SlideShare a Scribd company logo
Hacker	Academy	Ltd.	
LONDON	|	UK	
Hacker	Academy	Ltd	
COURSES	CATALOGUE
2	
TABLE	OF	CONTENTS	
Basic	Level	Courses	.....................................................................................................................................	3	
1.	 Information	Security	Awareness	for	End	Users	............................................................................	3	
2.	 Information	Security	Awareness	for	Managers	............................................................................	4	
3.	 Social	Engineering:	Attack	and	Defence	Methods	.......................................................................	5	
Intermediate	Level	Courses	........................................................................................................................	6	
1.	 ISO	27001	Information	Security	Management	System	Implementation	.....................................	6	
2.	 Cyber	Incident	Response	Team	Setup	and	Management	............................................................	7	
3.	 Microsoft	Systems	Security	...........................................................................................................	8	
4.	 Linux	Security	................................................................................................................................	9	
5.	 TCP/IP	Network	Security	.............................................................................................................	10	
6.	 Active	Network	Device	Security	..................................................................................................	11	
7.	 System	Security	Audit	.................................................................................................................	12	
Advanced	Level	Courses	...........................................................................................................................	13	
1.	 Oracle	Database	Security	............................................................................................................	13	
2.	 MS	SQL	Server	Database	Security	...............................................................................................	14	
3.	 Web	Applications	Security	..........................................................................................................	15	
4.	 Security	Information	and	Event	Management	Systems	.............................................................	16	
5.	 Penetration	Testing	and	Ethical	Hacking	....................................................................................	17	
Master	Level	Courses	...............................................................................................................................	18	
1.	 Computer	Forensics	Basics	.........................................................................................................	18	
2.	 Network	Forensics	.......................................................................................................................	19	
3.	 Secure	Software	Development	...................................................................................................	20
3	
BASIC	LEVEL	COURSES	
1. INFORMATION	SECURITY	AWARENESS	FOR	END	USERS		
Who	Should	Attend?		
Users	of	information	systems.		
Prerequisites		
None.		
Course	Syllabus		
• Role	of	user	in	information	security
	
• Contribution	of	user	to	corporate	Information	Security	Management	System	
(ISMS)		
• Access	to	computers
	
• Password	security
	
• E-mail	security
	
• Security	while	accessing	the	Internet
	
• Virus	protection
	
• Setup,	use	and	disposal	of	storage	media
	
• File	access	and	sharing
	
• Information	backup
	
• Social	engineering
	
• User	responsibilities	in	computer	incidents		
Duration		
3	hours		
Benefits		
Attendees	will	become	familiar	with	the	basics	of	information	security	and	will	
enhance	their	awareness	about	the	importance	of	corporate	information	security	as	
well.	They	will	learn	their	duties	and	responsibilities	as	a	contributor	to	a	corporate	
ISMS.
4	
2. INFORMATION	SECURITY	AWARENESS	FOR	MANAGERS	
	Who	Should	Attend?		
Managers,	staff	who	wants	to	know	much	about	information	security.		
Prerequisites		
Basic	information	systems’	knowledge.		
Course	Syllabus		
• Basic	concepts	of	information	security		
• Security	policy
	
• Organizational	security
	
• Human	resource	security		
• Risk	assessment	and	risk	mitigation
	
• Business	continuity
	
• Information	security	incident	management
	
• Operating	system	security
	
• Network	security
	
• Web	security
	
• Digital	certificates	and	certificate	distribution	systems		
• Password	management
	
• Antivirus	systems		
Duration		
2	days		
Benefits		
Attendees	will	obtain	information	about	the	basic	concepts	of	information	security	
and	overall	functioning	of	ISMS.	Introduction	will	be	made	based	on	the	technical	
aspects	of	information	systems	security.
5	
3. SOCIAL	ENGINEERING:	ATTACK	AND	DEFENCE	METHODS		
Who	Should	Attend?		
All	information	system	users,	especially	the	system	administrators.		
Prerequisites		
None.		
Course	Syllabus		
• “Social	engineering”	concept
	
• Attack	techniques
	
• Examples	of	social	engineering	attacks		
• Social	engineering	tests
	
• Prevention	methods
	
• Several	social	engineering	applications		
Duration		
2	days		
Benefits		
Attendees	will	become	familiar	with	the	social	engineering	attacks,	which	are	quite	
common	and	may	lead	to	loss	of	confidential	information	or	even	the	reputation	of	an	
institution.		
Attendees	will	acquire	the	capacity	of	offering	social	engineering	trainings	as	well.
6	
INTERMEDIATE	LEVEL	COURSES	
1. ISO	27001	INFORMATION	SECURITY	MANAGEMENT	SYSTEM	IMPLEMENTATION		
Who	Should	Attend?		
IT	Security	Centre	Personnel,	Auditors,	Cyber	Security	Experts,	IT	Personnel	to	be	
audited	under	ISO	27001.
	
Prerequisites
	
Familiarity	with	quality	management	systems	is	helpful	but	is	not	a	requisite.		
Course	Syllabus		
• What	is	an	ISMS	and	why	is	it	needed?
	
