top of page

CRI Cyber Division

patryk-gradys

Welcome to the Cybersecurity Division of CRI training school  & vocational school (CRI), where our core mission is to empower aspiring cybersecurity professionals through comprehensive and cutting-edge career training. In today's digital age, the importance of robust cybersecurity measures cannot be overstated, with organizations across the globe facing an ever-evolving array of cyber threats. At CRI's Cybersecurity Division, we are committed to developing the next generation of cybersecurity experts who are equipped with the knowledge, skills, and innovative thinking necessary to protect critical information infrastructure and ensure digital security.

Our career training programs are meticulously designed to cater to various levels of expertise, from beginners to advanced practitioners, ensuring a pathway for every aspirant to excel in the cyber field. With a curriculum that is constantly updated to reflect the latest trends, technologies, and threats, our trainees receive an education that is not only comprehensive but also relevant to today's cybersecurity challenges.

Learners at CRI benefit from hands-on or online training delivered by industry veterans and academic leaders, immersive simulations, and real-world project experiences that prepare them for the complexities and nuances of cybersecurity in practice. Our partnerships with leading technology firms and governmental agencies provide unparalleled opportunities for practical learning and professional networking, opening doors to prestigious careers in cybersecurity.

Whether you aim to specialize in threat intelligence, network security, incident response, or any other critical domain within cybersecurity, CRI's Cybersecurity Division offers a dynamic and supportive environment to foster your professional growth. Join us to embark on a rewarding career path, contribute to safeguarding the digital realm, and become part of the solution to one of the most pressing challenges of our time.

Find Out More, Today!
Financial Aid is Available

Certified Cyber Security Technician 

Cert Cybersecurity Technician

The CCT is ideal for anyone looking to start their career in cybersecurity or add a strong foundational understanding of the cybersecurity concepts and techniques required to be effective on the job.

The course is especially well suited for:

 Early-career IT professionals, IT managers, career changers, and career advancers.        

We accept several financing options: Pay Pal, Pay Pal Pay Later, After Pay and others.

Select the payment option at checkout.

What is the CCT certification?

The CCT is an entry-level cybersecurity program engineered to address the global need and demand for cybersecurity technicians with strong foundational skills.

 

What You Will Learn:

  • Key concepts in cybersecurity, including information security and network security

  • Information security threats, vulnerabilities, and attacks

  • The different types of malware

  • Identification, authentication, and authorization

  • Network security controls

  • Network security assessment techniques and tools (threat hunting, threat intelligence, vulnerability assessment, ethical hacking, penetration testing, configuration and asset management)

  • Application security design and testing techniques

  • Fundamentals of virtualization, cloud computing, and cloud security

  • Wireless network fundamentals, wireless encryption, and related security measures

  • Fundamentals of mobile, IoT, and OT devices and related security measures

  • Cryptography and public-key infrastructure

  • Data security controls, data backup and retention methods, and data loss prevention techniques

  • Network troubleshooting, traffic and log monitoring, and analysis of suspicious traffic

  • The incident handling and response process

  • Computer forensics and digital evidence fundamentals, including the phases of a forensic investigation

  • Concepts in business continuity and disaster recovery

  • Risk management concepts, phases, and frameworks

Certified Network Defender

Certified Network Defender image

CND v2 is for those who work in the network administration/cybersecurity domain in the capacity of Network Administrator/Engineer, Network Security Administrator/Engineer/Analyst, Cybersecurity Engineer, Security Analyst, Network Defense Technician, Security Operator. CNDv2 is for all cybersecurity operations, roles, and anyone looking to build a career in cybersecurity.

We accept several financing options: Pay Pal, Pay Pal Pay Later, After Pay and others.

Select the payment option at checkout.

CND v2 is based on the cybersecurity education framework and work role task analysis presented by the National Infocomm Competency Framework (NICF). The program is also mapped to the Department of Defense (DoD) roles for system/network administrators as well as global work roles and responsibilities laid out by the revised NICE Framework 2.0.

 

What You Will Learn:

  • Understanding network security management

  • Learn basics of first response and forensics

  • Establishing network security policies and procedures

  • Understanding indicators of Compromise, Attack, and Exposures (IoC, IoA, IoE)

  • Windows and Linux security administration

  • Building threat intelligence capabilities

  • Setting up mobile and IoT device security

  • Establishing and monitoring log management

  • Implementing data security techniques on networks

  • Implementing endpoint security

  • Embedding virtualization technology security

  • Configuring optimum firewall solutions

  • Determining cloud and wireless security

  • Understanding and using IDS/IPS technologies

  • Deploying and using risk assessment tools

  • Establishing Network Authentication, Authorization, Accounting (AAA)

Computer Hacking Forensic Investigator

CHFI

Course Outline:

Module 1  Computer Forensics in Today's World 

Module 2 Computer Forensics Investigation Process

Module 3 Understanding Hard Disks and File Systems

Module 4 Data Acquisition and Duplication

Module 5 Defeating Anti-Forensics Techniques

Module 6 Windows Forensics

Module 7 Linux and Mac Forensics

Module 8 Network Forensics

Module 9 Investigating Web Attacks

Module 10  Dark Web Forensics

Module 11   Database Forensics

Module 12  Cloud Forensics

Module 13  Investigating Email Crimes

Module 14  Malware Forensics

Module 15  Mobile Forensics

Module 16  IoT Forensics

Why CHFI? 

