fbpx
cybersecurity
education
€ EUR
  • $ USD
  • € EUR
  • #course
  • cmap

Cybersecurity Master Annual Program 2024

Days
Hours
Min.
Sec.

Take your cybersecurity journey to a whole new level with our live certified online course – a complete learning path which consists of the 14 most important skills for any cybersecurity profesional.

This program designed by CQURE Experts will keep you on top of the latest developments in this ever-changing industry.

    • Get 104 hours of live workshops and access to the recordings.
    • Get Demo-intensive content from real case scenarios.
    • Get 12-month access to the course content.
    • Get pre-work and home assignments.

(8 hours per module)

5629

Why this course?

This mastery program is great for people who a restarting out in cybersecurity, or are a seasoned IT pro who wants to switch to cybersecurity. The Cybersecurity Master Annual Program is a continuous learning program that provides the participants with insights into various cybersecurity skills. It consists of 14 interactive, demo-intensive workshops accompanied by pre-and post-workshop home assignments to solidify your learning. Every month, the students learn a new essential skill to become a cybersecurity Expert with the most up-to-date skills.

This mastery program is great for people who a restarting out in cybersecurity, or are a seasoned IT pro who wants to switch to cybersecurity. The Cybersecurity Master Annual Program is a continuous learning program that provides the participants with insights into various cybersecurity skills. It consists of 14 interactive, demo-intensive workshops accompanied by pre-and post-workshop home assignments to solidify your learning. Every month, the students learn a new essential skill to become a cybersecurity Expert with the most up-to-date skills.

Pricing plan

We offer you our pricing plan, designed to adjust to your specific needs and budget. Apply now, lock your price and pay later.

Course timeline

  • 1. Before the workshop

    Right after the purchase of the chosen modules or full program, you will be provided with access to our learning platform. A few days before the workshop, you will find there the pre-work as well as the Student Guide with instructions on how to prepare for the live workshop, and information regarding all the technical requirements.

  • 2. During the workshop

    You will be able to interact with the Trainer, as well as the group, and review all learned content on an ongoing basis. If something is unclear, you can always ask the Trainer for a review of the particular topic.

  • 3. After the workshop

    You will receive a Certificate of Completion, all the materials that have been created and presented by the trainer as well as a home assignment to practice even after the workshop concludes. Moreover, you will be granted access to our alumni community on the Discord server.

Course benefits

How is this training different from others?

  • Intensive learning
  • Only the newest content
  • Only the most effective learning
  • Only PROVEN tools and techniques
  • Only cool Experts!
  • Certification
  • Social & Network

Intensive learning

14 x 8-hour workshops conducted LIVE every month on the last Thursday of each month (except for December, which will be conducted a week earlier) in EU time zones.

Only the newest content

You’ll only learn crucial and relevant things. We run all workshops LIVE and always with the newest content to give you relevant industry skills.

Only the most effective learning

We know you’re busy, so we’re not going to waste your time with high-level theory and irrelevant reading material. You’ll get to dive into juicy, practical stuff in our demo-intensive workshops for the most effective (and useful) learning.

Only PROVEN tools and techniques

It’s our mission to give you ONLY the proven tools and techniques that will position you as a credible cybersecurity specialist in the real world. Everything you’ll learn has been vetted by passionate practitioners from the CQURE Team.

Only cool Experts!

The best part is you’ll get to learn from some of the best cybersecurity specialists in their field: Paula Januszkiewicz, Mike Jankowski-Lorek PhD, Sami Laiho, Michael Grafnetter, Artur Kalinowski, Ronald Harmsen, Piotr Pawlik, Damian Widera and Michał Furmankiewicz.

Certification

After finishing the course, you will be granted a CQURE Certificate of Completion. Please note that after completing the course you will also be eligible for CPE points!

Social & Network

During the 12-month training, you’ll gain access to our exclusive Discord community server, where you can connect with others for networking activities, support, motivation, and more.

Course syllabus

This full 12-month program consists of 14 Modules in terms of various cybersecurity skills. They include essential theory combined with individual practice during the exercises as well as loads of hands-on tools and real-case scenarios.

