Certification Programmes

MCSI Certification

MOIS - Certified OSINT Expert

Open Source Intelligence (OSINT) is the ability to locate and collect personal and target specific information sourced wholly through free and open online, digital, and internet resources.

The OSINT Certification is an beginner-level certification that focuses on instruction for students in the operational and technical aspects of open source intelligence. The primary goals of the Certified OSINT Expert program are to produce students who are prepared to provide leadership and execution in obtaining data from those resources. The program is also designed to give students the ability to analyze data from public and private sources to support decision making.

This unique program provides students with the skillset to lead an organization’s OSINT investigations and vulnerability assessments. Students learn to analyse data for use in vulnerability testing and the classification of risk for businesses. They also learn to identify and mitigate potential security risks. With this program, graduates can take on a leadership role in protecting their organisation from cybersecurity threats.

Register Now
Intermediate Level MCSI Certification Beginner
ic-certificate Certification
ic-clock 600+ hours
cpe-points 149
ic-money US$450
No Expiry, No Renewals

Course Overview

"An OSINT investigation is like putting together a puzzle. You gather all the pieces, and then you start putting them together to see the big picture."

OSINT is a powerful tool for cybersecurity that can be used to identify and mitigate threats. By gathering information from public sources, OSINT can help organizations stay ahead of potential threats and protect their networks and data. Additionally, OSINT can help identify vulnerabilities in networks and systems and prevent attacks.

Some key skills that are generally useful for OSINT include the following:

Research and analysis skills: The ability to gather information from a variety of sources, analyze it, and draw logical conclusions.

Technical skills: The ability to use technology to gather information, including using search engines, social media platforms, and dark web tools.

Writing skills: The ability to write clearly and effectively, and to express complex concepts in a way that is easy to understand.

Thinking skills: The ability to think critically, solve problems, and come up with creative solutions.

MCSI's MOIS certification is perfect for those who want to learn all the right OSINT skills. The certification covers a wide range of topics, from social media to Dark Web investigations. Everything is hands-on so you can immediately put your new skills to the test.

The MCSI Open-Source Intelligence (MOIS) certification will equip you with the skillset necessary to carry out the following tasks:

  • Create an anonymous presence to be used to conduct online investigative research and data collection
  • Explain, collect, and analyse data collected from social media platforms: Instagram, Facebook, Twitter, Reddit, LinkedIn
  • Demonstrate and differentiate tools utilized in OSINT work such as, but not limited to, Shodan, Maltego, Censys
  • Show how to manipulate and structure data collected and analysed from OSINT research
  • Identify risks to users from OSINT data collection and explain countermeasures to be utilised in providing anonymity for users
  • Create reporting to deliver collected and analysed research and conclude on OSINT risk and vulnerabilities

Knowledge, Skills and Abilities You Will Acquire

MCSI is one of the most respected and trusted names in cyber security education and training. Our certifications teach critical skills, knowledge and abilities needed to advance a career in cyber security. Our courses are comprehensive and up-to-date, and our instructors are experienced professionals who are dedicated to helping students learn. MCSI provides the real-world skills and knowledge you need to protect any organization from cyber threats.

  • Create an anonymous presence to be used to conduct online investigative research and data collection

    There are numerous advantages to maintaining an anonymous internet presence. Individuals can perform online investigative investigation and data collection without fear of retaliation thanks to anonymity. It can also be used to protect whistleblowers and political dissidents' identities. Anonymity is also a useful technique for safeguarding the privacy of personal data.

    While conducting an OSINT investigation, there are a number of tactics that can assist you remain anonymous. Here are a few of the techniques covered in this course:

    Pseudonyms

    One way to protect your identity and personal information when conducting online searches is to use a pseudonym instead of your real name. This will help to keep your private information confidential and out of the hands of anyone who may be interested in harming you or stealing your identity. Additionally, it is always a good idea to be mindful of the websites that you visit and the information that you share, as not all websites are safe and trustworthy. By taking these simple precautions, you can help to keep yourself and your loved ones safe and protected online.

