1/5

We offer a variety of programs encompassing courses according to the specific client’s needs and trainees background from candidates screening and preliminary evaluation to specialized experts in essential cyber professions.

OBJETIVE

GRADUATES WILL KNOW HOW COMPUTERS THINK, AND HOW TO MANAGE, PROTECT AND TEST IT NETWORKS.

CYBER ACADEMIES

RTNC ACADEMIES OFFERING

Solutions-SoteriaREV-RisksAssassment-Ico

Start Basic Offering Solutions

Our START offerings allows you to take first steps towards a safe cyber space exposing talented individuals to the cyber world and providing a wide range of comprehensive education & training modules to train and qualify cyber professionals for the real thing.

Solutions-SoteriaREV-Vulnerability-Icon.

Grow - Extended Offering

A step forward towards sustaining and promoting a continuance cyber readiness by practicing and training in real – world environments.

Solutions-SoteriaREV-SecurityAudits-Icon

Establish Complete Offering Solutions

Partner with RTNC-Group to establish a complete solution for cyber security education and training designed, installed and co-operated with RTNC-Tech for professional cyber specializations, BSc and MSc programs.

SPECIALIZATION

PROGRAMS

Fundamentals

  • Essential knowledge for employees and managers

  • Basic knowledge in IT engineering

  • Security Engineers qualifications

  • Basic knowledge in programming

UPON COMPLETION

Gain essential knowledge and skills in the IT and Cyber Security fields

Students will know how to establish secure network design, prevent, detect and respond to cyber threats.

Network Defense and Operations

  • Security Monitoring and Analysis

  • Secure Network Design & Administration

  • Secure Applications Design

  • Incidents Management and Investigation

  • Threats hunting & Risks Mitigation

  • Forensics Analysis

UPON COMPLETION

Ethical Hacking & PenTesting

  • Ethical Hacking & Pen-Testing

  • Exploitation Development and utilization

  • Threats Hunting and Neutralization

  • Incidents Management and Investigation

  • Forensics Analysis

UPON COMPLETION

Students will know how to analyze, plan, penetrate, exploit and reveal flaws and vulnerabilities of IT networks.

  • Security Managers

  • Chief Security Officers

  • Security Auditors

  • IT project managers

  • SIEM-SOC Managers

UPON COMPLETION

Students will an excellent understanding and broad perspective of the cyber security eco-system and have the capability to plan, implement, review and improve their organization’s overall level of cyber defense.

Cyber Security Management

OPERATED BY CYBER PROFESSIONALS

Security Analysts

  • Tier 1 – Events Monitoring and Alert

  • Tier 2 – Incidents managers

CERT and threat hunting investigators

  • Tier 3 – Deep Investigations

Cyber Security Managers

  • SOC Managers

  • IT Project Managers

  • CISO

  • CSO

IT Security Engineers

  • Systems Configuration

  • IT Infrastructure design & Installation