Cybersecurity is the Future. Learn it today. See the limited trainings offer.
The promotion has ended.
Ready to take your cybersecurity skills to the next level?
If you want to learn cybersecurity, CQURE Academy Experts will guide you in this process. Cybersecurity is the future. Now you've got the chance to learn from real professionals who perform pentests, forensics, red/blue team exercises and many more on the daily basis.
Below is the selection of courses for our 2-FOR-1 offer! When you buy one course, you get to choose second one on this list absolutely free. It's our 2-FOR-1 deal just for you!
Forensics and Prevention Mastery Course with Paula Januszkiewicz
This intensive Forensics and Prevention Mastery Course will train you how to think like a hacker so you can evaluate your infrastructure for exploitable vulnerabilities and how to recover the evidence attackers leave behind.
The syllabus covers topics like: Introduction to Incident Response and Handling, System and Network Security Mechanisms, Handling Malicious Code Incidents, Securing Monitoring Operations, Forensics Basics, Attack Prevention.
COURSE FORMULA
You'll get access to an intensive online course, divided into 6 modules (about 8 hours of video tutorials in total).
The course has an interactive, hands-on formula.
All the video recordings and extra materials are yours to keep for a full 12 months from the start of the program.
The course is packed with the newest cybersecurity findings, insights, and tools.
With the flexibility to learn these skills online from qualified Experts, there's no excuse not to dive in and take your future into your own hands.
Social Engineering & Phishing Mastery Course with Paula Januszkiewicz
Overview: This course is crafted to uncover tactics and techniques known as social engineering.
You'll learn how attackers gather information on their targets and what information available online is useful for them. You'll find out how to secure Red Team infrastructure, prepare an efficient payload, and bypass security solutions.
The agenda for the course includes: Data Reconnaissance, Infrastructure Preparation, Payload Preparation, Best Practices and Reporting.
COURSE FORMULA You'll get access to an intensive online course, divided into 4 modules (about 8 hours of video tutorials in total)
The course has an interactive, hands-on formula.
All the video recordings and extra materials are yours to keep for a full 12 months from the start of the program.
The course is packed with the newest cybersecurity findings, insights, and tools.
With the flexibility to learn these skills online from qualified Experts, there's no excuse not to dive in and take your future into your own hands.
Certificate upon passing the exam.
All the video recordings and extra materials are yours to keep for a full 12 months from the start of the program. The course is packed with the newest cybersecurity findings, insights, and tools. With the flexibility to learn these skills online from qualified Experts, there's no excuse not to dive in and take your future into your own hands. Certificate upon passing the exam.
With the flexibility to learn these skills online from qualified Experts, there's no excuse not to dive in and take your future into your own hands. More information can be found HERE.
Securing Windows Platform: W11 & WS22
$
797 (2-FOR-1)
Expert: Mike Jankowski-Lorek, PhD
Overview: During this course students will learn how to recognize and disable unnecessary services. CQURE Expert will demonstrate how the secure service accounts can be implemented. Additionally, the students will get acquainted with the methodology of implementing rights, permissions and privileges, as well as code signing.
Defining and disabling unnecessary services
Implementing secure service accounts
Implementing rights, permissions and privileges
Code signing
COURSE FORMULA
You'll get access to the LIVE class – 8 hours of interactive and demo-intensive workshop on our special interactive platform.
The live workshop will be recorded and accessible for students any time in case you miss a live workshop or want to review what you've learned. You will have access to the recording for 12 months after the training.
You'll get the author's unique pre-work and post-work assignments for self-study. You will be able to ask questions and engage with the teacher during and after the workshop.
The course is packed with the newest cybersecurity findings, insights, and tools.
The workshop is interactive and demo-intensive. You'll have the opportunity to ask questions and receive detailed answers during and after the training on the Discord platform.
With the flexibility to learn these skills online from qualified Experts, there's no excuse not to dive in and take your future into your own hands.
During this course, students will understand modern identity attack techniques, including the Pass-the-Hash, Pass-the-Ticket, Kerberoasting, and others. Further, they will learn what can be done to mitigate the threat from such attacks and how to do it.
You'll get access to the LIVE class – 8 hours of interactive and demo-intensive workshop on our special interactive platform.
The live workshop will be recorded and accessible for students any time in case you miss a live workshop or want to review what you've learned. You will have access to the recording for 12 months after the training.
You'll get the author's unique pre-work and post-work assignments for self-study. You will be able to ask questions and engage with the teacher during and after the workshop.
