud Security Engineer Certification Course Outline

Module 1: Introduction to Cloud Security

  • Core Concepts of Cloud Computing
  • Cloud Service Models
  • Cloud-Based Threats and Vulnerabilities
  • Service Provider Components
  • Shared Security Responsibility Model
  • Configuring a Secure Cloud Environment
  • Protecting Organisational Resources

Module 2: Platform and Infrastructure Security in the Cloud

  • Components and Technologies of Cloud Architecture
  • Securing Multi-Tenant, Virtualised, Physical, and Logical Cloud Components
  • Securing Physical Data Centres and Cloud Infrastructures
  • Tools and Techniques for Cloud Security in Azure, AWS, and GCP

Module 3: Application Security in the Cloud

  • Securing Cloud Applications
  • Secure Software Development Lifecycle Changes
  • Services and Tools for Application Security

Module 4: Data Security in the Cloud

  • Basics of Cloud Data Storage and Lifecycle
  • Controls for Protecting Data at Rest and Data in Transit
  • Data Storage Features in the Cloud
  • Services and Tools for Securing Data in Azure, AWS, and GCP

Module 5: Operation Security in the Cloud

  • Security Controls for Cloud Infrastructures
  • Building Cloud Infrastructures
  • Implementing Cloud Infrastructures
  • Operating Cloud Infrastructures
  • Managing Cloud Infrastructures
  • Maintaining Cloud Infrastructures
  • Services, Features, and Tools for Operational Security

Module 6: Penetration Testing in the Cloud

  • Implementing Comprehensive Penetration Testing
  • Assessing the Security of Cloud Infrastructure
  • Services and Tools for Penetration Testing

Module 7: Incident Detection and Response in the Cloud

  • Incident Response Lifecycle
  • Tools and Techniques for Incident Detection and Response
  • Using SOAR Technologies
  • Incident Response Capabilities

Module 8: Forensics Investigation in the Cloud

  • Forensic Investigation Process
  • Cloud Forensic Challenges
  • Data Collection Methods
  • Investigating Security Incidents

Module 9: Business Continuity and Disaster Recovery in the Cloud

  • Importance of Business Continuity
  • Disaster Recovery Planning
  • Backup and Recovery Tools, Services, and Features
  • Monitoring Business Continuity Issues

Module 10: Governance, Risk Management, and Compliance in the Cloud

  • Governance Frameworks, Models, and Regulations
  • Design and Implementation of Governance Frameworks
  • Cloud Compliance Frameworks
  • Governance Modules

Module 11: Standards, Policies, and Legal Issues in the Cloud

  • Standards
  • Policies
  • Legal Issues
  • Compliance and Auditing Features, Services, and Tools

Show moredown

Who should attend this Certified Cloud Security Engineer Certification Course?

This CCSE Course is specifically designed for IT and cybersecurity professionals who are focused on securing cloud environments. It is particularly beneficial for the following professionals:

  • Cloud Security Professionals
  • Network Security Engineers
  • IT Security Analysts
  • Cloud System Engineers
  • IT Security Managers
  • Cloud Developers
  • Security Compliance Specialists

Prerequisites of the Certified Cloud Security Engineer Certification Course

There are no formal prerequisites for attending this C|CSE Training Course. However, prior knowledge of cloud computing and system administration would be beneficial for the delegates.

Certified Cloud Security Engineer Certification Overview

The CCSE Training Course is an essential course for IT professionals aiming to specialise in the security aspects of cloud computing. As organisations increasingly migrate to the cloud, ensuring robust security measures is paramount.

Professionals such as Cloud Architects, Security Analysts, IT Managers, and System Administrators can greatly benefit from the C|CSE Course. By acquiring advanced cloud security expertise, these professionals can enhance their ability to protect their organisation's cloud assets, mitigate risks, and ensure compliance with industry standards.

The Knowledge Academy’s 5-day Certified Cloud Security Engineer Course will equip delegates with the skills to identify and address cloud security threats, implement security controls, and manage cloud security policies. The training sessions will be conducted by our highly experienced instructors.

Course Objectives

  • To understand the fundamentals of cloud computing and its architecture
  • To identify and evaluate the different types of cloud deployment models
  • To familiarise yourself with cloud security challenges and threats
  • To learn about authentication and authorisation mechanisms for cloud services
  • To Understand the principles of secure data storage and encryption in the cloud

After completing this Certified Cloud Security Engineer Certification Training, delegates will have a solid foundation in cloud security knowledge and contribute to the development of secure cloud-based systems.

Show moredown

What’s included in this Certified Cloud Security Engineer Certification Course?

  • Certified Cloud Security Engineer Certification Exam (312-40)
  • World-Class Training Sessions from Experienced Instructors
  • Certified Cloud Security Engineer Certificate
  • Digital Delegate Pack

Show moredown

Certified Cloud Security Engineer Certification Exam Information

The Certified Cloud Security Engineer (CCSE) exam assesses a candidate proficiency in securing cloud environments and implementing effective security measures. The exam format is as follows:

  • Type of Questions: Multiple Choice
  • Total Questions: 125
  • Duration: 4 Hours

Show moredown

Online Instructor-led (3 days)

Online Self-paced (24 hours)

Digital Forensics Essentials Certification Exam

Digital Forensics Essentials Certification Course Outline

  • Module 1: Computer Forensics Fundamentals
  • Module 2: Computer Forensics Investigation Process
  • Module 3: Understanding Hard Disks and File Systems
  • Module 4: Data Acquisition and Duplication
  • Module 5: Defeating Anti-forensics Techniques
  • Module 6: Windows Forensics
  • Module 7: Linux and Mac Forensics
  • Module 8: Network Forensics
  • Module 9: Investigating Web Attacks
  • Module 10: Dark Web Forensics
  • Module 11: Investigating Email Crimes
  • Module 12: Malware Forensics

Show moredown

Who should attend this Digital Forensics Essentials Certification Course?

The Digital Forensics Essentials Certification is ideal for those aiming to enhance their skills in digital investigations and cybersecurity. This certification is particularly beneficial for the following professionals:

  • IT Security Professionals
  • Network Administrators
  • Cybersecurity Analysts
  • Law Enforcement Officers
  • Incident Response Teams
  • Legal and Compliance Professionals
  • Risk Management Professionals
  • Forensic Investigators

Prerequisites of the Digital Forensics Essentials Certification Course

There are no formal prerequisites for attending this Digital Forensics Essentials Certification Course.

Digital Forensics Essentials Certification Course Overview

Digital Forensics is a critical field within cybersecurity that involves the process of identifying, preserving, analysing, and presenting digital evidence from electronic devices. It plays a vital role in investigating cybercrimes, ensuring data integrity, and supporting legal proceedings by uncovering digital footprints and patterns.

Proficiency in Digital Forensics is essential for IT Professionals, Cybersecurity Analysts, Law Enforcement Officers, and Legal Experts. Mastering this field equips individuals with the ability to conduct thorough investigations into data breaches, cyberattacks, and other digital incidents. It is crucial for professionals aiming to protect organisational assets, ensure compliance, and contribute to the effective resolution of cybercrime cases.

This comprehensive 3-day course provides delegates with fundamental concepts and practical skills in digital forensics. Through interactive workshops and expert-led sessions, delegates will gain a solid understanding of digital evidence collection, analysis techniques, and reporting. Delegates will learn to handle various types of digital evidence, perform forensic examinations, and develop strategies for incident response and recovery.

Course Objectives

  • To understand the foundational principles of digital forensics
  • To explore various types of digital evidence and their acquisition methods
  • To apply forensic analysis techniques to investigate cyber incidents
  • To effectively analyse and interpret digital evidence
  • To develop and implement strategies for incident response and recovery
  • To comprehend legal and ethical considerations in digital forensics

Upon completing this course, delegates will have acquired the knowledge and skills necessary to conduct digital forensic investigations and handle digital evidence effectively, making them valuable assets in their professional roles.