If you are tasked with implementing, managing, or protecting web applications, then this course is for you. If you are a cyber or tech professional who is interested in learning or recommending mitigation methods to a myriad of web security issues and want a pure hands-on program, then this is the course you have been waiting for.

CHFI includes all the essentials of digital forensics analysis and evaluation required for today’s digital world. From identifying the footprints of a breach to collecting evidence for a prosecution, CHFI walks students through every step of the process with experiential learning. This course has been tested and approved by veterans and top practitioners of the cyber forensics industry.


CHFI is engineered by industry practitioners for both professionals and aspiring professionals alike from careers including forensic analysts, cybercrime investigators, cyber defense forensic analysts, incident responders, information technology auditors, malware analysts, security consultants, and chief security officers.

We accept several financing options: Pay Pal, Pay Pal Pay Later, After Pay and others.

Select the payment option at checkout.

Certified Penetration Testing Professional

PENT

Program Outline:

Module 1  Intro to Penetration Testing & Methodologies

Module 2 Penetration Testing Scoping & Engagement

Module 3 Open-Source Intelligence (OSINT)

Module 4 Social Engineering Penetration Testing

Module 5 Network Penetration Testing – External

Module 6 Network Penetration Testing – Internal

Module 7 Network Penetration Testing - Perimeter Devices 

Module 8 Web Application Penetration Testing 

Module 9 Wireless Penetration Testing

Module 10  IoT Penetration Testing

Module 11   OT and SCADA Penetration Testing

Module 12  Cloud Penetration Testing

Module 13  Binary Analysis and Exploitation

Module 14  Report Writing and Post Testing Actions

With CPENT, Learn the Next-Generation Techniques and 
Methodologies for Handling Real-World Threat Situations
The following are 12 reasons that make the CPENT Program one of a kind. This exceptional course can make you one of the most advanced Penetration Testers in the world. 


The course has one purpose: To help you overcome some of the most advanced obstacles that real-world practitioners face when conducting Penetration tests. 
Here are some examples of the challenges you will face when you are exposed to the CPENT Range:

 

  • Advanced Windows Attacks 

  • Attacking Iot Systems

  • Writing Exploits: Advanced Binaries Exploitation

  • Bypassing A Filtered Network

  • Pentesting Operational Technology (Ot)

  • Access Hidden Networks with Pivoting

  • Double Pivoting

  • Privilege Escalation

  • Evading Defense Mechanisms 

  • Attack Automation with Scripts

  • Build Your Armory: Weaponize Your Exploits

  • Write Professional Reports
     

We accept several financing options: Pay Pal, Pay Pal Pay Later, After Pay and others.

Select the payment option at checkout.

Certified Ethical Hacker 

ethical hacking phases

What is the CEH certification?

This Certified Ethical Hacker program provides comprehensive training, hands-on learning labs, practice cyber ranges for engagement, certification assessments, cyber competitions, and opportunities for continuous learning into one comprehensive program curated through our new learning framework:

1. Learn 2. Certify 3. Engage 4. Compete.

We accept several financing options: Pay Pal, Pay Pal Pay Later, After Pay and others.

Select the payment option at checkout.

20 Modules That Help You Master the Foundations of Ethical Hacking

Course Outline:

  • Introduction to Ethical Hacking

  • Foot Printing and Reconnaissance

  • Scanning Networks

  • Enumeration

  • Vulnerability Analysis

  • System Hacking

  • Malware Threats

  • Sniffing

  • Social Engineering

  • Denial-of-Service

  • Session Hijacking

  • Evading IDS, Firewalls, and Honeypots

  • Hacking Web Servers

  • Hacking Web Applications

  • SQL Injection

  • Hacking Wireless Networks

  • Hacking Mobile Platforms

  • IoT Hacking

  • Cloud Computing

  • Cryptography

Additional Cyber Courses

Server Installation

Below Additional Cyber Courses are ALL certified

 

Web Application | Hacking & Security      

ICS/SCADA Cybersecurity   

STORM: Ethical Hacking Core Skills    

STORM: Ethical Hacking Intermediate Skills  

Project Management - CPM

Incident Handler - ECIH    

SOC Analyst - CSA    

Threat Intelligence Analyst - CTIA    
Network Defense Essentials    

Digital Forensics Essentials   
Ethical Hacking Essentials      

Secure Computer User - CSCU  

Chief Information Security Officer - CCISO   

Risk Management Approach and Practices - RM    

Ethical Hacking Core Skills

Encryption Specialist - ECES   

Disaster Recovery Professional - EDRP

Dark Web Forensics

Malware and Memory Forensics

Mobile Forensics

Cloud Security Engineer - CCSE

Blockchain Professional - CBP

DevSecOps Engineer (ECDE) 

Python Security (MicroDegree)    

PHP Security (MicroDegree) 

Application Security Engineer - CASE .NET    

Application Security Engineer - CASE Java    

To schedule one of the above courses, please contact us directly at

702-222-3489 or cri@critraining.com

bottom of page