The course is packed with the newest cybersecurity findings, insights, and tools.
The workshop is interactive and demo-intensive. You'll have the opportunity to ask questions and receive detailed answers during and after the training on the Discord platform.
With the flexibility to learn these skills online from qualified Experts, there's no excuse not to dive in and take your future into your own hands.
Building Secure Cluster Infrastructure in the Cloud
$
797 (2-FOR-1)
Expert: Michał Furmankiewicz
Overview: During this course, students will become familiar with all configuration parameters for the Azure Kubernetes Services from a security perspective. Further, they will learn how to plan optimal specification and design to secure cluster infrastructure by going through:
Planning and designing the secure cluster infrastructure in Azure
Securing DevOps pipeline for AKS
Confidential computing with AKS
COURSE FORMULA
You'll get access to the LIVE class – 8 hours of interactive and demo-intensive workshop on our special interactive platform.
The live workshop will be recorded and accessible for students any time in case you miss a live workshop or want to review what you've learned. You will have access to the recording for 12 months after the training.
You'll get the author's unique pre-work and post-work assignments for self-study. You will be able to ask questions and engage with the teacher during and after the workshop.
The course is packed with the newest cybersecurity findings, insights, and tools.
The workshop is interactive and demo-intensive. You'll have the opportunity to ask questions and receive detailed answers during and after the training on the Discord platform.
With the flexibility to learn these skills online from qualified Experts, there's no excuse not to dive in and take your future into your own hands.
Mastering Public Key Infrastructure (PKI), Certificate Services and FIDO2
$
797 (2-FOR-1)
Expert: Mike Jankowski-Lorek, PhD
Overview: During this course, students become familiar with cryptography basics and the essence of Public Key Infrastructure. Further CQURE Expert will show best practices for PKI architecture. Students will also learn about attacks on certificate infrastructure and mitigations.
Cryptography basics
Essence of PKI
Best practices for PKI Architecture
Active Directory Certificate Services Migration
Attacks on Certificates Infrastructure & Mitigations
COURSE FORMULA
You'll get access to the LIVE class – 8 hours of interactive and demo-intensive workshop on our special interactive platform.
The live workshop will be recorded and accessible for students any time in case you miss a live workshop or want to review what you've learned. You will have access to the recording for 12 months after the training.
You'll get the author's unique pre-work and post-work assignments for self-study. You will be able to ask questions and engage with the teacher during and after the workshop.
The course is packed with the newest cybersecurity findings, insights, and tools.
The workshop is interactive and demo-intensive. You'll have the opportunity to ask questions and receive detailed answers during and after the training on the Discord platform.
With the flexibility to learn these skills online from qualified Experts, there's no excuse not to dive in and take your future into your own hands.
Overview: The course has been designed to familiarize you with Microsoft EDR and SIEM solutions. CQURE Expert will present the Microsoft 365 Security from SOC Analyst perspective. Additionally, the students will get acquainted with incident management in Sentinel with EDR.
Microsoft 365 security from SOC Analyst perspective
Microsoft 365 Defender for Endpoint – EDR story
Detection and Response with Sentinel – Let's attack Contoso network
COURSE FORMULA
You'll get access to the LIVE class – 8 hours of interactive and demo-intensive workshop on our special interactive platform.
The live workshop will be recorded and accessible for students any time in case you miss a live workshop or want to review what you've learned. You will have access to the recording for 12 months after the training.
You'll get the author's unique pre-work and post-work assignments for self-study. You will be able to ask questions and engage with the teacher during and after the workshop.
The course is packed with the newest cybersecurity findings, insights, and tools.
The workshop is interactive and demo-intensive. You'll have the opportunity to ask questions and receive detailed answers during and after the training on the Discord platform.
With the flexibility to learn these skills online from qualified Experts, there's no excuse not to dive in and take your future into your own hands.
Overview: During this course, students will understand and be able to implement and manage On-Prem and Cloud-service Privileged Access Workstations.
Privileged Access Workstations – how and why?
Different hardware and VM solutions for implementing PAWs
Difference between normal and privileged access
Implementing and Managing On-prem PAWs
Implementing and Managing Cloud-service PAWs
COURSE FORMULA
You'll get access to the LIVE class – 8 hours of interactive and demo-intensive workshop on our special interactive platform.
The live workshop will be recorded and accessible for students at any time in case you miss a live workshop or want to review what you've learned. You will have access to the recording for 12 months after the training.
You'll get the author's unique pre-work and post-work assignments for self-study. You will be able to ask questions and engage with the teacher during and after the workshop.