Show moredown

What’s included in this Digital Forensics Essentials Course?

  • Digital Forensics Essentials (DFE) Examination
  • World-Class Training Sessions from Experienced Instructors
  • Digital Forensics Essentials (DFE) Certificate
  • Digital Delegate Pack

Show moredown

Digital Forensics Essentials Certification Exam Information

The Digital Forensics Essentials Certification Exam assesses delegates understanding of the core concepts and principles of digital forensics. This certification focuses on providing individuals with foundational knowledge and terminology used in digital forensics, equipping them with the skills needed to identify, preserve, analyse, and present digital evidence effectively.

  • Type of Questions: Multiple Choice
  • Total Questions: 75
  • Duration: 2 Hours

Show moredown

Online Instructor-led (3 days)

Online Self-paced (24 hours)

Certified Threat Intelligence Analyst Certification Exam

Certified Threat Intelligence Analyst Certification Course Outline

Module 1: Introduction to Threat Intelligence

  • Fundamentals of Threat Intelligence
  • Evolution of Cyber Threats
  • Roles and Importance of Threat Intelligence in Cybersecurity

Module 2: Cyber Threats and Attack Frameworks

  • Overview of Common Cyber Threats
  • Introduction to Attack Frameworks (like MITRE ATT&CK)
  • Analysing Threat Actors and Their Tactics

Module 3: Requirements, Planning, Direction, and Review

  • Setting Intelligence Goals and Objectives
  • Strategic Planning for Threat Intelligence Solutions
  • Review and Quality Assurance of Intelligence Activities

Module 4: Data Collection and Processing

  • Techniques for Data Collection
  • Tools for Data Mining and Harvesting
  • Processing Collected Data into Actionable Information

Module 5: Data Analysis

  • Methods of Data Analysis in Threat Intelligence
  • Applying Analytical Techniques to Cyber Threats
  • Turning Analysis into Actionable Insights

Module 6: Intelligence Reporting and Dissemination

  • Principles of Effective Intelligence Reporting
  • Tools and Formats for Dissemination
  • Managing Sensitivity and Privacy in Reporting

Module 7: Threat Hunting and Detection

  • Fundamentals of Threat Hunting
  • Techniques and Tools for Proactive Detection
  • Integrating Threat Hunting into Security Practices

Module 8: Threat Intelligence in SOC Operations, Incident Response, & Risk Management

  • Role of Threat Intelligence in SOC Operations
  • Enhancing Incident Response with Intelligence Inputs
  • Applying Threat Intelligence to Risk Management Strategies

Show moredown

Who should attend this Certified Threat Intelligence Analyst (CTIA) Certification?

The CTIA Course is designed for professionals looking to specialise in the field of threat intelligence. It is particularly beneficial for:

  • Security Analysts
  • Threat Intelligence Analysts
  • Network Security Engineers
  • Cybersecurity Consultants
  • SOC Analysts
  • Incident Response Team Members
  • Risk Management Professionals

Prerequisites of the Certified Threat Intelligence Analyst Certification

There are no formal prerequisites to attend this Certified Threat Intelligence Analyst Training.

Certified Threat Intelligence Analyst Certification Course Overview

Threat intelligence plays a crucial role in the cybersecurity landscape, providing organisations with insights to proactively defend against potential cyber threats. As cyber threats become more sophisticated and frequent, the need for skilled professionals to analyse and mitigate these risks is paramount. The relevance of this knowledge in safeguarding digital assets is undeniable, making CTIA Training essential for maintaining organisational security.

Understanding threat intelligence is vital for cybersecurity professionals tasked with defending infrastructures from cyber-attacks. Professionals such as security analysts, incident responders, and risk management officers should aim to master this subject to enhance their capabilities in identifying, assessing, and mitigating threats effectively.  Attending CTIA Course equips these specialists with advanced skills and knowledge, significantly bolstering an organisation's defense mechanisms.

The Knowledge Academy's 3-day CTIA Training is designed to empower delegates by offering comprehensive insights into the threat intelligence field. This intensive course covers the fundamental concepts, tools, and techniques essential for effective threat analysis and response. By the end of the training, attendees will have a thorough understanding of how to implement and utilise threat intelligence, enhancing their proficiency in managing security operations and incident responses.

Course Objectives

  • To deepen understanding of the cyber threat landscape and threat intelligence essentials
  • To improve skills in identifying, analysing, and mitigating cyber threats
  • To master the use of attack frameworks for effective security planning
  • To train in generating and disseminating accurate threat intelligence reports
  • To integrate threat intelligence seamlessly into security and incident response operations

Upon completion of the CTIA Training, delegates will be well-prepared to apply their newly acquired skills in real-world settings. They will have the ability to transform raw data into actionable intelligence, thus playing a pivotal role in strengthening their organisations' cybersecurity defenses.

Show moredown

What’s included in this Certified Threat Intelligence Analyst Certification?

  • Certified Threat Intelligence Analyst Exam (312-85)
  • World-Class Training Sessions from Experienced Instructors
  • Certified Threat Intelligence Analyst Certification
  • Digital Delegate Pack

Show moredown

Certified Threat Intelligence Analyst Certification Exam Information

The Certified Threat Intelligence Analyst (CTIA) exam assesses a delegates ability to apply threat intelligence principles in real-world scenarios. The exam format is as follows:

  • Question Type: Multiple-Choice 
  • Total Questions: 50  
  • Pass Marks: 70%
  • Duration: 2 Hours

Show moredown

Online Instructor-led (5 days)

Online Self-paced (40 hours)

Certified Penetration Testing Professional (CPENT) Certification Exam

Certified Penetration Testing Professional Certification Course Outline

  • Module 01: Introduction to Penetration Testing
  • Module 02: Penetration Testing Scoping and Engagement
  • Module 03: Open Source Intelligence (OSINT)
  • Module 04: Social Engineering Penetration Testing
  • Module 05: Network Penetration Testing – External
  • Module 06: Network Penetration Testing – Internal
  • Module 07: Network Penetration Testing – Perimeter Devices
  • Module 08: Web Application Penetration Testing
  • Module 09: Wireless Penetration Testing
  • Module 10: IoT Penetration Testing
  • Module 11: OT/SCADA Penetration Testing
  • Module 12: Cloud Penetration Testing
  • Module 13: Binary Analysis and Exploitation
  • Module 14: Report Writing and Post Testing Actions

Show moredown

Who should attend this Certified Penetration Testing Professional Certification Course?

The CPENT Certification Course is ideal for professionals looking to enhance their skills in penetration testing and ethical hacking skills. This course is particularly beneficial for the following professionals:

  • Penetration Testers
  • Ethical Hackers
  • Security Analysts
  • Network Security Engineers
  • Security Consultants
  • IT Managers
  • IT Administrators

Prerequisites of the Certified Penetration Testing Professional Certification Course

There are no formal prerequisites for attending this CPENT Certification Course.

Certified Penetration Testing Professional Certification Course Overview

The Certified Penetration Testing Professional Certification Course empowers participants to enhance their skills in conducting penetration tests and simulating cyberattacks to uncover vulnerabilities in systems, networks, and applications. This training is crucial for organisations, as it helps identify and rectify security flaws before malicious attackers can exploit them.

This course is ideal for Cybersecurity, IT Administration, and Compliance professionals. As cyber threats become more sophisticated and prevalent, there is a growing need for skilled experts who can protect digital assets and sensitive information from potential breaches. The CPENT certification enhances the security measures within an organisation and significantly boosts the career prospects of the professionals involved.

The Knowledge Academy's 5-day Pen Test Certification training teaches delegates how to conduct penetration tests. It combines theory with hands-on practice, showing how to find and ethically exploit vulnerabilities and suggest practical security improvements.

