Programs for Individuals
20 courses, 10 Certifications, 1000 online exercisesCyber Workforce Development Solutions
Identify, recruit, develop, and retain cyber talent
Next-Generation Cyber Talent
Training high school students on fundamental cyber security skills
COURSES, CERTIFICATIONS & WORKSHOPS
- keyboard_arrow_downIndividuals who have successfully achieved their MBT Certification can apply for Blue Teamer jobs worldwide, fully confident that they have the competencies that the industry is seeking for these roles. Learn more
- keyboard_arrow_downIndividuals who have successfully achieved their MCD Certification can defeat code-level obfuscation techniques employed by APTs such as Control Flow Flattening, Opaque Predicates, and Virtual Machines. This Certification is aimed at malware analysts that want to develop code deobfuscation capabilities to join advanced reverse engineering teams. Learn more
- keyboard_arrow_downIndividuals who have successfully achieved their MBT Certification can apply for Digital Forensics and Incident Response (DFIR) jobs worldwide, fully confident that they have the competencies that the industry is seeking for these roles. Learn more
- keyboard_arrow_downStudents who have successfully achieved their MICS Certification from MCSI can apply for winter/summer internships worldwide with the confidence that they have the competencies the industry is seeking. Learn more
- keyboard_arrow_downBy completing this Certification, you will learn fundamental network and endpoint security techniques that will successfully prevent cyber adversaries from breaching into small and medium size IT environments. This course is ideal for aspiring junior security engineers that wish to acquire practical skills that can benefit a vast number of organisations. Learn more
- keyboard_arrow_downIndividuals who have successfully achieved their MPT Certification can apply for Penetration Testing jobs worldwide with the confidence that they have the competencies that the industry is seeking for in these roles. Learn more
- keyboard_arrow_downIndividuals who have successfully achieved their MRE Certification can apply for Malware Analyst jobs worldwide, fully confident that they have the competencies that the industry is seeking for these roles. Learn more
- keyboard_arrow_downThe internship teaches skills that can immediately be applied in the field and help you land a job. Up-on completing the training programme, you will receive an industry-recognised Certificate of Completion from MCSI. Learn more
- keyboard_arrow_downIndividuals who have successfully achieved their MRT Certification can apply for Red Teamer jobs worldwide, fully confident that they have the competencies that the industry is seeking for these roles. Learn more
- keyboard_arrow_downIndividuals who have successfully achieved their MSE Certification can apply for Security Engineering jobs worldwide, fully confident that they have the competencies that the industry is seeking for these roles. Learn more
- keyboard_arrow_downIndividuals who have successfully achieved their MTH Certification can apply for Cyber Threat Hunter jobs worldwide, fully confident that they have the competencies that the industry is seeking for these roles. Learn more
- keyboard_arrow_downIndividuals who have successfully achieved their MTIA Certification can apply for Cyber Threat Intelligence Analyst jobs worldwide, fully confident that they have the competencies that the industry is seeking for these roles. Learn more
- turned_in_not MVRE - Certified Vulnerability Researcher and Exploitation Specialistkeyboard_arrow_downIndividuals who have successfully achieved their MVRE Certification can discover and exploit zero-day vulnerabilities in software deployed on workstations, servers, smartphones and embedded systems. Learn more
- keyboard_arrow_downLearn how to master the most important penetration-testing tools available. Detailed step-by-step instructions are provided for students to learn how to use Metasploit, NMAP, OpenVAS, PowerShell Empire, PoshC2, PowerSploit, Bloodhood and Burp Suite. Learn more
- keyboard_arrow_downThe Social Engineering Master Course teaches the best tactics, techniques, procedures and gives you the tools to become a thoroughly effective social engineer. This course is taught in a highly interactive manner with hours of workshops and exercises that will prepare the students for high-end social engineering engagements. Learn more
- keyboard_arrow_downRed Teaming – The Fundamentals is a basic yet potent introductory course to Red Teaming. Our instructors teach the fundamental knowledge and skills that novice Red Teamers require to deliver cyber-attack simulations. No prior knowledge of computer hacking is assumed. Detailed step-by-step instructions are provided for students to learn how to attack Windows networks using some of the same ways that like real attackers use. Learn more
- keyboard_arrow_downDragon-Net "Red Team Exercise" is an expertly guided hands-on experience conducting simulated real-world attacks against procedurally generated computer networks. During the mock exercise, Mossé Security instructors guide students to their target, assisting them to employ concepts and strategies that advanced persistent threats (APTs) use to great effect. Learn more