The course is packed with the newest cybersecurity findings, insights, and tools.
The workshop is interactive and demo-intensive. You'll have the opportunity to ask questions and receive detailed answers during and after the training on the Discord platform.
With the flexibility to learn these skills online from qualified Experts, there's no excuse not to dive in and take your future into your own hands.
Incident Response, Collecting and Analyzing Digital Evidence
$
797 (2-FOR-1)
Expert: Paula Januszkiewicz
Overview: During this course, students will learn the general idea on good practices regarding evidence gathering. They will be able to perform memory dumps, analyze them, and recognize indicators of compromise. Students will also learn how to dump and analyze forensic data from disks, and how to properly extract as well as interpret evidence.
Evidence Gathering
Memory: Dumping and Analysis
Memory: Indicators of compromise
Disk: Dumping & Analysis
Disk: Extracting and Interpreting Evidence
COURSE FORMULA
You'll get access to the LIVE class – 8 hours of interactive and demo-intensive workshop on our special interactive platform.
The live workshop will be recorded and accessible for students any time in case you miss a live workshop or want to review what you've learned. You will have access to the recording for 12 months after the training.
You'll get the author's unique pre-work and post-work assignments for self-study. You will be able to ask questions and engage with the teacher during and after the workshop.
The course is packed with the newest cybersecurity findings, insights, and tools.
The workshop is interactive and demo-intensive. You'll have the opportunity to ask questions and receive detailed answers during and after the training on the Discord platform.
With the flexibility to learn these skills online from qualified Experts, there's no excuse not to dive in and take your future into your own hands.
Overview: During this course, students will understand SQL Server Security baseline and will be able to effectively manage logins and passwords for MS SQL servers.
SQL Server Security Baseline Concepts
SQL Server Instance Security
Managing Logins & Passwords
COURSE FORMULA
You'll get access to the LIVE class – 8 hours of interactive and demo-intensive workshop on our special interactive platform.
The live workshop will be recorded and accessible for students any time in case you miss a live workshop or want to review what you've learned. You will have access to the recording for 12 months after the training.
You'll get the author's unique pre-work and post-work assignments for self-study. You will be able to ask questions and engage with the teacher during and after the workshop.
The course is packed with the newest cybersecurity findings, insights, and tools.
The workshop is interactive and demo-intensive. You'll have the opportunity to ask questions and receive detailed answers during and after the training on the Discord platform.
With the flexibility to learn these skills online from qualified Experts, there's no excuse not to dive in and take your future into your own hands.
Overview: The task of creating and maintaining secure applications, or fixing existing applications, can be difficult. It is no different for APIs. This course has been designed to give you an overview and working understanding of how to develop secure APIs and Web applications.
Introduction to OWASP Secure Coding
Authentication and Access Control
Hardening your API and Web application
COURSE FORMULA
You'll get access to the LIVE class – 8 hours of interactive and demo-intensive workshop on our special interactive platform.
The live workshop will be recorded and accessible for students any time in case you miss a live workshop or want to review what you've learned. You will have access to the recording for 12 months after the training.
You'll get the author's unique pre-work and post-work assignments for self-study. You will be able to ask questions and engage with the teacher during and after the workshop.
The course is packed with the newest cybersecurity findings, insights, and tools.
The workshop is interactive and demo-intensive. You'll have the opportunity to ask questions and receive detailed answers during and after the training on the Discord platform.
With the flexibility to learn these skills online from qualified Experts, there's no excuse not to dive in and take your future into your own hands.
Advancing at PowerShell for Security and Administration
$
797 (2-FOR-1)
Expert: Michael Grafnetter
Overview: During this course, students will be able to utilize specific PowerShell tools related to security, such as DSInternals. They will learn advanced PowerShell features which will allow them to audit Active Directory for vulnerabilities.
PowerShell security and specific hacktools (like DSInternals)
Advanced PowerShell course
Auditing Active Directory using PowerShell
COURSE FORMULA
You'll get access to the LIVE class – 8 hours of interactive and demo-intensive workshop on our special interactive platform.
The live workshop will be recorded and accessible for students any time in case you miss a live workshop or want to review what you've learned. You will have access to the recording for 12 months after the training.
You'll get the author's unique pre-work and post-work assignments for self-study. You will be able to ask questions and engage with the teacher during and after the workshop.
The course is packed with the newest cybersecurity findings, insights, and tools.
The workshop is interactive and demo-intensive. You'll have the opportunity to ask questions and receive detailed answers during and after the training on the Discord platform.