• “Plan-Do-Check-Act”	process	in	ISO	27001
	
• Risk	assessment	and	treatment	in	information	systems		
• ISO	27001	control	categories
-	Information	security	policies
	
- Organization	of	information	security
	
- Human	resources	security
	
- Asset	management
	
- Access	control
	
- Cryptography
	
- Physical	and	environmental	security
	
- Operational	security
	
- Communications	security
	
- System	acquisition,	development	and	maintenance
	
- Supplier	relationships
	
- Information	security	incident	management
	
- Information	security	aspects	of	business	continuity	management		
- Compliance		
• ISO	27001	conformance	audit	-	Audit	planning		
- Audit	checklists
-	Non-conformances	and	reporting		
• Several	applications		
Duration		
3	days		
Benefits		
Attendees	will	be	able	to	establish	ISMS	in	their	institutions.	Attendees	will	also	be	
acquainted	with	audit	concepts.
7	
2. CYBER	INCIDENT	RESPONSE	TEAM	SETUP	AND	MANAGEMENT	
Who	Should	Attend?		
CERT	(Computer	Emergency	Response	Team),	IT	Security	Centre	Personnel,	Cyber	
Security	Experts.		
Prerequisites		
Experiences	both	in	business	processes	and	information	systems.		
Course	Syllabus		
• Introduction	(History,	computer	incident	examples,	CERT	and	security	
organization	examples)
	
• CERT	basics		
• Computer	incident	management	process	(incident	management	service	
definition	and	functions)
	
• Operational	components	of	CERT	(software,	hardware,	policy	and	procedures)		
• CERT	project	plan		
Duration		
2	days		
Benefits		
Objective	of	the	training	is	to	elevate	the	level	of	course	attendees	to	a	position	
where	they	can	establish	CERTs	in	their	institutions.
8	
3. MICROSOFT	SYSTEMS	SECURITY		
Who	Should	Attend?		
Windows	Network	Administrators,	MS	AD	Administrators,	IIS/Exchange	
Administrators,	IT	Security	Centre	Personnel.		
Prerequisites		
Basic	knowledge	of	Microsoft	systems.		
Course	Syllabus		
• Microsoft	Web	Services	Security
	
• Microsoft	“PowerShell”
	
• Active	Directory	and	Network	Services	Security	(Group	policy,	DNS,	DHCP)		
• Patch	management	in	Microsoft	systems		
Duration		
4	days		
Benefits		
Attendees	will	acquire	advance	level	information	within	the	scope	of	Microsoft	
systems	security.	They	will	have	the	capability	to	apply	Microsoft	systems	security	
best	practices	in	their	institutions.
9	
4. LINUX	SECURITY		
Who	Should	Attend?		
Linux	System	Administrators,	IT	Security	Centre	Personnel.		
Prerequisites		
Linux	administration	knowledge.		
Course	Syllabus		
• Secure	setup
	
• Configuration	of	startup	services		
• Secure	configuration	of	kernel
	
• File	system	access	control
	
• User	access	control
	
• Management	of	system	logs
	
• Security	audit	tools
	
• Security	hardening	tools
	
• Security	script	programming		
Duration		
3	days		
Benefits		
Attendees	will	be	able	to	realize	the	security	hardening	of	Linux	based	operating	
systems.	They	will	acquire	ability	to	use	free	software	security	tools	on	their	systems.	
They	will	also	acquire	capability	of	using	or	developing	tools	that	will	help	them	
discover	security	breaches	in	their	systems.
10	
5. TCP/IP	NETWORK	SECURITY		
Who	Should	Attend?		
IT	Security	Centre	Personnel,	Auditors,	Cyber	Security	Experts,	Site	or	System	
Managers,	Network	Administrators.		
Prerequisites		
Basic	knowledge	of	networks.		
Course	Syllabus		
• Protocols	of	the	TCP/IP	protocol	stack
	
• Operation	principles	of	different	layers	of	the	TCP/IP	stack	and	threats	
targeting	these	layers
	
• Security	vulnerabilities	of	TCP/IP	protocols	and	mitigation	techniques
	
• Techniques,	protocols	and	devices	that	are	used	to	assure	network	security		
• Packet	capturing	software	such	as	Wireshark,	analysis	of	packets	and	
protocols
	
• Concepts	such	as	SSL,	IPSec,	VPN	and	digital	certificates
	
• Network	components	such	as	Firewall,	IDS/IPS	and	Proxy		
Duration		
2	days		
Benefits		
Applied	work	about	the	security	of	TCP/IP	networks	will	bring	a	wealth	of	information	
and	capabilities	to	the	attendees.	The	attendees	are	expected	to	apply	good	security	
practices	in	their	institutions’	network.
11	
6. ACTIVE	NETWORK	DEVICE	SECURITY		
Who	Should	Attend?		
System	and	network	administrators,	IT	Security	Centre	Personnel,	Auditors,	Cyber	
Security	Experts.
	
Prerequisites
	
Basic	knowledge	of	networks.		
Course	Syllabus		
• Within	the	scope	of	(hardening	of)	active	devices,	network	design	and	assuring	
the	security	of	networks,	the	following	topics	will	be	studied	theoretically	with	
hands-on	exercises.
	
• Steps	toward	hardening	of	active	devices	that	are	commonly	used	today	in	the	
internal	networks	and	they	are	also	used	to	connect	networks	to	the	outside	
world,	such	as
	
- Backbone	switch,		
- Router,
	
- Firewall,
	
- Content	filter		
• Security	controls	applicable	to	active	devices,	such	as		
- Physical	security,		
- Equipment	security,
	
- Identity	authentication,
	
- Authorization	and	monitoring,
	
- Patch	management,
	
- Access	control	lists,
	
- Remote	management	control,	etc.		
Duration		
2	days		
Benefits		
The	attendees	are	expected	to	learn	security	controls	applicable	to	active	network	
devices	through	the	theoretical	and	the	applied	parts	of	the	course.	The	attendees	are	
also	expected	to	apply	these	security	controls	in	their	institutions.
12	
7. SYSTEM	SECURITY	AUDIT		
Who	Should	Attend?		
Information	technology	auditors,	information	security	experts	eager	to	enhance	their	
system	security	audit	abilities,	system	and	network	administrators.		
Prerequisites		
Basic	network	and	operating	system	(Windows	and	Unix)	information,	familiarity	with	
peripheral	protection	systems.		
Course	Syllabus		
• Vulnerability	and	threat	definitions
	
