Log Files and Event Analysis

The learner will evaluate log files and learn tools to extract associated valuable data for detecting cyber threats and system performance issues.

Malware Behaviour Analysis

Malware analysis is used as part of a forensic investigation to understand the behaviour and purpose of malware which is designed to cause harm or exploit any programmable device.

Malware Reverse Engineering

This module teaches students the skills and toolsets required for in-depth investigations of modern malware and understanding what malicious impacts it can have on systems.

OT/ICS Networks & Protocols

The aim of the module is to provide knowledge, skills and abilities related to communication networks and protocols used in Operational Technology.

Penetration Testing

Penetration Testing is the authorized process of attacking a computer system to evaluate the security of the system by identifying and verifying security weaknesses.

Practical Cryptography

Students will gain a hands-on understanding of practical cryptographic applications and their correct implementations in information systems.

Practical Cybersecurity

In this module, learners will be provided practical skills necessary to secure their networks, data devices, cloud security, VPNs, website security, cell phones, and more.

Professional Diploma in OT Security Operations Specialist

Learn the necessary awareness, business and technical, knowledge, skills and abilities to protect their business against cybersecurity threats.