  • Module 1: Securing Windows Platform: Windows 11 & Windows Server 2022

    • January 25, 2024

      Students will recognize and disable unnecessary services, implement secure service accounts, rights, permissions and privileges:

      a) Defining and disabling unnecessary services
      b) Implementing rights, permissions and privileges
      c) Code signing
      d) Implementing secure service accounts

  • Module 2: Hardening Active Directory Infrastructure

    • February 29, 2024

      Students will understand modern identity attack techniques, including the Pass-the-Hash, Pass-the-Ticket, Kerberoasting and others. Further, they will learn what can be done to mitigate the threat from such attacks and how to do it.

      a) Modern Identity Attack Techniques
      b) Preventing Credential Theft and Misuse
      c) Recommended AD Configuration Options
      d) OS-Level Credential Protection Features: LSA Protected Process, Credential Guard, and RDP Restricted Admin Mode
      e) Detecting Backdoors in Active Directory

  • Module 3: Mastering Public Key Infrastructure (PKI), Certificate Services

    • March 28, 2024

      Students become familiar with cryptography basics and the essence of Public Key Infrastructure. Further CQURE Expert will show best practices for PKI architecture. Students will also learn about attacks on certificate infrastructure and mitigations.

      a) Cryptography basic
      b) Essence of PKI
      c) Best practices for PKI Architecture
      d) Active Directory Certificate Services Migration
      e) Attacks on Certificates Infrastructure & Mitigations

  • Module 4: Securing SQL Server

    • April 25, 2024

      Students will understand SQL Server Security baseline and will be able to effectively manage logins and passwords for MS SQL servers.

      a) SQL Server Security Baseline Concepts
      b) SQL Server Instance Security
      c) Managing Logins & Passwords

  • Module 5: Implementing Privileged Access Workstations

    • May 30, 2024

      Students will understand and be able to implement and manage On-Prem and Cloud-service Privileged Access Workstations.

      a) Privileged Access Workstations – how and why?
      b) Different hardware and VM solutions for implementing PAWs
      c) Difference between normal and privileged access
      d) Implementing and Managing On-prem PAWs
      e) Implementing and Managing Cloud-service PAWs

  • Module 6: Incident Response, Collecting and Analyzing Digital Evidence

    • June 27, 2024

      Students will learn the general idea on good practices regarding the evidence gathering. They will be able to perform memory dumps, analyze them and recognize indicators of compromise. Students will also learn how to dump and analyze forensic data from disks, and how to properly extract as well as interpret evidence.

      a) Evidence Gathering
      b) Memory: Dumping and Analysis
      c) Memory: Indicators of compromise
      d) Disk: dumping & analysis
      e) Disk: extracting and interpreting evidence

  • Module 7: Mastering Monitoring Operations in Azure

    • July 25, 2024

      Students become familiar with Microsoft EDR and SIEM solutions.

      a) Microsoft 365 security from SOC Analyst perspective
      b) Microsoft 365 Defender for Endpoint – EDR story
      c) Detection and Response with Sentinel – Let’s attack Contoso network

  • Module 8: Mastering Code Security

    • August 29, 2024

      The task to create and maintain secure applications, or fixing existing applications, can be difficult. It is no different for APIs. This module has been designed to give you an overview and working understanding of how to develop secure APIs and Web applications.

      a) Introduction to OWASP Secure Coding
      b) Authentication and Access Control
      c) Hardening your API and Web application

  • Module 9: Advancing at PowerShell for Security and Administration

    • October 3, 2024

      Students will be able to utilize specific PowerShell tools related to security, such as DSInternals. They will learn advanced PowerShell features which will allow them to audit Active Directory for vulnerabilities.

      a) PowerShell security and specific hacktools (like DSlnternals)
      b) Advanced PowerShell course
      c) Auditing Active Directory using PowerShell

  • Module 10: Implementing Secure Azure Active Directory

    • October 31, 2024

      Students will become familiar with the most important Azure Active Directory security settings. After completing the module they will be able to implement: AAD Identity Protection, AAD PI and AAD Password Protection.

      a) Azure AD security settings
      b) AAD Identity Protection
      c) AAD Privileged Identity Management (PIM)
      d) AAD Password Protection

  • Module 11: Pentesting Web Applications

    • November 28, 2024

      Students will become familiar with key aspects of web application pentesting. They will learn what vulnerabilities are often found in web apps and how they may be exploited. This knowledge can be useful both for offensive and defensive purposes – it might be interesting also to web app developers.