    Proxies

    A proxy server allows you to conceal your IP address and surfing habits from prying eyes.

    Virtual Private Network

    There are several reasons why you should utilise a VPN. Perhaps you're concerned about your privacy and don't want your internet service provider (ISP) to know what you're up to online. Perhaps you're travelling and don't want local networks to monitor or stop your traffic. Perhaps you live in a country with tight Internet censorship and wish to be able to access websites that have been restricted.

    Using a VPN, for whatever purpose, is a terrific way to keep your internet traffic secret and secure. VPNs are simple to set up and use, and they work on a variety of platforms, including PCs, Macs, cellphones, and tablets.

    TOR

    The TOR network is a collection of volunteer-run servers that enable anonymous internet access. The Onion Router (TOR) is a term that refers to the numerous layers of protection that are utilised to hide your identity and location. Your traffic is routed via a number of different servers before reaching its destination when you utilise TOR, making it harder to track your activity. TOR is a free and open source anonymity network that has been utilised by journalists, activists, and privacy advocates all around the world.

    Private Email Accounts

    Use a private email account instead of your personal email address when signing up for online services. This way, you can keep your personal email address private and only share it with people you know and trust. If you ever need to stop utilising the service, simply delete your account using your private email address.

    Secure Browsers

    Ensure that your web browser has strong security features like HTTPS and SSL enabled. This will help prevent third parties from intercepting your data and browser history. You'll learn a lot more browser security hardening techniques.

    Security Awareness

    When conducting OSINT investigations anonymously, it's vital to be aware of the security dangers. You expose yourself to attacks from hostile actors that are interested in tracing down your movements and activity if you remain anonymous. To protect yourself, it is vital to take steps to secure your identity and computer systems. You should also be aware of the risks of disclosing personal information on the internet and take steps to protect your privacy. By being aware of the security risks inherent with OSINT investigations, you may protect yourself and your investigations while still enjoying the benefits of anonymity.

  • Collect data from hundreds of high-value data sources

    It can be difficult to collect data from hundreds of high-value OSINT data sources. It may, however, be a fairly manageable procedure if the correct tools and techniques are used.

    Search Engines

    Search engines are an important part of any OSINT investigation. They can help you find information on the internet about people, organizations, and other topics. There are many different search engines, but the most popular ones are Google, Yahoo, and Bing.

    When you are conducting an OSINT investigation, it is important to use all of the resources at your disposal. This includes using search engines to find information on the internet. The best way to use search engines is to use a variety of different search terms to get as much information as possible.

    Social Media Platforms

    Social media platforms are valuable sources of information for open-source intelligence (OSINT) investigations. These platforms allow users to share information publicly and openly. This makes them an ideal source of information for investigators who are looking for leads or information that may not be available elsewhere.

    There are a number of social media platforms that can be useful for OSINT investigations. The most popular social media platforms, such as Facebook, Twitter, and LinkedIn, are all useful for finding information. These platforms can be a valuable resource for investigators who are looking for information about people, companies, or other organizations.

    Code Repositories

    Some open source intelligence (OSINT) investigations rely heavily on code repositories. They can provide significant insight into a company's or organization's operations, as well as information on potential security flaws. While there are several code repositories accessible, GitHub and SourceForge are two of the most popular.

    Both GitHub and SourceForge have search engines that allow you to search for specific code files or projects. They also have community forums where developers can ask questions and discuss code projects.

    Email Addresses

    Email addresses are one of the most important pieces of information in an OSINT investigation. They can provide a wealth of information about a person, including their name, their contact information, and their place of work. In order to find email addresses for an investigation, you can use a variety of online tools and websites.

    IP Addresses

    An IP address (internet protocol address) is a unique identifier assigned to devices participating in a computer network using the internet protocol. Most devices that connect to the internet are assigned a public IP address, which can be used by anyone to find and connect to the device.

    When conducting OSINT investigations, it is important to understand the role of IP addresses in networking. Investigators can use public IP addresses to identify the physical location of a device and its owner. By tracing the IP address back to the hosting provider, investigators can often obtain additional information about the device and its owner, including name, email address, and contact information.

