Certification Programmes

MCSI Certification

MTH - Certified Threat Hunter

A highly skilled and qualified MCSI certified Threat Hunter is able to execute threat hunting engagements in large-scale Windows networks. By identifying and targeting threats early, organizations can improve their overall security posture and prevent costly breaches.

Threat hunting is the proactive identification and mitigation of threats in a network before they cause damage. It is a critical process for improving the security posture of an organization and preventing costly data breaches. To be effective, a threat hunter must have a deep understanding of the network environment and the tools and techniques necessary to detect malicious activity.

The MTH Certification is designed to help security professionals master the art and science of threat hunting. It is a globally-recognized credential that demonstrates that you have the competencies that the industry is seeking. Earning your MTH certification can open up opportunities for you to pursue a career in Cyber Threat Hunting.

Register Now Course Overview
Intermediate Level MCSI Certification Intermediate
ic-certificate Certification
ic-clock 600+ hours
cpe-points 208
ic-money US$450
No Expiry, No Renewals

Course Overview

The MTH Certification offers you an in-depth understanding of cyber threat hunting concepts and techniques. After completing the course, you will be able to effectively detect, diagnose, and respond to cyber threats.

1. Strong technical skills.

A successful cyber threat hunter must be technically skilled in order to identify, track, and mitigate malicious activities on their networks. They must be able to navigate complex systems and data flows, understand malware and exploits, and have a deep understanding of how networks operate.

2. Knowledge of attacker tactics, techniques, and procedures. 3. Strong problem-solving skills.

Threat hunters must also be familiar with attacker tactics, techniques, and procedures (TTPs). This allows them to identify malicious activity that may not be detectable by traditional security controls. By understanding how attackers operate, threat hunters can better protect their networks from becoming compromised.

3. Strong problem-solving skills.

Threat hunting is not a simple process. It can be difficult to find and track malicious activity across a complex network. A successful hunter must be able to think critically and solve problems quickly and efficiently.

4. Experience in network security.

In order to properly identify malicious activity, threat hunters must have a deep understanding of network security. They need to be familiar with the various security controls and how to use them to detect malicious activity. Experience in network security will also help them understand the patterns of malicious activity and how to properly investigate incidents

The MCSI Threat Hunting certification will equip you with the skillset necessary to carry out the following tasks:

  • Capture digital forensics artefacts in large-scale enterprise networks and index them for threat hunting
  • Hunt for cyber adversaries that have bypassed/avoided/defeated enterprise security solutions using Python and YARA
  • Rapidly analyse suspicious binaries to confirm whether they are malware or not
  • Align your approach and methodology to the MITRE ATT&CK Matrix
  • Practice threat hunting against thousands of machines and gigabytes worth of malware samples

The MTH Certification reflects the broad spectrum of skills, abilities and knowledge required for success in today's rapidly changing cyber world. It demonstrates that you have the competencies to operate and thrive in any network environment.

A cyber threat hunter can earn a six-figure salary and is in high demand because their skills are so valuable. They are able to detect and prevent cyber attacks, which is why businesses are willing to pay top dollar for their services.

Knowledge, Skills and Abilities You Will Acquire

MCSI is one of the most respected and trusted names in cyber security education and training. Our certifications teach critical skills, knowledge and abilities needed to advance a career in cyber security. Our courses are comprehensive and up-to-date, and our instructors are experienced professionals who are dedicated to helping students learn. MCSI provides the real-world skills and knowledge you need to protect any organization from cyber threats.

  • Learn a professional threat hunting procedure that can be applied in enterprise and government networks

    Threat hunting is a process of identifying and eliminating potential threats to an organization's security. It's important to use a structured process for threat hunting in order to ensure that all potential threats are identified and eliminated. A structured process helps to ensure that all possible threats are considered, and it also helps to ensure that your work is efficient and effective.

    Establish Goals and Objectives

    When undertaking any activity, it is important to establish specific goals and objectives in order to achieve the desired outcome. Threat hunting is no exception. By establishing your goals and objectives prior to beginning your hunt, you can ensure that your efforts are focused and directed in the most effective way possible.

