courses.cybersmart.academy Open in urlscan Pro
2606:4700:4400::6812:239f  Public Scan

URL: https://courses.cybersmart.academy/
Submission Tags: phishingrod
Submission: On November 13 via api from DE — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

Skip to main content


CYBER SMART ACADEMY

Toggle menu Menu
 * Home
 * All Courses
 * Back to Main site
 * Sign In


CYBER SMART ACADEMY COURSES

Empower Your Skills. Secure Your Future

Find out more Enroll now


CHOOSE ONE OF OUR PROGRAMS AND TAKE THE FIRST STEPS TODAY!




DECRYPT THE LAW, HACK THE THREATS

Cybersecurity Course for Legal Professionals

We're excited to launch 'Decrypt the Law, Hack the Threats': Your one-stop
course for mastering cybersecurity in law. Safeguard your practice, navigate
global laws, understand the role of AI and guide your clients in the digital
age.
Enroll today



CYBER ELITE

Do you want a better paying, dynamic, interesting job?

We invite you on a 4-month journey (3 months of cyber technical sessions + 1
month of HR & career support) with us where we give 100%, and working together
you gain knowledge and skills as a Cyber analyst, level 1 but also career
support and advice.



BENEFITS

What will you learn?
At the end of this Program you will have both technical knowledge, at entry
level Cyber Analyst, but you will also be prepared to apply for a new job.

 * Cyber Security Basics: 30% theory, 70% practice

 * What about the types of entry level cybersecurity jobs in an organization
   (Example organizational chart of a Security department in a company)

 * How to think like a Cyber Analyst and work like a Cyber Analyst

 * How to update your resume to reflect the knowledge gained in the Program

 * Cum să comunici , cum să te prezinți la un interviu pt un rol de Cyber
   Analyst.


ENROLL FOR CYBER ELITE NOW

Start your Cyber Analist career today

Find out more


ALL COURSES

Browse our courses and start your training process today


 * CYBERSECURITY KICKSTART
   
   Course
   
   To be able to defend/attack a system, you first need to know how it works.
   Starting from this idea, we developed a course to cover the basic concepts of
   the IT environment: Networking, Hardware, Programming, Cryptography and the
   CIA triad.
   
   400 Lei


 * UNDERSTANDING AND IMPLEMENTING CYBER DECEPTION
   
   Course
   
   Cyber deception tools (honeypots, honeynets, canary tokens, etc.) are cyber
   security tools used to lure and capture cyber attackers. They are often used
   to detect cyber threats and gather information about attackers’ attempts to
   break in...
   
   470 Lei


 * VULNERABILITY ASSESSMENT/SCANNING
   
   Course
   
   Vulnerability scanning (or "Vulnerability Scanning") refers to the process of
   identifying the vulnerabilities of a system or an infrastructure. It involves
   the use of automated tools and specific methods to identify system
   weaknesses.
   
   470 Lei

View more courses
 * 
 * 
 * 
 * 

© cybersmart.academy. All rights reserved.
Teach online with Thinkific Open in a new window