Please download a newer version of your browser. Click to close
Taste of Cyber Security | Explore the world of Cybersecurity with this hands-on workshopsSign up
One of the fastest growing markets overall and the fastest in the tech industry. You'll set yourself up for a rewarding career.
Depending on experience and seniority, Cyber Security professionals can earn up to €60,000 gross per year on average in The Netherlands.
With an unemployment rate of 0%, the industry is looking for more talent to fill the growing number of open positions.
Cyber Security plays an essential role in the safety of the online, as well as the offline world. Contribute to protecting individuals, corporations and governments from cybercrime.
The curriculum is based on the National Initiative for Cybersecurity Education (NICE) Framework. The program consists of an interactive online learning platform with instant feedback from the facilitators
Cyber security is a team effort. Work together on exercises and projects while improving your collaboration skills.
Gain experience with real life scenarios and hands-on exercises. Learn to perform and defend from cyber attacks with the use of virtual machines.
With our career accelerator program, you'll be ready to hit the job market. Create your profile and land your first job in Cyber Security!
Overview of the Cybersecurity Landscape and Industry
Basics of Computer and Device Hardware, Software, Operating Systems, and Processes
Basics of Networking Traffic, Hardware Components, and Topology
Network Communication Principles and Methods
Network and Routing Protocols / Services
Packet Level Traffic Analysis
Hands-on Operation of a Computer Network and Equipment, Monitoring and Analyzing Network Traffic Flow, Patterns and Performance
Hands-on Creation and Analysis of Critical Network Servers
Hands-on Creation and Analysis of Telnet, Web, Data and Active Directory Servers
Hands-on Analysis of Network Topologies, Network Mapping and OS Fingerprinting
Telecommunication Concepts and Range
System and Network Admin Concepts, Management Principles and Controls
Hands-on Creation and Use of Virtual Machines and Bootable USB OS
Hands-on Assessment of Access Controls and Hardening Techniques to Ensure a Network’s Security
Hands-on Configuration and Utilization of a Firewall (on Windows, Linux and Hardware Firewall)
Hands-on Configuration and Utilization of a Network/Host Intrusion Detection/Prevention System to Alert and Prevent Malicious Activity on a Network
Hands-on Configuration and Utilization of a Security Information and Event Management System to Correlate, Research, Analyze Logs and Provide Timely Detection of Misuse, Threats and Malicious Activity on the Network
Hands-on Malware Detection, Analysis, Isolation and Removal
Cyber-Forensics Investigation Methodologies, Mindset, Tools
Hands-on Forensics Investigation: Logs, System Files, Media, Memory Dump and Traffic Monitoring and Analysis
Overview of Network Vulnerabilities, Associated Attacks; Ethical Hacking Methodologies, Stages, Principles, Tools and Techniques
Conducting Hands-on Vulnerability and Compliance Scanning and Correction Recommendation
Performing Hands-on Incident Response, Damage Assessment, Incident Triage, Tracking and Reporting
Full Day Scenarios: Hands-on Protecting a Network from a Range of Cyber-Attacks (DDoS, SQL Injection, XSS, Ransomware, MiTM, ARP Poisoning, etc.)
Analysis of System Security and Organizational Posture Trends
Analysis of Cyber-Defense Trends and Staying at the Cutting Edge of the Industry
Performing Security Design and Architecture Evaluation and Ensuing Recommendation
Hands-on Processing of the Whole Chain of Custody for Handling Digital Evidence
Performing Hands-on Static and Dynamic Analysis of Drive Images and other Data Sources, Recovery and Mitigation/Remediation of an Enterprise System
Risk and Security Management Processes and Security Models
Privacy Principles and Advising on Disaster Recovery, Contingency, and Continuity
Final Hands-on Scenario
Career Accelerator Program
These are the steps you will go through.
The tuition fee includes all training and guidance during the 6 months long course as well as 12 months long access to all learning material after the course. Currently, we're offering a discount on the tuition fee you choose to pay upfront.
Cyber Security is a field that encompasses the protection of data, networks, and software from unauthorized access, attack, or damage. Every company that collects, processes, and stores data has to protect its sensitive information (such as financial data, personal information, intellectual property etc). Government bodies, the military, large corporations, and medical institutions are now the sectors most dependent on cyber security, but as the number of sophisticated cyber attacks grows, more sectors will follow.
As Cyber Security becomes a more pressing and urgent matter, so is the need for talent with the right skills. Globally, the shortage of Cyber Security professionals is estimated at nearly 3 million. Job opportunties vary from very technical roles like Network Security Engineer to more consultancy-based ones such as Cyber Security Strategist. All these roles require deep knowledge about Cyber Security and hands-on skills.