MCSI certifications are highly respected and sought-after credentials in the industry. Earning an MCSI certification is a testament to your knowledge and skillset, and demonstrates your commitment to excellence. The content is cutting-edge, uniquely-designed, and hands-on. Our exercises teach in-demand skills that are immediately applicable in the field.
The certifications are valid indefinitely and do not require any renewal fees. The training is accessible without any time limits.
Syllabus
Training Modules
This course provides you with multiple training modules, each of which is designed to teach you practical skills that can help you solve important cyber problems. Each module offers exercises that will help you build your skills and capabilities.
-
MTIA-QS-01:
Quickstarter
- 11 exercises
-
MTIA-001:
Lab Setup
- 5 exercises
-
MTIA-002:
Fundamentals
- 5 exercises
-
MTIA-101:
Open-Source Intelligence
- 8 exercises
-
MTIA-102:
Internal Logs Sources
- 5 exercises
-
MTIA-103:
Binary Classification
- 4 exercises
-
MTIA-104:
File and Executable Forensics
- 3 exercises
-
MTIA-105:
Memory Forensics
- 5 exercises
-
MTIA-106:
Network Forensics
- 2 exercises
-
MTIA-107:
Windows Forensics
- 5 exercises
-
MTIA-108:
Threat Hunting with YARA
- 12 exercises
-
MTIA-109:
Threat Hunting with Pandas
- 5 exercises
-
MTIA-110:
Threat Hunting with Velociraptor
- 3 exercises
-
MTIA-111:
Threat Hunting with GRR Rapid Response
- 3 exercises
-
MTIA-201:
Situational Awareness
- 7 exercises
-
MTIA-202:
Pivot Analysis
- 4 exercises
-
MTIA-203:
Harnessing Threat Feeds
- 8 exercises
-
MTIA-204:
Monitor New Threats and Vulnerabilities
- 3 exercises
-
MTIA-205:
Security Automation
- 3 exercises
-
MTIA-301:
Cyber Threat Mapping
- 6 exercises
-
MTIA-302:
Hypotheses Creation
- 3 exercises
-
MTIA-303:
Supporting Red Teams and Threat Hunting Teams
- 3 exercises
-
MTIA-304:
Reporting
- 6 exercises
-
MTIA-305:
Policies, Procedures and Methodologies
- 11 exercises
-
MTIA-401:
Cyber Counterintelligence
- 1 exercises
Scenarios
Cyber professionals must be ready for everything. The typical security training strategy, which focuses on individual skills and tools, is insufficient. You must be able to operate as part of a team, see the big picture, and respond swiftly and effectively to unforeseen circumstances. That's why, as part of our training, we use replays of whole cyber missions. Our scenarios help you prepare for the demands of the job and give you confidence in your ability to work professionally.
-
MTIA-SC-01:
Operation Phantom Protocol
- 15 exercises
⚡
Enroll now with lifetime access for
$450
→
Certifications
MCSI Industry Certifications are important for you to earn because they signify that you have the skills required to work in a cybersecurity. Certificates of Completion are also important to earn because they signify that you have completed an exercise. Earning Certificates of Completion and Industry Certifications demonstrates that you are willing to put in the extra work to be successful.
1
Student
2
Obtain CPE points by solving exercises
3
Achieve multiple certifications
4
Receive help from instructors online
MCSI's MTIA certification provides you with the required skills and knowledge aligned to the Australian Signals Directorate's
Cyber Skills Framework
. Upon reaching each level, you will earn a certificate of achievement.
Click here to learn more about our multi-credentialed approach.
|
Certificate Level
|
Curriculum Completion Requirement
|
Scenarios Completion Requirement
|
MCSI Threat Intelligence Learner
|
Level 1
|
0%
|
0%
|
MCSI Novice Threat Intelligence Practitioner
|
Level 2
|
20%
|
0%
|
MCSI Threat Intelligence Practitioner
|
Level 3
|
50%
|
0%
|
MCSI Senior Threat Intelligence Practitioner
|
Level 4
|
70%
|
10%
|
MCSI Certified Principal Threat Intelligence Practitioner
|
Level 5
|
80%
|
25%
|
MCSI Certified Expert Threat Intelligence Practitioner
|
Level 6
|
95%
|
50%
|
In a single course, MCSI offers multiple industry certifications. You will save time and money with us because you will receive several accredited levels of competencies with a single purchase rather than having to buy multiple courses. Our goal is to provide you with a course that will take you from beginner to expert.