- keyboard_arrow_downOur Red Teaming “The Advanced User-Land Techniques” course teaches user-land exploitation techniques specifically designed to evade advanced enterprise security products, as well as make incident detection and response a real nightmare. Students will practice Red Teaming against procedurally generated computer networks, containing multiple VLANs, and which are properly defended by endpoint detection and response, and defence-in-depth. Learn more
- keyboard_arrow_downThis class is tailored for malware analysts, system developers, forensic analysts, incident responders, or enthusiasts who want to analyze Windows kernel rootkits or develop software for similar tasks. It introduces the Windows architecture and how various kernel components work together at the lowest level. It discusses how rootkits leverage these kernel components to facilitate nefarious activities such as hiding processes, files, network connections, and other common objects. As part of the analytical process, we will delve into the kernel programming environment; we will implement some kernel-mode utilities to aid our understanding. Learn more
- keyboard_arrow_downLearn structured techniques and tools to investigate incidents and make the right decisions when breached. Gain a structured process to work with professional teams of incident responders and digital forensics investigators to ensure positive outcomes as achieved for organizations affected by security breaches. Learn more
- keyboard_arrow_downIn this five-day master course, students will learn how to hunt for threat actors on large scale computer networks. No prior knowledge in incident response, threat hunting, reverse engineering or malware analysis is required prior to attending this course. Detailed step-by-step instructions will be given, and students will leave this course with practical skills to hunt for attackers on their networks, or their clients’ networks. Learn more
- keyboard_arrow_downIn this workshop, students will learn and hone their incident detection and response skills against procedurally-generated computer networks and adversaries. Every workshop is unique and thus offers new and unique learnings to returning participants. Throughout the workshop, Mossé Security’s instructors will facilitate, teach, and help students identify and remediate security breaches within the networks. Learn more
- keyboard_arrow_downNetwork forensics is a cornerstone activity of any security operations team. In this Master Course, we impart how to detect common and advanced attack techniques through a systematic review of network traffic and host logs. Dozens of exercises will be provided which will challenge and impart new knowledge to students of all skill level. Theoretical knowledge makes up 40% of the class, and the other 60% consists of practical exercises. At the end of the course, a large-scale network forensics exercise is conducted that can be reproduced at your workplace. Learn more
- keyboard_arrow_downThis course combines deep understanding of reverse engineering with rapid triage techniques to provide students with a broad capability to analyze malicious artifacts uncovered during incident response. By tailoring the instruction to rapid assessment of binaries, we equip students with the skills required to keep up with modern malware and rapidly extract the most valuable and pertinent data to their investigations, including Indicators of Compromise (IOCs). Rapid RE includes considerable lab time utilizing replicated enterprise networks and attacks as observed in the wild. Learn more
- turned_in_not Business Executives and Board Members Cyber Security Master Course4 hourskeyboard_arrow_downMossé Security offers a four-hour training course tailored for business executives and board members that want to learn how to defend their organisation against cyber threat actors and manage the risks of cyber attacks. Learn more
- keyboard_arrow_downlearn proven, structured analytics techniques, taken from the US Intelligence Community, and adapted by us into the corporate world. These techniques will help you make better cyber security decisions, and increase the likelihood of security solutions being championed by other teams because they have a stake in them. Learn more
- keyboard_arrow_downThis workshop prepares board members and business executives respond to a cyber breach. You will undertake a hypothetical breach challenge tailored to your organisation’s profile that is aimed at preparing you for the worst-case scenario. The benefits of undertaking this simulation are that you will learn proper critical thinking approaches and structured analytic techniques designed for executives that want to handle a cyber breach properly. Learn more
Master Seminars
Location: Melbourne, AU / Date(s): 22, 23, 26 October 2020
ACSO Curriculum
An open-source standard for a curriculum in cyber security
Online Learning Platform
1000 exercises to train anybody for 10 000 hours on cyber security
Certification Programs
Practical certifications that teach skills for career advancement
WHERE SOME OF OUR STUDENTS WORK



