Cyber Academy

Book this course and establish your future

Choose the best time for us to contact you

The Cyber Academy is a leading independent and impartial source of Skills and Knowledge on Cyber Security.

It’s all about Cyber-Security right now, and we’re really excited about the future!

Our training programme is designed around getting you the skills and certifications you need to become a Certified Ethical Hacker and in the most efficient way possible. No experience required!

Cyber Security Package includes the following courses with excellent Student Support :

  • CompTIA ITF+ (Online Courseware) – Introduction to basic IT knowledge and skills
  • CompTIA A+ (Online Courseware) -Certified professionals are proven problem solvers. They support today’s core technologies from security to cloud to data management and more.
  • CompTIA Network+ (Online Courseware + Mocks/Labs + Official Exam) – Certifies IT infrastructure skills for troubleshooting, configuring and managing networks.
  • CompTIA Security+ (Online Courseware + Mocks/Labs + Official Exam) – Global certification that validates the baseline skills you need to perform core security functions and pursue an IT security career.
  • Certified Ethical Hacker (Online Courseware + Mocks/Labs + Official Exam) – Professional designation to describe hackers that perform legitimate services for organizations and IT companies.

We have recruitment teams working alongside us to assist with finding that ideal job at the end of your training.

1.CompTIA Network+(N10-007)

The CompTIA Network+ certification is an internationally recognized validation of the technical knowledge required of foundation-level IT network practitioners.

Test Purpose: This exam will certify the successful candidate has the knowledge and skills required to troubleshoot, configure, and manage common network devices; establish basic network connectivity; understand and maintain network documentation; identify network limitations and weaknesses; and implement network security, standards, and protocols. The candidate will have a basic understanding of enterprise technologies, including cloud and virtualization technologies.

CompTIA Network+ is accredited by ANSI to show compliance with the ISO 17024 Standard and, as such, the exam objectives undergo regular reviews and updates.

Required exam CompTIA Network+ : N10-007

Number of questions : Maximum of 90

Types of questions : Multiple choice and performance-based

Length of test : 90 minutes

Passing score : 720 (on a scale of 100—900)

2. CompTIA Security+(SY0-501)

The CompTIA Security+ certification is a vendor-neutral credential. The CompTIA Security+ exam is an internationally recognized validation of foundation-level security skills and knowledge, and is used by organizations and security professionals around the globe.

The CompTIA Security+ exam will certify the successful candidate has the knowledge and skills required to install and configure systems to secure applications, networks, and devices; perform threat analysis and respond with appropriate mitigation techniques; participate in risk mitigation activities; and operate with an awareness of applicable policies, laws, and regulations. The successful candidate will perform these tasks to support the principles of confidentiality, integrity, and availability.

Required exam CompTIA Security+ : SY0-501

Number of questions : Maximum of 90

Types of questions : Multiple choice and performance-based

Length of test : 90 minutes

Passing score : 750 (on a scale of 100–900)

3. EC Council CEH(v10)

The Certified Ethical Hacker (C|EH v10) program is a trusted and respected ethical hacking training Program that any information security professional will need.

Exam Title : Certified Ethical Hacker (ANSI)

Exam Code : 312-50 (ECC EXAM), 312-50 (VUE)

Number of Questions : 125

Duration : 4 hours

Availability : ECCEXAM / VUE

Test Format : Multiple Choice

Cybersecurity has become a key area of job growth in the last few years, which has resulted from an influx of people opting for a Cybersecurity career. Even so, there are a number of people who are still having second thoughts as to whether they should jump into the unknown waters of Cybersecurity for their professional life.

Below are the key factors, that have made Cybersecurity certification such a brilliant career choice for many in our opinion:

  • Cybersecurity – An Evergreen Industry
  • Travel the World With Cybersecurity
  • A Career that Serves the Greater Good
  • A Chance to Work with Secret Agencies
  • No Math!
  • Unlimited Potential for Growth
  • Plenty of Opportunities
  • A Variety of Industries to Choose
  • A Job that Never Gets Boring
  • Fat Pay Cheques

Anyone who wants to learn! Optima provides all the help and support you need

Cybersecurity is not just for geeks! Anyone can learn to be a hacker or penetration tester if they apply themselves. The training is self-paced, but to give you an idea, 1 hours learning per day normally gets you fully certified within 6-8 months.

The learning portal and our 5* tutors will ensure you go from enrolment to employment. We will be there every step of the way.

Recommended Experience : No prior experience necessary.

