MasterPath Certificate

Our industry approved and university accredited courses offer prospective employers the assurance that your professional qualifications meet the highest standards.
bt_bb_section_bottom_section_coverage_image
https://icsiglobal.com/wp-content/uploads/2020/08/floating_image_04.png

Why choose the ICSI MasterPath Certificate?

The Bootcamp covers three training courses that balance theoretical knowledge with practical, hands-on training. Successfully completing the Bootcamp programme will lead to the ICSI MasterPath Certificate. This certificate combines three recognised professional qualifications and is at the same time a major step towards a Master’s Degree in Cyber Security from the University of Central Lancashire in the UK.
https://icsiglobal.com/wp-content/uploads/2022/05/shutterstock_1043401144.png

Accreditation

https://icsiglobal.com/wp-content/uploads/2022/03/crest-atp-320x197.png
https://icsiglobal.com/wp-content/uploads/2022/04/ncsc-logo-black-320x180.png
https://icsiglobal.com/wp-content/uploads/2022/03/UCLan_Cyprus_logo_rgb-320x105.png
60 Credits MSc Cybersecurity
bt_bb_section_bottom_section_coverage_image
  • Curriculum
  • Duration and Delivery
  • What's included
  • Price & Plans
  • Career Services
  • FAQ

Curriculum

During the Bootcamp, candidates will take the following courses to obtain the ICSI MasterPath Certificate.
https://icsiglobal.com/wp-content/uploads/2022/02/shutterstock_717740953-1.png

MasterPath PreWork course 00. ICSI | CYBERSECURITY ESSENTIALS

This course teaches the basics regarding Information Security, including a holistic view of modern network security, operating system hardening, firewalls, Encryption, Application Security, Incident Response and Recovery. There are no special prerequisites for you to meet to successfully start this course.
What you'll learn

Course Outline: ICSI | CyberSecurity Essentials

Module 1: Information Security

Lessons:

  • What is Security
  • Confidentiality, Integrity and Availability triad
  • Privacy
  • Non-Repudiation
  • Types of Attacks
  • Threats, Vulnerabilities and Risk
  • Risk Management

Review Questions

Module 2: Identification, Authentication and Authorisation

Lessons:

  • Identification
  • Authentication
  • Password and Multifactor Authentication
  • Biometrics
  • Authorization

Review Questions

Module 3: Access Control

Lessons:

  • Access Control Lists (ACLs)
  • Access Control Models and Methodologies
  • Discretionary Access Control
  • Mandatory Access Control
  • Role-based Access Control

Review Questions

Module 4: Law and Compliance

Lessons:

  • Laws and Regulations
  • Compliance (Regulatory & Industry Compliance)

Review Questions

Module 5: Fundamentals of Encryption

Lessons:

  • The History of Encryption
  • Modern Encryption Methods
  • Windows and Linux Encryption
  • Hashing

Review Questions

Labs:

  • Enabling BitLocker
  • Encrypting a Folder Using EFS
  • Use HashGenerator to generate hashes
  • Use Ophcrack to crack password hashes

Module 6: Network Infrastructure and Security

Lessons:

  • IP Protocols
  • Management Protocols
  • Routers and Switches
  • Firewalls
  • Firewall Implementation
  • Proxy Servers
  • Windows Firewalls
  • Linux Firewalls
  • Wireless Security
  • Mobile Device Security
  • Network Security Tools

Review Questions

Labs:

  • Configuring Windows Firewall
  • Configuring iptables Rules

Module 7: Microsoft Windows Infrastructure

Lessons:

  • Active Directory Domain Services
  • Group Policy Objects
  • Configuring Windows
  • Windows Update

Review Questions

Labs:

  • Password Policies

Module 8: UNIX / Linux Server

Lessons:

  • Configuring Linux
  • Third Party Software Updates
  • Core Operating System updates

Review Questions

Labs:

  • Linux File Permissions
  • Disabling Linux Services

Module 9: Assessing System Security

Lessons:

  • Risk Assessment
  • Conducting an Initial Assessment
  • Probing the Network
  • Vulnerabilities
  • Documenting Security

Review Questions

Labs:

  • Probing the Network using Nmap
  • Identify details regarding a specific vulnerability

Module 10: Application Security

Lessons:

  • Software Development Vulnerabilities
  • Buffer Overflows
  • Input Validation Attacks
  • Authentication, Authorisation and Cryptographic Attacks
  • Web Security
  • Database Security
  • Application Security tools

Review Questions

Module 11: Incident Response and Recovery

Lessons:

  • What is Incident Response
  • The Incident Response Process Model
  • Why Incident Response is needed
  • Disaster Recovery
  • Business Continuity
  • Fault Tolerance

Review Questions

Labs:

  • Backup Windows 10
  • Backup files using CPIO
  • Backup files with TAR
https://icsiglobal.com/wp-content/uploads/2022/02/shutterstock_1493468873-1.png

CREST Accredited, 20 MSc Cybersecurity credits 01.ICSI | Certified Penetration Tester (CPT)

This course teaches penetration testing and will illustrate how to think like an attacker and use industry standard tools to perform penetration testing. Students will learn and perform the different phases of penetration testing assessments. The students will also learn to report the results of their assessments.
What you'll learn

Course: ICSI | CPT Certified Penetration Tester

This course is designed to teach how to perform penetration tests, how to think like an attacker and also demonstrates the tools needed to perform penetration testing.

Students will learn and perform information gathering, target discovery and enumeration, vulnerability mapping, system exploitation including Windows Domain attacks, and Azure AD (Active Directory), privilege escalation and maintaining access to compromised systems with over 40 detailed hands-on labs.

Module 1: Introduction to Kali Linux

Lessons:

  • Kali Linux History
  • Kali Linux Installation
  • Kali Linux Configuration
  • Basic Search Utilities

Labs:

  • Finding Files
  • Starting and Stopping Services

Module 2: Introduction to Penetration Testing

Lessons:

  • What is Penetration testing
  • Benefits of Penetration Testing
  • Vulnerability Scans
  • Methodologies
  • Ethical Issues
  • Legal Issues

Review Questions

Module 3: Standards

Lessons:

  • Penetration Testing Execution Standard (PTES)
  • PCI DSS
  • NIST 800-115
  • CREST UK
  • OWASP Top 10
  • ISO 27002

Review Questions

Module 4: Network Essentials

Lessons:

  • TCP/IP
  • IP Protocols
  • Network Architectures
  • Domain Name Server (DNS)
  • Management Protocols
  • Network Protocols
  • Using Netcat

Labs

  • Using Netcat

Module 5: Cryptography

Lessons:

  • Basics of Cryptography
  • History of Encryption
  • Symmetric Encryption
  • Asymmetric (Public Key) Encryption
  • Digital Signatures
  • Hashing
  • MAC and HMAC
  • Encoding
  • Password Crackers
  • Steganography
  • Cryptanalysis

Review Questions

Module 6: Scripting

Lessons:

  • Scripting
  • Windows PowerShell (Command Line Interface)
  • Linux Shell (Command Line Interface)

Labs:

  • Writing a Simple Bash Script

Module 7: Information Gathering

Lessons:

  • Passive Information Gathering
  • Registration Records
  • Google Searching
  • Active Information Gathering
  • DNS Enumeration
  • Host Discovery
  • Port and Operating System Discovery
  • Fingerprinting and Enumeration

Labs:

  • Using Shodan
  • DNS Enumeration
  • Host Discovery
  • Port and operating System Discovery
  • Fingerprinting and Enumeration
  • Information Gathering

Module 8: Vulnerability Assessment

Lessons:

  • Vulnerabilities
  • Packet Capture
  • Network Scanners
  • Nmap NSE
  • Metasploit Framework
  • Web Application Scanners

Labs:

  • Using Wireshark
  • Using OpenVas
  • Using Nmap Scripts
  • Using Metasploit Framework
  • Finding Vulnerabilities

Module 9: Reconnaissance and Exploitation of Windows Services

Lessons:

  • Important Windows Files
  • Windows Logs
  • The Registry
  • Active Directory Roles
  • Active Directory Database
  • Active Directory Reconnaissance
  • User and System Enumeration
  • Windows Vulnerabilities
  • Windows Privilege Escalation
  • Antivirus Evasion
  • Harvesting Credentials
  • Windows Password Cracking

Labs:

  • Active Directory Reconnaissance
  • User and System Enumeration
  • Windows Vulnerabilities
  • Windows Privilege Escalation
  • Evading Windows Defender
  • Responder
  • Dumping Credentials from Memory
  • Extract SAM File from Windows Registry
  • Attacking SMB

Module 10: Reconnaissance and Exploitation of Linux/UNIX Services

Lessons:

  • Linux Permissions Review
  • User Enumeration
  • Linux/Unix Service Enumeration
  • Linux/Unix Vulnerabilities
  • Linux Privilege Escalation
  • Linux/Unix Passwords

Labs

  • User Enumeration
  • Service Enumeration
  • Exploit ProFTP
  • Linux Privilege Escalation
  • Linux/Unix Vulnerabilities