    Collect Forensics Data

    The second step in a threat hunting process is to collect forensics data across the network. In order to do this, analysts must first identify the systems and data sources that need to be analyzed. Once these have been identified, investigators can use forensics tools to collect information from these systems. This information can include logs, files, and other data that can help to identify threats. By collecting data from across the network, analysts can get a comprehensive view of all activity on the network.

    Generate Hypotheses

    In a threat hunting engagement, the hypothesis generation phase is where the analyst starts to develop a list of hypotheses about the potential threats that could be impacting the organization. This can be done by reviewing the organization's security logs, network traffic, and other data sources to identify any potential patterns that could indicate malicious activity. The analyst will then test these hypotheses by further investigating the data to see if they can confirm or disprove them.

    Test Hypotheses

    The hypothesis testing phase is where you test your assumptions about the attack. This is where you use your data to determine the likelihood that the attack is real. You can do this by looking for evidence of the attack and trying to determine how likely it is that the attack could have occurred.

    Triage Results

    Triage is the process of analyzing data to determine if it warrants further investigation and, if so, what type of investigation is required. Triage is necessary because it is impossible to investigate every piece of data. By using triage, analysts can focus on the most important data and quickly rule out data that is not relevant to the investigation.

    Investigate potential incidents

    The incident investigation phase in a threat hunting engagement is where the hunters attempt to identify and understand the scope of the incident, identify and isolate any affected systems, and begin to gather evidence about the incident. The hunters will also work to determine the root cause of the incident and any potential vectors that may have been used to compromise the systems.

    Engineer Detections

    Detection engineering is the process of designing and implementing detection controls to identify malicious or unauthorized activity. This is where you codify your threat hunts and deploy long-term security detections.

  • Capture digital forensics logs in large-scale computer networks

    Large-scale threat hunting in enterprise or government networks can help identify and mitigate potential security incidents before they cause serious damage. By proactively searching for threats, organizations can identify and address vulnerabilities before they are exploited by malicious actors. This can help protect against data breaches, cyberattacks, and other malicious activities.

    Windows Internals

    Knowing Windows internals is important for threat hunting because it allows you to understand how Windows works. This understanding can help you find malicious activity that may not be visible to someone who does not know Windows internals.

    This course teaches you fundamental Windows knowledge, such as, but not limited to:

    • Processes and DLLs
    • Windows Registry
    • Scheduled Tasks
    • Windows Drivers
    • Windows Services
    • Windows Event Logs

    Data Collection

    Collecting forensics data at scale can be difficult. This course will teach you the tools and techniques necessary to collect data from tens of thousands of machines. You will learn how to use Forensics Collection scripts, Sysinternals utilities, and other third-party tools to efficiently collect data from a large number of machines.

    • Configuring Windows systems to log key security event courses for digital forensics purposes
    • Using open-source tools to capture snapshots of workstations and servers
    • Capturing the physical memory (RAM)
    • Capturing Windows Event Logs

    Network security logs are a valuable source of information for any organization. By collecting and analyzing these logs, you can identify potential security incidents, locate malicious activity, and improve your organization's security posture.

    • Routers and switches
    • Firewalls
    • IDS/IPS
    • Proxies

    SIEM Architecture and Deployment

    A SIEM (security information and event management) is a platform that collects data from various security devices and sources in order to help organizations detect and respond to threats. It does this by consolidating and analyzing data from various devices, such as firewalls, intrusion detection/prevention systems (IDS/IPS), antivirus software, and log files from servers and applications. SIEMs also help organizations meet compliance requirements by providing a complete view of activity across the enterprise.

    In this course, you will learn how to use ELK as a free SIEM for threat hunting. ELK, or Elasticsearch, Logstash, and Kibana, is a free and open source solution for managing large volumes of data. In this course, you will learn how to use ELK to monitor your system activity and detect threats.

    File Decomposition

    Malicious files can often be very complex, containing a variety of code and data that can be used to achieve the attacker’s goals. Decomposing these files can help you to better understand the threats that they pose and the behaviour that they exhibit.

