fbpx
cybersecurity
education
€ EUR
  • $ USD
  • € EUR
  • #course
  • cmap

Cybersecurity Master Annual Program 2025

January 30, 2025, 9:00 am
Days
Hours
Min.
Sec.

Take your cybersecurity journey to a whole new level with our live certified online course – a complete learning path, which consists of the 16 most important skills for any cybersecurity professional.

This program designed by CQURE Experts will keep you on top of the latest developments in this ever-changing industry.

    • 16 modules in 12 months.
    • 127 hours of live workshops and access to the recordings.
    • Demo-intensive content from real case scenarios.
    • 12-month access to the course content.
    • Pre-work and home assignments.
    • 8 hours per module.
    • 9AM – 5PM CET/CEST

5629

Lowest price within 30 days - (€3940)

Why this course?

This mastery program is great for people who a restarting out in cybersecurity, or are a seasoned IT pro who wants to switch to cybersecurity. The Cybersecurity Master Annual Program is a continuous learning program that provides the participants with insights into various cybersecurity skills. It consists of 15 interactive, demo-intensive workshops accompanied by pre-and post-workshop home assignments to solidify your learning. Every month, the students learn a new essential skill to become a cybersecurity Expert with the most up-to-date skills.

This mastery program is great for people who a restarting out in cybersecurity, or are a seasoned IT pro who wants to switch to cybersecurity. The Cybersecurity Master Annual Program is a continuous learning program that provides the participants with insights into various cybersecurity skills. It consists of 15 interactive, demo-intensive workshops accompanied by pre-and post-workshop home assignments to solidify your learning. Every month, the students learn a new essential skill to become a cybersecurity Expert with the most up-to-date skills.

Pricing plan

We offer you our pricing plan, designed to adjust to your specific needs and budget. Apply now, lock your price and pay later.

Course timeline

  • 1. Before the workshop

    Right after the purchase of the chosen modules or full program, you will be provided with access to our learning platform. A few days before the workshop, you will find there the pre-work as well as the Student Guide with instructions on how to prepare for the live workshop, and information regarding all the technical requirements.

  • 2. During the workshop

    You will be able to interact with the Trainer, as well as the group, and review all learned content on an ongoing basis. If something is unclear, you can always ask the Trainer for a review of the particular topic.

  • 3. After the workshop

    You will receive a Certificate of Completion, all the materials that have been created and presented by the trainer as well as a home assignment to practice even after the workshop concludes. Moreover, you will be granted access to our alumni community on the Discord server.

Course benefits

How is this training different from others?

  • Intensive learning
  • Only the newest content
  • Only the most effective learning
  • Only PROVEN tools and techniques
  • Only cool Experts!
  • Certification
  • Social & Network

Intensive learning

16 x 8-hour workshops conducted LIVE every month on the last Thursday of each month (except for December, which will be conducted a week earlier) in EU time zones.

Only the newest content

You’ll only learn crucial and relevant things. We run all workshops LIVE and always with the newest content to give you relevant industry skills.

Only the most effective learning

We know you’re busy, so we’re not going to waste your time with high-level theory and irrelevant reading material. You’ll get to dive into juicy, practical stuff in our demo-intensive workshops for the most effective (and useful) learning.

Only PROVEN tools and techniques

It’s our mission to give you ONLY the proven tools and techniques that will position you as a credible cybersecurity specialist in the real world. Everything you’ll learn has been vetted by passionate practitioners from the CQURE Team.

Only cool Experts!

The best part is you’ll get to learn from some of the best cybersecurity specialists in their field: Paula Januszkiewicz, Sami Laiho, Michael Grafnetter, Artur Kalinowski, Piotr Pawlik, Damian Widera, and Amr Thabet.

Certification

After finishing the course, you will be granted a CQURE Certificate of Completion. Please note that after completing the course you will also be eligible for CPE points!

Social & Network

During the 12-month training, you’ll gain access to our exclusive Discord community server, where you can connect with others for networking activities, support, motivation, and more.

Course syllabus

This full 12-month program consists of 16 Modules in terms of various cybersecurity skills. They include essential theory combined with individual practice during the exercises as well as loads of hands-on tools and real-case scenarios.

