Cybersecurity Professional
This Training module aims for the training of individuals who want to understand the general Cyber Security features and get practiced in the main aspects of cybersecurity as in the outline as well as get hand-on experience on Offensive and Defensive Security -Ethical Hacking.
Provided by: Prishtina REA
Course Description
This course aims for the training of individuals who want to understand the general Cyber Security features and get practiced in the main aspects of cybersecurity as in the outline as well as get hand-on experience on Offensive and Defensive Security -Ethical Hacking. The course focuses more on the protection of organizational assets and upon completion of this module of training, you will be able to understand the details of cybersecurity.
This course provides a comprehensive introduction to the fundamentals of information security and penetration testing. It covers essential topics such as digital assets protection, penetration testing methodologies, hacker strategies, malware types including ransomware, security operations centres (SOC), system security principles, common threats, cryptography, blockchain technology, and setting up a lab environment for practical exercises. As trainees progress, the course focuses on penetration testing techniques through distinct phases. In Information Gathering (Pentesting Phase I), participants will learn the importance of footprinting and reconnaissance, use techniques like Google Hacking, and apply active and passive information-gathering methods. Practical skills will be developed using tools such as NMAP and Nessus, along with social engineering tactics. In Enumeration (Pentesting Phase II), the course focuses on working with the Metasploitable3 vulnerable machine, including Linux and Windows enumeration, and explores services such as SSH, Telnet, SMTP, Rails, DNS, and HTTP/S, as well as vulnerability assessment methods. In Exploitation (Pentesting Phase III), trainees engage in real-world exploitation scenarios, including vulnerabilities found on online vulnerable hubs and web applications. In the Web Penetration Testing and Post-Exploitation section, emphasis is placed on both automated and manual web pentesting methods, covering brute-force attacks, command injection, SQL injection, CSRF, different types of XSS (Stored, Reflected, DOM), session weaknesses, and JavaScript vulnerabilities. The course concludes with advanced post-exploitation techniques, including privilege escalation and covering tracks to simulate realistic cyberattack scenarios. Through a mix of theoretical lessons and extensive hands-on practice, participants will develop strong technical skills essential for a career in ethical hacking and cybersecurity.
Course details
Deep tech fields
Cybersecurity & Data Protection
Course language
English
Course certification
EU Support for the Competitiveness of Kosovo’s ICT Sector
Fee
Free course
Duration (hours)
250
Certificate provided
Yes
Skills addressed
This course develops expertise in infrastructure security hardening, configuration management, identity and access management (IAM), credential security, and authentication/authorization protocols (OAuth, SAML). Participants will master web application security including XSS/CSRF mitigation and HTTP header security, along with offensive security skills like ethical hacking, vulnerability assessment, and penetration testing. The training covers defensive techniques such as password attack prevention and post-exploitation analysis, while incorporating emerging technologies like AI-powered threat detection. Additional focus areas include digital forensics, social engineering defense, phishing countermeasures, and operational security skills including OSINT gathering and reconnaissance methodologies – all aligned with industry standards and ESCO taxonomy for cybersecurity professionals.
Course format
Online
Target group
Undergraduate-level learners, Postgraduate-level learners, Professional development learners, Life-long learners
Quality check
Approved
Dates
Current no dates scheduled
Course provider
Apply now
Ready to take the next step in your journey? Apply now and embark on a transformative learning experience. Whether you’re pursuing a passion or advancing your career, we’re here to help you succeed. Don’t wait any longer – seize the opportunity and apply today!