Akademi

comprehensive curriculum

our cybersecurity curriculum blends security principles with hands-on training to combat threats.

Cybersecurity Foundational Skills

this course builds a strong foundation in network security, systems security, applied cryptography, Python programming, and governance, risk management, and compliance (GRC).

    • Understand core concepts of network security, including protocols (Ethernet, TCP/IP, WiFi) and vulnerabilities (e.g., TCP hijacking, ARP poisoning).
    • Gain foundational knowledge of systems security, including system architecture and basic exploits.
    • Learn the basics of applied cryptography, including encryption and authentication.
    • Develop foundational skills in Python programming for scripting and automation.
  • Understand the principles of Governance, Risk Management, & Compliance (GRC).

Cybersecurity Intermediate Skills

this course deepens your knowledge of systems and network security, level up your Python skills, and you get introduced to cyber threat intelligence and applied cryptography.

  • Deepen knowledge of systems security, including advanced exploits (e.g., buffer overflows, shellcode injections) and countermeasures.

  • Expand understanding of network security, including firewalls, IDS/IPS, and wireless security.

  • Continue building Python programming skills, focusing on secure coding practices.

  • Gain hands-on experience with applied cryptography, including symmetric and asymmetric encryption.

  • Introduce cyber threat intelligence concepts, such as the Cyber Kill Chain and Diamond Model.

Cybersecurity Skills Development

this course refines your expertise in systems and network security, you learn to analyze logs and respond to incidents, and apply Python to networking, systems, and cryptography tasks.

  • Further develop systems security skills, including cloud security and hypervisor exploits.

  • Enhance network security knowledge, focusing on web application security and denial-of-service attacks.

  • Continue exploring cyber threat intelligence, including intelligence analysis and planning.

  • Learn to analyze logs using SIEM tools and understand incident response processes.

  • Apply Python programming to networking, systems, and cryptography tasks.

Gray Hat Hacking

during this course, you master penetration testing techniques, conduct application security assessments, and learn to identify and exploit vulnerabilities in networks and applications.

  • Master penetration testing techniques using tools like Metasploit and Kali Linux.

  • Conduct application security assessments, identifying and exploiting vulnerabilities in applications.

  • Perform network mapping and reconnaissance to identify potential attack vectors.

  • Learn post-exploitation techniques and reporting for penetration testing.

  • Continue working with logs and detection tools to identify and respond to security incidents.

Cybersecurity Capstone Project

during this course, you apply your knowledge to a real-world scenario, conducting risk assessments, implementing security controls, and delivering a professional-level report.

  • Apply knowledge from all previous phases to a real-world scenario.

  • Conduct risk assessments and recommend security improvements.

  • Implement security controls and countermeasures to address vulnerabilities.

  • Develop a professional-level report and present findings to simulate real-world decision-making.

  • Demonstrate proficiency in compliance, strategy development, and communication for senior management.