Training 

Either is a training or awareness, Cybersecurity.mk can provide this service to the customers and clients with over a decade experience, compliant with ISO standards, such as, ISO/IEC 27000, BS 7799, ISO 15408, ISO 54000, CIP-002-1, etc. Our team is certified ISO/IEC 27001 Lead Auditors, certified trainers for CEH, Microsoft Certified Trainers, etc. As well as authors of few paper back books. Moreover, we offer in-house and e-learning training. Our methodology and approches in training and awareness programmes have demonstrated an incredible positive results. For further more please visit our first project Interactive Cyber Security Awareness Program. Additionally, Cybersecurity.mk has a team of Microsoft Certified Trainers, Certified Ethical Hackers and Licensed Penetration Testing. Further, we have delivered workshops and hands-on practice exercises elsewhere. Continuous working with human rights, NGOs, NPOs, and other hacktivism organizations.

  1. Introduction
  2. Attacking Phases
  3. Reconnaissance
  4. Scanning and Enumeration
  5. Penetration
  6. Denial of Service
  7. Escalation and Maintaining Access
  8. Covering Tracks and Hiding
  9. Password and Brute-Force Attacks
  10. Network Security
  11. DNS Security
  12. E-mail Security
  13. Exploitation
  14. Web Application Security

  1. Physical Security
    1. Protect Your Computer
    2. Data Protection
    3. Mobile and Portable Device
    4. Secure Printing
  2. Computer and Mobile Security
    1. Malicious Software
    2. Operating System Security
    3. Strong and Safe Password
  3. Network and Internet Security
    1. Social Engineering and Social Networking
    2. Secure Browsing
    3. E-mail and Instant Messaging Security
    4. Firewall
    5. Wireless Network Securit

1. Information Security Governance and Risk Management Module
   - Fundamental principles of security
   - Risk management concepts
   - Security Frameworks
   - Policies, Standards, baselines, guidelines
   - Security Policies, Standards, Procedures, and Guidelines
   - Risk Management and Analysis
   - Information classification/ownership
   - Security education, training and awareness
   - Certification and accreditation
2. Information Systems Access Control Module
   - Identification, Authentication, Authorization and Accountability (IAAA)
   - Discretionary versus Mandatory Access Control Models
   - Role-based Access Control (RBAC)
3. Security Architecture and Design Module
   - Critical Components of Every Computer
   - Access Control Models
   - Certification and Accreditation
   - Countermeasure principles
   - Fundamental concepts of security models
   - Capabilities of information systems
   - Vulnerabilities and threats
4. Physical (Environmental) Security Module
   - Facility Location and Construction Issues
   - Physical Vulnerabilities and Threats
   - Internal security
   - Facilities security
5. Telecommunications and Network Security Module
   - TCP\IP Suite
   - LAN, MAN, and WAN Topologies and Technologies
   - Firewall Types and Architectures
   - Network attacks
6. Cryptography Module
   - Encryption concepts
   - Digital signatures
   - Cryptanalytic attacks
   - Public Key Infrastructure (PKI)
   - Symmetric & Asymmetric Key Algorithms
7. Business Continuity and Disaster Recovery Planning Module
   - Planning
   - Roles and Responsibilities
   - Recovery strategy
   - Business Impact Analysis
   - Disaster recovery process
   - Training
8. Legal, Regulations, Investigations and Compliance Module
   - Privacy Laws and Concerns
   - Compliance requirements/procedures
   - Types of Evidence and How to Collect It
9. Software Development Security Module
   - Software Development Models
   - Database Models and Relational Database Components
   - Application environment and security controls
   - Effectiveness of application security
10. Security Operations Module
    - Operations Department Responsibilities
    - Incident response and attack prevention
    - Patch and vulnerability management
11. Risk Management Module
    - Vulnerability Assessment
      - What is penetration testing?
      - Scope of Vulnerability analysis
      - Conducting a Risk & Vulnerability Assessment;
      - Methodology & Tools
    - Information Security Risk Assessment
      - Risk Assessment Frameworks
      - Reactive Vs. Proactive approaches
      - Quantitative risk management or qualitative risk management 
12. Privacy Module
    - Confidentiality, Privacy and Security
    - Data Privacy
    - Privacy Policy
    - Threats to personal privacy posed by computers and the Internet
    - EU Data Protection Directive
    - Health Insurance Act
    - Social networking and privacy issues
13. Ethical Hacking Module

  1. Attacking Phases
    1. Reconnaissance
    2. Scanning
    3. Gaining Access
    4. Maintaining and Expanding Access
    5. Covering Tracks
  2. Network Scanning Attacks
    1. Host Discovery and Port Scanning
    2. Service, Application and OS Version Detection
    3. IPS and IDS Evasion
    4. Vulnerability Scanning
    5. Scanning Countermeasures
  3. Password Attacks
    1. Types of Password Attacks
    2. Password Countermeasures
  4. Exploitation
    1. Memory Segmentation
    2. Buffer Overflow
    3. Exploitation Frameworks
    4. Exploitation Countermeasures
  5. Web Application Attacks
    1. Session Management
    2. Path Traversal Attacks
    3. Code Injection
    4. SQL Injection
    5. Cross Site Scripting
    6. Cross Site Request Forgery
    7. Web Application Countermeasures