    In some cases, investigators may also be able to identify the specific device model and operating system used by the owner of a public IP address. This information can be helpful in identifying the target of an investigation and understanding their online activities.

    Online Communities

    There are many different online communities that can be useful for OSINT investigations. Some of these communities are open to the public, while others are invitation-only.

    Public communities include social media platforms like Facebook and Twitter, and online forums and discussion boards. These platforms can be used to gather information about individuals, organizations, and events. They can also be used to track sentiment and activity around specific topics.

    Invitation-only communities include private social media groups, Slack channels, and email lists. These communities can be used to gather information that is not available in public forums.

    Documents

    Documents are a valuable source of information for any OSINT investigation. They can provide information about the subject of the investigation, as well as their associates and activities. Documents can be obtained from a variety of sources, including public records databases, online archives, and commercial data providers.

    Public records databases are a great resource for documents. They typically contain a variety of records from government agencies, such as birth certificates, marriage licenses, and property records. They also often contain court records and other government documents.

    Online archives are another great source of documents. They are typically collections of historical documents that have been scanned and made available online. This can include everything from ancient manuscripts to vintage newspapers.

    Commercial data providers are a great source of business records. They typically have detailed information on business owners and executives, such as addresses, phone numbers, and email addresses. They can also include information on business finances and operations.

    Maps

    Maps are a valuable tool for Open-source Intelligence (OSINT) investigations. They can provide a high-level view of an area or region, showing political boundaries, physical features, and points of interest. Maps can also help investigators identify relationships between people and places, and track changes over time.

    Domain Names

    Domain names are a valuable part of OSINT investigations, as they can provide important information about the owner of a website. Most domain names are registered through a domain name registrar, which is a company that manages the registration of domain names. By looking up the registrar for a given domain name, you can often get information about the owner of the website. Additionally, if the website is hosted on a server, you can often find information about the server by looking up the IP address associated with the domain name.

    Data Breaches

    A data breach is the intentional or unintentional release of confidential, sensitive, or private information. Data breaches can include email addresses, Social Security Numbers, credit card numbers, and other Personally Identifiable Information (PII).

    Dark Web

    The Dark Web provides a platform for anonymity and illegal activities. It can only be accessed through special software and is not indexed by traditional search engines. This makes it a haven for criminals who want to avoid detection. The Dark Web is also used in OSINT investigations to gather information about potential targets. Investigators can use special search engines to find websites and forums that are not accessible to the general public. This can give them a better understanding of the target's activities and vulnerabilities.

  • Perform Pivot Analysis to identify all the publicly available data on a target

    Pivot analysis is a process used in open source investigations to identify and track relationships between individuals, organizations, and events. The goal of pivot analysis is to create a network of information that can be used to identify previously unknown links and relationships between entities of interest. Pivot analysis can be used to identify potential suspects, victims, or witnesses in an investigation. It can also be used to identify potential sources of information or leads in an investigation.

    To perform a pivot analysis, the investigator begins by identifying a central entity or event in the investigation. The investigator then uses publicly available information to track the relationships between the central entity and other entities of interest. This process is repeated until all entities of interest have been linked to the central entity. The investigator then uses the information gathered in the pivot analysis to develop a hypothesis about the investigation.

  • Write tools in Python to interact with APIs and automate the OSINT data collection process

    API automation for OSINT investigations can provide huge benefits for analysts. By automating the process of querying APIs for data, analysts can spend more time analyzing the data and less time collecting it. Additionally, automated querying can help to ensure that all relevant data is collected, reducing the chances of missing important information.

    Automation can help to improve the quality and accuracy of OSINT investigations. By querying APIs automatically, analysts can be sure to collect all relevant data.

  • Develop professional procedures and methodologies for delivering professional OSINT engagements in the field

    It is important to develop professional procedures and methodologies when delivering professional OSINT engagements in the field in order to ensure the quality and accuracy of the information collected.

