Official Certification
Students gain official registration as technicians in a specific technology, which certifies them to practice their profession internationally. We certify our students worldwide.
- Cisco Certified Cybersecurity Associate
- Cisco Cybersecurity Operations Fundamentals (200-201 CBROPS)
Job opportunities
In a market where digital threats are growing daily, cybersecurity professionals are essential and highly valued. Companies, public administrations, and technology providers need professionals capable of monitoring, detecting, and responding to cyberattacks in real time, protecting the organization's critical systems and data. This training offers broad career opportunities, as Security Operations Centers (SOCs) operate continuously and require specialized analysts at various levels. Graduates can work as security analysts, cyber defense technicians, incident monitoring and response specialists, junior cybersecurity consultants, or intrusion detection technicians.
Through Cloud Talent The school connects you with more than 10,000 companies and generates job and internship interviews tailored to your professional profile. The Cloud Talent Program also gives you access to other complementary SAP certifications at no cost to enhance your qualifications.
Syllabus
FUNDAMENTALS OF OFFENSIVE SECURITY
Fundamentals and Basic Concepts
- Ethical principles of hacking and legal framework.
- Types of attackers, threats, and attack vectors.
- Network architecture, OSI and TCP/IP models.
- Essential protocols and services: HTTP, DNS, SMTP, FTP.
- Introduction to Linux and Windows operating systems for auditing.
- Concept of footprinting and passive vs. active recognition.
- Information gathering techniques and OSINT.
- Network and services scanning with Nmap.
- Identification of ports, services, and operating systems.
- Listing objectives and analyzing results.
Recognition and Information Gathering
Exploitation and Vulnerabilities
- Identification and analysis of common vulnerabilities (CVE, CVSS).
- Exploitation of typical vulnerabilities: SQL Injection, XSS, RCE.
- Basic use of exploitation tools and frameworks.
- Session and shell management.
- Safe practices in controlled laboratory environments.
Escalation of Privileges and Persistence
- Concepts and phases of the escalation of privileges.
- Escalation in Linux: sudoers, permissions, misconfigured scripts.
- Escalation in Windows: services, registry keys, local exploits.
- Basic persistence techniques: scheduled tasks, backdoors.
- Mitigation and traceability of post-exploitation actions.
Documentation and Best Practices
- Structure and writing of technical audit reports.
- Vulnerability classification and prioritization (VSS).
- Recommendations and remediation plan.
- Use of templates and tools for reports (OWASP, Markdown).
- Ethics, communication and good practices of the offensive professional.
FUNDAMENTALS OF DEFENSIVE SECURITY
Cybersecurity Fundamentals
- Basic concepts and CIA principles (confidentiality, integrity, availability).
- Overview of threats and actors (internal and external).
- Regulatory and ethical frameworks (ISO 27001, NIST, GDPR).
- Roles in cybersecurity: SOC, analyst, pentester, incident responder.
- Differences between offensive and defensive security.
- Networking review: OSI and TCP/IP models.
- Protocols and essential services.
- Concepts of NAT, VLAN, VPN, Firewalls and DMZ.
- Diagnostic and monitoring tools (ping, tracert, netstat).
- Basic device configuration and security measures.
Networks, Protocols and Perimeter Security
Threats, Vulnerabilities and Risk Management
- Threat classification: malware, phishing, DoS/DDoS, MITM.
- Concepts of vulnerability and exposure (CVE).
- Vulnerability management and risk assessment cycle.
- Scanning tools: OpenVAS, Nessus.
- Risk analysis and prioritization methodologies.
Cryptography and Information Security
- Fundamentals of encryption: symmetric and asymmetric.
- Hashing, digital signatures and certificates.
- Practical applications of cryptography (TLS, VPN, secure email).
- Good data protection practices.
- Practical exercises with encryption tools.
Operating Systems and Environment Security
- Security in Linux and Windows systems.
- Essential commands and permission settings.
- Introduction to PowerShell and Bash for secure administration.
- Fundamentals of social engineering and prevention.
- Hardening and access control practices.
CISCO CYBEROPS ASSOCIATE
Fundamentals and Context of Cybersecurity
- Cybersecurity principles and threat landscape.
- Actors, advocates, and roles in a SOC.
- Basic concepts of Windows and Linux operating systems.
- Using the command line and analyzing logs.
- Introduction to the work of a security analyst.
Networks, Protocols and Infrastructure
- Fundamentals of TCP/IP networking and architecture.
- Network protocols and services (DNS, HTTP, DHCP, etc.).
- Network devices: switches, routers, firewalls.
- Security infrastructure: segmentation and secure zones.
- Connectivity and traffic flow monitoring.
Threats, Attacks and Monitoring
- Types of attackers and common techniques.
- Common threats: malware, phishing, DoS, exploits.
- Detection and monitoring with IDS, IPS and SIEM.
- Network traffic and behavior analysis.
- Incident mitigation strategies.
Defense, Cryptography and Asset Protection
- Access control and authentication.
- Threat Intelligence.
- Applied cryptography: encryption, signatures and PKI.
- Endpoint protection and vulnerability management.
- Secure protocols: VPN, TLS, IDS/IPS.
Security Data, Alerts and Incidents
- Security data analysis: logs and events.
- Evaluation and classification of alerts in SOC.
- Correlation and normalization of data.
- Incident cycle management.
- Incident response and forensic analysis.
FINAL PROJECT
- Course Review
- Case study
OFFICIAL CERTIFICATION SEMINAR
- Preparation of exam-type questions
Do you want to see a demo class?
Subsidized Training for Companies
Cloud Training as an entity registered with code 16753 in the State Registry of Training Entities, Manages and teaches courses within the Company-Programmed Training initiative, Vocational Training for Employment, in accordance with the provisions of Law 30/2015, of September 9.
Cloud Training helps you check your company's credit amount for this year, free of charge.