  • Module 1: Securing Windows Platform: Windows 11 & Windows Server 2022

    • January 30, 2025

      Students will recognize and disable unnecessary services, implement secure service accounts, rights, permissions and privileges:

      a) Defining and disabling unnecessary services
      b) Implementing rights, permissions and privileges
      c) Code signing
      d) Implementing secure service accounts

  • Module 2: Hardening Active Directory Infrastructure

    • February 27, 2025

      Students will understand modern identity attack techniques, including the Pass-the-Hash, Pass-the-Ticket, Kerberoasting and others. Further, they will learn what can be done to mitigate the threat from such attacks and how to do it.

      a) Modern Identity Attack Techniques
      b) Preventing Credential Theft and Misuse
      c) Recommended AD Configuration Options
      d) OS-Level Credential Protection Features: LSA Protected Process, Credential Guard, and RDP Restricted Admin Mode
      e) Detecting Backdoors in Active Directory

  • Module 3: Cloud-based Incident Response in Azure and Microsoft 365

    • March 13, 2025

      a) Azure&O365 cloud security challenges
      b) Zero Trust principles and architecture
      c) Incident response management process
      d) Cyber kill chain process
      e) Hunting through attack chain
      f)
      Azure monitor
      g) Azure incident response – best practices

  • Module 4: Detecting and Hunting for Malware Activities and Prevention

    • March 27, 2025

      During this module, students will become familiar with detecting and hunting for malware activities.

      1. Intro to malware and malware functionalities
      2. Hunting for malware C&C communication in network activities
      3. Hunting for malware behavior in Sysmon logs
      4. Creating a Yara rule for malware family or a suspicious functionality
  • Module 5: Implementing Privileged Access Workstations

    • April 24, 2025

      Students will understand and be able to implement and manage On-Prem and Cloud-service Privileged Access Workstations.

      a) Privileged Access Workstations – how and why?
      b) Different hardware and VM solutions for implementing PAWs
      c) Difference between normal and privileged access
      d) Implementing and Managing On-prem PAWs
      e) Implementing and Managing Cloud-service PAWs

  • Module 6: Advancing at PowerShell for Security and Administration

    • May 29, 2025

      Students will be able to utilize specific PowerShell tools related to security, such as DSInternals. They will learn advanced PowerShell features which will allow them to audit Active Directory for vulnerabilities.

      a) PowerShell security and specific hacktools (like DSlnternals)
      b) Advanced PowerShell course
      c) Auditing Active Directory using PowerShell

  • Module 7: Everything You Need to Know About Application Whitelisting

    • June 12, 2025

      Students will be able to implement, manage and troubleshoot AppLocker.

      a) Whitelisting in General
      b) Implementing AppLocker
      c) Managing AppLocker
      d) Troubleshooting AppLocker

  • Module 8: High Priority Security Features in Azure

    • June 26, 2024

      a) Managing identity and access in Microsoft Entra ID
      b) Network security
      c) Microsoft Purview data protection
      d) Microsoft Defender for Cloud
      e) Application security

  • Module 9: Securing SQL Server to Feed SIEM Solutions

    • July 31, 2025

      Students will understand SQL Server Security baseline and will be able to effectively manage logins and passwords for MS SQL servers.

      a) SQL Server Security Baseline Concepts
      b) SQL Server Instance Security
      c) Managing Logins & Passwords

  • Module 10: Techniques for Effective Automation with PowerShell

    • August 28, 2025

      a) Navigating execution policies: picking the right security strategy
      b) PowerShell language modes: locking down your scripts
      c) Fortify your scripts: the power of digital signatures
      d) Restricting execution permissions: enforcing least privilege for scripts
      e) Protecting sensitive information: secure secrets management in PowerShell
      f)
      AMSI: Defending against malicious code with PowerShell
      g) Comprehensive logging: auditing and monitoring your PowerShell scripts

  • Module 11: Threat Hunting with AI Support

    • September 11, 2025

      a) Introduction to threat hunting and AI in cybersecurity
      b) Leveraging AI to detect anomalies and threats
      c) Automating threat hunting with machine learning
      d) Using AI-powered tools for real-time threat detection