    This can be particularly useful for threat hunting, as it can help you to identify malicious activity that may not be immediately obvious. By understanding the different components of a malicious file, you can more easily spot patterns and indicators of compromise that may otherwise go unnoticed.

  • Use Python to hunt for indicators of compromise at scale

    Data Science

    Knowing how to work with large datasets is important for threat hunting because it allows you to analyze more data and identify threats that may have otherwise gone unnoticed. Additionally, large datasets can be used to train machine learning models that can then be used to automate the process of threat hunting.

    Data science tools are important for threat hunting because they help analysts process and analyze large data sets quickly. Additionally, data science tools can help automate the process of threat detection, making it easier and faster for analysts to find threats.

    Python Pandas

    Python Pandas can be used for cyber threat hunting in a few ways. One way is to use the built-in functions to search for specific strings or values in data sets. This can be helpful in identifying malicious activity or data breaches. Another way is to use the data analysis features to identify trends or patterns in data. This can help you to spot suspicious activity that may be indicative of a cyber attack.

    MITRE Matrix

    The MITRE matrix is a tool that can be used for threat hunting. It is a table that organizes threats and vulnerabilities by type and severity. This can help you to organize and present your work.

    This course teaches you threat hunting techniques across the entire MITRE Matrix:

    • Initial Entry
    • Execution
    • Persistence
    • Privilege Escalation
    • Defence Evasion
    • Credential Access
    • Discovery
    • Lateral Movement
    • Collection
    • Command and Control
    • Exfiltration
  • Use YARA to hunt for malicious binaries at scale

    YARA can be a powerful tool for threat hunting. By creating rules that identify specific malware families or indicators of compromise, you can quickly scan your environment for signs of an attack.

    • Build a “goodware” dataset and a malware dataset
    • Learn how to use YARA's professionally and many of its pattern matching techniques
    • Detect obfuscated binaries
    • Detect exploits, vulnerabilities, shellcode and zero-days
    • Identify new malware samples based on features
    • Increase the speed of incident response
    • Build your own private anti-virus software using retro-hunting
  • Learn how to investigate cyber intrusions using digital forensics

    The MTH course provides multiple digital forensics case studies for the students to solve. This gives the students the opportunity to apply the skills they have learned in a real-world setting. The case studies are also a great way to learn more about digital forensics.

    • Investigating suspicious SSH tunnels
    • Investigating privilege escalation attacks
    • Detecting persistence techniques and entries
    • Investigating multiple password dumping attack techniques
  • Write professional malware analysis reports

    Executive Summary

    An executive summary is a high-level overview of a document that synthesizes the key points. It is typically used to give decision-makers a quick, executive-level understanding of complex topics. The executive summary should be clear, concise, and free of jargon. It should also contain enough detail to give the reader a good understanding of the document's contents.

    Tags and Keywords

    malware can have many different tags and keywords depending on its purpose. Some common tags and keywords for malware include: viruses, worms, Trojan horses, spyware, adware, and ransomware. Identifying and extracting these keywords and tags will help you summarize what the report is about.

    Sensitivity Classification

    The Traffic Light Protocol is a color-coding system used to indicate the sensitivity of information contained within a document. The colors represent different levels of classification, with red being the most sensitive, followed by amber, green, and white. The system is designed to help recipients of a document quickly identify the level of sensitivity of the information contained within.

    When conducting malware analysis, it is often necessary to share findings with other members of the security team. The Traffic Light Protocol can be used to classify the sensitivity of information contained in a report, making it easier for recipients to identify the level of risk associated with the malware.

    Hashes

    A common technique used to detect and analyze malware is to hash the contents of the sample and compare the result to a known database of hashes. This technique is effective because it is quick and does not require any prior knowledge of the sample. The most common algorithms used for hashing are MD5 and SHA-256.

    Methodology

    A malware analysis methodology is a process for reverse engineering malware to determine its functionality, capabilities, and purpose. The goal of malware analysis is to understand what the malware does, how it works, and how it can be detected and removed. The first step in malware analysis is to identify the type of malware and its capabilities. This can be done by looking at the code, researching the malware online, or running it in a controlled environment. Once the malware has been identified, the next step is to determine its purpose. This can be done by looking at the code, observing its behavior, or analyzing how it interacts with other systems.

