Certification Programmes

MCSI Certification

MTCF - Technical Cybersecurity Fundamentals

This free curriculum teaches basic technical cybersecurity skills.

Examples of the topics covered include: network reconnaissance, vulnerability scanning, penetration testing, YARA, digital forensics, Windows hardening and malware development.

Our technical exercises complement theoretical-focused cybersecurity classes.

Register Now
Intermediate Level MCSI Certification beginner
ic-certificate Certification
ic-clock 200+ hours
cpe-points 96
ic-money Free
No Expiry, No Renewals

Overview

MCSI Certifications are world-class. The content is cutting-edge, uniquely-designed, hands-on and challenging. Our exercises teach in-demand skills that are immediately applicable in the field. MCSI's unique approach helps students around the world advance their careers.

This Certification has no expiry date. It has no renewal fees, no hidden fees, and is accessible with no time limits.

MCSI - Technical Cybersecurity Fundamentals:

  • Perform infrastructure and application vulnerability scans
  • Manually exploit web application vulnerabilities
  • Protect and harden Windows machines
  • Write malware for penetration testing purposes
  • Discover malware code and exploits in documents and files
  • Hunt for threats across numerous digital forensics artefacts

Curriculum

Training Modules

  • Technical Concepts - 8 exercises
  • Software Development Concepts - 5 exercises
  • Governance, Risk and Compliance - 5 exercises
  • Screen Recording - 1 exercises
  • Lab Setup - 4 exercises
  • Network and Application Reconnaissance - 3 exercises
  • Vulnerability Scanning - 2 exercises
  • Web Application Testing Tools - 4 exercises
  • YARA Fundamentals - 7 exercises
  • Digital Investigations - 4 exercises
  • Web Application Vulnerabilities - 5 exercises
  • Windows Vulnerabilities - 1 exercises
  • Windows Hardening - 8 exercises
  • Windows Programming - 5 exercises
  • Web Application Vulnerabilities - 2 exercises
  • Windows Programming - 4 exercises
  • Malware Development - 5 exercises
  • Malware Development - 5 exercises
  • Threat Hunting Challenges - 3 exercises
  • Windows Network Defence - 3 exercises

Sample Exercises

Below are three (3) exercises from the 100+ exercises available in MTCF - Technical Cybersecurity Fundamentals:

Perform a Vulnerability Scan With Openvas (Novice)

exercise


Use dumpzilla to extract forensics browser logs (Novice)

exercise


Write Malware that automatically bypasses uac (Advanced Beginner)

exercise

Enrolment and Fees

Fees

Free

Practical exercises must be completed online using MCSI's Online Learning Platform.

Register Now

Requirements

Proficiency in the English language

Ability to comfortably read and understand IT documentation written in English. Ideally, an IELTS score of 6.5 with no band less than 6 (or equivalent).

Note: You can register for this course without having undertaken an English test.

Programming Skills

This course requires you to write scripts and simple web applications.

We recommend that you have at least one (1) year of experience in web programming, or a degree that included modules on software development.

System Administration Skills

This course requires you to:

  • Deploy, configure and manage virtual machines
  • Write scripts in PowerShell and Python
  • Install and configure software on Windows and Linux
  • Run programs and utilities using command line interfaces

Important Note

If you are completely new to Cybersecurity then complete MICS first.

If you have little to no technical IT skills then consider start with MSAF.

Career Outcomes

This curriculum teaches you fundamental technical skills. Gaining these skills will prepare you for an internship position in cybersecurity.

Certification Detail

Training Curriculum and Certifications

Students unlock Certificates of Completion for every exercise they complete. Industry Certifications are unlocked upon achieving Skills Proficiency Milestones.

1
ic-step-1

Student

2
ic-step-2

Obtain CPE points by solving exercises

3
ic-step-3

Achieve multiple certifications

4
ic-step-4

Receive help from instructors online

With this Certification training you will be fully capable of performing the following:

  • Install, configure and execute basic usage of cybersecurity tools
    • BeEF
    • Burp Suite
    • Cuckoo
    • Dumpzilla
    • Fierce
    • Metagoofil
    • OWASP ZAP
    • OpenVAS
    • PE Studio
    • WFUZZ
    • YARA
  • Develop simple malware for penetration-testing purposes
    • HTTP/S reverse shells
    • TCP reverse shells
    • Web shells
    • Web fuzzers
    • Programs that capture clipboard data
    • Programs that capture screenshots of the desktop
  • Write simple detection rules for threat hunting purposes
    • Use YARA to identify malicious files, documents and exploits
    • Use Pandas to search forensics logs for Indicators of Compromise
  • Harden Windows machines using PowerShell
    • LLMNR
    • Missing Patches
    • NetBIOS
    • Protecting LSASS
    • WPAD
    • Windows Script Host
  • Understand at a code-level how some web vulnerabilities are created and exploited
    • Arbitrary Command Execution
    • Cookie Injection
    • Cross-Site Scripting
    • Default Credentials

Why MCSI’s MTCF Curriculum is World Class

why MCSI certifications

Comprehensive, Effective, Exceeds Standards

Holders of the MTCF Certificate of Completion have completed 80 practical exercises. This approach ensured that they have entry-level skills across several cyber domains. Such as: web application vulnerabilities, OS vulnerabilities, YARA, Windows programming, PowerShell and malware development.

why MCSI certifications

Practical, Field-Based

Students must complete hands-on tasks inspired from real-life engagements. They must write code and deploy security tools in virtual machines. With each exercise, we ask them to develop functional proof-of-concept solutions.

why MCSI certifications

Programming Oriented

To get this Certificate of Completion, students must write software in PHP, Python, PowerShell and YARA. This teaches them how to properly think about cybersecurity and solve real-world problems.

DO YOU HAVE A QUESTION?

We'll respond within 24 hours

Visit our Frequently Asked Questions (FAQ) page for answers to the most common questions we receive.

Ready to learn hands-on cyber security skills online?

Register Now