Course Objectives

  • To understand the fundamentals of Penetration Testing
  • To learn how to conduct comprehensive security assessments
  • To identify and exploit vulnerabilities in systems and networks
  • To understand the legal and ethical aspects of Penetration Testing
  • To develop skills in writing effective Penetration Testing reports
  • To gain hands-on experience with popular Penetration Testing tools

After completing this course, delegates will gain better knowledge and skills in penetration testing, allowing them to spot and address security risks in their organisations effectively.

Show moredown

What’s included in this Certified Penetration Testing Professional Certification Course?

  • Certified Penetration Testing Professional CPENT Examination
  • World-Class Training Sessions from Experienced Instructors
  • Certified Penetration Testing Professional CPENT Certification
  • Digital Delegate Pack

Show moredown

Certified Penetration Testing Professional (CPENT) Certification  Exam Information:

The Certified Penetration Testing Professional (CPENT) exam evaluates a candidate proficiency in penetration testing techniques and cybersecurity principles. The exam format is as follows:

  • Exam Type: 100% practical, hands-on exam.
  • Exam Duration: You can choose between two 12-hour sessions or a single 24-hour session.
  • Exam Mode: Online

Show moredown

Online Instructor-led (3 days)

Online Self-paced (24 hours)

Ethical Hacking Essentials Certification Exam

Ethical Hacking Essentials Certification Course Outline

Module 1: Information Security Fundamentals

  • Information Security Fundamentals
  • Information Security Laws and Regulations

Module 2: Ethical Hacking Fundamentals

  • Cyber Kill Chain Methodology
  • Hacking Concepts and Hacker Classes
  • Different Phases of Hacking Cycle
  • Ethical Hacking Concepts, Scope, and Limitations
  • Ethical Hacking Tools

Module 3: Information Security Threats and Vulnerability Assessment

  • Threat and Threat Sources
  • Malware and its Types
  • Malware Countermeasures
  • Vulnerabilities
  • Vulnerability Assessment

Module 4: Password Cracking Techniques and Countermeasures

  • Password Cracking Techniques
  • Password Cracking Tools
  • Password Cracking Countermeasures

Module 5: Social Engineering Techniques and Countermeasures

  • Social Engineering Concepts and its Phases
  • Social Engineering Techniques
  • Insider Threats and Identity Theft
  • Social Engineering Countermeasures

Module 6: Network Level Attacks and Countermeasures

  • Packet Sniffing Concepts
  • Sniffing Techniques
  • Sniffing Countermeasures
  • DoS and DDoS Attacks
  • DoS and DDoS Attack Countermeasures
  • Session Hijacking Attacks
  • Session Hijacking Attack Countermeasures

Module 7: Web Application Attacks and Countermeasures

  • Web Server Attacks
  • Web Server Attack Countermeasures
  • Web Application Architecture and Vulnerability Stack
  • Web Application Threats and Attacks
  • Web Application Attack Countermeasures
  • SQL Injection Attacks
  • SQL Injection Attack Countermeasures

Module 8: Wireless Attacks and Countermeasures

  • Wireless Terminology
  • Wireless Encryption
  • Wireless Network-Specific Attack Techniques
  • Bluetooth Attacks
  • Wireless Attack Countermeasures

Module 9: Mobile Attacks and Countermeasures

  • Mobile Attack Anatomy
  • Mobile Platform Attack Vectors and Vulnerabilities
  • Mobile Device Management (MDM) Concept
  • Mobile Attack Countermeasures

Module 10: IoT and OT Attacks and Countermeasures

  • IoT Concepts
  • IoT Threats and Attacks
  • IoT Attack Countermeasures
  • OT Concepts
  • OT Threats and Attacks
  • OT Attack Countermeasures

Module 11: Cloud Computing Threats and Countermeasures

  • Cloud Computing Concepts
  • Container Technologies
  • Cloud Computing Threats
  • Cloud Attack Countermeasures

Module 12: Penetration Testing Fundamentals

  • Fundamentals of Penetration Testing and its Benefits
  • Strategies and Phases of Penetration Testing
  • Guidelines and Recommendations for Penetration Testing

Show moredown

Who should attend this Ethical Hacking Essentials Certification?

This Ethical Hacking Essentials Course is ideal for individuals looking to start a career in Ethical Hacking or cybersecurity. It is also beneficial for professionals already working in IT or cybersecurity who want to enhance their skills and knowledge in Ethical Hacking. It is particularly beneficial for:

  • IT professionals
  • Network administrators
  • System administrators
  • Security professionals
  • Computer science students
  • Ethical hackers
  • Penetration testers

Prerequisites of the Ethical Hacking Essentials Certification

There are no formal prerequisites to attend this Ethical Hacking Essentials Training.

Ethical Hacking Essentials Certification Overview

Ethical Hacking is a crucial discipline in the realm of cybersecurity, focusing on identifying and rectifying security vulnerabilities in systems. With cyber threats becoming increasingly sophisticated, the relevance of ethical hacking has never been greater. This course equips individuals with the foundational skills to protect and secure digital assets effectively.

Proficiency in Ethical Hacking is vital for IT professionals, network administrators, and cybersecurity enthusiasts. Mastery of this subject ensures they can anticipate and mitigate potential security breaches, safeguarding sensitive data. Professionals aiming to enhance their cybersecurity capabilities should consider this essential training.

This 3-day Ethical Hacking Training Course provides delegates with practical knowledge and hands-on experience in ethical hacking. Participants will learn to think like a hacker, identifying vulnerabilities before malicious actors can exploit them. The course is designed to offer a comprehensive understanding of key hacking techniques and defensive measures.

Course Objectives

  • To understand the fundamentals of ethical hacking
  • To identify common types of cyber threats and vulnerabilities
  • To perform vulnerability assessments and penetration testing
  • To implement security measures to protect against attacks
  • To develop skills in network scanning and mapping
  • To understand the legal and ethical implications of hacking

After completing this course, delegates will have the essential skills and knowledge to conduct basic ethical hacking tasks, improve their organisation’s security posture, and advance in the cybersecurity field. This certification enhances their ability to protect digital infrastructure from cyber threats effectively.

Show moredown

What’s included in this Ethical Hacking Essentials Certification?

  • Ethical Hacking Essentials Examination
  • World-Class Training Sessions from Experienced Instructors
  • Ethical Hacking Essentials Certificate
  • Digital Delegate Pack

Show moredown

Ethical Hacking Essentials Certification Exam Information:

The Ethical Hacking Essentials exam evaluates a candidate proficiency in ethical hacking techniques and cybersecurity principles. The exam format is as follows:

  • Type of Questions: Multiple Choice
  • Total Questions: 75
  • Duration: 2 Hours

Show moredown

Online Instructor-led (3 days)

Online Self-paced (24 hours)

Network Defense Essentials Certification Exam

Network Defense Essentials Certification Course Outline

Module 1: Network Security Fundamentals

  • Fundamentals of Network Security
  • Network Security Protocols

Module 2: Identification, Authentication and Authorisation

  • Access Control Principles, Terminologies, and Models
  • Identity and Access Management (IAM) Concepts

Lab Exercise:

  • Implementing Access Controls in Windows Machine
  • Managing Access Controls in Linux Machine
  • Implementing Role-Based Access Control in Windows Admin Centre (WAC)

Module 3: Network Security Controls – Administrative Controls

  • Regulatory Frameworks, Laws, and Acts
  • Design and Develop Security Policies
  • Conduct Different Types of Security and Awareness Training

Lab Exercise:

  • Implementing Password Policies Using Windows Group Policy

Module 4: Network Security Controls – Physical Controls

  • Importance of Physical Security
  • Physical Security Controls
  • Workplace Security
  • Environmental Controls