    Limitations

    There are a number of limitations to malware analysis. Firstly, it can be time consuming and resource intensive. Secondly, there is a lack of standardization in tools and techniques, which can make it difficult to compare results across different analysts. Thirdly, malware can be designed to evade detection by malware analysis techniques, making it difficult to obtain accurate results. Finally, the dynamic nature of malware means that it can be difficult to obtain repeatable results.

    Identification and Classification of Sample(s)

    Information regarding the malware. For example, filename, file size, file type and format, first detection in the wild, and attributed threat actor.

    Features

    Different malware can have different features. For example, some malware is designed to steal information, while other malware is designed to disable systems. These features can then be graded by confidence level.

    Dependencies

    Malware dependencies are what make a given piece of malware effective. Without the proper dependencies, a piece of malware may not be able to function properly or may not be able to infect a system. Malware dependencies can include things such as specific operating system versions, specific hardware, or even specific applications. In some cases, a piece of malware may have dependencies on multiple items in order to function properly. In other cases, a piece of malware may only have a few dependencies. Properly analyzing a piece of malware's dependencies is important in order to determine how effective it may be.

    Conclusions of Code Analysis and Observed Behavior

    Conclusions of code analysis can include an understanding of the functionality of the malware, how it works, and what it is designed to do. Additionally, code analysis can reveal the level of sophistication of the malware and who might have created it. Observations of behavior can also provide information on what the malware does, how it works, and what it is designed to do.

Student Testimonial

Career Outcomes

This certification thoroughly prepares you for the following roles:

  • Cyber Threat Hunter
  • Security Operations Centre (SOC) Analyst
  • Threat Detection Analyst
Certification Detail

MCSI certifications are highly respected and sought-after credentials in the industry. Earning an MCSI certification is a testament to your knowledge and skillset, and demonstrates your commitment to excellence. The content is cutting-edge, uniquely-designed, and hands-on. Our exercises teach in-demand skills that are immediately applicable in the field.

The certifications are valid indefinitely and do not require any renewal fees. The training is accessible without any time limits.

Syllabus

Training Modules

This course provides you with multiple training modules, each of which is designed to teach you practical skills that can help you solve important cyber problems. Each module offers exercises that will help you build your skills and capabilities.

  • MTH-QS-01: Quickstarter: Lab Setup - 3 exercises
  • MTH-QS-02: Quickstarter: Threat Hunting with YARA - 5 exercises
  • MTH-QS-03: Quickstarter: Threat Hunting with Python Pandas - 5 exercises
  • MTH-001: Lab setup - 7 exercises
  • MTH-002: Fundamental Skills - 2 exercises
  • MTH-003: Windows Internals Fundamentals - 3 exercises
  • MTH-004: Pandas Fundamentals - 7 exercises
  • MTH-101: Threat Hunting with YARA - 20 exercises
  • MTH-102: Threat Hunting with Pandas - 16 exercises
  • MTH-201: Digital Forensics and Incident Response - 11 exercises
  • MTH-202: Memory Forensics - 5 exercises
  • MTH-301: Malware Analysis - 7 exercises
  • MTH-302: Capability Development - 13 exercises
  • MTH-401: Threat Hunting Simulations - 10 exercises

Certifications

MCSI Industry Certifications are important for you to earn because they signify that you have the skills required to work in a cybersecurity. Certificates of Completion are also important to earn because they signify that you have completed an exercise. Earning Certificates of Completion and Industry Certifications demonstrates that you are willing to put in the extra work to be successful.

1
ic-step-1

Student

2
ic-step-2

Obtain CPE points by solving exercises

3
ic-step-3

Achieve multiple certifications

4
ic-step-4

Receive help from instructors online

MCSI's MTH certification provides you with the required skills and knowledge to achieve all six levels of the Australian Signals Directorate's Cyber Skills Framework. Upon reaching each level, you will earn a certificate of achievement. Click here to learn more about our multi-credentialed approach.