      a) Cross Site Scripting
      b) Injections
      c) Insecure File Handling
      d) Testing API

  • Module 12: Configuring Application Whitelisting

    • December 12, 2024

      Students will be able to implement, manage and troubleshoot AppLocker.

      a) Whitelisting in General
      b) Implementing AppLocker
      c) Managing AppLocker
      d) Troubleshooting AppLocker

  • Module 13: Building Secure Cluster Infrastructure in the Cloud

    • March 14, 2024

      Students will become familiar with all configuration parameters for the Azure Kubernetes Services from the security perspective. Further, they will learn how to plan optimal specification and design to secure cluster infrastructure by going through:

      a) Planning and designing the secure cluster infrastructure in Azure
      b) Securing DevOps pipeline for AKS
      c) Confidential computing with AKS

  • Module 14: Cyber Threat Intelligence

    • October 17, 2024

      Students will become familiar with threat intelligence and modeling. Further, they will learn how to use open-source intelligence tools and techniques. During this module CQURE Experts will present different patterns attacks.

      a) Threat Intelligence, Assessment and Threat Modeling
      b) Open-Source Intelligence Tools and Techniques
      c) Patterns of Attack

Who is it for?

This is an advanced, 12-month learning online program for Cybersecurity Specialists who would love to explore new dimensions of cybersecurity or ambitious geeks who would like to take on a challenge.

Ambitious beginners in cybersecurity

If you are a beginner with 1-2 years experience in cybersecurity, challenges define who you are. This training will hone your skills to detect today’s sophisticated cyberattacks and accelerate your career prospects in the field.

Specialists in IT

If you have 4-5 years experience in IT and want to spin off into cybersecurity, this training will give you all the relevant foundation and specialist skillsets to carve an exciting new career in cybersecurity

Cybersecurity Specialists

This program is relevant for specialists with 3-5 years and more. You will polish up your skills, learn the most current tools and techniques relevant for the newest systems, and boost your reputation.

How persuade your manager that this course is meaningful?

Investing in knowledge is one of the most worthy investment not only for us, but also for our environment. Learning new skills and insights in terms of cybersecurity may benefit with gaining awareness and as a result, may prevent falling a victim to cyber threats in the future.

Protects the Company

You will be the valuable element in regards to company’s safety – knowing about potential threats and ways of avoiding them may be incredibly useful in a daily company life.

Improves Employees skills

Not only your company will gain a specialist in terms of cybersecurity, but also you will unlock the door for expanding your skills horizon even further.

Boosts customer confidence

Completed course with personal certification may be the perfect advantage when it comes to business.

Helps comply with regulations

Knowledge is power – it can be incredibly helpful in…

Saves money in the long run

Who would have want to pay regularly for help in case of emergency data leakage in a company? It’s much better to educate the employees and prevent any cybersecurity risks.

Prepares for emerging threats

After our course, you will be educated in the possible threats and you will identify any suspicious activity online with ease.

Register now and learn from the best!

Join our live, online certification program, divided into 14 modules spread over 6 weeks, and get:

    • fresh and advanced stuff prepared for each edition
    • action-packed live trainings happening twice a week (2 hours each)
    • interactive program with hands-on formula (after every class, you’ll be able to ask questions)
    • free access to the CQURE Training Lab
    • free access to the closed Discord group where you can share your challenges and upgrade your network
    • an official CQURE certificate “Windows Security Master 2024” after passing the final exam
    • all the video recordings and extra materials are yours to keep for 12 months from the start of the program.
    • 30-Day, Money-Back Guarantee

FAQ

  • What happens if I sign up for the program in May, will I be able to access the previous modules?

    Yes, you can sign up for the whole program at your preferred time and you will get access to all the materials and course recordings from the previous months.

  • If I sign up just for one skill, will I have the access to the discord channel?

    Yes, there will be a different discord channel for each of the modules. Moreover, you will have access to #general channel where all CMAP24 students have access – no matter how many modules they have decided to enroll into.

  • If I sign up for one skill, can I access the next module?

    All of the skills are purchased separately, if you decide to sign up for one skill then you can always buy access to any additional one to boost your knowledge.