Module 5: Network Security Controls – Technical Controls

  • Types of Network Segmentation
  • Types of Firewalls and their Role
  • Types of IDS/IPS and their Role
  • Types of Honeypots
  • Types of Proxy Servers and their Benefits
  • Fundamentals of VPN and its importance in Network Security
  • Security Incident and Event Management (SIEM)
  • User Behaviour Analytics (UBA)
  • Antivirus/Anti-Malware Software

Lab Exercise:

  • Implementing Host-Based Firewall Protection with iptables
  • Implementing Host-Based Firewall Functionality Using Windows Firewall
  • Implementing Network-Based Firewall Functionality: Blocking Unwanted Website access using pfSense Firewall
  • Implementing Network-Based Firewall Functionality: Blocking Insecure Ports using pfSense Firewall
  • Implementing Host-Based IDS Functionality using Wazuh HIDS
  • Implementing Network-based IDS Functionality Using Suricata IDS
  • Detect Malicious Network Traffic using HoneyBOT
  • Establishing Virtual Private Network Connection using SoftEther VPN

Module 6: Virtualisation and Cloud Computing

  • Virtualisation Essential Concepts and OS
  • Virtualisation Security
  • Cloud Computing Fundamentals
  • Insights of Cloud Security and Best Practices

Lab Exercise:

  • Auditing Docker Host Security Using Docker-Bench-Security Tool
  • Implementing AWS Identity and Access Management
  • Securing Amazon Web Services Storage

Module 7: Wireless Network Security

  • Wireless Network Fundamentals
  • Wireless Network Encryption Mechanisms
  • Types of Wireless Network Authentication Methods
  • Implement Wireless Network Security Measures

Lab Exercise:

  • Configuring Security on a Wireless Router

Module 8: Mobile Device Security

  • Mobile Device Connection Methods
  • Mobile Device Management Concepts
  • Common Mobile Usage Policies in Enterprises
  • Security Risks and Guidelines Associated with Enterprises Mobile Usage Policies
  • Implement Enterprise-level Mobile Security Management Solutions
  • Implement General Security Guidelines and Best Practices on Mobile Platforms
  • Lab Exercise:
  • Implementing Enterprise Mobile Security Using Miradore MDM Solution

Module 9: IoT Device Security

  • IoT Devices, Application Areas, and Communication Models
  • Security in IoT-Enabled Environments

Lab Exercise:

  • Securing IoT Device Communication Using TLS/SSL

Module 10: Cryptography and PKI

  • Cryptographic Techniques
  • Cryptographic Algorithms
  • Cryptography Tools
  • Public Key Infrastructure (PKI)

Lab Exercise:

  • Calculate One-way Hashes using HashCalc
  • Calculate MD5 Hashes using HashMyFiles
  • Create a Self-signed Certificate

Module 11: Data Security

  • Data Security and its Importance
  • Security Controls for Data Encryption 8
  • Data Backup and Retention
  • Data Loss Prevention Concepts

Lab Exercise:

  • Perform Disk Encryption using VeraCrypt
  • File Recovery Using EaseUS Data Recovery Wizard
  • Backing Up and Restoring Data in Windows

Module 12: Network Traffic Monitoring

  • Need and Advantages of Network Traffic Monitoring
  • Determine Baseline Traffic Signatures for Normal and Suspicious Network Traffic
  • Perform Network Monitoring for Suspicious Traffic

Lab Exercise:

  • Capturing Network Traffic using Wireshark
  • Applying Various Filters in Wireshark
  • Analysing and Examining Various Network Packet Headers in Linux using tcpdump

Show moredown

Who should attend this Network Defense Essentials Certification Course?

This NDE Certification is designed to provide fundamental knowledge and skills for protecting network infrastructures. This training course is ideal for a wide range of professionals who are involved in, affected by, or interested in network security and defense strategies. This course can be beneficial for a wqide range of professionals, including:

  • Network Administrators
  • IT Technicians
  • Security Analysts
  • System Administrators
  • IT Support Specialists
  • Network Engineers
  • Cybersecurity Enthusiasts
  • Technical Support Engineers
  • Junior IT Security Professionals

Students and Career Changers looking to enter the cybersecurity field

Prerequisites of the Network Defense Essentials Certification Course

There are no formal prerequisites for attending this NDE Certification Course.

Network Defense Essentials Certification Course Overview

The certification provides a comprehensive introduction to network security fundamentals. Delegates will gain an understanding of the important concepts, tools, and techniques used to protect networks from cyber threats. This N|DE Certification is ideal for IT professionals, network administrators, and cybersecurity enthusiasts looking to enhance their knowledge and skills in network defense.

The Network Defense Essentials Certification Course covers network security principles, common vulnerabilities, and best practices for securing networks. Participants will learn about the latest threats and how to mitigate them, including malware, phishing, and denial-of-service attacks. Through practical exercises and real-world scenarios, delegates will develop the skills to secure networks effectively.

The Knowledge Academy's 3-day Network Defense Essentials Certification Training equips delegates with a strong understanding of network security fundamentals. Participants will learn about network vulnerabilities, common attack techniques, and best security practices. This N|DE Certification empowers delegates with the knowledge and skills to secure networks effectively.

Course Objectives

  • To introduce the fundamental concepts of network security
  • To understand common network vulnerabilities and attack vectors
  • To learn best practices for securing network infrastructures
  • To develop practical skills in implementing network security measures
  • To enhance the ability to identify and resolve network security incidents
  • To prepare delegates for the Network Defense Essentials Certification examination

Upon completing the Network Defense Essentials Certification Course, delegates will receive a certification that validates their expertise in network security fundamentals. This certification enhances their professional credibility and demonstrates their ability to implement effective network defence strategies, positioning them as valuable assets to any organisation.

Show moredown

What's included in this Network Defense Essentials Certification Course?

  • Network Defense Essentials Examination 
  • World-Class Training Sessions from Experienced Instructors 
  • Network Defense Essentials Certificate 
  • Digital Delegate Pack

Show moredown

Network Defense Essentials Certification Exam Information:

The Network Defense Essentials exam evaluates a candidate proficiency in network defense techniques and cybersecurity principles. The exam format is as follows:

  • Type of Questions: Multiple Choice
  • Total Questions: 75
  • Duration: 2 Hours

Show moredown

Online Instructor-led (3 days)

Online Self-paced (24 hours)

ICS/SCADA Cybersecurity Certification Exam

ICS/SCADA Cybersecurity Certification Course Outline

Module 1: Introduction to ICS/SCADA Network Defence

LAB: Security Model

  • IT Security Model
  • ICS/SCADA Security Model

LAB: Allowing a Service

  • Security Posture
  • Risk Management in ICS/SCADA
  • Risk Assessment
  • Defining Types of Risk
  • Security Policy

Module 2: TCP/IP 101

  • Introduction and Overview
  • Introducing TCP/IP Networks
  • Internet RFCs and STDs
  • TCP/IP Protocol Architecture
  • Protocol Layering Concepts
  • TCP/IP Layering
  • Components of TCP/IP Networks
  • ICS/SCADA Protocols

Module 3: Introduction to Hacking

  • Review of the Hacking Process
  • Hacking Methodology
  • Intelligence Gathering
  • Foot printing
  • Scanning
  • Enumeration
  • Identify Vulnerabilities
  • Exploitation
  • Covering Tracks

LAB: Hacking ICS/SCADA Networks Protocols

  • How ICS/SCADA Are Targeted?
  • Study of ICS/SCADA Attacks
  • ICS/SCADA as a High-Value Target
  • Attack Methodologies In ICS

