CRI Cyber Division

Welcome to the Cybersecurity Division of CRI training school & vocational school (CRI), where our core mission is to empower aspiring cybersecurity professionals through comprehensive and cutting-edge career training. In today's digital age, the importance of robust cybersecurity measures cannot be overstated, with organizations across the globe facing an ever-evolving array of cyber threats. At CRI's Cybersecurity Division, we are committed to developing the next generation of cybersecurity experts who are equipped with the knowledge, skills, and innovative thinking necessary to protect critical information infrastructure and ensure digital security.
Our career training programs are meticulously designed to cater to various levels of expertise, from beginners to advanced practitioners, ensuring a pathway for every aspirant to excel in the cyber field. With a curriculum that is constantly updated to reflect the latest trends, technologies, and threats, our trainees receive an education that is not only comprehensive but also relevant to today's cybersecurity challenges.
Learners at CRI benefit from hands-on or online training delivered by industry veterans and academic leaders, immersive simulations, and real-world project experiences that prepare them for the complexities and nuances of cybersecurity in practice. Our partnerships with leading technology firms and governmental agencies provide unparalleled opportunities for practical learning and professional networking, opening doors to prestigious careers in cybersecurity.
Whether you aim to specialize in threat intelligence, network security, incident response, or any other critical domain within cybersecurity, CRI's Cybersecurity Division offers a dynamic and supportive environment to foster your professional growth. Join us to embark on a rewarding career path, contribute to safeguarding the digital realm, and become part of the solution to one of the most pressing challenges of our time.
Certified Cyber Security Technician

The CCT is ideal for anyone looking to start their career in cybersecurity or add a strong foundational understanding of the cybersecurity concepts and techniques required to be effective on the job.
The course is especially well suited for:
Early-career IT professionals, IT managers, career changers, and career advancers.
We accept several financing options: Pay Pal, Pay Pal Pay Later, After Pay and others.
Select the payment option at checkout.
What is the CCT certification?
The CCT is an entry-level cybersecurity program engineered to address the global need and demand for cybersecurity technicians with strong foundational skills.
What You Will Learn:
-
Key concepts in cybersecurity, including information security and network security
-
Information security threats, vulnerabilities, and attacks
-
The different types of malware
-
Identification, authentication, and authorization
-
Network security controls
-
Network security assessment techniques and tools (threat hunting, threat intelligence, vulnerability assessment, ethical hacking, penetration testing, configuration and asset management)
-
Application security design and testing techniques
-
Fundamentals of virtualization, cloud computing, and cloud security
-
Wireless network fundamentals, wireless encryption, and related security measures
-
Fundamentals of mobile, IoT, and OT devices and related security measures
-
Cryptography and public-key infrastructure
-
Data security controls, data backup and retention methods, and data loss prevention techniques
-
Network troubleshooting, traffic and log monitoring, and analysis of suspicious traffic
-
The incident handling and response process
-
Computer forensics and digital evidence fundamentals, including the phases of a forensic investigation
-
Concepts in business continuity and disaster recovery
-
Risk management concepts, phases, and frameworks
Certified Network Defender

CND v2 is for those who work in the network administration/cybersecurity domain in the capacity of Network Administrator/Engineer, Network Security Administrator/Engineer/Analyst, Cybersecurity Engineer, Security Analyst, Network Defense Technician, Security Operator. CNDv2 is for all cybersecurity operations, roles, and anyone looking to build a career in cybersecurity.
We accept several financing options: Pay Pal, Pay Pal Pay Later, After Pay and others.
Select the payment option at checkout.
CND v2 is based on the cybersecurity education framework and work role task analysis presented by the National Infocomm Competency Framework (NICF). The program is also mapped to the Department of Defense (DoD) roles for system/network administrators as well as global work roles and responsibilities laid out by the revised NICE Framework 2.0.
What You Will Learn:
-
Understanding network security management
-
Learn basics of first response and forensics
-
Establishing network security policies and procedures
-
Understanding indicators of Compromise, Attack, and Exposures (IoC, IoA, IoE)
-
Windows and Linux security administration
-
Building threat intelligence capabilities
-
Setting up mobile and IoT device security
-
Establishing and monitoring log management
-
Implementing data security techniques on networks
-
Implementing endpoint security
-
Embedding virtualization technology security
-
Configuring optimum firewall solutions
-
Determining cloud and wireless security
-
Understanding and using IDS/IPS technologies
-
Deploying and using risk assessment tools
-
Establishing Network Authentication, Authorization, Accounting (AAA)
Computer Hacking Forensic Investigator

