0203 982 7573 [email protected]

Become a Cyber Security Consultant

With our job offer guarantee programme

Average salary of £70,000 per annum!

Get started

Guaranteed Finance on all of our courses! Book a call now.

Book the call that will change your life now! It only takes 30 seconds

Step 1: Pick the date and time that best suits you.

Step 2: Enter your details and click confirm.

Step 3: We’ll call you at your chosen date and time to see if you qualify.

Want to speak sooner? Call us on 0203 982 7573

The IT Career Swap Process

Step 1: Consultation

Unsure what course is right for you? We will walk you through what the options are and how you can benefit by starting it.

The consultation is free of charge and we will find the perfect course for your needs. 

If you’d like to book this consultation call now, please just click here:

Book a Consultation Call Now

Step 2 : Online Studying

All courses are delivered online, meaning you will be able to access the materials at any time, 24/7 for the one year that your course is active. This package will build you through CompTIA’s core syllabus: A+, Network+ and Security+ before then moving onto study and master the Microsoft Windows operating system versions 7 & 10, Cisco’s networking technologies. You will then complete your studies with more in depth cyber security CompTIA courses: Linux and CySA.

Step 3: Practical Placement – LiveLabs

Once you have completed your online training modules its time to get some hands on experience.

Live-Lab is real computer equipment networked together and conveniently accessible over the internet.

Our hosted platforms are configured to imitate real world configurations by providing sufficient hardware not only to carry out tasks, but also test the impact of those changes

Step 4: CompTIA Security+ and CySA+ Exams

You will finally be prepared for the official CompTIA Security+ and CySA+ Certifications exams. CompTIA are international leaders in IT certifications and obtaining both your  CompTIA and CySA certification will not only qualify you as an IT Technician and later as a Cyber Security Analyst not only in the UK but across the globe.

Step 5: Job Placement

Upon completion of all online courses, quizzes, examinations, assignments and live labs we will assign you a Career Agent and we will re-model your CV and start to source you interviews with our local partners within your area. We guarantee to get you a job offer through our programme.

The main difference between us and other IT training companies is that our sister company has over 5,000 employer partnerships in operation so we can place you into work all over the country with a number of different companies, often with multiple options.

FAQs

Which of these courses would be the best starting point for my studies?

We recommend starting your studies with the CompTIA A+ course, as it will provide you with the basic knowledge that is essential when starting an IT career.

What is a Live Lab?

A Live Lab consists of computer equipment that you are able to access and manipulate through your browser. You will have the ability to work with real switches, servers and routers in order to gain valuable practical experience.

Do you offer finance?

Yes and at 0%, all you do is choose a payment plan to suit your financial needs with our easy, monthly payment options over 12 months.

Key Learning Points: Year 1

This package will help you to build a full understanding of many factors within cyber security:

CompTIA IT Fundamentals

In this course students get the essential IT skills and knowledge needed by advanced end-users and those considering careers in IT. These essentials skills include identifying and explaining computer components, setting up a workstation, conducting software installations, establishing network connectivity, and managing end-user security risks.

CompTIA A+

After completing this course students are considered problem solvers who are able to perform critical IT support tasks including device configuration, data backup and recovery, and operating system configuration. CompTIA A+ certified professionals have demonstrated baseline security skills for IT support roles and are able to detect and remove malware, address privacy concerns, and troubleshoot core service challenges.

CompTIA Network+

Learners of the CompTIA Network+ certification have the skills needed to troubleshoot, configure, and manage wired and wireless networks found in companies around the world. CompTIA Network+ professionals have demonstrated the ability to design and implement functional networks, configure, manage, and maintain essential network devices, implement network security, and troubleshoot network problems.

