Improve your experience. We are very sorry but this website does not support Internet Explorer. We recommend using a different browser that is supported such as Google Chrome or Mozilla Firefox.

Catalogue

Cyber Security

Certified Application Security Engineer (CASE.NET)

BHD600.00 excl. Tax

The Certified Application Security Engineer (CASE .NET) credential tests the critical security skills and knowledge required throughout a typical software development life cycle (SDLC), focusing on the importance of the implementation of secure methodologies and practices in today’s insecure operating environment.

More information

Certified Application Security Engineer (CASE JAVA)

BHD600.00 excl. Tax

The CASE Java program is designed to be a hands-on, comprehensive application security training course that trains software developers on the critical security skills and knowledge required throughout a typical software development life cycle (SDLC), focusing on the importance of the implementation of secure methodologies and practices required in today’s insecure operating environment.

More information

Certified SOC Analyst (CSA)

BHD600.00 excl. Tax

This program is the first step to joining a security operations center (SOC). It is engineered for current and aspiring Tier I and Tier II SOC analysts to achieve proficiency in performing entry-level and intermediate-level operations.

More information

Certified Threat Intelligence Analyst (CTIA)

BHD600.00 excl. Tax

CTIA is a method-driven Threat Intelligence program that uses a holistic approach, covering concepts from planning the threat intelligence project to building a report to disseminating threat intelligence. These concepts are highly essential while building effective threat intelligence and, when used properly, can secure organizations from future threats or attacks.

More information

Computer Hacking Forensic Investigator (CHFI)

BHD1,000.00 excl. Tax

The Computer Hacking Forensic Investigator (CHFI) course delivers the security discipline of digital forensics from a vendor-neutral perspective. CHFI is a comprehensive course covering major forensic investigation scenarios and enabling students to acquire necessary hands-on experience with various forensic investigation techniques and standard forensic tools necessary to successfully carry out a computer forensic investigation leading to the prosecution of perpetrators.

More information

Certified Ethical Hacker (CEH)

BHD1,000.00 excl. Tax

The most comprehensive ethical hacking course to help information security professionals grasp the fundamentals of ethical hacking. The purpose of the CEH credential is to: establish and govern minimum standards for credentialing professional information security specialists in ethical hacking measures, inform the public that credentialed individuals meet or exceed the minimum standards, and reinforce ethical hacking as a unique and self-regulating profession. (Certificate accredited by EC-Council)

More information

Certified Network Defender (CND)

BHD1,000.00 excl. Tax

The program prepares network administrators on network security technologies and operations to attain Defense-in-Depth network security preparedness. It covers the protect, detect, and respond approach to network security. The course contains hands-on labs, based on major network security tools and techniques which will provide network administrators real world expertise on current network security technologies and operations.

More information

Certified Secure Computer User (CSCU)

BHD400.00 excl. Tax

The purpose of the Certified Secure Computer User (CSCU) training program is to provide students with the necessary knowledge and skills to protect their information assets. (Certificate accredited by EC-Council)

More information

Certified Incident Handler (ECIH)

From BHD305.00 excl. Tax

The IH&R process includes stages like incident handling and response preparation, incident validation and prioritization, incident escalation and notification, forensic evidence gathering and analysis, incident containment, systems recovery, and incident eradication. This systematic incident handling and response process creates awareness among incident responders in knowing how to respond to various types of security incidents.

More information

Certified Security Analyst (ECSA)

From BHD645.00 excl. Tax

The ECSA program offers a seamless learning progress continuing where the CEH program left off. The new ECSAv10 includes updated curricula and an industry recognized comprehensive step-by step penetration testing methodology. This allows a learner to elevate their ability in applying new skills learned through intensive practical labs and challenges

More information

Identity And Access Management

BHD20.00 excl. Tax

This comprehensive course covers the key areas of IAM, with including fundamental concepts, but also the technologies and the different approaches to implementing effective IAM across the enterprise, web services and government.

More information

Black Hat Python: Python for Pentesters

BHD12.00 excl. Tax

Starting from scratch this course will enable you on all the latest tools and techniques available for Python pen testing. By the end of the course you'll be successfully able to use to Python scripts for penetration testing a variety of system.

More information

Continuous Integration and Continuous Deployment with Azure

BHD10.00 excl. Tax

After completing the course you will have a working knowledge of how azure DevOps works and you will be able to implement CI-CD for your organization.

More information

Deep Dive into the World of Malware

BHD5.00 excl. Tax

This course aims to look at modern malware families and techniques, as well as how they are being used in the “real world". By the end of this course, you will learn some basic activities that you can do at home to help reduce your risk.

More information

Hands-On Android Security

BHD10.00 excl. Tax

This course focuses on the practical aspect of penetration testing. The course will begin with teaching you the core concepts of Android OS, hardware security components, and native applications. Further, you'll learn to analyze existing android apps, understand vulnerabilities, and test your work to fully secure your android environment.

More information

Introduction to OOP Programming in Java EE

BHD10.00 excl. Tax

Learn to build reliable, maintainable, and extensible code in Java EE. This course starts your journey by refreshing your knowledge of basic OOP concepts and how to implement them in real Java code.

More information

Secure Full Stack MEAN Developer

BHD30.00 excl. Tax

MEAN stack development is a modern approach to building dynamic web applications. It is an open-source JavaScript framework that harnesses four major technologies: MongoDB, Express, Angular, and Node.js. Given the rise of the ever-increasing demand for full-stack JavaScript developers, this course will help you master both front-end and back-end development.

More information

Wireless Pentesting with the Raspberry Pi

BHD12.50 excl. Tax

Raspberry pi, a credit card sized computer chip can help you design open and well documented projects which are easy to build and modify. Ever thought, your portable raspberry pi tools can be converted into a low-cost hacking tool.

More information

Secure Programming With C++

BHD30.00 excl. Tax

The C++ programming language is widely used, but C++ programs are often insecure. A number of different vulnerabilities can exist in C++ code and make it vulnerable to exploitation.

More information

Metasploit Like a Pro

BHD32.50 excl. Tax

Metasploit is the most common command and control (C2) framework used by penetration testers and red team operators around the globe. It is a framework that is a “must-know” and will give you the confidence to successfully operate on a target network.

More information

Press enter to see more results