  • Module 12: Cyber Threat Intelligence

    • September 25, 2025

      Students will become familiar with threat intelligence and modeling. Further, they will learn how to use open-source intelligence tools and techniques. During this module CQURE Experts will present different patterns attacks.

      a) Threat Intelligence, Assessment and Threat Modeling
      b) Open-Source Intelligence Tools and Techniques
      c) Patterns of Attack

  • Module 13: Mastering Monitoring Operations in Azure

    • October 30, 2025

      a) Microsoft 365 Security from SOC Analyst perspective
      b) Microsoft 364 Defender for Endpoint – EDR story
      c) Detection and response with Sentinel – Let’s attack Contoso network

  • Module 14: Boosting your Penetration Testing Skills

    • November 13, 2025

      a) From zero to domain admin almost always working exploitation techniques and discovery
      b) Advanced network penetration testing
      c) Bypassing modern security controls
      d) Reporting and remediation strategies in penetration testing

  • Module 15: Defending against threats with SIEM Plus XDR

    • November 27, 2025

      a) Intro with Unified Security Operation with Defender XDR, Microsoft Sentinel and Security Copilot in the Defender XDR portal
      b) Configuring and managing Microsoft Defender XDR and integration with Defender Family
      c) Configuring and managing Microsoft Sentinel
      d) Configuring and managing Security Copilot
      e) Automated investigation and incident response with Microsoft Sentinel, Microsoft Defender XDR and Security Copilot
      f) Automatic attack disruption in Microsoft Defender XDR and SOC optimization
      g) Threat Hunting through attack chain with Defender XDR

  • Module 16: Implementing Secure Entra ID

    • December 11, 2025

      a) Entra ID security settings
      b) Entra ID identity protection
      c) Entra ID privileged identity management (PIM)
      d) Entra ID password protection

Who is it for?

This is an advanced, 12-month learning online program for Cybersecurity Specialists who would love to explore new dimensions of cybersecurity or ambitious geeks who would like to take on a challenge.

Ambitious beginners in cybersecurity

If you are a beginner with 1-2 years experience in cybersecurity, challenges define who you are. This training will hone your skills to detect today’s sophisticated cyberattacks and accelerate your career prospects in the field.

Specialists in IT

If you have 4-5 years experience in IT and want to spin off into cybersecurity, this training will give you all the relevant foundation and specialist skillsets to carve an exciting new career in cybersecurity

Cybersecurity Specialists

This program is relevant for specialists with 3-5 years and more. You will polish up your skills, learn the most current tools and techniques relevant for the newest systems, and boost your reputation.

How persuade your manager that this course is meaningful?

Investing in knowledge is one of the most worthy investment not only for us, but also for our environment. Learning new skills and insights in terms of cybersecurity may benefit with gaining awareness and as a result, may prevent falling a victim to cyber threats in the future.

Protects the Company

You will be the valuable element in regards to company’s safety – knowing about potential threats and ways of avoiding them may be incredibly useful in a daily company life.

Improves Employees skills

Not only your company will gain a specialist in terms of cybersecurity, but also you will unlock the door for expanding your skills horizon even further.

Boosts customer confidence

Completed course with personal certification may be the perfect advantage when it comes to business.

Helps comply with regulations

Knowledge is power – it can be incredibly helpful in…

Saves money in the long run

Who would have want to pay regularly for help in case of emergency data leakage in a company? It’s much better to educate the employees and prevent any cybersecurity risks.

Prepares for emerging threats

After our course, you will be educated in the possible threats and you will identify any suspicious activity online with ease.

Register now and learn from the best!

Take your cybersecurity journey to a whole new level with our live certified online course – a complete learning path, which consists of the 16 most important skills for any cybersecurity professional.

This program designed by CQURE Experts will keep you on top of the latest developments in this ever-changing industry.

    • Get 128 hours of live workshops and access to the recordings.
    • Demo-intensive content from real case scenarios.
    • 12-month access to the course content.
    • Pre-work and home assignments.

