Certified secure computer user (CSCU)
- Introduction to Security
- Securing Operating Systems
- Malware and Antivirus
- Internet Security
- Security on Social Networking Sites
- Securing Email Communications
- Securing Mobile Devices
- Securing the Cloud
- Securing Network Connections
- Data Backup and Disaster Recovery
Comptia A+
- Personal Computer Components
- Operating System Fundamentals
- PC Technician Professional Best Practices
- Installing and Configuring Peripheral Components
- Installing and Configuring System Components
- Maintaining and Troubleshooting Peripheral Components
- Troubleshooting System Components
- Installing and Configuring Operating Systems
- Maintaining and Troubleshooting Microsoft Windows
- Network Technologies
- Installing and Managing Network Connections
- Supporting Laptops and Portable Computing Devices
- Supporting Printers and Scanners
- Personal Computer Security Concepts
- Supporting Personal Computer Security
Cisco Certified Network Associate (CCNA)
- Understanding Networks and their Building Blocks
- IP Addressing and Subnets
- Introduction to Cisco Routers, Switches and IOS
- Introduction to IP Routing
- Routing Protocols
- Switching and Spanning Tree Protocol
- VLANs and VTP
- Access Lists
- Network Address Translation (NAT)
- Wide Area Networks
- IPv6
- Virtual Private Networks
- IP Services
- QoS & Security
Certified Ethical Hacking ( CEH)
- Introduction to Ethical Hacking
- Footprinting and Reconnaissance
- Scanning Networks
- Enumeration
- Vulnerability Analysis
- System Hacking
- Malware Threats
- Sniffing
- Social Engineering
- Denial-of-Service
- Session Hijacking
- Evading IDS, Firewalls, and Honeypots
- Hacking Web Servers
- Hacking Web Applications
- SQL Injection
- Hacking Wireless Networks
- Hacking Mobile Platforms
- IoT Hacking
- Cloud Computing
- Cryptography
Certified Network Defender (CND)
- Computer Network and Defense Fundamentals
- Network Security Threats, Vulnerabilities, and Attacks
- Network Security Controls, Protocols, and Devices
- Network Security Policy Design and Implementation
- Physical Security
- Host Security
- Secure Firewall Configuration and Management
- Secure VPN Configuration and Management
- Secure IDS Configuration and Management
- Wireless Network Defense
- Network Traffic Monitoring and Analysis
- Network Risk and Vulnerability Management
- Data Backup and Recovery
- Network Incident Response and Management
Computer hacking forensic investigator (CHFI)
- Computer forensics in today’s world
- Computer forensics investigation process
- Data acquisition and duplication
- Defeating anti-forensics techniques
- Operating system forensics
- Operating system forensics
- Investigating web attacks
- Database forensics
- Cloud forensics
- Malware forensics
- Investigating email crimes
- Mobile forensics
- Forensics report writing and presentation
EC- Council Certified security analyst (ECSA)
- Introduction to Penetration Testing and Methodologies
- Penetration Testing Scoping and Engagement Methodology
- Open Source Intelligence (OSINT) Methodology
- Social Engineering Penetration Testing Methodology
- Network Penetration Testing Methodology - External
- Network Penetration Testing Methodology - Internal
- Network Penetration Testing Methodology - Perimeter Devices
- Web Application Penetration Testing Methodology
- Database Penetration Testing Methodology
- Wireless Penetration Testing Methodology
- Cloud Penetration Testing Methodology
- Report Writing and Post Testing Actions