• Open	source	security	vulnerability	scanners	and	how	to	use	them		
• Discovering	the	topology	of	a	network
	
• Peripheral	protection	systems	audit
	
• Windows	audit
	
• Audit	of	Unix/Linux	systems		
Duration		
4	days		
Benefits		
Attendees	will	learn	how	to	use	security	vulnerability	scanners.	Attendees	will	also	
learn	how	to	conduct	security	audit	of	operating	systems,	peripheral	protection	
systems	and	web	applications.
13	
ADVANCED	LEVEL	COURSES	
1. ORACLE	DATABASE	SECURITY		
Who	Should	Attend?		
Database	administrators,	database	security	auditors.		
Prerequisites		
Database	management	basics.		
Course	Syllabus		
• Database	basics
	
• Identity	control
	
• Access	control	lists
	
• Database	security	audits
	
• Network	security
	
• Database	backup
	
• Audit	of	access	tools
	
• Advanced	security	measures		
Duration		
3	days		
Benefits		
At	the	end	of	the	course,	participants	will	be	able	to	conduct	security	audit	of	
databases	and	managers	will	be	able	to	implement	secure	management	of	databases.
14	
2. MS	SQL	SERVER	DATABASE	SECURITY		
Who	Should	Attend?		
Database	administrators,	database	security	auditors.		
Prerequisites		
Database	management	basics.		
Course	Syllabus		
• SQL	Server,	general	topics
	
• Operating	system	configuration
	
• Network	configuration
	
• SQL	Server	setup	and	maintenance
	
• SQL	Server	configuration
	
• Access	control	and	authorization
	
• Audit	and	log	management
	
• Backup	and	disaster	recovery	procedures		
• Replication
	
• Software	application	development
	
• “Surface	Area	Configuration”	tool
	
• SQL	Server	test	and	monitoring	tools		
Duration		
3	days		
Benefits		
At	the	end	of	the	course,	attendees	will	learn	SQL	Server	database	security	
mechanisms	and	factors	affecting	security.	They	will	gain	ability	to	conduct	security	
audit	of	an	SQL	Server	database.	Database	managers,	in	the	meantime,	will	learn	how	
to	manage	their	database	securely.
15	
3. WEB	APPLICATIONS	SECURITY		
Who	Should	Attend?		
Web	Application	Developers,	Web	Site	Admins,	IT	Security	Centre	Personnel,	Auditors,	
Cyber	Security	Experts.		
Prerequisites		
Basic	knowledge	of	web	technologies.		
Course	Syllabus		
• Information	gathering
	
• Configuration	management	flaws	
• Input	/	output	manipulation	
- Cross	Site	Scripting	(XSS)	
- Injection	flaws:	SQL	Injection,	OS	command	injection	etc.	
• User	authentication	flaws
	
• Authorization	flaws
	
• Session	management	flaws	
- Session	fixation	
- Session	hijacking	
- Cross	Site	Request	Forgery	(CSRF)	
	
• Application	logic
	
• Log	management
	
• Failure	management
	
• Secure	application	management		
Duration		
2	days		
Benefits		
The	attendees	will	learn	important	security	components	of	HTTP	based	applications,	
most	common	mistakes,	how	to	avoid	making	these	mistakes	and	how	to	assure	
sustainable	application	security.
16	
4. SECURITY	INFORMATION	AND	EVENT	MANAGEMENT	SYSTEMS		
Who	Should	Attend?		
IT	Security	Centre	Personnel,	Auditors,	Cyber	Security	Experts,	Network	
Administrators.
	
Prerequisites
	
Familiarity	with	information	system	components.		
Course	Syllabus		
• Centralized	log	management	systems
	
• Requirement	for	event	correlation	systems
	
• Advantages	of	event	correlation	systems
	
• Event	correlation	steps
	
• OSSIM	attack	correlation	systems
	
• OSSIM	overview
	
• Basic	components	of	OSSIM
	
• Tools	utilized	by	OSSIM
	
• OSSIM	setup
	
• OSSIM	component	configuration
	
• Policies
	
• Data	fusion	from	separate	components
	
• Attack	correlation
	
• System	maintenance	and	update
	
Duration
	
4	days
	
Benefits
	
Attendees	will	obtain	information	about	centralized	attack	correlation	systems.	They	
will	learn	how	to	gather	logs	being	accumulated	on	separate	security	components	
centrally,	how	to	monitor	attacks	conducted	from	an	internal	or	an	external	network	
and	take	necessary	steps	against	an	attack.
17	
5. PENETRATION	TESTING	AND	ETHICAL	HACKING		
Who	Should	Attend?		
IT	Security	Centre	Personnel,	Auditors,	Cyber	Security	Experts,	Site	or	System	
Managers.
	
Prerequisites
	
None.	Basic	knowledge	of	networks	is	a	plus.		
Course	Syllabus
	
• Introduction	(What	is	“Penetration	test”?	Crucial	points	before,	during	and	
after	penetration	tests	and	penetration	test	methodologies)
	
• Discovery	(Discovery	categories.	Applied	nmap	exercise;	port	scanning,	service	
and	operating	system	discovery,	etc.)
	
• Vulnerability	discovery	(Vulnerability	concept.	Nessus	exercise;	policy	
designation,	scanning	and	vulnerability	analysis)
	
• Exploit	(Exploit	and	payload	concepts.	Metasploit	exercise;	msfconsole,	
meterpreter,	post-exploit	and	auxiliary	modules,	etc.)
	