  1. Introduction
  2. Anatomy of APTs
    1. Reconnaissance
    2. Preparation
    3. Targeting
    4. Further Access
    5. Data Gathering
    6. Maintenance
  3. APT Countermeasures

  1. Decision Process Making Phases
    1. Plan–Do–Check–Act
    2. Observe, Orient, Decide, and Act
  2. Risk Management
  3. Information and Cyber Security Assurance
  4. Security Management and Cost Optimization
  5. Security Standards
  6. Policy and Privacy

  1. Targets
  2. Social Engineering
  3. E-mail
  4. Browsing
  5. Social Networking
  6. Mobile Security
  7. Password
  8. Encryption
  9. Data Security
  10. Data Destruction
  11. Wireless Security
  12. Remotely working
  13. IT Staff
  14. Physical Security
  15. Protect your Computer
  16. Protect your Home Network
  17. Protect your Children On-line
  18. Advanced Persistent Threat
  19. Firewall
  20. Cloud Security

  1. Injection
  2. Cross Site Scripting
  3. Authentication
  4. Session Management
  5. Insecure Direct Object references
  6. Cross Site Request Forgery
  7. Insecure Configuration
  8. Insecure Cryptographic Storage
  9. Path Traversal
  10. Offensive Security
  11. Format String Attack
  12. Race Conditions
  13. Memory Corruption

  1. Introduction
  2. PenTesting Logistic
  3. Linux Fundamentals
  4. Information Gathering
  5. Detecting Live Systems
  6. Enumeration
  7. Vulnerability Assessments
  8. Malware Goes Undercover
  9. Windows/Apple Hacking
  10. Hacking UNIX/Linux
  11. Advanced Exploitation Techniques
  12. Networks, Sniffing and IDS
  13. PenTesting Wireless Networks
  14. SQL Injection
  15. Attacking Web Technologies
  16. Buffer Overflow Attack

  1. Introduction to dynamic WEB applications
  2. PHP variables, constants and operators
  3. Control structures
  4. Loops
  5. Functions
  6. String and date functions
  7. Arrays
  8. Array functions
  9. Objects
  10. Processing Forms
  11. MySQL and SQL Injection
  12. Cookies and Sessions
  13. GD (image manipulation)
  14. PHP Security

  1. Examples
  2. Hello Android
  3. Application 1 & 2
  4. Android Application Fundamentals
  5. Android View
  6. Application Storage
  7. Adapters and Data Handling
  8. Inflaters
  9. Dialogs
  10. Android Maps & working with GPS
  11. Services, Notifications, AsyncTasks
  12. SMS and other details
  13. Animations and Audio
  14. Camera and External Files
  15. Android Security

  1. Introduction to Forensics
  2. Forensics Technologies
  3. Data Recovery and Clean Room
  4. Disk & File Systems
  5. Evidence Collection
  6. Preservation, Verification & Authentication
  7. Discovery & Identification
  8. Windows Forensic
  9. Linux Forensic
  10. MacOS Forensic
  11. File Analysis
  12. Net Analysis
  13. Automating Analysis
  14. Forensics Report

  1. General introduction to mobile devices
  2. Introduction to Android OS, iOS, BlackBerry and applications
  3. Malware iOS & Android
  4. Other risks from mobile devices
  5. Forensic procedures for mobile devices
  6. Android Forensics
  7. Protection and mitigation of risks mobile devices
  8. SQL forensics and analysis of data from mobile application

  1. Introductions and Overview
  2. Installing Linux
  3. Performing the installation
  4. The Boot Process
  5. Basic Commands
  6. Internet server operations
  7. The Apache Web Server
  8. Maintaining the system
  9. Implementing File and Print Services
  10. Login Services
  11. Linux Name Services
  12. Providing Mission-Critical Intranet and Internet Services
  13. Other information services (POP, IMAP, NNTP, SMTP)
  14. Improving Network Security

  1. Supporting Users Running the Microsoft Windows XP Operating
  2. Exam Preparation for the MCDST Certification
  3. Exam Preparation for the MCDST Certification Hands-On Labs
  4. Deploying Microsoft® Office Professional Plus 2007
  5. Deploying Windows Vista® Business Desktops
  6. Installing, Configuring, and Troubleshooting Windows Vista®
  7. Configuring Windows Vista Mobile Computing and Applications - MODL
  8. Installing, Configuring, Troubleshooting, and Maintaining Windows Vista
  9. Supporting Windows Vista® and Applications in the Enterprise
  10. Supporting the Microsoft Windows Vista Operating System and Applications - MODL
  11. Updating Your Technology Knowledge of Microsoft® Windows® XP to Windows® 7 Beta
  12. Installing and Configuring Windows® 7 Client
  13. Troubleshooting and Supporting Windows® 7 in the Enterprise
  14. Planning and Managing Windows 7 Desktop Deployments and Environments
  15. Planning and Managing Windows® 7 Desktop Deployments and Environments
  16. Introduction to Web Development with Microsoft® Visual Studio® 2010
  17. Automating Administration with Windows PowerShell 2.0
  18. Windows 7, Enterprise Desktop Support Technician

This course is available only through our partners. Therefore, if you are interested please let us know on contact form or through social media sites.