Module 4: Vulnerability Management

  • Challenges of Vulnerability Assessment
  • System Vulnerabilities
  • Desktop Vulnerabilities
  • ICS/SCADA Vulnerabilities
  • Interpreting Advisory Notices
  • CVE
  • ICS/SCADA Vulnerability Sites
  • Life Cycle of a Vulnerability and Exploit
  • Challenges of Zero-Day Vulnerability
  • Exploitation of a Vulnerability
  • Vulnerability Scanners
  • ICS/SCADA Vulnerability Uniqueness
  • Challenges of Vulnerability Management Within ICS/SCADA

LAB: Vulnerability Assessment

  • Prioritising Vulnerabilities
  • CVSS
  • OVAL

Module 5: Standards and Regulations for Cybersecurity

  • ISO 27001
  • ICS/SCADA
  • NERC CIP
  • CFATS
  • ISA99
  • IEC 62443
  • NIST SP 800-82

Module 6: Securing the ICS Network

  • Physical Security
  • Establishing Policy – ISO Roadmap
  • Securing the Protocols Unique to the ICS
  • Performing a Vulnerability Assessment
  • Selecting and Applying Controls to Mitigate Risk
  • Monitoring
  • Mitigating the Risk of Legacy Machines

Module 7: Bridging the Air Gap

  • Do You Really Want to Do This?
  • Advantages and Disadvantages
  • Guard
  • Data Diode
  • Next Generation Firewalls

Module 8: Introduction to Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS)

  • What IDS Can and Cannot Do
  • Types IDS
  • Network
  • Host
  • Network Node
  • Advantages of IDS
  • Limitations of IDS
  • Stealth the IDS
  • Detecting Intrusions

Show moredown

Who should attend this ICS/SCADA Cybersecurity Certification Course?

This ICS/SCADA Certification Course is ideal for a wide range of professionals who are involved in, affected by, or interested in the security of critical infrastructure and industrial environments. Professionals who will benefit from this ICS/SCADA Cybersecurity Certification Course include:

  • ICS/SCADA Engineers
  • Control Systems Engineers
  • Network Security Engineers
  • Cybersecurity Analysts
  • Industrial Automation Engineers
  • Risk Management Professionals
  • Operations Technology (OT) Security Specialists

Prerequisites of the ICS/SCADA Cybersecurity Certification Course

There are no formal prerequisites for attending this ICS/SCADA Certification Course. However, an understanding of networking and security concepts, and Linux operating system fundamentals is highly recommended.

ICS/SCADA Cybersecurity Certification Course Overview

ICS (Industrial Control Systems) and SCADA (Supervisory Control and Data Acquisition) systems are critical to industrial operations. As cyber threats grow more sophisticated, protecting these systems from cyberattacks has become essential. This course offers a comprehensive overview of ICS/SCADA Cybersecurity, ensuring participants are equipped to safeguard vital infrastructure against emerging threats.

Proficiency in ICS/SCADA Cybersecurity is crucial for professionals working in industrial sectors, IT security roles, and system administration. With the increasing frequency of cyberattacks targeting industrial systems, mastering these skills is essential for protecting sensitive data and ensuring operational continuity. This course is designed for cybersecurity professionals, engineers, and IT managers seeking to enhance their expertise in securing industrial control environments.

This intensive 3-day training provides delegates with hands-on knowledge and practical skills necessary to defend ICS/SCADA systems. Participants will gain insights into threat detection, risk assessment, and implementing effective security measures. The course is tailored to offer actionable strategies for mitigating vulnerabilities and improving overall system resilience against cyber threats.

Course Objectives

  • To understand the fundamentals of ICS/SCADA systems and their vulnerabilities
  • To identify common cyber threats and attack vectors in industrial environments
  • To learn methods for assessing and managing cybersecurity risks
  • To apply best practices for securing ICS/SCADA infrastructure
  • To develop skills in incident response and recovery planning
  • To explore tools and technologies used for ICS/SCADA Cybersecurity

After completing this course, delegates will receive a certification recognising their proficiency in securing industrial control systems and enhancing their professional credentials in the cybersecurity field.

Show moredown

What's included in this ICS/SCADA Cybersecurity Certification Course?

  • World-Class Training Sessions from Experienced Instructors 
  • ICS/SCADA Cybersecurity Certificate 
  • Digital Delegate Pack

Show moredown

ICS/SCADA Cybersecurity Certification Exam Information:

The ICS/SCADA Cybersecurity exam evaluates a candidate proficiency in ICS/SCADA cybersecurity techniques and principles. The exam format is as follows:

  • Type of Questions: Multiple Choice
  • Total Questions: 75
  • Duration: 2 Hours

Show moredown

Online Instructor-led (5 days)

Online Self-paced (40 hours)

Disaster Recovery Professional Certification Exam

Disaster Recovery Professional Certification Course Outline

  • Module 1: Introduction to Disaster Recovery and Business Continuity
  • Module 2: Business Continuity Management
  • Module 3: Risk Assessment
  • Module 4: Business Impact Analysis
  • Module 5: Business Continuity Plan
  • Module 6: Data Backup
  • Module 7: Data Recovery Strategies
  • Module 8: Virtualisation Bases Disaster Recovery
  • Module 9: System Recovery
  • Module 10: Centralised and Decentralised Computing
  • Module 11: Disaster Recovery Planning Process
  • Module 12: BCP Testing, Maintenance, and Training

Show moredown

Who should attend this Disaster Recovery Professional Certification?

This Disaster Recovery Professional Certification is ideal for IT professionals seeking to enhance their skills in disaster recovery planning and implementation. It is particularly beneficial for:

  • IT managers
  • System administrators
  • Network engineers
  • Security professionals
  • Disaster recovery specialists
  • Business continuity planners
  • Risk management professionals

Prerequisites of the Disaster Recovery Professional Certification

There are no formal prerequisites to attend this Disaster Recovery Professional Training.

Disaster Recovery Professional Certification Course Overview

Disaster Recovery Professional Certification is crucial in today's digital landscape, where businesses are increasingly reliant on technology. This course provides a comprehensive understanding of disaster recovery principles and practices, ensuring organisations can effectively mitigate risks and maintain continuity in the face of disasters.

Professionals across IT, risk management, and business continuity fields should aim to master this course. It equips them with the skills needed to develop and implement robust disaster recovery plans, ensuring business resilience and minimising downtime in times of crisis.

The Disaster Recovery Professional Course offered by The Knowledge Academy is a 5-day intensive training designed to provide delegates with practical knowledge and tools to navigate disaster recovery scenarios. By focusing on real-world applications and best practices, this course empowers professionals to enhance their organisation's disaster recovery capabilities.

Course Objectives

  • To provide a comprehensive overview of disaster recovery concepts and best practices
  • To familiarise delegates with various disaster recovery strategies and solutions
  • To enable delegates to develop effective disaster recovery plans
  • To equip with the skills to implement and manage disaster recovery plans efficiently
  • To prepare delegates for the Disaster Recovery Professional Certification exam

Upon completion of the Disaster Recovery Professional Course, delegates will possess a solid understanding of disaster recovery principles, strategies, and solutions. They will be able to develop and implement effective disaster recovery plans, enhancing their organisation's resilience to disasters.

Show moredown

What’s included in this Disaster Recovery Professional Certification?

  • Disaster Recovery Professional Exam
  • World-Class Training Sessions from Experienced Instructors
  • Disaster Recovery Professional Certification
  • Digital Delegate Pack

Show moredown

Disaster Recovery Professional Certification Exam Information 

The Disaster Recovery Professional Certification exam assesses delegates expertise in disaster recovery planning, implementation, and management. To qualify for the exam, candidates must have a minimum of two years of experience in the BC/DR domain. The exam format is as follows: 

  • Type of Assessment: Multiple-Choice
  • Number of Questions: 150 
  • Pass Marks: 70% 
  • Duration: 4 Hours  
  • Exam Mode: ECC Exam Portal

Show moredown

Online Instructor-led (2 days)

Online Self-paced (16 hours)

Ethical Hacking Core Skills Certification Exam

Ethical Hacking Core Skills Certification Course Outline

  • Module 1: Introduction To Required Skills for Security
  • Module 2: Introduction & Overview
  • Module 3: UNIX/Linux
  • Module 4: Introducing Linux
  • Module 5: Overview of Virtual Machines
  • Module 6: Introduction to Vulnerability Assessment
  • Module 7: Introduction to the Hacking Process
  • Module 8: Challenges of Staying Current

Show moredown

Who should attend this Ethical Hacking Core Skills Certification Course?