CompTIA Security+

After completing this course students will have the knowledge and skills necessary to perform core security functions required of any security role. CompTIA Security+ professionals know how to identify and address potential threats, attacks and vulnerabilities and they have established techniques in risk management, risk mitigation, threat management and intrusion detection

AWS Essentials & Solutions Architect Associate

AWS Certified Solutions Architect – Associate showcases knowledge and skills in AWS technology, across a wide range of AWS services. The focus of this certification is on the design of cost and performance optimized solutions, demonstrating a strong understanding of the AWS Well-Architected Framework. This certification can enhance the career profile and earnings of certified individuals and increase your credibility and confidence in stakeholder and customer interactions.

Azure Security Engineer Associate

The Azure Security Engineer implements, manages, and monitors security for resources in Azure, multicloud, and hybrid environments as part of an end-to-end infrastructure. They recommend security components and configurations to protect identity & access, data, applications, and networks.

CompTIA Cloud+

The CompTIA Cloud+ is a vendor-neutral certification that provides training in all areas necessary for IT professionals to effectively and successfully deploy or migrate their organization to the cloud, utilizing the most efficient service and deployment models, while also managing cost, compliance, and security-relevant to the organization

Cisco CCNA

Learners of Cisco CCNA – Implementing and Administering Cisco Solutions (CCNA) have demonstrated knowledge and skills related to network fundamentals, network access, IP connectivity, IP services, security fundamentals, and automation and programmability.

Advanced Learning Points: Year 2

This package will help you to evolve your understanding of many factors within cyber security:

Cybersecurity Fundamentals

An introduction to cybersecurity foundations. This module is a blend of lecture and hands-on exercises. We utilize the ITCS platform courses and cyber ranges here to give a true introduction to the learner. This Learning Path is set apart by its slow pace and hands-on exercises. Learners receive guidance on how to use the  platform in order to continue to grow past this course.

 

CompTIA Linux+

CompTIA Linux+ covers common tasks in major distributions of Linux, including the Linux command line, basic maintenance, installing and configuring workstations, and networking.

CompTIA CySA+
  • Identifying vulnerabilities, risks and threats to an organisation
  • Secure and protect applications and systems within an organisation
  • Prevent, detect and combat security threats
  • Cyber incident response
CompTIA PenTest+
  • Module 1 – The Pen Test Engagement
    In this module, you will learn how to work with a client and prepare for a penetration testing engagement. The topics are:

    1. Penetration Testing Overview
    In this topic, you will learn what a penetration test is, the steps taken to prepare for a pentest, tools used, communicating with the client and your team, and pen testing standards and frameworks.

    2. Engagement Planning
    In this topic, you will learn about the logistics of planning for a pentest engagement including setting scope, determining end goals and deliverables, assessment types, threat modeling, and scheduling.

    3. Engagement Documents
    In this topic, you will learn about documentation required for a professional pentest engagement including contracts, authorizations, rules of engagement, impact analysis, disclaimers, and support resources.

    4. Prepare to Go Live
    In this topic, you will prepare both the client and your team to start the actual test.

    Module 2 – Passive Reconnaissance
    In this module, you will learn how to gather background information on your target. The topic is:

    1. OSINT
    In this topic, you will learn about passive reconnaissance through open source intelligence gathering, including using websites, social media, Google hacking, DNS querying, and other tools.

    Activities include using Whois, Google Hacking Database, theHarvester, Recon-ng, FOCA, dig, nslookup, and Shodan.

    Module 3 – Active Reconnaissance
    In this module, you will learn how to actively search for targets. The topics are:

    1. Host Discovery and Port Scanning
    In this topic, you will learn about the different tools and methods for discovering target systems and the services they provide.
    Activities include using the command line, nmap, and Metasploit.

    2. Enumeration
    In this topic, you will learn how to obtain additional information from network services, Windows and Linux systems, as you prepare to exploit those systems.

    Activities include using Windows and Linux command line commands, nmap, netcat, telnet, rpcclient, dirbuster, and Metasploit.

