Take your cybersecurity journey to a whole new level with our live certified online course – a complete learning path, which consists of the 15 most important skills for any cybersecurity professional.
This program designed by CQURE Experts will keep you on top of the latest developments in this ever-changing industry.
(8 hours per module)
€5629
This mastery program is great for people who a restarting out in cybersecurity, or are a seasoned IT pro who wants to switch to cybersecurity. The Cybersecurity Master Annual Program is a continuous learning program that provides the participants with insights into various cybersecurity skills. It consists of 15 interactive, demo-intensive workshops accompanied by pre-and post-workshop home assignments to solidify your learning. Every month, the students learn a new essential skill to become a cybersecurity Expert with the most up-to-date skills.
This mastery program is great for people who a restarting out in cybersecurity, or are a seasoned IT pro who wants to switch to cybersecurity. The Cybersecurity Master Annual Program is a continuous learning program that provides the participants with insights into various cybersecurity skills. It consists of 15 interactive, demo-intensive workshops accompanied by pre-and post-workshop home assignments to solidify your learning. Every month, the students learn a new essential skill to become a cybersecurity Expert with the most up-to-date skills.
We offer you our pricing plan, designed to adjust to your specific needs and budget. Apply now, lock your price and pay later.
Join our course at a competitive and fair price. This is the last chance!
Join our course at a competitive and fair price. This is the last chance!
Right after the purchase of the chosen modules or full program, you will be provided with access to our learning platform. A few days before the workshop, you will find there the pre-work as well as the Student Guide with instructions on how to prepare for the live workshop, and information regarding all the technical requirements.
You will be able to interact with the Trainer, as well as the group, and review all learned content on an ongoing basis. If something is unclear, you can always ask the Trainer for a review of the particular topic.
You will receive a Certificate of Completion, all the materials that have been created and presented by the trainer as well as a home assignment to practice even after the workshop concludes. Moreover, you will be granted access to our alumni community on the Discord server.
You’ll get access to the LIVE classes – 15 modules consisting of 8 hours of interactive and demo-intensive workshops on our special interactive platform.
You can enroll in separate modules or in the full program. The decision is yours.
You’ll get the author’s unique pre-work and post-work assignments for self-study.
You’ll get a full year online access to the live sessions recording. The downloads are yours to keep.
The course is packed with the newest cybersecurity findings, insights and tools.
You will be able to ask questions and engage with the experts during and after the workshop.
You’ll get access to the LIVE classes – 15 modules consisting of 8 hours of interactive and demo-intensive workshops on our special interactive platform.
You can enroll in separate modules or in the full program. The decision is yours.
You’ll get the author’s unique pre-work and post-work assignments for self-study.
You’ll get a full year online access to the live sessions recording. The downloads are yours to keep.
The course is packed with the newest cybersecurity findings, insights and tools.
You will be able to ask questions and engage with the experts during and after the workshop.
15 x 8-hour workshops conducted LIVE every month on the last Thursday of each month (except for December, which will be conducted a week earlier) in EU time zones.
You’ll only learn crucial and relevant things. We run all workshops LIVE and always with the newest content to give you relevant industry skills.
We know you’re busy, so we’re not going to waste your time with high-level theory and irrelevant reading material. You’ll get to dive into juicy, practical stuff in our demo-intensive workshops for the most effective (and useful) learning.
It’s our mission to give you ONLY the proven tools and techniques that will position you as a credible cybersecurity specialist in the real world. Everything you’ll learn has been vetted by passionate practitioners from the CQURE Team.
The best part is you’ll get to learn from some of the best cybersecurity specialists in their field: Paula Januszkiewicz, Mike Jankowski-Lorek PhD, Sami Laiho, Michael Grafnetter, Artur Kalinowski, Ronald Harmsen, Piotr Pawlik, Damian Widera, Amr Thabet, and Michał Furmankiewicz.
After finishing the course, you will be granted a CQURE Certificate of Completion. Please note that after completing the course you will also be eligible for CPE points!
During the 12-month training, you’ll gain access to our exclusive Discord community server, where you can connect with others for networking activities, support, motivation, and more.
This full 12-month program consists of 14 Modules in terms of various cybersecurity skills. They include essential theory combined with individual practice during the exercises as well as loads of hands-on tools and real-case scenarios.