Course Outline:
Module 1 Computer Forensics in Today's World
Module 2 Computer Forensics Investigation Process
Module 3 Understanding Hard Disks and File Systems
Module 4 Data Acquisition and Duplication
Module 5 Defeating Anti-Forensics Techniques
Module 6 Windows Forensics
Module 7 Linux and Mac Forensics
Module 8 Network Forensics
Module 9 Investigating Web Attacks
Module 10 Dark Web Forensics
Module 11 Database Forensics
Module 12 Cloud Forensics
Module 13 Investigating Email Crimes
Module 14 Malware Forensics
Module 15 Mobile Forensics
Module 16 IoT Forensics
Why CHFI?
If you are tasked with implementing, managing, or protecting web applications, then this course is for you. If you are a cyber or tech professional who is interested in learning or recommending mitigation methods to a myriad of web security issues and want a pure hands-on program, then this is the course you have been waiting for.
CHFI includes all the essentials of digital forensics analysis and evaluation required for today’s digital world. From identifying the footprints of a breach to collecting evidence for a prosecution, CHFI walks students through every step of the process with experiential learning. This course has been tested and approved by veterans and top practitioners of the cyber forensics industry.
CHFI is engineered by industry practitioners for both professionals and aspiring professionals alike from careers including forensic analysts, cybercrime investigators, cyber defense forensic analysts, incident responders, information technology auditors, malware analysts, security consultants, and chief security officers.
We accept several financing options: Pay Pal, Pay Pal Pay Later, After Pay and others.
Select the payment option at checkout.
Certified Penetration Testing Professional

Program Outline:
Module 1 Intro to Penetration Testing & Methodologies
Module 2 Penetration Testing Scoping & Engagement
Module 3 Open-Source Intelligence (OSINT)
Module 4 Social Engineering Penetration Testing
Module 5 Network Penetration Testing – External
Module 6 Network Penetration Testing – Internal
Module 7 Network Penetration Testing - Perimeter Devices
Module 8 Web Application Penetration Testing
Module 9 Wireless Penetration Testing
Module 10 IoT Penetration Testing
Module 11 OT and SCADA Penetration Testing
Module 12 Cloud Penetration Testing
Module 13 Binary Analysis and Exploitation
Module 14 Report Writing and Post Testing Actions
With CPENT, Learn the Next-Generation Techniques and
Methodologies for Handling Real-World Threat Situations
The following are 12 reasons that make the CPENT Program one of a kind. This exceptional course can make you one of the most advanced Penetration Testers in the world.
The course has one purpose: To help you overcome some of the most advanced obstacles that real-world practitioners face when conducting Penetration tests.
Here are some examples of the challenges you will face when you are exposed to the CPENT Range:
-
Advanced Windows Attacks
-
Attacking Iot Systems
-
Writing Exploits: Advanced Binaries Exploitation
-
Bypassing A Filtered Network
-
Pentesting Operational Technology (Ot)
-
Access Hidden Networks with Pivoting
-
Double Pivoting
-
Privilege Escalation
-
Evading Defense Mechanisms
-
Attack Automation with Scripts
-
Build Your Armory: Weaponize Your Exploits
-
Write Professional Reports
We accept several financing options: Pay Pal, Pay Pal Pay Later, After Pay and others.
Select the payment option at checkout.
Certified Ethical Hacker

What is the CEH certification?
This Certified Ethical Hacker program provides comprehensive training, hands-on learning labs, practice cyber ranges for engagement, certification assessments, cyber competitions, and opportunities for continuous learning into one comprehensive program curated through our new learning framework:
1. Learn 2. Certify 3. Engage 4. Compete.
We accept several financing options: Pay Pal, Pay Pal Pay Later, After Pay and others.
Select the payment option at checkout.
20 Modules That Help You Master the Foundations of Ethical Hacking
Course Outline:
-
Introduction to Ethical Hacking
-
Foot Printing and Reconnaissance
-
Scanning Networks
-
Enumeration
-
Vulnerability Analysis
-
System Hacking
-
Malware Threats
-
Sniffing
-
Social Engineering
-
Denial-of-Service
-
Session Hijacking
-
Evading IDS, Firewalls, and Honeypots
-
Hacking Web Servers
-
Hacking Web Applications
-
SQL Injection
-
Hacking Wireless Networks
-
Hacking Mobile Platforms
-
IoT Hacking
-
Cloud Computing
-
Cryptography
Additional Cyber Courses

Below Additional Cyber Courses are ALL certified
Web Application | Hacking & Security
ICS/SCADA Cybersecurity
STORM: Ethical Hacking Core Skills
STORM: Ethical Hacking Intermediate Skills
Project Management - CPM
Incident Handler - ECIH
SOC Analyst - CSA
Threat Intelligence Analyst - CTIA
Network Defense Essentials
Digital Forensics Essentials
Ethical Hacking Essentials
Secure Computer User - CSCU
Chief Information Security Officer - CCISO
Risk Management Approach and Practices - RM
Ethical Hacking Core Skills
Encryption Specialist - ECES
Disaster Recovery Professional - EDRP
Dark Web Forensics
Malware and Memory Forensics
Mobile Forensics
Cloud Security Engineer - CCSE
Blockchain Professional - CBP
DevSecOps Engineer (ECDE)
Python Security (MicroDegree)
PHP Security (MicroDegree)
Application Security Engineer - CASE .NET
Application Security Engineer - CASE Java
To schedule one of the above courses, please contact us directly at
702-222-3489 or cri@critraining.com