• Network	penetration	tests	and	layer	2	attacks	(Network	sniffing,	MAC	table	
flooding,	ARP	poisoning,	VLAN	hopping,	DHCP	IP	pool	exhaustion	attacks)
	
• External	network	tests	and	information	gathering	(Active	and	passive	
information	gathering,	“Google	hacking”,	etc.)
	
• Social	engineering	(Using	e-mail	and	telephone.	Customized	payload	and	
malware	generation	–	macro,	pdf	and	exe.	“Relay”	vulnerability.	“Post-	
exploitation”)
	
• Web	application	tests	(Input-output	detection,	XSS	and	SQL-i	attacks)		
Duration
	
5	days
	
Benefits
	
Attendees	will	be	able	to	participate	and	contribute	to	penetration	tests.
18	
MASTER	LEVEL	COURSES	
1. COMPUTER	FORENSICS	BASICS	
Who	Should	Attend?		
IT	Security	Centre	Personnel,	Auditors,	CERT	members.		
Prerequisites		
Basic	knowledge	of	Linux	and	Windows	operating	systems.		
Course	Syllabus		
• Computer	incident	response
	
• Preliminary	stages	of	computer	analysis
	
• Information	about	NTFS,	FAT32,	ext2,	ext3	file	systems	(how	files	are	opened,	
saved	and	deleted	in	these	systems)
	
• Non-volatility	of	data	in	different	components	of	a	computer	(RAM,	“Stack”	
area,	hard	disks	etc.)	Data	storage	and	retrieval	from	these	components
	
• Conducting	computer	analysis	on	a	Linux	system	and
presentation	of	related	
tools
	
• In	the	applied	part	of	the	course,	setting	up	the	analysis	environment
and	
conducting,	with	tools,	the	analysis	of	a	suspected	file
	
• Conducting	computer	analysis	on	a	Windows	system	and
presentation	of	
related	tools		
Duration		
3	days		
Benefits		
Attendees	will	be	able	to	conduct	computer	analysis	on	their	own.
19	
2. NETWORK	FORENSICS	
Who	Should	Attend?		
I	T	Security	Centre	Personnel,	Auditors,	CERT	members,	Network	and	System	
Administrators.
	
Prerequisites
	
Basic	knowledge	of	TCP/IP,	networks,	Linux	and	Windows	operating	system.		
Course	Syllabus		
The	following	topics	will	be	covered	in	order	to	conduct	incident	analysis	without	
referring	to	storage
components	such	as	hard	disks	and	RAM.	Another	objective	is	to	
detect	incidents	and	malicious	network	traffic	exploiting	incorrect	configuration	of	
network	components.		
• Foundations	of	traffic	analysis
	
• Network	packet	capturing	technologies:	Hardware,	software	and	tools
	
• Basic	network	protocols	and	components
	
• Network	security	component	log	analysis:	Logs	of	firewalls,	intrusion	detection	
and	prevention	systems,	etc.
	
• Analysis	of	network	protocols	(HTTP,	SMTP,	DNS	etc.)
	
• Deep	packet	inspection
	
• Detection	of	malicious	network	traffic:	“Man	in	the	middle	attack”,	“DNS	cache	
poisoning”	etc.	attacks		
• Detection	of	network	traffic	tunnelling	techniques:	DNS,	ICMP,	SSH	tunnelling	
etc.		
• Analysis	of	encrypted	network	traffic:	“SSL	traffic	listening”	technique
	
• Reconstruction	of	network	traffic	to	obtain	original	data
	
• Network	flow	analysis
	
Duration
	
4	days
	
Benefits
	
Attendees	will	be	able	to	conduct	network	traffic	analysis	and	to	collect	evidence	
without	accessing	storage	components.	They	will	also	be	able	to	detect	malicious	
network	traffic	and	security	incidents	deriving
from	components.
20	
3. SECURE	SOFTWARE	DEVELOPMENT		
Who	Should	Attend?		
Software	developers/engineers,	software	project	managers,	software	quality	control	
staff.		
Prerequisites		
Intermediate	experience	with	programming.		
Course	Syllabus		
• Security	problems	of	software
	
• Security	problems	of	technology	components	where	software	is	running
	
• Basic	elements	of	secure	software	development	process
	
• How	to	integrate	a	secure	software	development	lifecycle	to	a	software	
development	process
	
• Source	code	samples,	demonstrating	most	common	vulnerabilities	and	how	to	
prevent	them
	
• Technology	that	maybe	applied	to	assure	secure	operation	of	components	
such	as	application	server	and	database	where	software	is	running,	since	
software	depends	on	these	systems.		
Duration		
3	days		
Benefits		
Attendees	will	learn	basic	secure	coding	principles,	secure	software	design	and	
development,	threat	modelling	and	principles	of	security	tests.