Students will recognize and disable unnecessary services, implement secure service accounts, rights, permissions and privileges:
a) Defining and disabling unnecessary services
b) Implementing rights, permissions and privileges
c) Code signing
d) Implementing secure service accounts
Students will understand modern identity attack techniques, including the Pass-the-Hash, Pass-the-Ticket, Kerberoasting and others. Further, they will learn what can be done to mitigate the threat from such attacks and how to do it.
a) Modern Identity Attack Techniques
b) Preventing Credential Theft and Misuse
c) Recommended AD Configuration Options
d) OS-Level Credential Protection Features: LSA Protected Process, Credential Guard, and RDP Restricted Admin Mode
e) Detecting Backdoors in Active Directory
Students become familiar with cryptography basics and the essence of Public Key Infrastructure. Further CQURE Expert will show best practices for PKI architecture. Students will also learn about attacks on certificate infrastructure and mitigations.
a) Cryptography basic
b) Essence of PKI
c) Best practices for PKI Architecture
d) Active Directory Certificate Services Migration
e) Attacks on Certificates Infrastructure & Mitigations
Students will understand SQL Server Security baseline and will be able to effectively manage logins and passwords for MS SQL servers.
a) SQL Server Security Baseline Concepts
b) SQL Server Instance Security
c) Managing Logins & Passwords
Students will understand and be able to implement and manage On-Prem and Cloud-service Privileged Access Workstations.
a) Privileged Access Workstations – how and why?
b) Different hardware and VM solutions for implementing PAWs
c) Difference between normal and privileged access
d) Implementing and Managing On-prem PAWs
e) Implementing and Managing Cloud-service PAWs
Students will learn the general idea on good practices regarding the evidence gathering. They will be able to perform memory dumps, analyze them and recognize indicators of compromise. Students will also learn how to dump and analyze forensic data from disks, and how to properly extract as well as interpret evidence.
a) Evidence Gathering
b) Memory: Dumping and Analysis
c) Memory: Indicators of compromise
d) Disk: dumping & analysis
e) Disk: extracting and interpreting evidence
Students become familiar with Microsoft EDR and SIEM solutions.
a) Microsoft 365 security from SOC Analyst perspective
b) Microsoft 365 Defender for Endpoint – EDR story
c) Detection and Response with Sentinel – Let’s attack Contoso network
The task to create and maintain secure applications, or fixing existing applications, can be difficult. It is no different for APIs. This module has been designed to give you an overview and working understanding of how to develop secure APIs and Web applications.
a) Introduction to OWASP Secure Coding
b) Authentication and Access Control
c) Hardening your API and Web application
Students will be able to utilize specific PowerShell tools related to security, such as DSInternals. They will learn advanced PowerShell features which will allow them to audit Active Directory for vulnerabilities.
a) PowerShell security and specific hacktools (like DSlnternals)
b) Advanced PowerShell course
c) Auditing Active Directory using PowerShell
Students will become familiar with the most important Azure Active Directory security settings. After completing the module they will be able to implement: AAD Identity Protection, AAD PI and AAD Password Protection.
a) Azure AD security settings
b) AAD Identity Protection
c) AAD Privileged Identity Management (PIM)
d) AAD Password Protection
Students will become familiar with key aspects of web application pentesting. They will learn what vulnerabilities are often found in web apps and how they may be exploited. This knowledge can be useful both for offensive and defensive purposes – it might be interesting also to web app developers.
a) Cross Site Scripting
b) Injections
c) Insecure File Handling
d) Testing API
Students will be able to implement, manage and troubleshoot AppLocker.
a) Whitelisting in General
b) Implementing AppLocker
c) Managing AppLocker
d) Troubleshooting AppLocker
Students will become familiar with all configuration parameters for the Azure Kubernetes Services from the security perspective. Further, they will learn how to plan optimal specification and design to secure cluster infrastructure by going through:
a) Planning and designing the secure cluster infrastructure in Azure
b) Securing DevOps pipeline for AKS
c) Confidential computing with AKS
Students will become familiar with threat intelligence and modeling. Further, they will learn how to use open-source intelligence tools and techniques. During this module CQURE Experts will present different patterns attacks.
a) Threat Intelligence, Assessment and Threat Modeling
b) Open-Source Intelligence Tools and Techniques
c) Patterns of Attack
During this module, students will become familiar with detecting and hunting for malware activities.
This is an advanced, 12-month learning online program for Cybersecurity Specialists who would love to explore new dimensions of cybersecurity or ambitious geeks who would like to take on a challenge.
If you are a beginner with 1-2 years experience in cybersecurity, challenges define who you are. This training will hone your skills to detect today’s sophisticated cyberattacks and accelerate your career prospects in the field.
If you have 4-5 years experience in IT and want to spin off into cybersecurity, this training will give you all the relevant foundation and specialist skillsets to carve an exciting new career in cybersecurity
This program is relevant for specialists with 3-5 years and more. You will polish up your skills, learn the most current tools and techniques relevant for the newest systems, and boost your reputation.
Investing in knowledge is one of the most worthy investment not only for us, but also for our environment. Learning new skills and insights in terms of cybersecurity may benefit with gaining awareness and as a result, may prevent falling a victim to cyber threats in the future.
