Level 3

Threat Analysis, Forensics, & Security Assessments

(NX Defence & ZX Offensive)

At Cyber Academy Hub

Develop critical skills through focused training on threat analysis, system forensics, and security assessments. Understand what it takes to identify and respond to incidents or conduct penetration testing, giving you insight into both sides of the security equation.

SOC Analyst

This SOC Analyst module is meticulously crafted to empower SOC teams with the knowledge and expertise to implement and maintain a resilient SOC infrastructure. Covering a comprehensive range of responsibilities, this program provides hand —on training in system monitoring, incident response, threat hunting, and SIEM operations. With practical guidance on tools like Sysmon, ELK Stack, and Splunk, participants will develop the skills to protect enterprises against evolving adversarial tactics and ensure robust network security operations.

Course Information

Program Code: NX220
Package: NX Defense
Prerequisites
Basic Networking Knowledge
Understanding Cybersecurity Principles
Duration Options
Self-paced: 4-8 weeks
Trainer-led: 40 hours

Windows Forensics

Windows Forensics is a critical component of cybersecurity, enabling investigators to uncover digital evidence and analyze cyber incidents. This comprehensive course explores the intricacies of the Windows operating system’s data storage mechanisms and equips trainees with the skills necessary to conduct thorough investigations during and after cyber events. Through four intensive modules, participants will gain hands-on experience with essential tools and techniques, from file analysis to malware detection, preparing them for the complex challenges of digital forensics in the Windows environment.

Course Information

Program Code: NX212
Package: NX Defense
Prerequisites
Basic knowledge of Windows OS
Duration Options
Self—paced: 4-8 weeks
Trainer-led: 40 hours

Penetration Testing

This program provides a comprehensive skill set to identify, exploit, and mitigate system vulnerabilities. Participants will master essential techniques such as data reconnaissance, system infiltration, post-exploitation tactics, and WebApp security methodologies. By covering tools like Nmap, Metasploit, and Burp Suite, this course prepares learners to simulate real-world attacks and strengthen cybersecurity defenses. Whether performing vulnerability assessments or securing critical assets, this program equips participants to safeguard digital environments against evolving cyber threats effectively.

Course Information

Program Code: ZX301
Package: ZX Offense
Prerequisites
Basic Networking Knowledge
Cybersecurity Foundation
Linux Commands
Duration Options
Self-paced: 4-8 weeks
Trainer-led: 40 hours

Secure Your Future in Cybersecurity

Have questions about our programs? Contact our experts to find the right training path for your goals.