    In today's fast-paced and ever-changing world, it is more important than ever to have accurate and timely information when making decisions. OSINT provides a unique perspective on the adversary that can be used to inform those decision makers. However, in order for OSINT to be useful, it must be collected and processed correctly.

    Developing professional procedures and methodologies ensures that the OSINT collected is of the highest quality and that it meets the specific needs of the customer. It also allows

  • Write professional OSINT reports

    The content of an OSINT report should be organized into six sections: an executive summary, scope of work, methodology, narrative, target profile face card/sheet, and appendices. Each component should be labelled correctly, and each paragraph should be well-written and simple to comprehend. Wherever possible, supporting evidence should be supplied, especially in the form of screenshots or pictures. The report should be formatted professionally, with headers and footers that are appropriate.

    Executive Summary

    An executive summary for an osint report should provide a brief overview of the report's findings. It should explain what osint is, what was found during the research process, and what the implications of the findings are. The executive summary should be clear, concise, and free of any jargon.

    Scope of work

    An OSINT report's scope of work section typically outlines the specific goals and objectives of the report, as well as the methods and tools used to collect the data. It is important to be as specific as possible in this section so that the reader knows exactly what to expect from the report. The scope of work should also be tailored to the specific client or audience for whom the report is being prepared.

    Methodology

    The methodology section of an OSINT report should describe the process and tools used to gather and analyze the data. It should also explain how the data was evaluated and how the conclusions were reached. This section should be clear and concise so that readers can understand how the information was collected and what methods were used to arrive at the final report.

    Narrative

    An OSINT report's narrative section is designed to give a clear and concise overview of the information that has been gathered. It should be written in a way that is easy to understand, and should not contain any unnecessary information. The narrative should be logical and well-organized, so that readers can easily follow the chain of events that led to the information being gathered.

    Target profile face card/sheet

    This is where all of the gathered information about the target is compiled into an easy to digest format. This format includes things like a physical description, known associates, and any relevant information about the target's background. This section is important because it allows the reader to get a quick overview of who the target is and what they are all about.

    Appendices

    This section contains information that supports the findings in the report. This information can include links to websites, screenshots, and other documentation. The appendices section is important because it provides readers with additional information that they can use to verify the findings in the report.

Career Outcomes

This certification thoroughly prepares you for the following roles:

  • OSINT Investigator
  • Cyber Threat Intelligence Analyst
  • Incident Responder
  • Penetration Tester
Certification Detail

MCSI certifications are highly respected and sought-after credentials in the industry. Earning an MCSI certification is a testament to your knowledge and skillset, and demonstrates your commitment to excellence. The content is cutting-edge, uniquely-designed, and hands-on. Our exercises teach in-demand skills that are immediately applicable in the field.

The certifications are valid indefinitely and do not require any renewal fees. The training is accessible without any time limits.

Syllabus

Training Modules

This course provides you with multiple training modules, each of which is designed to teach you practical skills that can help you solve important cyber problems. Each module offers exercises that will help you build your skills and capabilities.

  • MOIS-QS-001: Quickstarter - 12 exercises
  • MOIS-001: Key Concepts - 7 exercises
  • MOIS-002: IT Environment Setup - 3 exercises
  • MOIS-101: Search Engines - 13 exercises
  • MOIS-102: Facebook - 6 exercises
  • MOIS-103: Twitter - 5 exercises
  • MOIS-104: LinkedIn - 4 exercises
  • MOIS-105: Instagram - 3 exercises
  • MOIS-106: Usernames - 3 exercises
  • MOIS-107: Github - 7 exercises
  • MOIS-201: Email Addresses - 6 exercises
  • MOIS-202: Online Communities - 4 exercises
  • MOIS-203: Documents - 7 exercises
  • MOIS-301: Online Maps - 5 exercises
  • MOIS-302: Images - 4 exercises
  • MOIS-303: Videos - 3 exercises
  • MOIS-401: Domain Names - 8 exercises
  • MOIS-402: IP Addresses - 2 exercises
  • MOIS-403: Tor - 4 exercises
  • MOIS-501: Data Breaches - 2 exercises
  • MOIS-502: Documentation, Reports and Procedures - 5 exercises
  • MOIS-601: Capability Development - 2 exercises

Scenarios

Cyber professionals must be ready for everything. The typical security training strategy, which focuses on individual skills and tools, is insufficient. You must be able to operate as part of a team, see the big picture, and respond swiftly and effectively to unforeseen circumstances. That's why, as part of our training, we use replays of whole cyber missions. Our scenarios help you prepare for the demands of the job and give you confidence in your ability to work professionally.