More Related Content

What's hot

708studyguide
708studyguide708studyguide
708studyguide
YAWAR HASSAN KHAN
 
711studyguide
711studyguide711studyguide
711studyguide
YAWAR HASSAN KHAN
 
NVQ 6 Electrical Technology Industrial Training Report
NVQ 6 Electrical Technology Industrial Training ReportNVQ 6 Electrical Technology Industrial Training Report
NVQ 6 Electrical Technology Industrial Training Report
pathumsandaruwan3
 
1 contents about_book
1 contents about_book1 contents about_book
1 contents about_book
Ratchanee Sangkaew
 
Ibm mobile first in action for mgovernment and citizen mobile services red
Ibm mobile first in action for mgovernment and citizen mobile services redIbm mobile first in action for mgovernment and citizen mobile services red
Ibm mobile first in action for mgovernment and citizen mobile services red
bupbechanhgmail
 
Sun blackboardwp10 1_07
Sun blackboardwp10 1_07Sun blackboardwp10 1_07
Sun blackboardwp10 1_07
Steve Feldman
 
713studyguide
713studyguide713studyguide
713studyguide
YAWAR HASSAN KHAN
 
Gstar cad 2018 user guide
Gstar cad 2018 user guideGstar cad 2018 user guide
Gstar cad 2018 user guide
Eleftheria Zoaki
 
Industrial Training Report - SLT
Industrial Training Report - SLTIndustrial Training Report - SLT
Industrial Training Report - SLT
sivakumar haameshan
 
Mini CNC (Router Machine)
Mini CNC (Router Machine)Mini CNC (Router Machine)
Mini CNC (Router Machine)
Amir Dawa
 
Ecdl l2 project2013_sample
Ecdl l2 project2013_sampleEcdl l2 project2013_sample
Ecdl l2 project2013_sample
Qassim Ahmed
 
Spring tutorial
Spring tutorialSpring tutorial
Spring tutorial
mamog
 
User_Manual
User_ManualUser_Manual
User_Manual
tutorialsruby
 
Spring Framework Upgrade
Spring Framework UpgradeSpring Framework Upgrade
Spring Framework Upgrade
v_mahesh76
 
Chip specification
Chip specificationChip specification
Chip specification
PaulValenzuela17
 
E-FREELANCING - MAJOR/FINAL YEAR PROJECT DOCUMENTATION
E-FREELANCING - MAJOR/FINAL YEAR PROJECT DOCUMENTATIONE-FREELANCING - MAJOR/FINAL YEAR PROJECT DOCUMENTATION
E-FREELANCING - MAJOR/FINAL YEAR PROJECT DOCUMENTATION
PIYUSH Dubey
 
Why You Aren't Eligible for Social Security, Form #06.001
Why You Aren't Eligible for Social Security, Form #06.001Why You Aren't Eligible for Social Security, Form #06.001
Why You Aren't Eligible for Social Security, Form #06.001
Sovereignty Education and Defense Ministry (SEDM)
 
Tech Indicators E Book
Tech Indicators E BookTech Indicators E Book
Tech Indicators E Book
accsnet1
 
Vmoduser
VmoduserVmoduser
Vmoduser
Ronald Escobar
 
47396377 m2000-operation-guide
47396377 m2000-operation-guide47396377 m2000-operation-guide
47396377 m2000-operation-guide
mahrane trabelsi
 

What's hot (20)

708studyguide
708studyguide708studyguide
708studyguide
 
711studyguide
711studyguide711studyguide
711studyguide
 
NVQ 6 Electrical Technology Industrial Training Report
NVQ 6 Electrical Technology Industrial Training ReportNVQ 6 Electrical Technology Industrial Training Report
NVQ 6 Electrical Technology Industrial Training Report
 
1 contents about_book
1 contents about_book1 contents about_book
1 contents about_book
 
Ibm mobile first in action for mgovernment and citizen mobile services red
Ibm mobile first in action for mgovernment and citizen mobile services redIbm mobile first in action for mgovernment and citizen mobile services red
Ibm mobile first in action for mgovernment and citizen mobile services red
 
Sun blackboardwp10 1_07
Sun blackboardwp10 1_07Sun blackboardwp10 1_07
Sun blackboardwp10 1_07
 
713studyguide
713studyguide713studyguide
713studyguide
 
Gstar cad 2018 user guide
Gstar cad 2018 user guideGstar cad 2018 user guide
Gstar cad 2018 user guide
 
Industrial Training Report - SLT
Industrial Training Report - SLTIndustrial Training Report - SLT
Industrial Training Report - SLT
 
Mini CNC (Router Machine)
Mini CNC (Router Machine)Mini CNC (Router Machine)
Mini CNC (Router Machine)
 
Ecdl l2 project2013_sample
Ecdl l2 project2013_sampleEcdl l2 project2013_sample
Ecdl l2 project2013_sample
 
Spring tutorial
Spring tutorialSpring tutorial
Spring tutorial
 
User_Manual
User_ManualUser_Manual
User_Manual
 
Spring Framework Upgrade
Spring Framework UpgradeSpring Framework Upgrade
Spring Framework Upgrade
 
Chip specification
Chip specificationChip specification
Chip specification
 
E-FREELANCING - MAJOR/FINAL YEAR PROJECT DOCUMENTATION
E-FREELANCING - MAJOR/FINAL YEAR PROJECT DOCUMENTATIONE-FREELANCING - MAJOR/FINAL YEAR PROJECT DOCUMENTATION
E-FREELANCING - MAJOR/FINAL YEAR PROJECT DOCUMENTATION
 
Why You Aren't Eligible for Social Security, Form #06.001
Why You Aren't Eligible for Social Security, Form #06.001Why You Aren't Eligible for Social Security, Form #06.001
Why You Aren't Eligible for Social Security, Form #06.001
 
Tech Indicators E Book
Tech Indicators E BookTech Indicators E Book
Tech Indicators E Book
 
Vmoduser
VmoduserVmoduser
Vmoduser
 
47396377 m2000-operation-guide
47396377 m2000-operation-guide47396377 m2000-operation-guide
47396377 m2000-operation-guide
 

Similar to Hacker Academy Training Catalogue

It project development fundamentals
It project development fundamentalsIt project development fundamentals
It project development fundamentals
Universidad Tecnológica de México - UNITEC
 
FCC Interop Board Final Report 05 22 12
FCC Interop Board Final Report 05 22 12FCC Interop Board Final Report 05 22 12
FCC Interop Board Final Report 05 22 12
Claudio Lucente
 
