

Inspired By Excellence & Innovation
We offer a wide range of high quality of teaching and extra-curricular activities.
Cybersecurity/Pentest
Cybersecurity/Pentest
In this program, we will cover the basics of information security vulnerabilities and ethical hacking. The principles of operations for assessing security of web applications, databases and operating systems will be presented with hands-on practices. Client-server working principles, web browser proxies, and basic web programming concepts will be introduced to describe the core issues related to information security.
It will be followed by exercises for hardening security from a defense perspective..
Program Agenda
Date | Module |
---|---|
June 6 | Setups and Information Security Principal Concepts |
June 7 | Common Application Vulnerabilities and Practicing Hacks on DVWA (Brute Force, Command Injection) |
June 8 | Practicing Hacks on DVWA continues (SQL Injection, XSS, File Injection) |
June 9 | Physical Access to Information and Working with Hard Drives |
June 10 | Secure Coding, and Hardening Practices Against Covered Vulnerabilities |
June 11 | Malware Basics and Analysis |
COURSE TUTORS
Join us Now
Any questions ? We are more than welcome to answer them !
Communication Skills
COURSE TUTORS
Join us Now
Any questions ? We are more than welcome to answer them !
Python
Python
Python is a high-level, interpreted, general-purpose programming language. Its design philosophy emphasizes code readability with the use of significant indentation.
Python is dynamically-typed and garbage-collected. It supports multiple programming paradigms, including structured (particularly procedural), object-oriented and functional programming. It is often described as a “batteries included” language due to its comprehensive standard library.
COURSE TUTORS
Join us Now
Any questions ? We are more than welcome to answer them !
Java
Java
Java is a programming language and computing platform first released by Sun Microsystems in 1995. It has evolved from humble beginnings to power a large share of today’s digital world, by providing the reliable platform upon which many services and applications are built. New, innovative products and digital services designed for the future continue to rely on Java, as well.
There are many applications and even some websites that will not function unless you have Java installed. Java.com, this website, is intended for consumers who require Java for their desktop applications – specifically applications targeting Java 8. Developers as well as users that would like to learn Java programming should visit the dev.java website instead and business users should visit oracle.com/java for more information.
Today, in the modern world more than 3 billion devices run Java.
So, what can you do with Java? Here are the examples:
- Mobile applications (specially Android apps)
- Desktop applications
- Web applications
- Web servers and application servers
- Games
- Database connection
- And much, much more!
COURSE TUTORS
Join us Now
Any questions ? We are more than welcome to answer them !
Web Development
Web Development
Every Web Developer must have a basic understanding of HTML, CSS, and JavaScript.
Responsive Web Design is used in all types of modern web development.
ECMAScript 5 (JavaScript 5) is supported in all modern browsers. Take a good look at it, especially the new array functions.
COURSE TUTORS
Join us Now
Any questions ? We are more than welcome to answer them !
Cybersecurity/Pentest
Cybersecurity/Pentest
In this program, we will cover the basics of information security vulnerabilities and ethical hacking. The principles of operations for assessing security of web applications, databases and operating systems will be presented with hands-on practices. Client-server working principles, web browser proxies, and basic web programming concepts will be introduced to describe the core issues related to information security.
It will be followed by exercises for hardening security from a defense perspective..
Program Agenda
Date | Module |
---|---|
June 6 | Setups and Information Security Principal Concepts |
June 7 | Common Application Vulnerabilities and Practicing Hacks on DVWA (Brute Force, Command Injection) |
June 8 | Practicing Hacks on DVWA continues (SQL Injection, XSS, File Injection) |
June 9 | Physical Access to Information and Working with Hard Drives |
June 10 | Secure Coding, and Hardening Practices Against Covered Vulnerabilities |
June 11 | Malware Basics and Analysis |
COURSE TUTORS
Join us Now
Any questions ? We are more than welcome to answer them !
Entrepreneurial Thinking
Entrepreneurial Thinking
To become an entrepreneur, you need to have certain entrepreneurial thinking essentials. What are these, and how can someone own them? Besides, is a successful entrepreneur born or raised? This age-old question has rattled a lot of minds, and the nature versus nurture debate does not seem to have a definitive answer yet.
Entrepreneurship comes from the French word “entreprendre” which means “to undertake”. Thus, in this case, this means someone that undertakes the risk. The risk is an integral part of entrepreneurship’s existence. Above all, nascent entrepreneurs identify the whole entrepreneurial endeavour as a journey.
This journey begins with opportunity identification, idea generation, and idea implementation. The push behind an entrepreneur to embark on this dangerous journey is passion. And that passion is the magic dust that transforms an entrepreneur into a successful one.
COURSE TUTORS
Join us Now
Any questions ? We are more than welcome to answer them !
Join us Now
Any questions ? We are more than welcome to answer them !