    3. Vulnerability Scanning
    In this topic, you will use different types of scans including packet crafting to discover exploitable vulnerabilities on hosts, websites, network services, and network devices.

    Activities include using OpenVAS, nmap NSE scripts, Metasploit Pro, sqlmap, Nikto, MBSA, hping3, airmon-ng, aircrack-ng, Fern Wi-Fi Cracker, mdk3, and Kismet.

    Module 4 – Physical Security
    In this module, you will learn how to test physical security controls. The topic is:

    1. Physical Security Tests
    In this topic, you will learn about ways to circumvent physical security controls to gain access to restricted areas.

    Activities include RFID badge cloning

    Module 5 – Social Engineering
    In this topic, you will learn about social engineering. The topic is:

    1. Social Engineering Attacks
    In this topic, you will learn how to execute both technical and non-technical social engineering attacks.

    Activities include using msfvenom and Metasploit for USB stick baiting, and the Kali Social Engineering Toolkit for website login cloning, phishing, and credential interception.

    Module 6 – Vulnerability Scan Analysis
    In this module, you will learn how to examine vulnerability scan results to choose the best exploit against discovered targets. The topic is:

    1. Vulnerability Scan Results
    In this topic, you will learn how to assess vulnerability scan results, weed out false positives, adjudicate and prioritize findings, and map vulnerabilities to exploits. You will also learn about both the value and limits of using automated vulnerability scans in your pentest engagement.

    Activities include using Metasploit Pro to validate vulnerability scan findings and determine the appropriate exploit modules that can be used to penetrate the vulnerable systems.

    Module 7 – Password Cracking
    In this module, you will learn the basics of password cracking. The topic is:

    1. Password Cracking Types
    In this topic, you will learn about dictionary, rainbow table, and brute force attacks. You will learn how to brute force network service authentication, intercept a network authentication, and pass-the-hash.

    Activities include using Medusa, John-the-Ripper, Wireshark, and Metasploit.

    NOTE: You will learn additional password cracking techniques in subsequent modules.

    Module 8 – Penetrating Wired Networks
    In this module, you will learn how to penetrate a wired Ethernet network. The topic is:

    1. Common Network Exploits
    In this topic, you will learn how to sniff wired network activity, intercept file transfers, read transmitted email, conduct Man-in-the-Middle attacks using ARP poisoning, hijack TCP sessions, execute network-based denial-of-service attacks, and exploit common network services.

    Activities include using Wireshark, ettercap, Low Orbit Ion Cannon, nmap, the Searchsploit database, gcc, and Metasploit.

    Module 9 – Penetrating Wireless Networks
    In this module, you will learn how attack wireless networks. The topic is:

    1. Wireless Network Exploits
    In this topic you will learn how to sniff and jam Wi-Fi networks, crack WEP, WPA/WPA2 and WPS, conduct Evil Twin attacks, and attack BlueTooth.

    Activities include using Netcut, Wireshark, and airmon-ng, besside-ng, bettercap, and Wi-Fi Pumpkin.

    Module 10 – Windows Exploits
    In this module, you will learn how to exploit Windows hosts. The topics are:

    1. Common Windows-Based Vulnerabilities
    In this topic you will learn about common Windows vulnerabilities, exploits, and payloads.

    Activities include using Metasploit, the Searchsploit database, and command-line commands.

    2. Password Cracking in Windows
    In this topic, you will learn about cracking Windows passwords.

    Activities include using Cain & Abel, John-the-Ripper and L0pht 7

    3. Windows Components
    In this topic, you will learn how to exploit standard Windows components including default protocols and configurations, the file system, the kernel, and memory. You will also learn how to leverage these components to escalate privilege on a compromised host.

    Activities include using Metasploit and the Searchsploit database.

    4. Windows Accounts
    In this topic you will learn how to exploit default and user-defined Windows accounts.

    Activities include using Metasploit and command-line commands.

