Cyber Security refers to the body of technologies, processes, and practices designed to protect networks, devices, programs, and data from attack, damage, or unauthorized access.
|Price||150€ per month. Candidates can also pay the total price of the Training 900€|
|Application deadline||February 23, 2022|
|(Past application deadline)|
Tuesday - Thursday - Saturday from 17:30 - 20:30
The course will start on March 1, 2022
The threats and the vectors of the attacks are growing in an exponential form, together with their complexity. On the other hand the affected interest groups are in need of combat techniques and expertise. Cyber security Experts of the new generation who are emerging from the Cyber Unity academy, are the future leaders of the cyber security dimension. Cyber Unity offers the opportunity to learn hands-on expertise on both the Offensive and Defensive side, who are capable to defend as well as attack by defending the leading production infrastructures.
The hands-on, real-life based scenarios are powered by Cybera. With a combination of both complex and logical based labs on how they can keep the ecosystems of digital lives safe and develop an advanced skill set of cyber threats and defenses in a continuous way for the domain of the continuously evolving threat landscape.
The curriculum for the course will be divided in two modules; offensive and defensive.
Both modules will be delivered 9 hours per week, over the period of 20 weeks, in a total of 198 + (5 hours) / to perform a whole recap.
■ Intro to Systems
↳ Domain Controllers
↳ Active Directory
■ Windows and Linux Environment Testing / Exploitation
↳ Introduction to Networking
↳ Network Defensive Mechanisms
↳ Exploitation Frameworks
↳ Testing / Exploitation
■ Information Gathering / Discovery
↳ OSINT (Open Source Intelligence)
■ Web Application Testing / Exploitation
↳ Tools of Reconnaissance on the Web layer
↳ Fuzzing the Web
■ Mobile Application Testing / Exploitation
■ Evasion Techniques
■ Post Exploitation, Pivoting and Persistence
■ Reporting and Remediation
↳ Scoping & Rules of Engagement
↳ Final Report/Presentation Preparatio
Defensive module will be delivered 6 hours per week, over the period of 9 weeks.
Defensive module will prepare candidates on hardening and protecting their information systems, applying best practices and recommendations, as well as introduce them to the best working frameworks for achieving the desired results.
■ Asset Security
■ Communication and Network Security
■ Identity and Access Management
■ Security and Risk Management
■ Security Architecture and Engineering
■ Security Assessment and Testing
■ Security Operations
■ Software Development Security
■ Legislation and Regulations
■ Basic Computer Science knowledge
■ over the age of 16
Certificate of Completion
1. Course attendance – 80%.
2. Final Project/Exam - 20%
Butrint Komoni is a senior Cybersecurity Engineer and Executive Director of VOID | International, an international company with expertise on the Cybersecurity field.
Butrint has a significant experience regarding the Cybersecurity dimension which engages on both the Offensive and Defensive side. He has also engaged on different sectors of the economy as well as the public sector to provide security and availability to critical environments.
Partin Pruthi is a legal expert specialized in the legal aspects of Information Technology, Finance, and Data Protection. His focus is particularly suited to the Cybersecurity sector, since its a combination of his experience. Partin has advised many Kosovo startups and companies to streamline their operations and minimize their legal risk.
© ICK — Innovation Centre Kosovo