This EHCS Training is designed for individuals who want to improve their cybersecurity skills and acquire practical knowledge in Ethical Hacking. This training course suits various professionals involved in, affected by, or interested in cybersecurity and ethical hacking practices. Professionals who will benefit from this course include:

  • IT Security Professionals
  • Network Administrators
  • System Administrators
  • Penetration Testers
  • Security Consultants
  • Cybersecurity Analysts
  • Information Security Managers

Prerequisites of the Ethical Hacking Core Skills Certification Course

There are no formal prerequisites to attend this EHCS Training.

Ethical Hacking Core Skills Certification Course Overview

This course on Ethical Hacking Core Skills provides individuals with the knowledge and techniques to identify and mitigate cyber threats effectively. This EHCS Certification is highly relevant as cyberattacks continue to rise, impacting businesses and individuals globally.

Understanding and mastering Ethical Hacking is essential for professionals who want to protect information and systems. IT Security Professionals, Network Administrators, and Cybersecurity Analysts, among others, should aim to master these skills to stay ahead of potential threats. The EHCS Certification provides a valuable credential demonstrating expertise in this crucial area.

The Knowledge Academy's 2-day EHCS Training offers comprehensive, hands-on learning to help delegates develop practical skills in Ethical Hacking. This course on Ethical Hacking Core Skills covers critical concepts and tools, ensuring delegates can effectively protect their organisations. With expert instruction and real-world scenarios, delegates will be well-prepared to manage cybersecurity challenges.

Course Objectives

  • To understand the fundamentals of Ethical Hacking and its significance
  • To identify and assess various types of cyber threats and vulnerabilities
  • To use Ethical Hacking tools and techniques for penetration testing
  • To implement strategies for securing networks and systems
  • To analyse and report on security breaches and suggest preventive measures

After completing the EHCS Training, delegates will have the essential skills and knowledge to protect their organisations from cyber threats effectively. They can identify exposures, conduct penetration tests, and execute robust security measures to mitigate risks and enhance overall cybersecurity.

Show moredown

What’s included in this Ethical Hacking Core Skills Certification Course?

  • World-Class Training Sessions from Experienced Instructors 
  • Ethical Hacking Core Skills Certification 
  • Digital Delegate Pack

Show moredown

Ethical Hacking Core Skills Certification Exam Information:

The Ethical Hacking Core Skills exam evaluates a candidate proficiency in advanced ethical hacking techniques and cybersecurity principles. The exam format is as follows:

  • Type of Questions: Multiple Choice
  • Total Questions: 75
  • Duration: 2 Hours

Show moredown

Online Instructor-led (5 days)

Online Self-paced (40 hours)

Certified Project Management Training Course Exam

Certified Project Management Training Course Outline

Module 1: Introduction to Project Management

  • 1.1 Definition and Importance of Project Management
  • 1.2 Project Management Frameworks and Methodologies
  • 1.3 Roles and Responsibilities of a Project Manager
  • 1.4 Project Life Cycle Phases
  • 1.5 Key Project Management Terminologies
  • 1.6 Introduction to Project Management Software Tools

Module 2: Project Scope & Technology Integration

  • 2.1 Defining Project Scope
  • 2.2 Creating a Scope Management Plan
  • 2.3 Scope Creep and Change Control Process
  • 2.4 Integrating Technology in Project Management
  • 2.5 Tools for Managing Project Scope
  • 2.6 Case Studies on Successful Scope Management

Module 3: Project Scheduling & Time Management

  • 3.1 Importance of Project Scheduling
  • 3.2 Developing a Project Schedule
  • 3.3 Techniques for Effective Time Management
  • 3.4 Critical Path Method (CPM)
  • 3.5 Gantt Charts and Project Timelines
  • 3.6 Tools and Software for Scheduling
  • 3.7 Managing Schedule Changes

Module 4: Project Cost and Budget Management

  • 4.1 Basics of Project Cost Management
  • 4.2 Budget Planning and Estimation
  • 4.3 Cost Control and Monitoring
  • 4.4 Earned Value Management (EVM)
  • 4.5 Managing Budget Overruns
  • 4.6 Financial Reporting and Analysis
  • 4.7 Tools for Cost Management

Module 5: Project Sourcing & Vendor Management

  • 5.1 Fundamentals of Sourcing and Procurement
  • 5.2 Developing a Procurement Plan
  • 5.3 Vendor Selection Criteria
  • 5.4 Contract Management
  • 5.5 Managing Vendor Relationships
  • 5.6 Performance Evaluation of Vendors
  • 5.7 Tools for Sourcing and Vendor Management

Module 6: Project Controls & Quality Assurance

  • 6.1 Importance of Project Controls
  • 6.2 Developing a Quality Management Plan
  • 6.3 Quality Assurance vs. Quality Control
  • 6.4 Tools and Techniques for Quality Assurance
  • 6.5 Implementing Quality Controls
  • 6.6 Continuous Improvement Processes
  • 6.7 Case Studies on Quality Management

Module 7: Project Opportunity & Risk Management

  • 7.1 Identifying Project Risks and Opportunities
  • 7.2 Risk Assessment and Prioritisation
  • 7.3 Developing Risk Mitigation Strategies
  • 7.4 Opportunity Management
  • 7.5 Tools for Risk Management
  • 7.6 Monitoring and Controlling Risks
  • 7.7 Case Studies on Risk Management

Module 8: Project Governance & Team Management

  • 8.1 Principles of Project Governance
  • 8.2 Establishing Governance Structures
  • 8.3 Roles and Responsibilities in Governance
  • 8.4 Effective Team Management Strategies
  • 8.5 Building and Leading High-Performing Teams
  • 8.6 Conflict Resolution and Team Dynamics
  • 8.7 Tools for Team Management

Module 9: Project Visualisation, Analytics & Reporting

  • 9.1 Importance of Project Visualisation
  • 9.2 Data Analytics in Project Management
  • 9.3 Creating Effective Project Reports
  • 9.4 Using Dashboards for Real-Time Tracking
  • 9.5 Tools for Project Visualisation and Reporting
  • 9.6 Communicating Project Progress to Stakeholders
  • 9.7 Case Studies on Effective Reporting

Module 10: Project Stakeholder Engagement & Expectations Management

  • 10.1 Identifying Project Stakeholders
  • 10.2 Developing a Stakeholder Management Plan
  • 10.3 Techniques for Effective Stakeholder Communication
  • 10.4 Managing Stakeholder Expectations
  • 10.5 Conflict Management and Resolution
  • 10.6 Tools for Stakeholder Engagement
  • 10.7 Case Studies on Stakeholder Management

Show moredown

Who should attend this Certified Project Management Training Course?

This Certified Project Management Course is ideal for professionals looking to enhance their Project Management skills and advance their careers. This includes individuals from various industries seeking to improve their ability to manage projects effectively. It is particularly beneficial for:

  • Aspiring Project Managers
  • Current Project Managers
  • Team Leaders
  • Operations Managers
  • Product Managers
  • IT Managers
  • Business Analysts

Prerequisites of the Certified Project Management Training Course

There are no formal prerequisites to attend this Certified Project Management Course.