FAQ

  • What happens if I sign up for the program in May, will I be able to access the previous modules?

    Yes, you can sign up for the whole program at your preferred time and you will get access to all the materials and course recordings from the previous months.

  • If I sign up just for one skill, will I have the access to the discord channel?

    Yes, there will be a different discord channel for each of the modules. Moreover, you will have access to #general channel where all CMAP24 students have access – no matter how many modules they have decided to enroll into.

  • If I sign up for one skill, can I access the next module?

    All of the skills are purchased separately, if you decide to sign up for one skill then you can always buy access to any additional one to boost your knowledge.

  • If I sign up for one workshop and decide that I would like to take the whole program afterwards, will I be charged the full price?

    You will not be charged for the module that you have already for, only for the difference.

  • Is the final exam obligatory?

    The final exam is not mandatory and you will receive a certificate of completion without it, however with passing the exam your certification will be higher and you will receive the Cybersecurity Master Certificate.

  • Do I need to have any entry knowledge before signing up for the CMAP?

    Basic understanding of the IT technologies is something that you should have in order to follow with the class; however all the necessary skills come with the pre-work assignment that is provided before each module, and a post-work assignment to consolidate newly gained knowledge. Please explore our curriculum for more information on what this Program is about.

  • How does the delivery of each Module look like?

    Firstly, you receive the pre-work materials on the subject that will help you with the understanding of the live workshop that comes afterward. The live workshop will be delivered on the Zoom platform and it will last 8 hours including breaks. After the workshop concludes, you will receive the post-work materials/assignments along with a test. You will also be granted access to a dedicated Discord server.

  • Can I buy the whole CMAP program and share the skills among my colleagues?

    The CMAP program can only be accessed per person, and the access to individual workshops cannot be shared or distributed across other people. You are, however, more than welcome to teach your fellow colleagues what you have learned here.

  • Will there be a new CMAP program next year?

    Yes, we will be releasing the new program next year – all the skills will be updated with the latest technology upgrades.

Your Experts

This course is delivered by one of the greatest, world-renowned Cybersecurity Experts with practical knowledge from tons of successful projects, many years of real-world experience, great teaching skills and no mercy for misconfigurations or insecure solutions.

Paula

Januszkiewicz

Founder & CEO, Microsoft Regional Director, MVP, MCT

Paula is a world-class Cybersecurity Expert with over 19 years of experience in the field. She is often a top-rated speaker at the world biggest conferences as her unique stage presence is always well-received among diverse audiences. To top it all, she has the access to the source code of Windows!

Michael

Grafnetter

Windows Security Expert, MVP, MCT, CEI, MCP

Cybersecurity Expert on Windows Security, Microsoft Azure and PowerShell with over 11 years of experience in teaching IT professionals, the author of the DS Internals PowerShell module.

Sami

Laiho

Windows OS Expert, MVP

Sami is one of the world’s leading professionals in the Windows OS troubleshooting and security. Sami has been working with and teaching OS troubleshooting, management, and security for more than 25 years. In the past, Sami’s two sessions were evaluated as the Top 2 sessions (out of 1700+ sessions) at Microsoft Ignite in Orlando.

Piotr

Pawlik

Cybersecurity Expert, MCITP, MCTS

System Engineer and Unified Communications Expert. His areas of expertise includes Microsoft Private Cloud, Microsoft Public Cloud (Office 365 and Azure), Microsoft Exchange Server 2010/2013, Lync Server 2010/2013, Office Communications Servers and Windows Server family.

Damian

Widera

Data Platform MVP, MCT, Software Engineer, Cybersecurity Expert

Software engineer with over 20 years of professional experience in all aspects of data platform development. In 2022, for the 14th time, he has been awarded Microsoft’s Data Platform MVP. He holds various Microsoft Certifications since 2004.

Amr

Thabet

Cybersecurity Expert

Amr is a malware researcher and incident handler with over 12 years of experience, he worked in some of the Fortune 500 companies. He is the author of “Mastering Malware Analysis”.

How can we help you?

Suggested searches

    Search history

      Popular searches:

      Not sure what course to look for?

      Mobile Newsletter Form