Module 11: Reconnaissance and Exploitation of Web-Based Applications

Lessons:

  • Web Protocols
  • Web Servers
  • Web Application Structure Discovery
  • Cross-Site Scripting (XSS)
  • SQL Injection
  • Directory Traversal
  • File Uploads
  • Command Execution

Labs:

  • XSS
  • SQL Injection
  • Directory Traversal
  • File Uploads
  • Command Execution

Module 12: Databases

Lessons

  • Databases
  • Microsoft SQL Server
  • Oracle RDBMS
  • MySQL

Labs

  • Assessing Databases

Module 13: Lateral Movement

Lessons

  • Discovery
  • Windows Situational Awareness
  • Linux Situational Awareness
  • Lateral Movement

Labs

  • Pass the Hash
  • Port Forwarding

Module 14: Data Exfiltration

Lessons

  • Data from Local System
  • Data Exfiltration with Frameworks

Labs

  • Data Exfiltration with Metasploit

Module 15: Maintaining Access and Covering Tracks

Lessons

  • Persistence
  • Windows Persistence
  • Windows Persistence with Scheduled Tasks
  • .bash Startup File Manipulation
  • Local Job Scheduling
  • Linux Persistence by Adding User Accounts
  • Windows Persistence by Adding User Accounts

Labs

  • Maintaining Access

Module 16: Pen Testing Cloud Services (Azure)

Lessons

  • Introduction to Cloud Computing
  • Cloud Security
  • Threats and Attacks
  • Azure
  • Azure AD
  • Access Control
  • Attacking Azure with PowerZure

Labs

  • Attacking Azure
https://icsiglobal.com/wp-content/uploads/2022/02/shutterstock_1033103851.png

NCSC Accredited, 20 MSc Cybersecurity credits02. ICSI | Certified Digital Forensics Examiner (CDFE)

This course provides a holistic view of how Digital Forensics is implemented in the real world, including Incident Response preparation, acquiring and analyzing digital forensic images and analyzing host and network data. Malware analysis, Threat intelligence and report creation are also included.
What you'll learn

Course: ICSI | CDFE Digital Forensics, Incident Response and Threat Hunting

In this course, we will discuss what Incident Response and Digital Forensics are, the legal implications they have and how they are structured. We will also perform various exercises on digital forensics tools in order to get a clear understanding of the technicality that digital forensics assumes.

We will study how to capture images of memory, storage, network packets and logs and how to correlate them in order to draw conclusions. Finally, we will look at malware and threat analysis, which are more than ever relevant today.


Module 1: Incident Response

Lessons:

  • What is Incident Response
  • The Incident Response Process Model
  • The Role of Digital Forensics
  • Why Incident Response is Needed
  • The Incident Response Framework
  • The CSIRT Response Charter
  • The Incident Response Team
  • The Incident Response Plan
  • Incident Classification
  • The Incident Response Playbook
  • Escalation Procedures
  • Incident Response Capability Maintenance

Review Questions

Module 2: Identification, Authentication and Authorisation

Lessons:

  • Digital Forensic Fundamentals
  • UK Laws and Regulations
  • Digital Forensic Process
  • Forensics Lab

Review Questions

Module 3: Collection of Network Evidence

Lessons:

  • Collection of Network Evidence
  • Preparation
  • Evidence from Network Devices
  • Collection of Evidence

Review Questions

Module 4: Capturing Evidence from Host Systems

Lessons:

  • Capturing Evidence from Host Systems
  • Methods for Acquiring Evidence
  • Procedures for Collecting Evidence
  • Acquiring Memory
  • Acquiring Memory Remotely
  • Virtual Machines Captures
  • Non-Volatile Data

Review Questions

Labs

  • Acquiring Memory with FTK Imager
  • Acquiring Memory with WinPmem
  • Capturing Registry and Logs using FTK Imager

Module 5: Forensic Imaging

Lessons:

  • Forensic Imaging
  • Forensic Imaging Overview
  • Evidence Drive Preparation
  • Dead Imaging
  • Live Imaging

Review Questions

Labs:

  • Drive Wiping with Eraser
  • Encrypting a Drive’s Repository Partition with VeraCrypt
  • Creating a Forensic Image with a GUI Tool
  • Create a Forensic Image with a CLI Tool
  • Creating a Live image using FTK Imager Lite
  • Forensic Imaging

Module 6: Analysing Network Evidence

Lessons:

  • Analysing Network Evidence
  • Wireshark

Labs:

  • Network Traffic Identification: PING
  • Network Traffic Identification: DNS Query
  • Network traffic Identification: TCP Three-Way Handshake
  • Traffic Analysis: Host Footprinting / File Extractions
  • Analysing Network Evidence