E participation study
E participation study E participation study
OpenScape Contact Center Enterprise V10 Manager Administration Guide Administ...
OpenScape Contact Center Enterprise V10 Manager Administration Guide Administ...OpenScape Contact Center Enterprise V10 Manager Administration Guide Administ...
OpenScape Contact Center Enterprise V10 Manager Administration Guide Administ...
EnriqueJoseCaleroGal
 
Europe’s Digital Competitiveness Report
Europe’s Digital Competitiveness ReportEurope’s Digital Competitiveness Report
Europe’s Digital Competitiveness Report
Victor Gridnev
 
Sap
SapSap
Fingerprint Biometrics vulnerabilities
Fingerprint Biometrics vulnerabilitiesFingerprint Biometrics vulnerabilities
Fingerprint Biometrics vulnerabilities
Farhan Liaqat
 
Industry 4.0 Final Report, National Academy of Science and Engineering of Ger...
Industry 4.0 Final Report, National Academy of Science and Engineering of Ger...Industry 4.0 Final Report, National Academy of Science and Engineering of Ger...
Industry 4.0 Final Report, National Academy of Science and Engineering of Ger...
Asia Pacific Intellectual Capital Centre Ltd
 
Отчет из Германии о 4й промышленной революции
Отчет из Германии о 4й промышленной революции Отчет из Германии о 4й промышленной революции
Отчет из Германии о 4й промышленной революции
Sergey Zhdanov
 
Thesis writing
Thesis writingThesis writing
Thesis writing
Moktar Awang
 
Securing your mobile business with ibm worklight
Securing your mobile business with ibm worklightSecuring your mobile business with ibm worklight
Securing your mobile business with ibm worklight
bupbechanhgmail
 
This is
This is This is
This is
kaykaykay12
 
NaturNet Plus Book (part 1)
NaturNet Plus Book (part 1)NaturNet Plus Book (part 1)
NaturNet Plus Book (part 1)
NaturNetPlus
 
Sandrine debetaz
Sandrine debetazSandrine debetaz
Sandrine debetaz
Amit Agrawal
 
Arc flash publication
Arc flash publicationArc flash publication
Arc flash publication
Wilson Pavão
 
Irisbond Primma User Guide
Irisbond Primma User GuideIrisbond Primma User Guide
Irisbond Primma User Guide
IRISBOND
 
Assessment Report
Assessment ReportAssessment Report
Master_Thesis
Master_ThesisMaster_Thesis
Master_Thesis
Kieran Flesk
 
actix-troubleshooting-and-optimizing-umts-network
actix-troubleshooting-and-optimizing-umts-networkactix-troubleshooting-and-optimizing-umts-network
actix-troubleshooting-and-optimizing-umts-network
Rohit Joshi
 
FYP_enerScope_Final_v4
FYP_enerScope_Final_v4FYP_enerScope_Final_v4
FYP_enerScope_Final_v4
Hafiiz Osman
 

Similar to Hacker Academy Training Catalogue (20)

It project development fundamentals
It project development fundamentalsIt project development fundamentals
It project development fundamentals
 
FCC Interop Board Final Report 05 22 12
FCC Interop Board Final Report 05 22 12FCC Interop Board Final Report 05 22 12
FCC Interop Board Final Report 05 22 12
 
E participation study
E participation study E participation study
E participation study
 
OpenScape Contact Center Enterprise V10 Manager Administration Guide Administ...
OpenScape Contact Center Enterprise V10 Manager Administration Guide Administ...OpenScape Contact Center Enterprise V10 Manager Administration Guide Administ...
OpenScape Contact Center Enterprise V10 Manager Administration Guide Administ...
 
Europe’s Digital Competitiveness Report
Europe’s Digital Competitiveness ReportEurope’s Digital Competitiveness Report
Europe’s Digital Competitiveness Report
 
Sap
SapSap
Sap
 
Fingerprint Biometrics vulnerabilities
Fingerprint Biometrics vulnerabilitiesFingerprint Biometrics vulnerabilities
Fingerprint Biometrics vulnerabilities
 
Industry 4.0 Final Report, National Academy of Science and Engineering of Ger...
Industry 4.0 Final Report, National Academy of Science and Engineering of Ger...Industry 4.0 Final Report, National Academy of Science and Engineering of Ger...
Industry 4.0 Final Report, National Academy of Science and Engineering of Ger...
 
Отчет из Германии о 4й промышленной революции
Отчет из Германии о 4й промышленной революции Отчет из Германии о 4й промышленной революции
Отчет из Германии о 4й промышленной революции
 
Thesis writing
Thesis writingThesis writing
Thesis writing
 
Securing your mobile business with ibm worklight
Securing your mobile business with ibm worklightSecuring your mobile business with ibm worklight
Securing your mobile business with ibm worklight
 
This is
This is This is
This is
 
NaturNet Plus Book (part 1)
NaturNet Plus Book (part 1)NaturNet Plus Book (part 1)
NaturNet Plus Book (part 1)
 
Sandrine debetaz
Sandrine debetazSandrine debetaz
Sandrine debetaz
 
Arc flash publication
Arc flash publicationArc flash publication
Arc flash publication
 
Irisbond Primma User Guide
Irisbond Primma User GuideIrisbond Primma User Guide
Irisbond Primma User Guide
 
Assessment Report
Assessment ReportAssessment Report
Assessment Report
 
Master_Thesis
Master_ThesisMaster_Thesis
Master_Thesis
 
actix-troubleshooting-and-optimizing-umts-network
actix-troubleshooting-and-optimizing-umts-networkactix-troubleshooting-and-optimizing-umts-network
actix-troubleshooting-and-optimizing-umts-network
 
