Skip to main content

Cyber Security Classes

(I) Intro to Cyber Safety -

Course Description:  Introduction to Cyber Safety.  Why is cyber safety a growing concern in the modern era?  Understand the various events concerning Cyber Safety that are unique to the modern world.  The training will include hands-on exercises and test questions.  Class material will be provided to students in an electronic version.

Course Objectives: In this training, participants will learn to;

  • Understand their digital footprint.
  • Identify common cyber threats (phishing, malware, ransomware).
  • phishing. etc
  • Protect themselves from identity theft.
  • Recognize attacker motives
  • Practice safe online habits
  • Avoid risks of oversharing Information

Duration: 16 hours (2 days), Hybrid /or Online Training class

Intro to Artificial Intelligence

Description and Course Objectives: Artificial Intelligence (AI) is the theory and development of computer systems able to perform tasks that normally require human intelligence. In this introductory course, you will become familiar with the basic concepts and definitions of modern AI, its applications/uses, implications, and impacts, and how AI is redefining numerous industries. The training will include hands-on exercises and test questions. Class material will be provided to students in an electronic version.

Course Objectives : In this training, participants will learn to;

  • Understand basic AI terminology and definitions
  • Discuss the practical, ethical, and societal impacts of AI
  • Explore major AI applications across industries (finance, healthcare, customer service, etc.)
  • Explain what Machine Learning is and why it matters
  • Define Deep Learning and its significance
  • Examine recent innovations in AI and Machine Learning
  • Outline the general process of AI product development
  • Identify key challenges in developing AI products

Durration : 16 hours (2 days), Hybrid /or Online Training class

Defending Against Social Engineering Attacks

Course Description: The impact of a social engineering attack has reached new heights in the Information Age because of the ability of one person to anonymously reach an enormous audience. However, foundational elements of the components of social engineering have remained constant over time. Those responsible for defending their organizations from social engineering threats must understand not only the “tool bag of tricks” employed by cyber criminals and intelligence agents to exploit trust, but also an understanding of the black-market sale of information that drives cyber-criminal economic decisions and targets. By understanding both how social engineering works and what incentives drive cyber-criminal behaviour, defenders can proactively address training opportunities across their organizations.

Course Objectives: In this training, participants will learn to;

  • Understand cyberspace, key actors, and EW technologies & tactics
  • Appreciate the ethics and real-world consequences of cyber warfare
  • Identify and defend networks against malicious attacks
  • Recognize hacktivism, espionage, and insider threats

Duration: 16 hours (2 days), Hybrid /or Online Training class

Cyber Warfare For Practitioners

Course Description: Cyber Warfare takes a comprehensive look at how and why digital warfare is waged. The training session explores adversaries, cyberspace, and the tools and techniques used in today’s digital conflicts. The training provides an understanding of how cyber conflicts are currently carried out and how to detect and defend against espionage, hacktivism, insider threats, and non-state actors, including organised criminals and terrorists. The class addresses how cyber warfare is expected to evolve in the future.
Course Objectives: In this training, participants will learn to;

  • Gain a comprehensive understanding of cyber warfare, its drivers, and its strategic implications.
  • Analyze the principal actors, domains, and tools employed in cyber conflict.
  • Examine current and emerging techniques in cyber warfare and assess their potential evolution.
  • Develop the ability to detect and defend against diverse threats, including espionage, hacktivism, insider risks, and non-state actors.
  • Acquire foundational knowledge and applied skills to support professional growth in cybersecurity and related disciplines.

Duration: 16 hours (2 days), Hybrid /or Online Training class

Machine Learning vs Humanoid Artificial Intelligence (Strong AI)

Course Description: The discussion is focused on Humanoid AI as a superset of ML and the advantages provided beyond ML. Present ML and its successful uses in problem-solving. ML capabilities and limitations. Presenting cutting-edge uses of Humanoid AI. How it provides additional AI capabilities and dynamic problem solving beyond ML and/or scripted programmatic solutions.

Course Objectives: In this training, participants will learn to;

  • Define Humanoid AI, Machine Learning, and Strong AI
  • Compare ML capabilities with the advantages of Humanoid AI
  • Explore applications of AI in cybersecurity and future trends
  • Analyze how emerging AI technologies enhance problem-solving and defense

Duration: 24 hours (3 days), Hybrid /or Online Training class

Fundamentals of Design and Architecture for Cyber Security.

Course Description: The training includes the design and architecture to ensure the strongest protection of network systems. Will address the standards, network layouts, protections, and design recommendations to harden systems. The class covers the best layouts to protect your entire networks of systems. The training will include hands-on exercises and test questions. Class material will be provided to students in an electronic version.

Course Objectives: In this training, participants will learn to;

  • Understand the importance of secure system architecture as the foundation for effective cyber defense.
  • Identify and apply recognized standards and best practices for hardening systems against cyber-attacks.
  • Evaluate network designs, system protections, and application security as key components of a comprehensive protection plan.
  • Examine strategies for designing secure environments that protect entire organizations.
  • Develop the skills and knowledge needed to design and implement system protection plans across business, government, and healthcare sectors.

Duration: 16 hours (2 days), Hybrid /or Online Training class