ASD Skills Proficiency Level Curriculum Completion Requirement Scenarios Completion Requirement
MCSI Threat Hunter Learner Level 1 0% 0%
MCSI Novice Threat Hunter Practitioner Level 2 20% 0%
MCSI Threat Hunting Practitioner Level 3 50% 0%
MCSI Senior Threat Hunting Practitioner Level 4 70% 0%
MCSI Certified Principal Threat Hunting Practitioner Level 5 80% 0%
MCSI Certified Expert Threat Hunter Practitioner Level 6 95% 0%

In a single course, MCSI offers multiple industry certifications. You will save time and money with us because you will receive several accredited levels of competencies with a single purchase rather than having to buy multiple courses. Our goal is to provide you with a course that will take you from beginner to expert.

Career Pathways

This certification aligns with the following career pathways:

Certifications are important tools to validate your skills and knowledge. They can provide you with the credentials you need to get ahead in your career.

There are many reasons why a person should select certifications that teach practical skills over an open-book theory exam. Hands-on experience is crucial in many industries, and theory exams cannot replace the real-world application of skills. Furthermore, practical skills are often more marketable than theoretical knowledge, and can help a person secure a job in their desired field. Finally, practical skills can provide a foundation for further learning, while theory exams may only teach limited information. In conclusion, selecting a certification that teaches practical skills is the best way to ensure success in today's competitive job market.

Sample Exercises

Below are three (3) exercises from the 100+ exercises available in MTH - Certified Threat Hunter:

Write A YARA Rule That Identifies Binaries Compiled In The Last 24 hours (Novice)

exercise

Write A Query To Search For Signs Of Lateral Movement (Advanced Beginner)

exercise

Build A MultiThreaded Python Tool To Convert A Redline Outputs To Parquet At Scale (Competent)

exercise

Our Instructors

Student exercises are reviewed and graded by multiple instructors. This one-of-a-kind approach allows you to get highly personalized input from a number of successful professionals.

MCSI's teachers bring real-world experience and knowledge to the classroom, ensuring that students have the skills they need to excel in the field of information security. Due to their extensive experience in penetration testing, vulnerability assessment, reverse engineering, incident response, digital forensics, and exploit development, students will understand the most up-to-date defensive and offensive cybersecurity strategies and procedures.

Our instructors are passionate about information security and are always looking to further their own knowledge. Students who attend an MCSI course can be confident that they are learning from some of the best in the business. They can adapt their teaching approaches to match the demands of any student, regardless of their degree of expertise.

The MCSI team strives to provide the most comprehensive and up-to-date cybersecurity training available. Whether you are a seasoned security professional or new to the field, MCSI has a course that will meet your needs.

Received personalized feedback from cybersecurity experts:

  • Overcome challenges and hurdles preventing you from advancing your skills
  • Receive guidance on how to focus your training efforts and avoid wasting time
  • Learn how to meet the industry's quality standards and produce high-quality work
  • When you're stuck, go to a support forum or ask inquiries to the instructors right on the platform

Help and Support

Your submissions will be reviewed by MCSI instructors, who will provide you with personalized feedback. This input is critical since it can assist you in identifying the areas where you need to enhance your skills. The instructor's feedback will also tell you how well you did an exercise and what you can do to improve your performance even further.

Click here to see an example of personalized feedback.

To read a student's testimony about MCSI's feedback, click here.

Throughout the course, MCSI provides continuing support and assistance. Students have access to an online forum where they can communicate directly with the instructors. The exercises include a question form for students to ask for clarification, allowing them to get the most out of the course.

The exercises are written in a way that makes it clear what is expected of you. There is a description, specifications, guidelines, and quality expectations for each exercise. If you need more information, you can ask for it and expect a response within a few hours.

Whenever you encounter an exercise that could be improved, please contact us so that we can update it. Our catalog is kept very up-to-date, and students who propose enhancements typically receive a patch within one business day.