FYP_enerScope_Final_v4
FYP_enerScope_Final_v4FYP_enerScope_Final_v4
FYP_enerScope_Final_v4
 

Recently uploaded

一比一原版圣托马斯大学毕业证(UST毕业证书)学历如何办理
一比一原版圣托马斯大学毕业证(UST毕业证书)学历如何办理一比一原版圣托马斯大学毕业证(UST毕业证书)学历如何办理
一比一原版圣托马斯大学毕业证(UST毕业证书)学历如何办理
uqbyfm
 
Bangalore Call Girls 9079923931 With -Cuties' Hot Call Girls
Bangalore Call Girls 9079923931 With -Cuties' Hot Call GirlsBangalore Call Girls 9079923931 With -Cuties' Hot Call Girls
Bangalore Call Girls 9079923931 With -Cuties' Hot Call Girls
narwatsonia7
 
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
APNIC
 
KubeCon & CloudNative Con 2024 Artificial Intelligent
KubeCon & CloudNative Con 2024 Artificial IntelligentKubeCon & CloudNative Con 2024 Artificial Intelligent
KubeCon & CloudNative Con 2024 Artificial Intelligent
Emre Gündoğdu
 
IPv6: Unlocking the Potential, presented by Paul Wilson at CommunicAsia 2024
IPv6: Unlocking the Potential, presented by Paul Wilson at CommunicAsia 2024IPv6: Unlocking the Potential, presented by Paul Wilson at CommunicAsia 2024
IPv6: Unlocking the Potential, presented by Paul Wilson at CommunicAsia 2024
APNIC
 
Unlimited Fun With Call Girls Hyderabad ✅ 7737669865 💘 FULL CASH PAYMENT
Unlimited Fun With Call Girls Hyderabad ✅ 7737669865 💘 FULL CASH PAYMENTUnlimited Fun With Call Girls Hyderabad ✅ 7737669865 💘 FULL CASH PAYMENT
Unlimited Fun With Call Girls Hyderabad ✅ 7737669865 💘 FULL CASH PAYMENT
keshavtiwari584
 
Unlimited Short Call Girls Mumbai ✅ 9833363713 FULL CASH PAYMENT
Unlimited Short Call Girls Mumbai ✅ 9833363713 FULL CASH PAYMENTUnlimited Short Call Girls Mumbai ✅ 9833363713 FULL CASH PAYMENT
Unlimited Short Call Girls Mumbai ✅ 9833363713 FULL CASH PAYMENT
rajesh344555
 
10 Conversion Rate Optimization (CRO) Techniques to Boost Your Website’s Perf...
10 Conversion Rate Optimization (CRO) Techniques to Boost Your Website’s Perf...10 Conversion Rate Optimization (CRO) Techniques to Boost Your Website’s Perf...
10 Conversion Rate Optimization (CRO) Techniques to Boost Your Website’s Perf...
Web Inspire
 
HistorySrSec2024 daahi sadhin sgg-25.pdf
HistorySrSec2024 daahi sadhin sgg-25.pdfHistorySrSec2024 daahi sadhin sgg-25.pdf
HistorySrSec2024 daahi sadhin sgg-25.pdf
AdiySgh
 
cyber crime.pptx..........................
cyber crime.pptx..........................cyber crime.pptx..........................
cyber crime.pptx..........................
GNAMBIKARAO
 
The Principal Up-and-Coming Risks to Cloud-Based Security!
The Principal Up-and-Coming Risks to Cloud-Based Security!The Principal Up-and-Coming Risks to Cloud-Based Security!
The Principal Up-and-Coming Risks to Cloud-Based Security!
Alec Kassir cozmozone
 
India Cyber Threat Report of 2024 with year
India Cyber Threat Report of 2024 with yearIndia Cyber Threat Report of 2024 with year
India Cyber Threat Report of 2024 with year
AkashKumar1733
 
Unlimited Short Call Girls Navi Mumbai ✅ 9967824496 FULL CASH PAYMENT
Unlimited Short Call Girls Navi Mumbai ✅ 9967824496 FULL CASH PAYMENTUnlimited Short Call Girls Navi Mumbai ✅ 9967824496 FULL CASH PAYMENT
Unlimited Short Call Girls Navi Mumbai ✅ 9967824496 FULL CASH PAYMENT
rajesh344555
 
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
dtagbe
 
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
thezot
 
EASY TUTORIAL OF HOW TO USE CiCi AI BY: FEBLESS HERNANE
EASY TUTORIAL OF HOW TO USE CiCi AI BY: FEBLESS HERNANE EASY TUTORIAL OF HOW TO USE CiCi AI BY: FEBLESS HERNANE
EASY TUTORIAL OF HOW TO USE CiCi AI BY: FEBLESS HERNANE
Febless Hernane
 
Decentralized Justice in Gaming and Esports
Decentralized Justice in Gaming and EsportsDecentralized Justice in Gaming and Esports
Decentralized Justice in Gaming and Esports
Federico Ast
 
Lesson6 in spreadsheet 2024 for g12..ppt
Lesson6 in spreadsheet 2024 for g12..pptLesson6 in spreadsheet 2024 for g12..ppt
Lesson6 in spreadsheet 2024 for g12..ppt
ReyLouieSedigo1
 
DocSplit Subsequent Implementation Activation.pptx
DocSplit Subsequent Implementation Activation.pptxDocSplit Subsequent Implementation Activation.pptx
DocSplit Subsequent Implementation Activation.pptx
AmitTuteja9
 