  • MOIS-SC-01: Operation Blue Sun - 6 exercises

Certifications

MCSI Industry Certifications are important for you to earn because they signify that you have the skills required to work in a cybersecurity. Certificates of Completion are also important to earn because they signify that you have completed an exercise. Earning Certificates of Completion and Industry Certifications demonstrates that you are willing to put in the extra work to be successful.

1
ic-step-1

Student

2
ic-step-2

Obtain CPE points by solving exercises

3
ic-step-3

Achieve multiple certifications

4
ic-step-4

Receive help from instructors online

MCSI's MOIS certification covers all six levels of the Australian Signals Directorate's Cyber Skills Framework. You will achieve a certificate upon reaching each level. Click here to learn more.

ASD Skills Proficiency Level Curriculum Completion Requirement Scenarios Completion Requirement
MCSI OSINT Learner Level 1 0% 0%
MCSI Novice OSINT Practitioner Level 2 20% 0%
MCSI OSINT Practitioner Level 3 50% 25%
MCSI Senior OSINT Practitioner Level 4 70% 50%
MCSI Certified Principal OSINT Practitioner Level 5 80% 75%
MCSI Certified Expert OSINT Practitioner Level 6 95% 100%

In a single course, MCSI offers multiple industry certifications. You will save time and money with us because you will receive several accredited levels of competencies with a single purchase rather than having to buy multiple courses. Our goal is to provide you with a course that will take you from beginner to expert.

Career Pathways

This certification aligns with the following career pathways:

Certifications are important tools to validate your skills and knowledge. They can provide you with the credentials you need to get ahead in your career.

There are many reasons why a person should select certifications that teach practical skills over an open-book theory exam. Hands-on experience is crucial in many industries, and theory exams cannot replace the real-world application of skills. Furthermore, practical skills are often more marketable than theoretical knowledge, and can help a person secure a job in their desired field. Finally, practical skills can provide a foundation for further learning, while theory exams may only teach limited information. In conclusion, selecting a certification that teaches practical skills is the best way to ensure success in today's competitive job market.

Sample Exercises

Below are three (3) exercises from the 100+ exercises available in MOIS - Certified OSINT Expert:

Use Shodan.io To Passively Map An Organization's External Facing Assets (Novice)

exercise

Develop A Program That Utilizes Flicky API To Investigate A Target Person (Advanced Beginner)

exercise

Evaluate Key Information Commonly Revealed In Domain Names And Develop A Workflow Diagram To Analyse Domain Names In OSINT Engagements (Competent)

exercise

Our Instructors

Student exercises are reviewed and graded by multiple instructors. This one-of-a-kind approach allows you to get highly personalized input from a number of successful professionals.

MCSI's teachers bring real-world experience and knowledge to the classroom, ensuring that students have the skills they need to excel in the field of information security. Due to their extensive experience in penetration testing, vulnerability assessment, reverse engineering, incident response, digital forensics, and exploit development, students will understand the most up-to-date defensive and offensive cybersecurity strategies and procedures.

Our instructors are passionate about information security and are always looking to further their own knowledge. Students who attend an MCSI course can be confident that they are learning from some of the best in the business. They can adapt their teaching approaches to match the demands of any student, regardless of their degree of expertise.

The MCSI team strives to provide the most comprehensive and up-to-date cybersecurity training available. Whether you are a seasoned security professional or new to the field, MCSI has a course that will meet your needs.

