Bammtech Academy
Our Curriculum
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiosmod tempor incidididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercise ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum.
1. Cryptography
We will tell you all about it in this cryptography course, designed for you to learn about the origins of cryptography, encryption techniques, vocabulary related to cybersecurity and cryptography, as well as practical exercises to apply your knowledge in cryptography.
In this course:
- You will learn the basis and origins of Cryptography.
- The vocabulary used in relation to Cybersecurity and Cryptography.
- You will learn the main relationships of encryption techniques and delve into Cryptanalysis and discover ways to break the encryption.
2. Reversing
Welcome to the world of reversing or reverse engineering, do you dare to enter?
In this course:
- Introduction to reversing tools.
- Practice with IDA Freeware to perform reverse engineering.
- Perform a program cracking with the acquired knowledge.
3. Ransomware
Ransomware is one of the most used techniques by cyber criminals. We will learn about its origins, motivations and the techniques most commonly used by cybercriminals.
In this course:
- The basics of viruses and malwares that exist and the origin of them.
- Do you know how they work and the motivation of organized cybercrime such as Conti?
- You will learn the techniques added to the Ransomware that a cybercriminal applies, including the DeepWeb.
4. Network Security
We will tell you all about it in this specific course designed to teach you everything from how Internet protocols work, network analysis through Wireshark, to what measures and resources can be used to secure the network.
In this course:
- You will learn the basics of Internet communications and its protocols.
- You will learn how to use the Wireshark tool.
- Measures and resources for securing the Internet and network segmentation, demilitarized network zone (DMZ) and architectures.
5. Identity Management
Do you know what an IDM is and what an IAM is? Learn about the techniques and how to organize identities for a company.
In this course:
- Learn about IDM, IAM and how it positively affects the business.
- Organizes identity management, access control and techniques.
- Practice with authorization criteria and the processes and techniques currently used in identity management.
6. Exploiting
Do you know what an exploit is? How do attackers and ethical hackers use it?
In this course:
- You will delve into the world of exploits, from the concepts to how they are used by attackers and ethical hackers.
- You will learn how to search for vulnerabilities through Nmap, as well as prevention against exploits.
- You will learn what Metasploit is, how it works and its uses.
7. Secure Programming
Secure programming is an essential process in software development that seeks to ensure the confidentiality, integrity and availability of information and data, as well as to prevent and mitigate security risks. It is important to apply secure programming to protect confidential information and ensure business continuity. Do you want to know more?
In this course:
- Do you know the methodologies for identifying and assessing the risks associated with an application or system?
- Learn how to take measures to mitigate the associated risks, ensure user privacy and comply with regulations and security standards.
- How to detect and prevent failures using free tools.
8. Forensic Hacking
What is digital forensic analysis? In this course we teach you step by step.
In this course:
- Learn about the applications of specialized scientific and analytical techniques to technological infrastructures that enable the identification, preservation, analysis and presentation of valid data within a legal process.
- Learn about the hash function and Autopsy, the leading open source forensic platform.
- You will understand how file systems work, making it easier to know how files are deleted, recovered and erased.
9. Incident Response
Do you know what incident response is? Do you know its importance for a company? What are the steps to follow?
In this course:
- You will learn an introduction to incident response and its management.
- Incident response according to the ENS and the risks that invite attackers into the network.
- You will develop an Incident plan.
10. OWASP
Do you know what is OWASP and what is it for? Enter this course to discover this and an extension of the OWASP methodology.
In this course:
- You will be introduced to OWASP and its utilities and the 3 main causes of vulnerabilities in an application.
- Expansion of OWASP and 7 additional vulnerabilities.
- Explore the different vulnerabilities that we can find in an insecure web.
11. Red Team
Are you ready to enter the world of Red Team and learn all its secrets? Dare to discover them through this course.
In this course:
- You will learn about the methodology for information gathering, initial engagement.
- You will learn about common Red Team techniques and persistence establishment to gain access to the target system.
- You will test your knowledge to escalate privileges and gain administrator access.
12. Blue Team
In this course we will delve into the Blue Team, the people in charge of protecting IT infrastructures, and you will learn what they do and how they do it.
In this course:
- You will be introduced to the world of the Blue Team, in charge of protecting infrastructures.
- You will learn about various tools to care for and protect the assets to be protected.
13. IT Risks
In this course you will learn the basics of measuring IT risks, how to protect yourself and the different methodologies to manage a risk analysis.
In this course:
- You will discover how to manage the risk to which IT systems are exposed and the different methodologies that exist.
- Security principles and basic concepts to measure risk and protect assets.
- Once you know how to manage a risk analysis, you will see some practical cases.
14. Pentesting
Would you like to know what Pentesting is and how it can help protect your system or network against possible attacks? In this course we teach you step by step.
In this course:
- Know the concepts, techniques and methodologies of Pentesting.
- Prepare the pentesting environment and Kali Linux.
- Study and practice the different frameworks to perform a pentesting exam, as well as its tools.
15. OSINT
In this course you will learn about the tools, operation and phases of OSINT.
In this course:
- Learn the fundamentals, skills and phases of the OSINT process.
- You will learn some of the fundamental tools in OSINT to collect as much information as possible about your targets.
- You will put into practice the knowledge acquired and try out various tools used to collect information from public sources, which is called OSINT.
Entender para atender
Entre em contato conosco e conheça mais sobre a abrangência das nossas soluções.