Academysys Traning Center Courses Catalog

Course NameDayCourse Description
Cyber Security Essentials5This course is about Network Security Essentials, Defense-In-Depth and Attack, Threat Management and Cryptography, Risk Management and Response, Windows Security, and Linux Security
Hacker Tools and Techniques5Course helps you understand attackers' tactics and strategies in detail, gives you hands-on experience in finding vulnerabilities and discovering intrusions, and equipping you with a comprehensive incident handling plan.
Network Security5This course is about protecting and defending network infrastructure against attacks. Main topics: Secure network topologies , local area and internet based network attacks, network attacks tools, hardening network devices (router, switch, access point etc.), network security tools and products,.
Windows Security3This course is about defending Microsoft Windows based systems and automating operations with Powershell. Main topics: Windows authentication mechanisms, file and folder permissions, patch managament, Active Directory and security features, securing windows server services (DNS, DHCP, IIS), security configuration audit, windows operating system ans services hardening,
Linux Security3This course is about hardening Linux based operating systems and services and automating security with shell scripts and Python.Main topics: Linux security fundamentals, file and folder permissions, user access control, system log configuration, security hardening tools.
Database Security2This course is about security mechanisms and hardening of popular database managament systems like MySQL, PostgreSQL, MSSQL and Oracle. Main topics: database concepts, identity control, access control lists, database security audits, securing remote access, backup and restore, DB hardening, log managament and access control
Virtualization Security3This course is about security mechanism and hardening of popular virtulazation platforms. Main topics: virtualization concepts and popular platforms, virtualization system components, secure virtualization network architecture, attacks on virtual infrastructure, hardening virtulization components, log managament and monitoring, security policies and audit.
DDoS Attacks and Protection2This course is about understanding the nature of DDoS attacks and defending against these attacks. Main topics: Internet infrastructure and design problems, ,DoS/DDoS consept, DDoS attacks types (TCP flood ,SYN flood DNS/UDP flood, Amlification, etc), DDoS prevention products, hardening operationg systems and applications against DDoS, DDoS attack analysis,
Penetration Testing5Practical Penetration Test Training is a hands-on training designed to test weaknesses in services, services and web applications that are running at the network level, along with services and applications running on local networks. 
Network Penetration Testing3Course helps to obtain hacker point of view to attack IT systems and gives insight to technical and management processes of penetration tests and ethical hacking. Main topics: Essentials concepts, penetrations test project phases and administrative process, pentest technical workflow, information gathering and recon, vulnerability discovery and analysis, exploitation, post-exploitation and pivoting, social engineering attacks, pentest reporting, common pentest tools (Nmap, Nessus, Metasploit, Nexpose, SET, Hping3, Kali Linux tools)
Web Application Penetration Testing3Web Application Security and Penetration Testing Training is a training which is mainly prepared for web applications testing. This training is proper for the people who want to work in this area primarily but anyone interested in cyber security can enroll this training because it is taught from beginning to end and basic to advanced.
Log Management and Analysis2Course provides foundational log analysis skills and experience using the tools needed to help detect a network intrusion. Students learn how to process logs from Windows and Linux operating systems, firewalls, intrusion detection systems and web and e-mail servers.
Incident Response2Course provides knowledge and hands-on experience about computer incident response tools and techniques. Main topics: IR terms and definitions, incident response workflow, communication managament, digital evidence gathering and chain of custody, coordination with other CERTs incident response case studies,
Digital Forensics5Course helps attendees conduct computer forensic analysis using modern tools and techniques. Main topics: incident response steps, digital evidence gathering process, extracting infromation from different computer components (RAM, Hard disk, slack space, etc.) , filesystem internals, forensic analysis tools, conducting forensic analysis on digital evidence, legal considerations and presenting evidence to courts.
Malware Forensic3Course explains how to determine whether a computer system is infected with malware. It covers the tools that computer forensics practitioners use to examine a system, build a timeline of events and preserve the state of the system or data they are examining. Common malware attachment points in the Windows/linux operating system are also described.
Network Forensic4Network Forensics is a branch of Digital Forensics that helps collect evidence against cyber criminals and aids in proving their malign intentions. If you want to become a forensic investigator, this network forensics course is the right way forward. Learn about systematically identifying intrusions, gathering information, and collecting legal evidence against black hat hackers and network intruders.
Secure Software Development5Secure Software Development Training contributes to the development process by teaching the current security vulnerabilities, deficiencies which caused to these vulnerabilties and the most accurate coding methods with a security perspective to software developers. This training is addressed to software developer specialists and software architects in the field
F5 LTM Bootcamp3This course gives a functional understanding of how to deploy, tune, and operate BIG-IP Application Security Manager (ASM) to protect their web applications from HTTP-based attacks.
F5 ASM Bootcamp4The BIG-IP Application Security Manager course gives participants a functional understanding of how to deploy, tune, and operate BIG-IP Application Security Manager (ASM) to protect their web applications from HTTP-based attacks.The course includes lecture, hands-on labs, and discussion about different ASM components for detecting and mitigating threats from multiple attack vectors such web scraping, Layer 7 Denial of Service, brute force, bots, code injection, and zero day.
Fortigate I- Security Bootcamp2In this two-day course, candidates will learn how to use basic FortiGate features, including security profiles.In interactive labs, candidates will explore firewall policies, user authentication, SSL VPN, dial-up IPsec VPN, and how to protect their network using security profiles such as IPS, antivirus, web filtering, application control, and more. These administration fundamentals will provide candidates with a solid understanding of how to implement basic network security.
Fortigate II-Infrastructure Bootcamp3In this three-day course, candidates will learn how to use advanced FortiGate networking and security features.Topics include features commonly applied in complex or larger enterprise or MSSP networks, such as advanced routing, transparent mode, redundant infrastructure, site-to-site IPsec VPN, SSO, web proxy, and diagnostics.

Discover what we can do for your information security…