    5. Sandboxes
    In this topic, you will learn about using sandboxing to contain hacking attempts.

    Module 11 – Linux Exploits
    In this module, you will learn how to hack Linux systems. The topics are:

    1. Common Linux/Unix-Based Vulnerabilities
    In this topic you will learn about common Linux vulnerabilities, exploits, and payloads.

    Activities include using Metasploit, the Searchsploit database, and command-line commands.

    2. Password Cracking in Linux
    In this topic you will learn how to crack Linux passwords.

    Activities include using command-line commands, unshadow, and John-the-Ripper.

    3. Vulnerable Linux Components
    In this topic, you will learn how to exploit standard Linux components including default protocols and configurations, the file system, the kernel, and memory. You will also learn how to leverage these components to escalate privilege on a compromised host.

    Activities include using command-line commands, Metasploit and the Searchsploit database.

    4. Linux Accounts
    In this topic, you will learn how to attack default Linux accounts.

    Activities include using Linux bash commands.

    Module 12 – Mobile Devices
    In this module, you will learn how to attack mobile devices. The topics are:

    1. Android Exploits
    In this topic, you will learn how to exploit common Android vulnerabilities

    Activities include using msfvenom and Metasploit to compromise and remotely control an Android phone.

    2. Apple Exploits
    In this topic, you will learn how to exploit common Apple vulnerabilities

    Activities include using nmap and WinSCP to access a compromised iPhone.

    Module 13 – Specialized Systems
    In this module, you will learn about specialized systems. The topics are:

    1. ICS
    In this topic, you will learn about common vulnerabilities of industrial control ICS and SCADA systems

    2. Embedded Systems
    In this topic, you will learn about common vulnerabilities of embedded systems such as point-of-sale and real-time operating systems

    Activities include using a Raspberry PI to attack an internal network.

    3. 13.3 IoT
    In this topic, you will learn about common and emerging threats related to the Internet of Things

    4. 13.4 Hardware Attacks
    In this topic, you will learn about additional hardware-based attacks that can be conducted against specialized systems.

    Module 14 – Scripts
    In this module, you will learn the basics of scripting, as pertains to penetration testing. The topics are:

    1. Scripting Basics
    In this topic, you will learn about the basics of Bash, PowerShell, Python, and Ruby scripting

    2. Common Scripting Elements
    In this topic, you will learn about common scripting elements found in all of the scripting languages including variables, substitution, arrays, operations, logic, and error handling.

    Activities include writing simple scripts.

    Module 15 – Application Testing
    In this module you will learn about testing application code for vulnerabilities. The topics are:

    1. Static Code Analysis
    In this topic, you will learn how to analyze static, non-running code

    2. Dynamic Code Analysis
    In this topic, you will learn how to test running code.

    Activity includes fuzz testing an application for potential buffer overflow vulnerabilities.

    3. Reverse Engineering
    In this topic, you will learn about application reverse-engineering techniques including de-compilation, disassembly, and debugging.

    Module 16 – Web App Exploits
    In this module, you will learn how to exploit web apps. The topics are:

    1. Common Web Application Vulnerabilities
    In this topic, you will learn how to exploit authentication, authorization, misconfigurations, browser sessions, and insecure code.

    2. Injection Attacks
    In this topic, you will learn about various injection techniques.

    Activities include using a browser, sqlmap, and Metasploit to inject code and SQL commands into a web app form.

    3. Cross-Site Attacks
    In this topic, you will learn how to conduct Cross-Site Scripting and Cross-Site Request Forgery attacks.

    Activities include using a browser and other tools to perform XSS attacks.

    4. Other Web-Based Attacks
    In this topic, you will learn how to conduct other types of web-based attacks including clickjacking, file inclusion, and webshells.

    Module 17 – Lateral Movement
    In this module, you will learn how to move around in a compromised network. The topic is:

    1. Lateral Movement Techniques
    In this topic, you will learn how to use lateral movement techniques including migrating malicious code to another process, pivoting, and using proxy chains.

