Cybersecurity Course Portfolio

Our Training Portfolio

In order to provide a better overview and to facilitate access to the course program you are looking for, we have organised our portfolio in two main domains:

Technical Domain Portfolio

Applied Web Security

Web application security is a branch of information security that deals specifically with the security of websites, web applications and web services. At a high level, web application security draws on the principles of application security but applies them specifically to internet and web systems.

Web Application Security Intermediate - RT422

The Web Application security course will help participants understand major web application flaws and their exploitation, as well as learn a proven process for locating these flaws consistently.

RT422

Web Application Security Advanced - RT423

This training is an advanced course that covers topics in the Red-Team Cyber Warfare methodologies.

RT423 - WebApp Hacking

Industrial Control Systems

Intro to ICS/SCADA - BT222

The Intro to ICS/SCADA program was constructed primarily for the security industry and was meant to equip participants with understanding of the world of ICS.

BT222

ICS Forensics - BT223

The program was designed comprehensively and professionally, to impart the skills and knowledge required to integrate into key positions of the information security world, both in defense and attack teams.

BT223

IoT Exploitation - RT430

The course will be based on both theoretical and practical use of vulnerabilities in IoT devices, IoT devices architecture, identifying attack surfaces, and exploiting IoT vulnerabilities.

RT430

ICS Penetration Testing - RT431

This training covers possible attack methods by hostile entities and the security challenges that naturally follow.

RT431

Cybercrime investigation

Cryptography - BT216

From ancient examples of secret messages and the spies that cracked them to modern cryptographic applications, you will have the opportunity to explore the foundations of data security.

BT216

Reverse Engineering - BT221

This course sets the groundwork of understanding networks and the investigation process on them.

BT221

Core Domain Portfolio

Foundations

Cybersecurity Introduction - NS101

Cybersecurity Introduction training covers the core concepts of defense and understanding in the practical world using the CYBERIUM ARENA simulator. Students will learn about different domain structures and security technology products.


Warning: Trying to access array offset on value of type bool in /home/clients/0693dfda65b5b933cf10a4fc8f7a540d/sites/dev.semafor-conseil.ch/wp-content/plugins/exclusive-addons-for-elementor/elements/accordion/accordion.php on line 1283

Cybersecurity Advanced Notions - NS102

Cybersecurity Advanced Notions course is designed for experienced computer users who have limited or no previous exposure to Linux, whether they are working in an individual or corporate environment.

NS102 Tier 2

Security Advanced Notions - NS106

The Network Security course aims to address cyber challenges experienced on the network level. The course covers various attack techniques and how to defend against them.

NS106 Network Research

Network Security - BT208

After this course, you will be able to discover security vulnerabilities across the entire network by using network hacking techniques and vulnerability scanning.

BT208

Cryptography - BT216

From ancient examples of secret messages and the spies that cracked them to modern cryptographic applications, you will have the opportunity to explore the foundations of data security.

BT216

Monitoring, Detection, Defense Operations

SIEM/SOC Intermediate - NS107

This course covers the necessary skills and practices to train such SOC personnel and successfully operate a modern-day SOC.

NS107 SIEM/SOC Intermediate

SIEM/SOC Advanced - NS108

This SOC Operation course is designed for SOC organizations implementing a SOC solution and provides full guidance on the necessary skills and procedures to operate it.

NS108 SIEM/SOC Advanced

Threat Intelligence and OSINT - BT209

This course teaches participants how to collect and analyze information using various tools and unique methods and apply targeted cyber intelligence to defensive operations to act on threats proactively.

BT209

Penetration Testing Intermediate

Penetration Testing - BT212

This training will provide the participant with a steppingstone on how to use it in practice and take on the complex task of effectively measuring the entire attack surface of a traditionally secured environment.

BT212

Cyber Warfare - RT420

This training is an advanced course that covers topics in the Red-Team Cyber Warfare methodologies.

RT420

Offensive Python - RT421

The course offers participants advanced levels of attack to evade the many defense mechanisms available in the market today with the help of independent tools and Python programming capabilities.

RT421

Web Application Security Intermediate - RT422

The Web Application security course will help participants understand major web application flaws and their exploitation, as well as learn a proven process for locating these flaws consistently.

RT422

Exploit Development Intermediate- RT433

This course covers how to write shellcodes, programs, and tools, essential skills for advanced penetration testers and software security professionals.

RT433

Windows Exploitation - RT424

In this training, you will learn about the Windows operating system, and you will experience in both offensive and defensive methods, knowing how to break into the system is not the same as understanding how to defend against the attack.

RT424

Penetration Testing Advanced

Web Application Security Advanced - RT423

Testing web-application security is not intuitive, and to be useful, you need an understanding of web application design, HTTP, JavaScript, browser behavior, and potentially other technologies.

RT423 - WebApp Hacking

Exploit Development Advanced - RT434

This training is an advanced course that covers topics in the Red-Team Cyber Warfare methodologies.

RT434

IoT Exploitation - RT430

The course is based on both theoretical and practical use of vulnerabilities in IoT devices, IoT devices architecture, identifying attack surfaces, and exploiting IoT vulnerabilities.

RT430

Intro to ICS/SCADA - BT222

The Intro to ICS/SCADA program was constructed primarily for the security industry and was meant to equip participants with understanding the world of ICS.

BT222

ICS Penetration Testing - RT431

This training covers possible attack methods by hostile entities and the security challenges that naturally follow.

RT431

Incident Response, Threat Management Forensics

Windows Forensics - BT210

Windows Forensics is an essential skill in the cybersecurity world. This course covers a broad spectrum of aspects of the forensic investigation process performed on a Windows OS.

BT210

Network Forensics - BT211

This course sets the groundwork for understanding networks and the investigation process on them.

BT211

Linux Forensics - BT214

During this course, participants will learn the basics of computer hardware and the Linux-OS files system.

BT214

Python Forensics - BT215

This training will provide the participant with steppingstones on how to take forensics skills to the next level, combining them with powerful Python scripting.

BT215

Malware Analysis - BT220

This course provides participants with the practical skills and knowledge to be able to analyze malware and exposes them to a critical set of tools required for their tasks.

BT220

Reverse Engineering - BT221

Reverse Engineering is a technique used to analyze software to identify and understand its components and its flows. It is a process of understanding code infringement processes and analyzing software weaknesses.

BT221

ICS Forensics - BT223

The program was designed comprehensively and professionally, to impart the skills and knowledge required to integrate into key positions of the information security world, both in defense and attack teams.

BT223

CyberLearning - Educational Process

This course explores the various tools and techniques commonly used by Linux system administrators and end-users to achieve their day-to-day work in a Linux environment using automation techniques. Linux Operations course is designed for experienced computer users who have limited or no previous exposure to Linux, whether they are working in an individual or Enterprise environment.

Cyberium LMS & Arena

The Cyberium Arena is a high-end cybersecurity Learning Management System and Simulator.

Role Training Program

Update or upgrade your cyber security knowledge and skills using our roles view. Check how our learning program can improve your career!