Received personalized feedback from cybersecurity experts:

  • Overcome challenges and hurdles preventing you from advancing your skills
  • Receive guidance on how to focus your training efforts and avoid wasting time
  • Learn how to meet the industry's quality standards and produce high-quality work
  • When you're stuck, go to a support forum or ask inquiries to the instructors right on the platform

Help and Support

Your submissions will be reviewed by MCSI instructors, who will provide you with personalized feedback. This input is critical since it can assist you in identifying the areas where you need to enhance your skills. The instructor's feedback will also tell you how well you did an exercise and what you can do to improve your performance even further.

Click here to see an example of personalized feedback.

To read a student's testimony about MCSI's feedback, click here.

Throughout the course, MCSI provides continuing support and assistance. Students have access to an online forum where they can communicate directly with the instructors. The exercises include a question form for students to ask for clarification, allowing them to get the most out of the course.

The exercises are written in a way that makes it clear what is expected of you. There is a description, specifications, guidelines, and quality expectations for each exercise. If you need more information, you can ask for it and expect a response within a few hours.

Whenever you encounter an exercise that could be improved, please contact us so that we can update it. Our catalog is kept very up-to-date, and students who propose enhancements typically receive a patch within one business day.

Actively Maintained Course

This course is actively maintained to ensure that it is current and error-free. We want to ensure that you have the best possible experience while taking this course, which includes having access to accurate and current information. This course is also tested for flaws on a regular basis, so you can be sure you're getting a high-quality product.

This course is constantly updated with the support of trustworthy industry peers to ensure that students are acquiring the most up-to-date information and skills. This dedication to staying ahead of the curve is what distinguishes this course as one of the greatest in the market.

Prerequisites

Training Laptop Requirement

This course can be completed on a standard training laptop. To ensure you have the necessary hardware to complete the course, your machine should meet the following specifications:

  • 64-bit Intel i5/i7 2.0+ GHz processor or equivalent
  • 8GB of RAM
  • Ability to run at least (1) virtual machine using Virtual Box, or an equivalent virtualization software
  • Windows 10 or later, macOS 10 or later, or Linux
  • Local administrator privileges
Do you support older operating systems?

Yes. Many of the exercises can be completed on older OS versions. A few of our students are successfully using older equipment to learn cyber security.

Proficiency in the English language

You must have the ability to comfortably read and understand IT documentation written in English. Ideally, they have an IELTS score of 6.5 with no band less than 6 (or equivalent).

Note: You can register for this course without having undertaken an English test.

Professional Experience

No formal professional experience in IT required.

Lab Environment

This course teaches you how to setup and configure your own cybersecurity lab.

There are numerous advantages to creating your own cybersecurity lab rather than paying for one. The cost savings are perhaps the most evident benefit. When compared to the expense of licensing a pre-built lab, creating your own lab can save you thousands of dollars. You also have the option of customizing the lab environment to meet your specific requirements. You can, for example, select the hardware and software that will be used in your lab.

Another advantage of setting up your own cybersecurity lab is that it allows you to learn new skills. Building a lab from the ground up necessitates knowledge of networking, system administration, and other technical subjects. This experience is invaluable in your career as a cybersecurity professional.

We frequently see students who can complete a task in a pre-built lab but cannot complete the same task at work. This is because these labs are meant to lessen work complexity, thereby creating an illusion of personal capabilities. It's also worth noting that you'll be expected to set up your own lab to test tools and techniques in the workplace. Employers may give you the resources to set up virtual computers and networks, but it will be up to you to manage the lab environment and maintain your tools.

Finally, you should know that pre-built labs are not commonly licensed by top cybersecurity professionals. They've realized that setting up a lab is simple, efficient, adaptable, cost-effective, and that it sparks creativity. It also nullifies risk of performing unauthorized actions against systems provisioned by a third-party.