Network Security and Cyber Laws (Complete Notes) for B.Tech/BCA/BSc. IT
Network Security and Cyber Laws (Complete Notes) for B.Tech/BCA/BSc. ITNetwork Security and Cyber Laws (Complete Notes) for B.Tech/BCA/BSc. IT
Network Security and Cyber Laws (Complete Notes) for B.Tech/BCA/BSc. IT
Sarthak Sobti
 

Recently uploaded (20)

一比一原版圣托马斯大学毕业证(UST毕业证书)学历如何办理
一比一原版圣托马斯大学毕业证(UST毕业证书)学历如何办理一比一原版圣托马斯大学毕业证(UST毕业证书)学历如何办理
一比一原版圣托马斯大学毕业证(UST毕业证书)学历如何办理
 
Bangalore Call Girls 9079923931 With -Cuties' Hot Call Girls
Bangalore Call Girls 9079923931 With -Cuties' Hot Call GirlsBangalore Call Girls 9079923931 With -Cuties' Hot Call Girls
Bangalore Call Girls 9079923931 With -Cuties' Hot Call Girls
 
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
 
KubeCon & CloudNative Con 2024 Artificial Intelligent
KubeCon & CloudNative Con 2024 Artificial IntelligentKubeCon & CloudNative Con 2024 Artificial Intelligent
KubeCon & CloudNative Con 2024 Artificial Intelligent
 
IPv6: Unlocking the Potential, presented by Paul Wilson at CommunicAsia 2024
IPv6: Unlocking the Potential, presented by Paul Wilson at CommunicAsia 2024IPv6: Unlocking the Potential, presented by Paul Wilson at CommunicAsia 2024
IPv6: Unlocking the Potential, presented by Paul Wilson at CommunicAsia 2024
 
Unlimited Fun With Call Girls Hyderabad ✅ 7737669865 💘 FULL CASH PAYMENT
Unlimited Fun With Call Girls Hyderabad ✅ 7737669865 💘 FULL CASH PAYMENTUnlimited Fun With Call Girls Hyderabad ✅ 7737669865 💘 FULL CASH PAYMENT
Unlimited Fun With Call Girls Hyderabad ✅ 7737669865 💘 FULL CASH PAYMENT
 
Unlimited Short Call Girls Mumbai ✅ 9833363713 FULL CASH PAYMENT
Unlimited Short Call Girls Mumbai ✅ 9833363713 FULL CASH PAYMENTUnlimited Short Call Girls Mumbai ✅ 9833363713 FULL CASH PAYMENT
Unlimited Short Call Girls Mumbai ✅ 9833363713 FULL CASH PAYMENT
 
10 Conversion Rate Optimization (CRO) Techniques to Boost Your Website’s Perf...
10 Conversion Rate Optimization (CRO) Techniques to Boost Your Website’s Perf...10 Conversion Rate Optimization (CRO) Techniques to Boost Your Website’s Perf...
10 Conversion Rate Optimization (CRO) Techniques to Boost Your Website’s Perf...
 
HistorySrSec2024 daahi sadhin sgg-25.pdf
HistorySrSec2024 daahi sadhin sgg-25.pdfHistorySrSec2024 daahi sadhin sgg-25.pdf
HistorySrSec2024 daahi sadhin sgg-25.pdf
 
cyber crime.pptx..........................
cyber crime.pptx..........................cyber crime.pptx..........................
cyber crime.pptx..........................
 
The Principal Up-and-Coming Risks to Cloud-Based Security!
The Principal Up-and-Coming Risks to Cloud-Based Security!The Principal Up-and-Coming Risks to Cloud-Based Security!
The Principal Up-and-Coming Risks to Cloud-Based Security!
 
India Cyber Threat Report of 2024 with year
India Cyber Threat Report of 2024 with yearIndia Cyber Threat Report of 2024 with year
India Cyber Threat Report of 2024 with year
 
Unlimited Short Call Girls Navi Mumbai ✅ 9967824496 FULL CASH PAYMENT
Unlimited Short Call Girls Navi Mumbai ✅ 9967824496 FULL CASH PAYMENTUnlimited Short Call Girls Navi Mumbai ✅ 9967824496 FULL CASH PAYMENT
Unlimited Short Call Girls Navi Mumbai ✅ 9967824496 FULL CASH PAYMENT
 
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
 
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
 
EASY TUTORIAL OF HOW TO USE CiCi AI BY: FEBLESS HERNANE
EASY TUTORIAL OF HOW TO USE CiCi AI BY: FEBLESS HERNANE EASY TUTORIAL OF HOW TO USE CiCi AI BY: FEBLESS HERNANE
EASY TUTORIAL OF HOW TO USE CiCi AI BY: FEBLESS HERNANE
 
Decentralized Justice in Gaming and Esports
Decentralized Justice in Gaming and EsportsDecentralized Justice in Gaming and Esports
Decentralized Justice in Gaming and Esports
 
Lesson6 in spreadsheet 2024 for g12..ppt
Lesson6 in spreadsheet 2024 for g12..pptLesson6 in spreadsheet 2024 for g12..ppt
Lesson6 in spreadsheet 2024 for g12..ppt
 
DocSplit Subsequent Implementation Activation.pptx
DocSplit Subsequent Implementation Activation.pptxDocSplit Subsequent Implementation Activation.pptx
DocSplit Subsequent Implementation Activation.pptx
 
Network Security and Cyber Laws (Complete Notes) for B.Tech/BCA/BSc. IT
Network Security and Cyber Laws (Complete Notes) for B.Tech/BCA/BSc. ITNetwork Security and Cyber Laws (Complete Notes) for B.Tech/BCA/BSc. IT
Network Security and Cyber Laws (Complete Notes) for B.Tech/BCA/BSc. IT
 

Hacker Academy Training Catalogue