Posted On September 28, 2025

Infrastructure

nizar 0 comments
Cyber-Defense.ma >> trainings >> Infrastructure

 

 

Too often, beginner courses assume an already high level of skill and understanding of the subject matter being taught. This course is different in that we start with no assumption, rather getting you ready to learn how attackers compromise targets, as well as ensuring you get to do the same thing. As the title suggests, it provides an ideal training ground for our other Cyber-Defense Training courses, further self-study, or other hacking courses.

Course outline

Introduction to Network and Application Vulnerabilities

Lifestyle today is based around the Internet. From banking, to shopping and leisure, everything has an Internet layer. Numerous media reports have stated the obvious that there is a chronic skills shortage with regards to defensive and offensive security. This course sets you on course to beginning a career, or understanding more, about information security. We start off explaining why vulnerabilities exist, how one would discover them and also what the next step is. This gets you into the mindset of a hacker and by exploiting real-world vulnerabilities yourselves, you start to see how attackers operate.

Command Line Interfaces

Understanding how to use the Linux command line and indeed Windows is a key skill required when performing vulnerability assessements. This module teaches you how not to be afraid of the terminal window and how you can become a power user in a few hours.

Kali Linux

Kali Linux is the penetration testing distribution available out there. It includes nearly every tool you’d require to discover vulnerabilities, exploit them and gain control of targets. Whilst daunting at first, we show you how to get the best out of this world-class operating system.

Networking and Application Fundamentals

Understanding how the Internet is built from a networking and application perspective is key. This module explains it in an easy to understand language so you can better test for vulnerabilities. It looks at common network architectures and web applications and teaches you how they are deployed and developed and how vulnerabilities are introduced.

Mobile and Wireless Fundamentals

As bring your own device continues to grow in the workplace, this module looks at common vulnerabilities found within mobile applications and the wireless networks they use. Learn how to start assessing both.

Cyber-Defense Training Portal

We’ve developed a training portal for students to interact with the trainers, keep updated on content and also download all files, slides and tools delivered during the course. This portal is made available to all students, even when the course has finished. In addition, we’ve moved our training infrastructure into our own cloud, which means students get their own individual environments to test against, making use of VPN’s and numerous targets. This gives a fully immersive experience of attacking real-world architecture and networks.

Who should take this course?

This course is ideal for anyone just starting out in their journey into the exciting world of penetration testing and hacking or for those who work in an environment where they need to understand what attackers are doing and how attacks work.

Location & Time

Will be discussed

Our courses are delivered publicly by our training partner Gitex africa. For further information on the next public course, please contact us. If you wish to have In-house training, please get in touch with our sales team to discuss further.

Leave a Reply

Your email address will not be published. Required fields are marked *

Related Post

DEVELOPER/SECDEVOPS

      Developer   There’s a web application for most parts of our Internet…

Mobile

This course will give you insight and practical window into the methods used when attacking…

MASTER/BLACKOPS

Master   Our Master course is aimed at existing penetration testers and people with a…