Why MCSI's OSINT Certification is World Class

why MCSI certifications

Comprehensive, Effective, Exceeds Standards

MOIS Certification holders have completed 100 practical online exercises, indicating that they have the abilities and knowledge to deliver OSINT engagements and develop unique OSINT tools. These activities take an average of 6 months for students to complete.

why MCSI certifications

Process and Outcome Focused

Students who have earned this certification have shown that they understand the OSINT methodology completely. This certification teaches more than just a set of techniques. Rather, it encourages students to create repeatable techniques that produce real-world results.

why MCSI certifications

Full Coverage

Google, Bing, theHarvester, Facebook, Twitter, LinkedIn, Instagram, Usernames, Github, Email Addresses, Discord, Reddit, Cloud Buckets, Pastebin, Google Maps, Barcodes, Youtube, Censys, Fierce, Tor, and many other data sources and technologies are covered.

MCSI students have submitted over 14,000 practical online exercises since December 2018.

Enrolment and Fees

Fees

US$450 (+ GST if you're based in Australia).

Practical exercises must be completed online using MCSI's Online Learning Platform.

How to enrol

  • Step 1 - Login/Register for MCSI's Online Learning Platform
  • Step 2 - Click `Shop` from the left-side menu
  • Step 3 - Find the course, select `Buy` and proceed through the checkout process.

You can purchase the training using a Credit Card or PayPal. The training is immediately available.

Terms and Conditions

  • No discounts
  • No refunds
  • No transfers
  • No renewal fees
  • No hidden fees
  • No time limits

Cooling-Off Policy

Received a full refund if you changed your mind about a purchase within 24 hours. No questions asked. Read the full details here.

Don't Buy This Course

Don't buy this course if you think learning cyber security is simple, that it will only take a few hours, that remembering a few concepts from videos and books would be enough, or, that you should be provided with walkthroughs and solutions to practical problems instead of thinking critically for yourself.

Our competitors are misleading you by claiming that their video courses and open-book theoretical certificates will teach you everything you need to know about cyber security. We recommend that you stay away from our courses until you've realized that cybersecurity requires hundreds of hours of training against difficult challenges under the watchful eye of experts encouraging you to improve your weaknesses. Only then will you understand the value of this course and the benefits that the MCSI Method™ can bring to your career. We only want satisfied customers.

How does MCSI Compare?

If you are looking for a certification that will give you an edge in the job market, look no further than MCSI certifications. Thanks to our innovative approach, cybersecurity training is more affordable and effective than traditional methods.

MCSI Certifications Traditional Vendors Industry Conferences Conference Workshop Cybersecurity Bootcamps Cyber Ranges
Cost US$450 $5,000+ $900+ $4,000+ $10,000+ $3,000+
Hours of training 600+ hours 40-48 10+ 16-40 450 40-100
Certifications 5 1 0 0 1 0
Online Yes Some No No No Yes
practical 100% 50% 0% 50% 50% 100%
Maintenance Level High Low Low Low Low Low
free trial Yes No No No No No
Access to instructors Yes Some No Yes Yes Some

Our pricing is more affordable than our competitors because we have reinvented how cyber training is done online. Our innovative Online Learning Platform is highly effective at teaching cyber security. The platform provides a more engaging and interactive learning experience than traditional methods, which helps students learn and retain skills better. Try the free version and see for yourself.

Bloom's Taxonomy

Bloom's Taxonomy is a system for categorizing distinct stages of intellectual growth. It is used in education to assist students comprehend and learn material more effectively. MCSI teaches students how to apply, analyze, evaluate, and create at the highest levels of the taxonomy. The majority of our competitors are simply concerned with getting you to remember concepts.

The intellectual developments outlined in Bloom's Taxonomy are directly tied to your capacity to advance in your cyber security career. Employers look for people who can solve challenges that are worth paying for. With us, you'll learn practical skills that are in demand and applicable to a wide range of cyber occupations.

Industry Recognized Skills

MCSI credentials are well-respected around the world, and organisations searching for people with real cyber security abilities seek them out. Obtaining an MCSI certification verifies your understanding of critical cyber security topics as well as your ability to provide real-world results.

The ability of MCSI's training programme to give students with real-world, hands-on experience is unrivalled. Students must conduct their own research and develop their own answers in order to complete our practical exercises, which are meant to give them the skills they need to be successful in the field.