Module 7: Analysis of System Memory

Lessons:

  • Analysis of System Memory
  • Memory Analysis Methodology

Labs:

  • Analysis of Memory File Using Volatility
  • Analysis of System Memory

Module 8: Analysis of System Storage

Lessons:

  • Analysis of System Storage
  • Types of System Storage
  • File Systems
  • Commercial Tools
  • Must Have Tools for Incident Responders
  • File Carving
  • Email Analysis
  • Registry Analysis
  • Hashing
  • Web Browser Analysis
  • File Analysis
  • Timestamps and Timeline Analysis
  • Event Log Analysis
  • Shortcut Files and Jump List Analysis
  • Prefetch File Analysis
  • Thumbnail Caches Analysis
  • GREP Searches
  • File Recovery
  • Recovering Passwords

Labs:

  • File Carving
  • Email Header Analysis
  • Reading Offline Files with Regedit
  • Reading Offline Registry Files with Windows Registry Recovery
  • Reading Offline Files with RegRipper
  • Hashing Folders and Their Contents for Comparison
  • Hashing Individual Files for Comparison
  • Hashing Evidence Files for Validation
  • Analysing Chrome Internet Cache and History
  • File Analysis – Microsoft Office Files
  • File Analysis – EXIF Data from Graphic Files
  • Combining Timestamps for a Timeline
  • Examining Event Logs
  • Shortcut File Analysis
  • Jump List Analysis
  • Prefetch File Analysis
  • Analysing Thumbs.db from Windows XP
  • Analysing Cache Images within Microsoft Files
  • GREP Searching Through Log Files
  • Mounting a Forensic Image with FTK Imager and Recovering Files
  • Recovering Files from Forensic Images with Autopsy
  • Recovering Passwords

Module 9: Log Analysis

Lessons:

  • Collecting Data from Network Devices
  • Collecting Data from Host Machines and Application Protocols
  • Log Analysis Tools
  • Using SIEM’s for Log Analysis

Labs

  • Using Log Parser to Analyse Logs
  • Analysing Logs with Linux Tools
  • Log Analysis with Splunk

Module 10: Creating Forensics Reports

Lessons:

  • Creating Forensic Reports
  • What Should Be Documented
  • Documentation Types
  • Sources to Include
  • Audience
  • Tracking Incidents
  • Written Reports

Review Questions

Module 11: Malware Analysis

Lessons:

  • Malware Analysis
  • Malware Types and Definition
  • Malware Analysis Methodology

Labs

  • Performing Static Analysis
  • Performing Dynamic Analysis
  • Malware Analysis

Module 12: Threat Intelligence

Lessons:

  • Threat Intelligence
  • Threat Intelligence Actor Groups
  • Advanced Persistent Threat
  • Types of Threat Intelligence
  • Threat Intelligence Life Cycle
  • Sourcing Threat Intelligence
  • Threat Intelligence Platforms
  • Threat Intelligence Use Types

Review Questions

Labs:

  • Hashing Evidence – Known Bad Hashes
https://icsiglobal.com/wp-content/uploads/2022/02/shutterstock_1098558470.png

NCSC Accredited, 20 MSc Cybersecurity credits03. ICSI | Certified ISO 27001 Lead Implementer (CIL)

The purpose of the ISO 27001 course is to provide people involved with ISO 27001 and information security management with appropriate knowledge of the contents and high level requirements of the ISO/IEC 27001 standard, and an understanding how the standard operates in a typical organisation.
What you'll learn

Course: ICSI | CIL Certified ISO 27001 Lead Implementer

The ISO 27001 is the most acknowledged and globally recognized standard for implementing an Information Security Management System (ISMS) within any organization. The value of information assets and the importance of thoroughly securing them against today’s ever increasing threats, highlight the significance of developing and implementing effective and holistic security management systems. The course highlights the importance of information security and provides the necessary tools and methodologies for students to master the concepts of ISMS implementation, in line with ISO 27001.