Actively Maintained Course

This course is actively maintained to ensure that it is current and error-free. We want to ensure that you have the best possible experience while taking this course, which includes having access to accurate and current information. This course is also tested for flaws on a regular basis, so you can be sure you're getting a high-quality product.

This course is constantly updated with the support of trustworthy industry peers to ensure that students are acquiring the most up-to-date information and skills. This dedication to staying ahead of the curve is what distinguishes this course as one of the greatest in the market.

Prerequisites

Training Laptop Requirement

This course can be completed on a standard training laptop. To ensure you have the necessary hardware to complete the course, your machine should meet the following specifications:

  • 64-bit Intel i5/i7 2.0+ GHz processor or equivalent
  • 8GB of RAM
  • Ability to run at least (1) virtual machine using Virtual Box, or an equivalent virtualization software
  • Windows 10 or later, macOS 10 or later, or Linux
  • Local administrator privileges
Do you support older operating systems?

Yes. Many of the exercises can be completed on older OS versions. A few of our students are successfully using older equipment to learn cyber security.

Proficiency in the English language

You must have the ability to comfortably read and understand IT documentation written in English. Ideally, they have an IELTS score of 6.5 with no band less than 6 (or equivalent).

Note: You can register for this course without having undertaken an English test.

Programming Skills

We recommend that you have some experience in software programming prior to registering for this course.

The preferred programming language for this course is Python.

Lab Environment

This course teaches you how to setup and configure your own cybersecurity lab.

There are numerous advantages to creating your own cybersecurity lab rather than paying for one. The cost savings are perhaps the most evident benefit. When compared to the expense of licensing a pre-built lab, creating your own lab can save you thousands of dollars. You also have the option of customizing the lab environment to meet your specific requirements. You can, for example, select the hardware and software that will be used in your lab.

Another advantage of setting up your own cybersecurity lab is that it allows you to learn new skills. Building a lab from the ground up necessitates knowledge of networking, system administration, and other technical subjects. This experience is invaluable in your career as a cybersecurity professional.

We frequently see students who can complete a task in a pre-built lab but cannot complete the same task at work. This is because these labs are meant to lessen work complexity, thereby creating an illusion of personal capabilities. It's also worth noting that you'll be expected to set up your own lab to test tools and techniques in the workplace. Employers may give you the resources to set up virtual computers and networks, but it will be up to you to manage the lab environment and maintain your tools.

Finally, you should know that pre-built labs are not commonly licensed by top cybersecurity professionals. They've realized that setting up a lab is simple, efficient, adaptable, cost-effective, and that it sparks creativity. It also nullifies risk of performing unauthorized actions against systems provisioned by a third-party.

Aptitude Test (Optional)

This is an intermediate course. It includes exercises for novices but assumes that they have competent IT skills and a strong understanding of cybersecurity concepts.

Aptitude Test:

If you're not sure if you'll be able to fully enjoy this course, then contact us via email to organize a free aptitude test. This test will determine whether you meet the course's basic baseline criteria. If you've never studied with us before, it will also introduce you to the MCSI Method™.

Easier Courses:

If you are convinced that this course is too difficult for you, then you should start with something easier. We recommend checking out the following courses:

You won't need to complete all of these easier courses in their entirety. Most likely, you already have adequate skills and only need to fine-tune them before taking an intermediate course like this one. Choose a route, follow it, enhance your skills, and then return to this course in a few months!

Free Study Materials

Purchasing a course is a significant investment. It's critical to know what the course entails and what you intend to get out of it. If you're on the fence about whether or not to buy this course, you might want to check out our blog for more information. Concepts, terminology, and essential principles are all taught in our blog. This will give you more details about the topics that will be addressed in the course.

We place a major emphasis on teaching practical skills. Our students learn best when they can put what they've learned into practice. In addition, we believe that many significant thoughts and ideas should be publicly accessible to anyone. We believe that knowledge that is already available in the public domain should not be subject to price.