With MCSI, you will build a comprehensive cybersecurity portfolio of your skills as you complete exercises. This portfolio is a powerful tool for displaying your cybersecurity knowledge and abilities. A portfolio, as opposed to typical resumes and paper-based credentials, presents a more thorough summary of your skills and accomplishments.

Students Feedback

Here's what students say about the MCSI Method™ and our Online Learning Platform:

Student Testimonials

Information Security Professionals made a median salary of $103,590 in 2020. Cybersecurity roles are regularly ranked #1 jobs in the United States.

If you're interested in increasing your earning potential, investing in five-week in this course will give you the skills and confidence you need to apply for jobs that offer a salary of $75,000 to $150,000 per year. Why spend tens of thousands of dollars on degrees or theoretical certifications when you can develop in-demand practical skills in a shorter amount of time?

Frequently Asked Questions

What is the MCSI Method™?

Common Questions

  • Are solutions included in certifications and bundles?
    • No. Our method of teaching cyber security consists of challenging you with real-world problem statements that you're expected to research and solve by doing your own research. This is how you'll be expected to work in the field. When you fail an exercise, we provide you with constructive feedback to improve and try again.
  • Do the videos provides the answers to exercises?
    • No. The videos teach concepts, mindset, methodologies, procedures and professional skills such as report writing, interviewing and preparing proposals.
  • Do bundles, training content, or certificates ever expire? Am I expected to buy again in the future?
    • Upon purchase, bundles and certificates are permanently unlocked with no recurring or ongoing fees.
  • Do I need to buy the training and the certification separately?
    • No. The price provided covers both. You only pay once.
  • Do you offer any special offers and discounts?
    • We understand that many of our customers may be looking for discounts, and we would love to be able to offer them. However, we do not provide discounts because we believe that our prices are fair and reasonable. We work hard to keep our prices low, and we feel that discounts would be unfair to our other customers. We hope you understand.
  • If I can't solve the exercise where do I go for help?
  • Who reviews and marks exercises?
    • Trained cyber security instructors that work for Mossé Cyber Security Institute.
    • MCSI instructors are highly qualified and experienced professionals who are able to teach a variety of topics related to information security. They have the ability to tailor their teaching methods to meet the needs of each student, regardless of their experience level. In addition, they are always up-to-date on the latest trends and developments in information security, which enables them to provide students with the most relevant and current information.
  • We can't pay via credit card. Can you raise an invoice for international wire payment instead?
    • Yes. Send us the list of bundles and certifications you want to purchase at [email protected]
  • Can I access a trial/demo the certification programmes prior to enrolling?
    • We provide a free curriculum with 82 practical exercises you can try.
    • The Free Curriculum teaches Security Tools, Penetration Testing, Red Teaming, Threat Hunting, Cyber Defence, GRC and Windows Internals.
    • Try the Free Curriculum
  • What is an `Unofficial Curriculum`?
    • An `Unofficial Curriculum` contains MCSI's practical exercises aligned to a non-MCSI Industry Certification syllabus.
    • We offer unofficial curriculums for the OSCP, ISACA CISA, ISACA CISM, ISACA CRISC, CCT ICE, CCSAS, CCT ACE.
  • Do you provide Continuing Professional Education (CPE) credits?
    • Yes. Every single exercise offers CPE credits. The number of credits earned depends on the difficulty of the exercise completed. Below are the CPE Credits achieve for an exercise in each difficulty:
    • Novice exercises = 1 CPE credits
    • Advanced Beginner exercises = 2 CPE credits
    • Competent exercises = 5 CPE credits
    • Proficient exercises= 8 CPE credits
    • Beyond Proficient exercises = 16 CPE credits
  • Do I need to complete an exam to receive MCSI Certification?
    • No. MCSI Certifications are completed by solving practical cybersecurity exercises.

DO YOU HAVE A QUESTION?

We'll respond within 24 hours

Visit our Frequently Asked Questions (FAQ) page for answers to the most common questions we receive.

Ready to learn hands-on cyber security skills online?

Register Now