Module 1 – Introduction

Module 2 – ISO/IEC 27000:2014 (Overview and vocabulary)

Module 3 – ISO/IEC 27001:2013 Mandatory Certification Requirements

Module 4 – ISO/IEC 27005:2011 Information Security Risk Management

Module 5 – ISO 27001 – Annex A Controls

Module 6 – ISO/IEC 27003 Implementation of ISMS Framework

Module 7 – ISO/IEC 27007 – ISMS Audit and Certification

Duration and Delivery

Fast and flexible programme
that gives you a powerful head start

Delivery Method

On-demand study material with 24/7 labs and One-To-One Online Tutor support

Duration

12 months access

What's included

Hands-On Labs

24-hr remote access to a virtual lab, train and practice your skills in your own time

100% online course

On-demand study material with 24/7 labs and One-To-One Online Tutor support

Support

Instructor Email and One-To-One Online Support

Career Services

You’ve invested in a specialised education that is in great demand. We’ll help you make sure people know it

Multiple payment options

Different options to accommodate your budget

Exam Preparation

Practice Quizzes and MOCK Exam along with ICSI exam vouchers

Price & Plans

Monthly
  • 100% online course
  • Instructor Email and One-To-One Online Support
  • On-demand study material
  • 1 Year Access
  • 24/7 remote access to Labs
  • Practice Quizzes and MOCK Exam
  • Certificate of Completion
  • 3 Exam Vouchers (available upon full payment)
  • Career Services (available upon full payment)
£125
(Pay in 12 monthly instalments)
Annual
  • 100% online course
  • Instructor Email and One-To-One Online Support
  • On-demand study material
  • 1 Year Access
  • 24/7 remote access to Labs
  • Practice Quizzes and MOCK Exam
  • Certificate of Completion
  • 3 Exam Vouchers
  • Career Services
£1250
(SAVE £250)

Career Services

You’ve invested in a specialised education that is in great demand. We’ll help you make sure people know it.
CV writing services
LinkedIn profile
Cover
letter
Personal
Statement
Interview
coaching

FAQ

Read our answers to the most common questions from interested students like yourself.

MasterPath in Cybersecurity

01.
What are the entry requirements?

Candidates over the age of 18 are eligible to enrol in the programme, provided they can demonstrate good knowledge of the English language.

02.
How long do I have to complete the programme?

The average time of completion is 6-7 months with 12 months access.

03.
What are the certification requirements?

The ICSI | MasterPath Certificate in Cybersecurity is granted to all who have obtained the following three certifications:

  1. ICSI | Certified Penetration Tester (CPT)
  2. ICSI | Certified Digital Forensics Examiner (CDFE)
  3. ICSI | Certified ISO 27001 Lead Implementer (CIL)
04.
Is this an online programme?

Yes. This programme is 100% online. Students can do it from the comfort of their own home or wherever they have a computer and internet.

05.
I've never worked in Tech before, can I apply?

Yes. This programme was designed to take complete beginners in addition to business professionals. 

MSc Cybersecurity

01.
What are the entry requirements?
  • High school certificate
  • BA degree and transcripts
  • English qualification (if applicable)
  • 1 reference letter
  • C.V
  • Professionals with five years’ work experience in a relevant field will also be considered subject to an interview from the Head of School of the programme.
02.
What are the stages of the MSc Programme?

1. Successful completion of the ICSI | MasterPath Certificate in Cybersecurity

2. Registration for MSc programme

3. Top-up assessment to qualify for continued study as per UCLAN’s academic programme

4. Successful completion of 3 University modules:

  • Critical Analysis
  • Cyber Warfare
  • Cyber Defence

5. Successful completion of the University Final MSc Project

03.
Is this an online programme?

The MSc in Cybersecurity can can be completed entirely online.

04.
In which UCLAN Campus is the online programme delivered?

The program is delivered at the UCLan Cyprus campus, upon completion of studies at UCLan Cyprus will result in a Double Degree (two MSc Cyber Security certificates) from the two Universities, UCLan Cyprus and UCLan UK recognized in EU and worldwide.

05.
What is the cost of the MSc Cybersecurity?

Price is *EUR 5,330 payable in installments.
Distance Learning Exams Fee: The University will indicate the nearest exam centre to your location or at the University campus. In case you will need to be accommodated to an exam centre/location not in the University’s list a Fee per Exam might be charged.
*Price is not including the cost of the MasterPath Certificate in Cybersecurity.

    https://icsiglobal.com/wp-content/uploads/2020/08/floating_image_03.png
    https://icsiglobal.com/wp-content/uploads/2020/08/floating_image_05.png

    ICSI MasterPath Cybersecurity Bootcamp prepares IT professionals for a role in cybersecurity.

    This certificate combines three recognised professional qualifications and is at the same time a major step towards a Master’s Degree in Cyber Security from the University of Central Lancashire in the UK.
    bt_bb_section_top_section_coverage_image
    https://icsiglobal.com/wp-content/uploads/2020/08/floating_image_04.png
    bt_bb_section_bottom_section_coverage_image
    0
      0
      Your Cart
      Your cart is emptyReturn to Shop