Testimonials

Why MCSI’s Threat Hunter Certification is World Class

why MCSI certifications

Comprehensive, Effective, Exceeds Standards

Holders of the MTH Certification have completed 100 practical online exercises thus demonstrating that they have the skills and knowledge required to perform professional threat hunting engagements in any network environment – no matter the scale. Students take an average of 6 months to complete these exercises.

why MCSI certifications

Data Science Focused

Students who have obtained this Certification have demonstrated that they have a full understanding of the threat hunting process and methodology using data science techniques. These techniques are 100% transferable to any enterprise security solution.

why MCSI certifications

Programming Oriented

Many of the challenges that students must pass to obtain this certification require students to write software in Python, YARA and PowerShell. This guarantees that threat hunter certified by MCSI understand how exactly how threat hunting works and do not solely require on automated tools.

MCSI students have submitted over 14,000 practical online exercises since December 2018.

Enrolment and Fees

Fees

US$450 (+ GST if you're based in Australia).

Practical exercises must be completed online using MCSI's Online Learning Platform.

How to enrol

  • Step 1 - Login/Register for MCSI's Online Learning Platform
  • Step 2 - Click `Shop` from the left-side menu
  • Step 3 - Find the course, select `Buy` and proceed through the checkout process.

You can purchase the training using a Credit Card or PayPal. The training is immediately available.

Terms and Conditions

  • No discounts
  • No refunds
  • No transfers
  • No renewal fees
  • No hidden fees
  • No time limits

Cooling-Off Policy

Received a full refund if you changed your mind about a purchase within 24 hours. No questions asked. Read the full details here.

Don't Buy This Course

Don't buy this course if you think learning cyber security is simple, that it will only take a few hours, that remembering a few concepts from videos and books would be enough, or, that you should be provided with walkthroughs and solutions to practical problems instead of thinking critically for yourself.

Our competitors are misleading you by claiming that their video courses and open-book theoretical certificates will teach you everything you need to know about cyber security. We recommend that you stay away from our courses until you've realized that cybersecurity requires hundreds of hours of training against difficult challenges under the watchful eye of experts encouraging you to improve your weaknesses. Only then will you understand the value of this course and the benefits that the MCSI Method™ can bring to your career. We only want satisfied customers.

How does MCSI Compare?

If you are looking for a certification that will give you an edge in the job market, look no further than MCSI certifications. Thanks to our innovative approach, cybersecurity training is more affordable and effective than traditional methods.

MCSI Certifications Traditional Vendors Industry Conferences Conference Workshop Cybersecurity Bootcamps Cyber Ranges
Cost US$450 $5,000+ $900+ $4,000+ $10,000+ $3,000+
Hours of training 600+ hours 40-48 10+ 16-40 450 40-100
Certifications 5 1 0 0 1 0
Online Yes Some No No No Yes
practical 100% 50% 0% 50% 50% 100%
Maintenance Level High Low Low Low Low Low
free trial Yes No No No No No
Access to instructors Yes Some No Yes Yes Some

Our pricing is more affordable than our competitors because we have reinvented how cyber training is done online. Our innovative Online Learning Platform is highly effective at teaching cyber security. The platform provides a more engaging and interactive learning experience than traditional methods, which helps students learn and retain skills better. Try the free version and see for yourself.

Bloom's Taxonomy

Bloom's Taxonomy is a system for categorizing distinct stages of intellectual growth. It is used in education to assist students comprehend and learn material more effectively. MCSI teaches students how to apply, analyze, evaluate, and create at the highest levels of the taxonomy. The majority of our competitors are simply concerned with getting you to remember concepts.

The intellectual developments outlined in Bloom's Taxonomy are directly tied to your capacity to advance in your cyber security career. Employers look for people who can solve challenges that are worth paying for. With us, you'll learn practical skills that are in demand and applicable to a wide range of cyber occupations.

Industry Recognized Skills

MCSI credentials are well-respected around the world, and organisations searching for people with real cyber security abilities seek them out. Obtaining an MCSI certification verifies your understanding of critical cyber security topics as well as your ability to provide real-world results.

The ability of MCSI's training programme to give students with real-world, hands-on experience is unrivalled. Students must conduct their own research and develop their own answers in order to complete our practical exercises, which are meant to give them the skills they need to be successful in the field.