You will be the valuable element in regards to company’s safety – knowing about potential threats and ways of avoiding them may be incredibly useful in a daily company life.
Not only your company will gain a specialist in terms of cybersecurity, but also you will unlock the door for expanding your skills horizon even further.
Completed course with personal certification may be the perfect advantage when it comes to business.
Knowledge is power – it can be incredibly helpful in…
Who would have want to pay regularly for help in case of emergency data leakage in a company? It’s much better to educate the employees and prevent any cybersecurity risks.
After our course, you will be educated in the possible threats and you will identify any suspicious activity online with ease.
You will be the valuable element in regards to company’s safety – knowing about potential threats and ways of avoiding them may be incredibly useful in a daily company life.
Not only your company will gain a specialist in terms of cybersecurity, but also you will unlock the door for expanding your skills horizon even further.
Completed course with personal certification may be the perfect advantage when it comes to business.
Knowledge is power – it can be incredibly helpful in…
Who would have want to pay regularly for help in case of emergency data leakage in a company? It’s much better to educate the employees and prevent any cybersecurity risks.
After our course, you will be educated in the possible threats and you will identify any suspicious activity online with ease.
Take your cybersecurity journey to a whole new level with our live certified online course – a complete learning path, which consists of the 15 most important skills for any cybersecurity professional.
This program designed by CQURE Experts will keep you on top of the latest developments in this ever-changing industry.
Yes, you can sign up for the whole program at your preferred time and you will get access to all the materials and course recordings from the previous months.
Yes, there will be a different discord channel for each of the modules. Moreover, you will have access to #general channel where all CMAP24 students have access – no matter how many modules they have decided to enroll into.
All of the skills are purchased separately, if you decide to sign up for one skill then you can always buy access to any additional one to boost your knowledge.
You will not be charged for the module that you have already for, only for the difference.
The final exam is not mandatory and you will receive a certificate of completion without it, however with passing the exam your certification will be higher and you will receive the Cybersecurity Master Certificate.
Basic understanding of the IT technologies is something that you should have in order to follow with the class; however all the necessary skills come with the pre-work assignment that is provided before each module, and a post-work assignment to consolidate newly gained knowledge. Please explore our curriculum for more information on what this Program is about.
Firstly, you receive the pre-work materials on the subject that will help you with the understanding of the live workshop that comes afterward. The live workshop will be delivered on the Zoom platform and it will last 8 hours including breaks. After the workshop concludes, you will receive the post-work materials/assignments along with a test. You will also be granted access to a dedicated Discord server.
The CMAP program can only be accessed per person, and the access to individual workshops cannot be shared or distributed across other people. You are, however, more than welcome to teach your fellow colleagues what you have learned here.
Yes, we will be releasing the new program next year – all the skills will be updated with the latest technology upgrades.
This course is delivered by one of the greatest, world-renowned Cybersecurity Experts with practical knowledge from tons of successful projects, many years of real-world experience, great teaching skills and no mercy for misconfigurations or insecure solutions.
Paula is a world-class Cybersecurity Expert with over 19 years of experience in the field. She is often a top-rated speaker at the world biggest conferences as her unique stage presence is always well-received among diverse audiences. To top it all, she has the access to the source code of Windows!
Sami is one of the world’s leading professionals in the Windows OS troubleshooting and security. Sami has been working with and teaching OS troubleshooting, management, and security for more than 25 years. In the past, Sami’s two sessions were evaluated as the Top 2 sessions (out of 1700+ sessions) at Microsoft Ignite in Orlando.
Solution architect, trainer, and speaker based in the Netherland. He has been active in professional software development since the mid-90s. He mainly works with technologies like Microsoft Azure, Kubernetes and software development in dotnet, building IoT and microservice-based cloud-first systems.
System Engineer and Unified Communications Expert. His areas of expertise includes Microsoft Private Cloud, Microsoft Public Cloud (Office 365 and Azure), Microsoft Exchange Server 2010/2013, Lync Server 2010/2013, Office Communications Servers and Windows Server family.
Software engineer with over 20 years of professional experience in all aspects of data platform development. In 2022, for the 14th time, he has been awarded Microsoft’s Data Platform MVP. He holds various Microsoft Certifications since 2004.
During almost 20 years of his IT career Artur developed his skills in cybersecurity from different perspectives. His experience ranges from a forensic analytics and a university lecturer to a security administrator. Artur worked for government financial institutions and for global cybersecurity companies.
Do you want to receive the geekiest cybersecurity solutions, tools, and tricks, straight to your inbox?
Learn more about our offer in terms of Consulting. Our Cybersecurity Experts perform consulting work on a daily basis, hence we are fully prepared for any challenge.
Learn more about our offer in terms of Consulting. Our Cybersecurity Experts perform consulting work on a daily basis, hence we are fully prepared for any challenge.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.