  • If I sign up for one workshop and decide that I would like to take the whole program afterwards, will I be charged the full price?

    You will not be charged for the module that you have already for, only for the difference.

  • Is the final exam obligatory?

    The final exam is not mandatory and you will receive a certificate of completion without it, however with passing the exam your certification will be higher and you will receive the Cybersecurity Master Certificate.

  • Do I need to have any entry knowledge before signing up for the CMAP?

    Basic understanding of the IT technologies is something that you should have in order to follow with the class; however all the necessary skills come with the pre-work assignment that is provided before each module, and a post-work assignment to consolidate newly gained knowledge. Please explore our curriculum for more information on what this Program is about.

  • How does the delivery of each Module look like?

    Firstly, you receive the pre-work materials on the subject that will help you with the understanding of the live workshop that comes afterward. The live workshop will be delivered on the Zoom platform and it will last 8 hours including breaks. After the workshop concludes, you will receive the post-work materials/assignments along with a test. You will also be granted access to a dedicated Discord server.

  • Can I buy the whole CMAP program and share the skills among my colleagues?

    The CMAP program can only be accessed per person, and the access to individual workshops cannot be shared or distributed across other people. You are, however, more than welcome to teach your fellow colleagues what you have learned here.

  • Will there be a new CMAP program next year?

    Yes, we will be releasing the new program next year – all the skills will be updated with the latest technology upgrades.

Your Experts

This course is delivered by one of the greatest, world-renowned Cybersecurity Experts with practical knowledge from tons of successful projects, many years of real-world experience, great teaching skills and no mercy for misconfigurations or insecure solutions.

Paula

Januszkiewicz

Founder & CEO, Microsoft Regional Director, MVP, MCT

Paula is a world-class Cybersecurity Expert with over 19 years of experience in the field. She is often a top-rated speaker at the world biggest conferences as her unique stage presence is always well-received among diverse audiences. To top it all, she has the access to the source code of Windows!

Mike

Jankowski-Lorek, Ph.D.

Director of Consulting, Cybersecurity Expert, MCT

Cybersecurity Expert, solution architect, consultant, penetration tester, and developer with more than 20 years of experience in the field. Mike holds multiple certifications, in security, database and software development. He also holds a Ph.D. in Computer Science.

Michael

Grafnetter

Windows Security Expert, MVP, MCT, CEI, MCP

Cybersecurity Expert on Windows Security, Microsoft Azure and PowerShell with over 11 years of experience in teaching IT professionals. He holds a master’s degree in Software Engineering and in 2016 he was awarded with the title in the Microsoft Azure Category.

Sami

Laiho

Windows OS Expert, MVP

Sami is one of the world’s leading professionals in the Windows OS troubleshooting and security. Sami has been working with and teaching OS troubleshooting, management and security for more than 25 years. In 2018, Sami’s two sessions were evaluated as the Top 2 sessions (out of 1700+ sessions) at Microsoft Ignite in Orlando.

Ronald

Harmsen

MCT, Solution & Software Architect, Developer

Solution architect, trainer, and speaker based in the Netherland. He has been active in professional software development since the mid-90s. He mainly works with technologies like Microsoft Azure, Kubernetes and software development in dotnet, building IoT and microservice-based cloud-first systems.

Piotr

Pawlik

Cybersecurity Expert, MCITP, MCTS

System Engineer and Unified Communications Expert. His areas of expertise includes Microsoft Private Cloud, Microsoft Public Cloud (Office 365 and Azure), Microsoft Exchange Server 2010/2013, Lync Server 2010/2013, Office Communications Servers and Windows Server family.

Damian

Widera

Data Platform MVP, MCT, Software Engineer, Cybersecurity Expert

Software engineer with over 20 years of professional experience in all aspects of data platform development. In 2022, for the 14th time, he has been awarded Microsoft’s Data Platform MVP. He holds various Microsoft Certifications since 2004.

Artur

Kalinowski

Cybersecurity Expert

During almost 20 years of his IT career Artur developed his skills in cybersecurity from different perspectives. His experience ranges from a forensic analytics and a university lecturer to a security administrator. Artur worked for government financial institutions and for global cybersecurity companies.

How can we help you?

Suggested searches

    Search history

      Popular searches:

      Not sure what course to look for?

      Mobile Newsletter Form