• Cryptography
    • Cryptography
    • Cryptography

    • R11,999.00
    • Cryptography is an indispensable tool for protecting information in computer systems. In this course, you will learn the inner workings of cryptographic systems and how to use them in real-world applications correctly. From ancient examples of secret messages and the spies that cracked them to modern cryptographic applications, you will have the opportunity to explore the foundations of data security.…
    • Add to basket
  • Linux Forensics
    • Linux Forensics
    • Linux Forensics

    • R11,999.00
    • OS Forensics is the ART of extracting evidence and important artifacts from a digital crime scene that can help the investigator in reconstructing the chain of events. During this course, students will learn the basics of computer hardware and the Linux-OS filesystem. The students will learn to collect and analyze forensic evidence and write official reports. Duration: 40 Hours Target…
    • Add to basket
  • Malware Analysis
    • Malware Analysis
    • Malware Analysis

    • R11,999.00
    • Malware Analysis is the study and close examination of malware to understand its origins, purpose, and potential impact on the system. Malware analysts accomplish their tasks by using various tools and expert-level knowledge to understand not only what a piece of malware can do but also how it does it. This course provides participants with the practical skills and knowledge…
    • Add to basket
  • Network Forensics
    • Network Forensics
    • Network Forensics

    • R11,999.00
    • Network forensics training is about the analysis of network traffic to identify intrusions or anomalous activity. Compared to computer forensics, where evidence is usually preserved on disk, network data is more volatile and unpredictable and therefore requires a different approach. This course sets the groundwork of understanding networks and the investigation process on them. Students will master the fundamentals of…
    • Add to basket
  • Network Security
    • Network Security
    • Network Security

    • R11,999.00
    • Network security is a board term that covers multiple technologies, devices, and processes. Nowadays, every organization, regardless of size, industry, or infrastructure, requires a network security expert in place to protect it from the ever-growing landscape of cyber threats today. After this course, you will be able to discover security vulnerabilities across the entire network by using network hacking techniques…
    • Add to basket
  • Penetration Testing
    • Penetration Testing
    • Penetration Testing

    • R11,999.00
    • Penetration testers face with a combination of intrusion detection systems, host-based protection, hardened systems, and analysts that pour over data collected by their security information management systems. Penetration tests help find flaws in the system to take appropriate security measures to protect the data and maintain functionality. This training will provide the student with a steppingstone on how to use…
    • Add to basket
  • Python Forensics
    • Python Forensics
    • Python Forensics

    • R11,999.00
    • What makes an excellent digital forensics investigator, is to have the knowledge and skill to automate forensics stages using the power of Python programming language. Many laboratories rely on Python to build basic models for predictions and to run experiments. It also helps to control critical operational systems. Python has built-in capabilities to support the digital investigation and protect the…
    • Add to basket
  • Reverse Engineering
    • Reverse Engineering
    • Reverse Engineering

    • R11,999.00
    • Reverse Engineering is a technique used to analyze software to identify and understand its components and its flows. It is a process of understanding code infringement processes and analyzing software weaknesses. Reverse Engineers analyze systems to create system representations in another form of abstraction. Duration: 40 Hours Target Audience Cybersecurity practitioners Cyber forensics analysts Security engineers/researchers Incident responders Junior reverse…
    • Add to basket
  • Threat Intelligence and OSINT
    • Threat Intelligence and OSINT
    • Threat Intelligence and OSINT

    • R11,999.00
    • Open-source intelligence (OSINT) covers the techniques and procedures practiced to retrieve targeted information from open-source networks containing immense amounts of data. This course teaches participants how to collect and analyze information using various tools and unique methods and apply targeted cyber intelligence to defensive operations to act on threats proactively. Students will collect information from the DarkNet, social networks, classifying…
    • Add to basket
  • Windows Forensics
    • Windows Forensics
    • Windows Forensics

    • R11,999.00
    • Windows Forensics is an essential skill in the cybersecurity world. Covering a broad spectrum of aspects of the forensic investigation process performed on Windows OS. Participants will learn how different computer components work and how to investigate after a cyber-incident. The training will focus on developing hands-on capabilities of forensics teams or individual practitioners in these areas: Searching the hard…
    • Add to basket