With the flexibility to learn these skills online from qualified Experts, there's no excuse not to dive in and take your future into your own hands.
Experts: Paula Januszkiewicz, Mike Jankowski-Lorek, PhD & Piotr Pawlik
Overview: During this course, students will become familiar with threat intelligence and modeling. Further, they will learn how to use open-source intelligence tools and techniques. During this course, CQURE Experts will present different patterns of attacks.
Threat Intelligence, Assessment and Threat Modeling
Open-Source Intelligence Tools and Techniques
Patterns of Attack
COURSE FORMULA
You'll get access to the LIVE class – 8 hours of interactive and demo-intensive workshop on our special interactive platform.
The live workshop will be recorded and accessible for students at any time in case you miss a live workshop or want to review what you've learned. You will have access to the recording for 12 months after the training.
You'll get the author's unique pre-work and post-work assignments for self-study. You will be able to ask questions and engage with the teacher during and after the workshop.
The course is packed with the newest cybersecurity findings, insights, and tools.
The workshop is interactive and demo-intensive. You'll have the opportunity to ask questions and receive detailed answers during and after the training on the Discord platform.
With the flexibility to learn these skills online from qualified Experts, there's no excuse not to dive in and take your future into your own hands.
Overview: During this course, students will become familiar with the most important Azure Active Directory security settings. After completing the course they will be able to implement: AAD Identity Protection, AAD PI and AAD Password Protection.
Azure AD security settings
AAD Identity Protection
AAD Privileged Identity Management (PIM)
AAD Password Protection
COURSE FORMULA
You'll get access to the LIVE class – 8 hours of interactive and demo-intensive workshop on our special interactive platform.
The live workshop will be recorded and accessible for students at any time in case you miss a live workshop or want to review what you've learned. You will have access to the recording for 12 months after the training.
You'll get the author's unique pre-work and post-work assignments for self-study. You will be able to ask questions and engage with the teacher during and after the workshop.
The course is packed with the newest cybersecurity findings, insights, and tools.
The workshop is interactive and demo-intensive. You'll have the opportunity to ask questions and receive detailed answers during and after the training on the Discord platform.
With the flexibility to learn these skills online from qualified Experts, there's no excuse not to dive in and take your future into your own hands.
Overview: During this course, students will become familiar with key aspects of web application pentesting. They will learn what vulnerabilities are often found in web apps and how they may be exploited. This knowledge can be useful both for offensive and defensive purposes – it might be interesting also to web app developers.
Cross Site Scripting
Injections
Insecure File Handling
Testing API
COURSE FORMULA
You'll get access to the LIVE class – 8 hours of interactive and demo-intensive workshop on our special interactive platform.
The live workshop will be recorded and accessible for students at any time in case you miss a live workshop or want to review what you've learned. You will have access to the recording for 12 months after the training.
You'll get the author's unique pre-work and post-work assignments for self-study. You will be able to ask questions and engage with the teacher during and after the workshop.
The course is packed with the newest cybersecurity findings, insights, and tools.
The workshop is interactive and demo-intensive. You'll have the opportunity to ask questions and receive detailed answers during and after the training on the Discord platform.
With the flexibility to learn these skills online from qualified Experts, there's no excuse not to dive in and take your future into your own hands.
Overview: In 2020+ the most important security measure in enterprises is Allow-Listing" says Gartner and multiple other agencies. In Windows, this means you need to implement AppLocker. There's no more excuse either if you don't have the Enterprise version as Microsoft allowed AppLocker on Windows 10/11 Pro in the beginning of the year 2023.
The course has been designed to guide you through the implementation, management, and troubleshooting of AppLocker. If you think deploying AppLocker will need new people hired, you got it wrong – it will make you work less!
Whitelisting in general
Implementing AppLocker
Managing AppLocker
Troubleshooting AppLocker
COURSE FORMULA
You'll get access to the LIVE class – 8 hours of interactive and demo-intensive workshop on our special interactive platform.
The live workshop will be recorded and accessible for students at any time in case you miss a live workshop or want to review what you've learned. You will have access to the recording for 12 months after the training.
You'll get the author's unique pre-work and post-work assignments for self-study. You will be able to ask questions and engage with the teacher during and after the workshop.
The course is packed with the newest cybersecurity findings, insights, and tools.
The workshop is interactive and demo-intensive. You'll have the opportunity to ask questions and receive detailed answers during and after the training on the Discord platform.
With the flexibility to learn these skills online from qualified Experts, there's no excuse not to dive in and take your future into your own hands.