With MCSI, you will build a comprehensive cybersecurity portfolio of your skills as you complete exercises. This portfolio is a powerful tool for displaying your cybersecurity knowledge and abilities. A portfolio, as opposed to typical resumes and paper-based credentials, presents a more thorough summary of your skills and accomplishments.

Students Feedback

Here's what students say about the MCSI Method™ and our Online Learning Platform:

Student Testimonials

Information Security Professionals made a median salary of $103,590 in 2020. Cybersecurity roles are regularly ranked #1 jobs in the United States.

If you're interested in increasing your earning potential, investing in five-week in this course will give you the skills and confidence you need to apply for jobs that offer a salary of $75,000 to $150,000 per year. Why spend tens of thousands of dollars on degrees or theoretical certifications when you can develop in-demand practical skills in a shorter amount of time?

Frequently Asked Questions

What is the MCSI Method™?

Common Questions

  • Are solutions included in certifications and bundles?
    • No. Our method of teaching cyber security consists of challenging you with real-world problem statements that you're expected to research and solve by doing your own research. This is how you'll be expected to work in the field. When you fail an exercise, we provide you with constructive feedback to improve and try again.
  • Do the videos provides the answers to exercises?
    • No. The videos teach concepts, mindset, methodologies, procedures and professional skills such as report writing, interviewing and preparing proposals.
  • Do bundles, training content, or certificates ever expire? Am I expected to buy again in the future?
    • Upon purchase, bundles and certificates are permanently unlocked with no recurring or ongoing fees.
  • Do I need to buy the training and the certification separately?
    • No. The price provided covers both. You only pay once.
  • Do you offer any special offers and discounts?
    • We understand that many of our customers may be looking for discounts, and we would love to be able to offer them. However, we do not provide discounts because we believe that our prices are fair and reasonable. We work hard to keep our prices low, and we feel that discounts would be unfair to our other customers. We hope you understand.
  • If I can't solve the exercise where do I go for help?
  • Who reviews and marks exercises?
    • Trained cyber security instructors that work for Mossé Cyber Security Institute.
    • MCSI instructors are highly qualified and experienced professionals who are able to teach a variety of topics related to information security. They have the ability to tailor their teaching methods to meet the needs of each student, regardless of their experience level. In addition, they are always up-to-date on the latest trends and developments in information security, which enables them to provide students with the most relevant and current information.
  • We can't pay via credit card. Can you raise an invoice for international wire payment instead?
    • Yes. Send us the list of bundles and certifications you want to purchase at [email protected]
  • Can I access a trial/demo the certification programmes prior to enrolling?
    • We provide a free curriculum with 82 practical exercises you can try.
    • The Free Curriculum teaches Security Tools, Penetration Testing, Red Teaming, Threat Hunting, Cyber Defence, GRC and Windows Internals.
    • Try the Free Curriculum
  • What is an `Unofficial Curriculum`?
    • An `Unofficial Curriculum` contains MCSI's practical exercises aligned to a non-MCSI Industry Certification syllabus.
    • We offer unofficial curriculums for the OSCP, ISACA CISA, ISACA CISM, ISACA CRISC, CCT ICE, CCSAS, CCT ACE.
  • Do you provide Continuing Professional Education (CPE) credits?
    • Yes. Every single exercise offers CPE credits. The number of credits earned depends on the difficulty of the exercise completed. Below are the CPE Credits achieve for an exercise in each difficulty:
    • Novice exercises = 1 CPE credits
    • Advanced Beginner exercises = 2 CPE credits
    • Competent exercises = 5 CPE credits
    • Proficient exercises= 8 CPE credits
    • Beyond Proficient exercises = 16 CPE credits
  • Do I need to complete an exam to receive MCSI Certification?
    • No. MCSI Certifications are completed by solving practical cybersecurity exercises.

DO YOU HAVE A QUESTION?

We'll respond within 24 hours

Visit our Frequently Asked Questions (FAQ) page for answers to the most common questions we receive.

Ready to learn hands-on cyber security skills online?

Register Now