Certified Project Management Training Course Overview

Project Management is a critical discipline that ensures projects are completed on time, within scope, and on budget. With increasing complexity in business environments, the demand for skilled Project Managers is higher than ever. The Certified Project Management Certification provides the essential knowledge and skills to effectively manage projects of any size and scope, making it an asset for any professional aiming to excel in this field.

Mastering Project Management is crucial for delivering successful projects and achieving strategic business goals. Professionals such as aspiring Project Managers, current Project Managers, Team Leaders, Operations Managers, Product Managers, IT Managers, Business Analysts, and Programme Coordinators should aim to master these skills.

This 5-day Certified Project Management Course by The Knowledge Academy offers intensive training that covers key Project Management principles and practices. Delegates will learn to apply best practices, manage project lifecycles, and use Project Management tools effectively.

Course Objectives

  • To understand the fundamental principles of Project Management
  • To apply Project Management methodologies and tools effectively
  • To develop skills for managing project lifecycles from initiation to closure
  • To enhance capabilities in risk management and quality assurance
  • To prepare for the Certified Project Management Certification exam

Upon completion, delegates will have a solid understanding of Project Management principles and practical skills to manage projects efficiently. They will be well-prepared for the Certified Project Management Certification exam, significantly enhancing their professional credentials and career prospects in Project Management.

Show moredown

What’s included in this Certified Project Management Training Course?

  • World-Class Training Sessions from Experienced Instructors 
  • Certified Project Management Certification 
  • Digital Delegate Pack

Show moredown

Certified Project Management Training Course Exam Information:

The Certified Project Management Training Course exam evaluates a candidate proficiency in project management techniques and principles. The exam format is as follows:

  • Type of Questions: Multiple Choice
  • Total Questions: 150
  • Duration: 3 Hours

Show moredown

Online Instructor-led (1 days)

Online Self-paced (8 hours)

Malware and Memory Forensics Certification Exam

Malware and Memory Forensics Certification Course Outline

  • Module 1: Types of Analysis
  • Module 2: In-memory data
  • Module 3: Memory Architectural Issues
  • Module 4: Tools used
  • Module 5: Registry in Memory

Show moredown

Who should attend this Malware and Memory Forensics Course?

This Malware and Memory Forensics Course is ideal for individuals interested in gaining a comprehensive understanding of malware analysis and memory forensics, enabling them to delve into the intricacies of digital forensics and cybersecurity. This course can be beneficial for a wide range of professionals, including:

  • IT Security Analysts
  • Digital Forensic Investigators
  • Incident Response Team Members
  • Network Security Engineers
  • Cybersecurity Consultants
  • System Administrators
  • Law Enforcement Personnel
  • Ethical Hackers

Prerequisites for this Malware and Memory Forensics Certification Course

There are no formal prerequisites for this Course.

Malware and Memory Forensics Course Overview

Cyber threats continue to evolve, becoming more sophisticated and challenging to detect. Malware, a typical cyber threat, poses a significant risk to organisations and individuals. Memory forensics, however, plays a crucial role in identifying and analysing volatile data stored in a system's memory, providing insights into malicious activities and potential security breaches.

Proficiency in this course is essential for professionals working in cybersecurity, digital forensics, incident response, and threat intelligence. Understanding malware behaviour and memory forensics enables these professionals to effectively identify, analyse, and respond to cyber threats. By mastering these skills, professionals can enhance their organisations' security posture and mitigate the impact of cyber-attacks.

This 1-day Course by The Knowledge Academy course offers comprehensive training, covering fundamental concepts and advanced techniques. Delegates will learn to use industry-standard tools and methodologies to analyse memory-resident malware, identify malicious code, and extract valuable forensic evidence. Delegates will develop practical skills and gain a deeper understanding of malware analysis and memory forensics through hands-on exercises and real-world scenarios.

Course Objectives

  • To understand the fundamentals
  • To learn advanced techniques for analysing memory-resident malware
  • To gain proficiency in using forensic tools for malware analysis
  • To develop skills in identifying and responding to security incidents involving malware
  • To enhance knowledge of malware behaviour and evasion techniques
  • To practice real-world scenarios in malware analysis and memory forensics

After completing this Certification course, delegates will receive this certification. This certification validates their expertise in malware analysis, memory forensics, and incident response, demonstrating their readiness to tackle complex cybersecurity challenges.

Show moredown

What’s included Malware and Memory Forensics Course

  • World-Class Training Sessions from Experienced Instructors   
  • Malware and Memory Forensics Certificate   
  • Digital Delegate Pack

Show moredown

Malware and Memory Forensics Certification Exam Information:

The Malware and Memory Forensics exam evaluates a candidate proficiency in malware analysis, memory forensics techniques, and cybersecurity principles. The exam format is as follows:

  • Type of Questions: Multiple Choice and Hands-on Analysis
  • Total Questions: 50 multiple choice + 1-2 practical scenarios
  • Duration: 3 Hours

Show moredown

Online Instructor-led (3 days)

Online Self-paced (24 hours)

Certified Application Security Engineer Certification Exam

Certified Application Security Engineer Certification Course Outline

  • Module 1: Understanding Application Security, Threats, and Attacks
  • Module 2: Security Requirements Gathering
  • Module 3: Secure Application Design and Architecture
  • Module 4: Secure Coding Practices for Input Validation
  • Module 5: Secure Coding Practices for Authentication and Authorisation
  • Module 6: Secure Coding Practices for Cryptography
  • Module 7: Secure Coding Practices for Session Management
  • Module 8: Secure Coding Practices for Error Handling
  • Module 9: Static and Dynamic Application Security Testing (SAST & DAST)
  • Module 10: Secure Deployment and Maintenance

Show moredown

Who should attend this Certified Application Security Engineer Certification Course?

This CASE Java Certification Course is ideal for individuals who want to improve their application security skills, especially those interested in learning about Java security practices to protect applications from vulnerabilities and cyber threats. This course can be beneficial for a wide range of professionals, including:

  • Software Developers
  • Application Architects
  • Security Consultants
  • Quality Assurance Testers
  • IT Managers
  • System Analysts
  • Security Engineers
  • Technical Leads

Prerequisites for Certified Application Security Engineer Certification Course

Delegates should have at least 2 years of working Java experience to take this CASE Certification Course. Familiarity with programming languages such as Java, C#, or Python will also be beneficial.

Certified Application Security Engineer Certification Course Overview

The CASE Certification Course is designed to train professionals to protect Java applications from cyber threats. In today's digital age, application security is vital because cyber-attacks are more advanced and pose risks to businesses and individuals.

Mastering application security is vital for ensuring the integrity, confidentiality, and availability of software applications. This CASE Java Certification Training is ideal for Software Developers, Security Engineers, and IT Professionals aiming to enhance their ability to secure Java-based applications and build strong defenses against vulnerabilities and cyber-attacks.

This intensive 3-day CASE Java Certification Training by The Knowledge Academy, participants will gain hands-on experience identifying, fixing, and reducing security weaknesses in Java applications. Through practical exercises and real-world scenarios, attendees will grasp application security principles thoroughly. This training will empower them to implement adequate security measures and create more secure Java applications.

Course Objectives

  • To understand the fundamental concepts of application security
  • To identify common security vulnerabilities in Java applications
  • To implement secure coding practices and techniques
  • To apply secure design principles to Java applications
  • To conduct thorough security testing and assessments
  • To develop and maintain secure Java applications

After completing the CASE Java Certification Course, delegates will possess the skills and knowledge necessary to enhance the security of Java applications effectively. They will be well-equipped to tackle security challenges and ensure their applications are resilient against modern cyber threats.

Show moredown

What’s included in this Certified Application Security Engineer Certification Course?

