Hack the right way, for a better tomorrow.
Certified IT Infrastructure and Cyber SOC Analyst
Stay ahead of the game in the ever-changing world of cybersecurity
Know more about the Course
Overview of Certified IT Infrastructure and Cyber SOC Analyst
The CPT is a security credential that focuses on core Penetration Testing concepts and skills. The CPT course provides you with a real-world hands-on penetration testing experience and is a nationally accepted hacking and penetration testing class available that covers the testing of modern infrastructures, operating systems, and application environments while training the students on how to document and write a penetration testing report.
It is a highly interactive, comprehensive, standards-based, and methodology-intensive 80 Hours security training program that teaches information security professionals to conduct real-life penetration tests.

Duration
180 Hours

Total Modules
13

Program format
Online/Offline/ Blended

Effort
10 hours/week
Who is the course for?
Take a look at our Comprehensive Curriculum
Module 1
Cyber Security Building Blocks
Module 2
Infrastructure and Networking
Module 3
Network Security
Module 4
Linux Essentials
Module 5
Offensive Security
Module 6
Web Application Security
Module 7
Security Management and Operation
Module 8
Security Information & Event Management
Module 9
Splunk
Module 10
Incident Response
Module 11
Capstone Project
Module 12
Cybersecurity Career Hacking Program
Learn To Hack Ethically And Secure The World
The course will cover various tools that you can learn and use.








What will you learn
Learning Objective of CICSA
Understand primary building blocks of cybersecurity including risk identification, incident management, Vulnerability Management, infosec design, security implementation.
Understand incidents, Events, and Logs.
Understand how to address enterprise security concerns, potential threats, and vulnerabilities.
Protect enterprise information assets through Defense in depth.
Understand Firewalls, IDS/IPS, and SIEM.
Understand CyberThreats, Indicators of Compromise (IoC), and Attack Methodology.
Explore the essential components of Cyber Defense.
Understand Honeypot Deployments.
Understand and interpret cyberattack events with the Cyber Kill Chain Framework.
Build an agile Security Operation Centre for managing and controlling overall cybersecurity operations
Protecting The Future Through Ethical Hacking Education
Why us ? Why CICSA ?
All-inclusive security defense and protection understanding
Fully-equipped real-like practice environments
Most recent and proven methodologies for defensive security evaluation
Career-focused curriculum designed by industry experts
Highly valued security credentials after training completion
Training sessions delivered by Subject Matter Experts having extensive experience
Internationally Certified Instructors
Industry Accredited Program
Exclusive Soft Skill Training
Cybersecurity Careers after CICSA
Cybersecurity Engineer
Application Penetration Tester
Information Security Consultant
Security Operations Center Engineer
Cybersecurity Engineer
Risk Advisory Consultant
More details about the Course
Support Center
Frequently Asked Questions
Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book.