    Activities include using Metasploit to migrate code and pivot through the target network, and Armitage Team Server to pass control to another attacker.

    Module 18 – Persistence
    In this module, you will learn how to maintain control of a compromised system. The topics are:

    1. Persistence Techniques
    In this topic, you will learn about common persistence techniques.

    2. Backdoors
    In this topic, you will learn how to plant persistent back doors on a compromised system.

    Activities include using ProRAT Trojan builder

    3. Bind and Reverse Shells
    In this topic, you will learn the difference between bind and reverse shells, and when it is appropriate to use either.

    Activities include using Metasploit to create bind and reverse connections to a compromised target.

    4. Netcat
    In this topic, you will learn how to use netcat to set up a persistent back door.

    Activities include using netcat to launch both bind and reverse shells.

    5. Scheduled Tasks
    In this topic, you will learn how to maintain persistence through scheduled tasks.

    Activities include using the task scheduler to regularly launch a netcat session that exfiltrates updated data out of the target and back to the attacker.

    Module 19 – Cover Your Tracks
    In this module, you will learn how to remove evidence of your hacking activities. The topic is:

    1. Anti-forensics Techniques
    In this topic, you will learn how to hide malicious activity from a forensic investigator

    Activities include clearing logs, changing file timestamps, and impersonating another user when conducting malicious activity.

    Module 20 – The Report
    In this module, you will learn how to analyze your pentest findings and write a report as the final deliverable for your client. The topics are:

    1. Data Analysis
    In this topic, you will categorize and prioritize the data you have collected during the penetration test.

    2. Recommendations
    In this topic, you will formulate recommendations for the client based on the data you collected during the penetration test.

    3. Writing the Report
    In this topic, you will normalize the data you have collected, and organize it into an actionable report aimed at multiple audiences.

    4. Handling the Report
    In this topic, you will securely hand over the report to your client.

    The activity includes examining real world report examples.

    Module 21 – Post Engagement Cleanup
    In this module, you will learn about the tasks you must perform after completing a professional penetration test. The topic is:

    1. Post Engagement Activities
    In this topic, you will learn about the cleanup tasks required after a typical pentest engagement, including removing artifacts, client acceptance of the findings, lessons learned, and follow up actions.

CCSP

In this course, students will learn advanced technical skills and knowledge to design, manage and secure data, applications and infrastructure in the cloud using best practices, policies and procedures established by the cybersecurity experts.

Certified Ethical Hacker

You will be exposed to a different way of achieving information security strength in their organisation; by hacking it! You will scan, test, hack and secure your own systems. You will be taught the five phases of ethical hacking and taught how you can approach your target and succeed at breaking in every time! The five phases include Reconnaissance, Gaining Access, Enumeration, Maintaining Access, and covering your tracks

Python for Cyber Security

Master Python for a variety of cybersecurity tasks. This Specialisation provides an application-driven introduction to using Python for cybersecurity.

What our students are saying

Guaranteed Finance on all of our courses! Book a call now.

Book the call that will change your life now! It only takes 30 seconds

Step 1: Pick the date and time that best suits you.

Step 2: Enter your details and click confirm.

Step 3: We’ll call you at your chosen date and time to see if you qualify.

Want to speak sooner? Call us on 0203 982 7573

Claim Your FREE Trial

All you have to do is fill in the short form provided and we will be in touch to activate your free trial and send you your login!

The free trial lasts 48 hours so please once you have been handed your login, make sure to make the most of the system.

If you have any questions about the platform please do not hesitate to ask, we’re here to help you make the most of what we provide and to ensure your time with ITCS will be a success just like many students before

We're Here To Help!

Head Office

Mortimer House Chatsworth Parade
Petts Wood
Kent
BR5 1DE

Hours

Mon - Fri: 8.30am - 6.00pm

Call Us

0203 982 7573