  • Certified Application Security Engineer Examination   
  • World-Class Training Sessions from Experienced Instructors   
  • Certified Application Security Engineer Certificate   
  • Digital Delegate Pack

Show moredown

Certified Application Security Engineer Certification Exam Information

This CASE .NET Certification exam assesses candidate proficiency in securing Java applications. It evaluates their understanding of secure coding practices, common vulnerabilities in Java applications, and techniques for mitigating security risks. To be eligible to apply to sit for the CASE Exam, the candidate must either:  

  • Attend the official EC-Council CASE training through an accredited EC-Council Partner  
  • Be an ECSP (.NET/ Java) member in good standing 
  • Have a minimum of 2 years working experience in InfoSec/ Software domain 
  • Have any other industry equivalent certifications such as GSSP .NET/Java

The exam format is as follows: 

  • Type of Assessment: Multiple Choice  
  • Number of Questions: 50  
  • Pass Marks: 70%  
  • Duration: 2 Hours

Show moredown

Online Instructor-led (3 days)

Online Self-paced (24 hours)

Dark Web Forensic Investigation Certification Exam

Dark Web Forensics Certification Course Outline

Module 1: Technical Background

  • TOR
  • Tumblers
  • Exit Nodes

Module 2: Tour of Markets

  • Drug Markets
  • Financial Crimes
  • Deviant Markets
  • Terrorist Markets

Module 2: Investigative Techniques

  • Step by Step Process
  • Specific Guidance
  • Tor Crawlers
  • Keeping your Identity Safe and Secure

Show moredown

Who should attend this Dark Web Forensics Certification Course?

This Dark Web Investigator Training is ideal for a range of professionals who are involved in, affected by, or interested in understanding and combating cybercrime that originates from or operates through the Dark Web. Professionals who will benefit from this Dark Web Investigation Course include:

  • Cybersecurity Professionals
  • Digital Forensics Investigators
  • Law Enforcement Officers
  • Government Intelligence Analysts
  • IT Security Consultants
  • Corporate Investigators
  • Compliance Officers
  • Risk Assessment Professionals

Prerequisites of the Dark Web Forensics Certification Course

To attend this Dark Web Investigator Course, delegates should be 18 and over.

Dark Web Forensics Certification Course Overview

The Dark Web Investigator Course delves into the intricacies of the dark web, a hidden part of the Internet often associated with illegal activities. This Dark Web Forensics Certification covers the tools and techniques used to investigate and track activities on the dark web, which is essential for law enforcement and cybersecurity efforts to combat cybercrime.

Professionals such as Digital Forensic Analysts, Cybersecurity Experts, and Law Enforcement Officers must master Dark Web Forensics to effectively track and apprehend cybercriminals. Knowledge of this subject enables these professionals to uncover illegal activities, gather evidence, and understand the complex nature of dark web operations.

The Knowledge Academy’s 3-day Dark Web Forensics Certification Training provides comprehensive training in the methodologies and tools used to investigate the dark web. Delegates will learn how to navigate dark web environments, identify illegal activities, and collect forensic evidence. This course combines theoretical knowledge with practical exercises to ensure that participants are equipped with the skills needed to conduct thorough and effective investigations into dark web activities.

Course Objectives

  • To introduce the fundamentals of the dark web and its relevance to cybercrime
  • To understand the tools and techniques used in dark web investigations
  • To learn how to navigate dark web environments safely and effectively
  • To develop skills in identifying and tracking illegal activities on the dark web
  • To enhance the ability to collect and preserve forensic evidence from the dark web

Upon completing this Dark Web Forensics Certification Course, delegates will have a deep understanding of dark web forensics and the practical skills to investigate and track dark web activities. They will be better equipped to uncover illegal operations, gather critical evidence, and contribute to the broader efforts of cybersecurity and law enforcement agencies.

Show moredown

What's included in this Dark Web Forensics Certification Course? 

  • World-Class Training Sessions from Experienced Instructors 
  • Dark Web Forensic Investigation Certificate 
  • Digital Delegate Pack

Show moredown

Dark Web Forensic Investigation Certification Exam Information:

The Dark Web Forensic Investigation exam evaluates a candidate proficiency in dark web forensics and cybersecurity principles. The exam format is as follows:

  • Type of Questions: Multiple Choice and Practical Simulations
  • Total Questions: 50 multiple choice + 2-3 hands-on challenges
  • Duration: 3 Hours

Show moredown

Not sure which course to choose?

Speak to a training expert for advice if you are unsure of what course is right for you. Give us a call on +44 1344 203 999 or Enquire.

EC – Council Certification Training FAQs

EC-Council Certification Training provides industry-recognised qualifications for cybersecurity professionals. These certifications validate skills in various cybersecurity practices and technologies, enhancing professional credibility.
Choosing EC-Council Courses equips you with advanced cybersecurity knowledge and skills, crucial for protecting organisations against sophisticated cyber threats and securing digital assets.
By training your team with EC-Council Training, your organisation gains a workforce capable of detecting, mitigating, and responding to cyber threats effectively, ensuring robust security practices are in place.
Most EC-Council certifications require a foundational knowledge of networking and information security. Specific prerequisites can vary, so checking the requirements for each certification is recommended.
The duration can be between 1 to 5 days depending on the course you choose. You can find more about the duration on the respective course pages.
These programmes help individuals gain knowledge and practical skills. The certifications demonstrate expertise in areas like ethical hacking, network security, and penetration testing. They validate technical skills and make individuals more appealing to employers
EC-Council Certification opens numerous career opportunities in cybersecurity, potentially leading to roles such as Ethical Hacker, Security Analyst, Forensic Investigator, and many others, often with competitive salaries and growth prospects.
EC-Council Certification equips professionals with critical skills to tackle emerging cybersecurity challenges effectively.
Yes, there are online training options available that provide flexibility for professionals to learn at their own pace.
To register for EC-Council Exam, you can check the respective course page. You can also contact our customer support through email or toll-free phone number for any questions relating to exam.
In the EC-Council Certifications, you will be learning cybersecurity, ethical hacking and penetration testing.
EC-Council Certifications are valid for three years. To renew your certification, you can apply for renewal at EC Council Website, or you can contact out customer support via email or phone.
While certifications from CompTIA and CompTIA+ are catered towards beginners, EC Council is more advanced and is up to date with all the security protocols that are part of modern society.
The EC-Council Certification team constantly works in the real time environment with incident investigation, expert advice and opinions, and cyber security watch dogs to create an environment that can react to any cybersecurity threat.
The format of exams for each course differs. Please check the respective course pages for more information.
The Knowledge Academy in Lebanon stands out as a prestigious training provider known for its extensive course offerings, expert instructors, adaptable learning formats, and industry recognition. It's a dependable option for those seeking this course.
The Knowledge Academy is the Leading global training provider for EC – Council Certification Training.
The training fees for EC – Council Certification Training in Lebanon starts from $6995
Show more down

Why we're the go to training provider for you

icon

Best price in the industry

You won't find better value in the marketplace. If you do find a lower price, we will beat it.

icon

Trusted & Approved

We are accredited by PeopleCert on behalf of AXELOS

icon

Many delivery methods

Flexible delivery methods are available depending on your learning style.

icon

High quality resources

Resources are included for a comprehensive learning experience.

barclays Logo
deloitte Logo
Thames Water Logo

"Really good course and well organised. Trainer was great with a sense of humour - his experience allowed a free flowing course, structured to help you gain as much information & relevant experience whilst helping prepare you for the exam"

Joshua Davies, Thames Water

santander logo
bmw Logo
Google Logo

Looking for more information on EC – Council Certification Training

cross

BIGGEST
Christmas SALE!

red-starWHO WILL BE FUNDING THE COURSE?

close

close

Thank you for your enquiry!

One of our training experts will be in touch shortly to go over your training requirements.

close

close

Press esc to close

close close

Back to course information

Thank you for your enquiry!

One of our training experts will be in touch shortly to go overy your training requirements.

close close

Thank you for your enquiry!

One of our training experts will be in touch shortly to go over your training requirements.