What skills will you learn?

IT Concepts & Terminology

Comprehend notational systems, illustrate the basics of computing and explain the value of data and troubleshooting.

Infrastructure

Know how to set up and install common peripheral devices to a laptop/PC or secure a basic wireless network.

Applications & Software

Manage applications software, understand the various components of an operating system and explain the purpose of methods of application architecture.

Software Development

Comprehend programming language categories, interpret logic, and understand the purpose of programming concepts.

Database Fundamentals

Able to explain database concepts, structures, and purpose, as well as understands methods used to interface.

Security

Understand confidentiality, integrity, and availability concerns of secure devices and best practice methods.

Hardware

Identifying, using, and connecting hardware components and devices

Operating Systems

Install and support Windows OS including command line & client support. Understand Mac OS, Linux and mobile OS

Software Troubleshooting

Troubleshoot PC and mobile device issues including application security support

Networking

Explain types of networks and connections including TCP/IP, WIFI and SOHO

Hardware & Network Troubleshooting

Troubleshoot device and network issues

Security

Identify and protect against security vulnerabilities for devices and their network connections

Mobile Devices

Install & configure laptops and other mobile devices

Virtualization & Cloud Computing

Compare & contrast cloud computing concepts &set up client-side virtualization

Operational Procedures

Follow best practices for safety, environmental impacts, and communication and professionalism

Networking Concepts

Explain the purpose of a variety of networking concepts and implement them appropriately

Infrastructure

Determine & explain the appropriate cabling, device and storage technologies

Network Operations

Use best practices to manage the network, determine policies & ensure business continuity

Network Security

Summarize physical security & common attacks while securing the wired and wireless network

Troubleshooting Network Troubleshooting & Tools

Explain the network troubleshooting methodology & appropriate tools to support connectivity & performance

Threats, attacks & vulnerabilities

Detect various types of compromise and have an understanding of penetration testing and vulnerability scanning concepts

Technologies & tools

Install, configure, and deploy network components while assessing and troubleshooting issues to support organizational security

Architecture & design

Implement secure network architecture concepts and systems design

Networking identity & access management

Install and configure identity and access services, as well as management controls

Risk management

Implement and summarize risk management best practices and the business impact

Cryptography & PKI

Install and configure wireless security settings and implement public key infrastructure

Footprinting and Reconnaissance

Process which is used for gathering possible information about a target computer system or network

Scanning Networks

Process that can be defined in many ways, it identifies the active hosts (Clients and servers) on a network and their activities to attack a network.

Enumeration

Process of extracting user names, machine names, network resources, shares and services from a system.

Vulnerability Analysis

Process of identifying, quantifying, and prioritizing the vulnerabilities in a system.

System Hacking

The compromise of computer systems and software to gain access to the target computer and steal or misuse their sensitive information.

Malware Threats

Computer programs designed to infiltrate and damage computers without the users consent.

Sniffing

Process of monitoring and capturing all the packets passing through a given network using sniffing tools.

Social Engineering

In the context of information security, social engineering is the psychological manipulation of people into performing actions or divulging confidential information.

Denial-of-Service

An interruption in an authorized user's access to a computer network, typically one caused with malicious intent.

Session Hijacking

An attack where a user session is taken over by an attacker. A session starts when you log into a service, for example your banking application, and ends when you log out.

Evading IDS, Firewalls, and Honeypots

An Intrusion Detection System (IDS) is a device or software application that monitors network and/or system activities for malicious activities or policy violations and produces reports to a Management Station.

Hacking Web Servers

Hackers attack on the web server to steal credential information, passwords, and business information by using DoS (DDos) attacks, SYN flood, ping flood, port scan, sniffing attacks, and social engineering attacks.

Hacking Web Applications

Serious weaknesses or vulnerabilities allow criminals to gain direct and public access to databases in order to churn sensitive data.

SQL Injection

Code injection technique that might destroy database.

Hacking Wireless Networks

Defeating the security of a wireless local-area network.

IoT Hacking

IoT (Internet of Things) and embedded devices present a new challenge to ethical hackers hoping to understand the security vulnerabilities these devices contain.

Jobs that use Cyber Academy

  • Systems Administrator
  • Network Administrator
  • Security Administrator
  • Junior IT Auditor/ Penetration Tester
  • Cyber Security Specialist
  • Cyber Security Consultant
  • Cyber Security Engineer
  • Cyber Security Analyst

Companies that trust Cyber Academy