Career Pathways
This certification aligns with the following career pathways:
Certifications are important tools to validate your skills and knowledge. They can provide you with the credentials you need to get ahead in your career.
There are many reasons why a person should select certifications that teach practical skills over an open-book theory exam. Hands-on experience is crucial in many industries, and theory exams cannot replace the real-world application of skills. Furthermore, practical skills are often more marketable than theoretical knowledge, and can help a person secure a job in their desired field. Finally, practical skills can provide a foundation for further learning, while theory exams may only teach limited information. In conclusion, selecting a certification that teaches practical skills is the best way to ensure success in today's competitive job market.
Sample Exercises
Below are three (3) exercises from the 100+ exercises available in MTIA - Certified Threat Intelligence Analyst:
Use Shodan.Io To Passively Map An Organization's External Facing Assets (Novice)
Write A Python Script To Scrape Online Content For Indicators Of Compromise (Advanced Beginner)
Perform A Code Review Of The Control Panel Of The Zeus Banking Trojan (Competent)
Our Instructors
Student exercises are reviewed and graded by multiple instructors. This one-of-a-kind approach allows you to get highly personalized input from a number of successful professionals.
MCSI's teachers bring real-world experience and knowledge to the classroom, ensuring that students have the skills they need to excel in the field of information security. Due to their extensive experience in penetration testing, vulnerability assessment, reverse engineering, incident response, digital forensics, and exploit development, students will understand the most up-to-date defensive and offensive cybersecurity strategies and procedures.
Our instructors are passionate about information security and are always looking to further their own knowledge. Students who attend an MCSI course can be confident that they are learning from some of the best in the business. They can adapt their teaching approaches to match the demands of any student, regardless of their degree of expertise.
The MCSI team strives to provide the most comprehensive and up-to-date cybersecurity training available. Whether you are a seasoned security professional or new to the field, MCSI has a course that will meet your needs.
Receive personalized feedback from cybersecurity experts:
-
Overcome challenges and hurdles preventing you from advancing your skills
-
Receive guidance on how to focus your training efforts and avoid wasting time
-
Learn how to meet the industry's quality standards and produce high-quality work
-
When you're stuck, go to a support forum or ask inquiries to the instructors right on the platform
Help and Support
24/7 Discord Community
If you're looking for additional support during your studies, consider joining our Discord server. Our community of fellow students and instructors is always available to provide help and answer any questions you may have.
Personalized Support
Your submissions will be reviewed by MCSI instructors, who will provide you with personalized feedback. This input is critical since it can assist you in identifying the areas where you need to enhance your skills. The instructor's feedback will also tell you how well you did an exercise and what you can do to improve your performance even further.
Click here to see an example of personalized feedback.
Our personalized support will take your skills to the next level. Read what a student says about it:
Quick Questions
If you have any questions or need clarification on any of the exercises, MCSI offers a Quick Questions section on each exercise where you can ask for help. This is a great resource to use if you need assistance. This feature is only available for paid courses.
Actively Maintained Course
This course is actively maintained to ensure that it is current and error-free. We want to ensure that you have the best possible experience while taking this course, which includes having access to accurate and current information. This course is also tested for flaws on a regular basis, so you can be sure you're getting a high-quality product.
This course is constantly updated with the support of trustworthy industry peers to ensure that students are acquiring the most up-to-date information and skills. This dedication to staying ahead of the curve is what distinguishes this course as one of the greatest in the market.
Prerequisites
Training Laptop Requirement
This course can be completed on a standard training laptop. To ensure you have the necessary hardware to complete the course, your machine should meet the following specifications:
-
64-bit Intel i5/i7 2.0+ GHz processor or equivalent
-
8GB of RAM
-
Ability to run at least (1) virtual machine using Virtual Box, or an equivalent virtualization software
-
Windows 10 or later, macOS 10 or later, or Linux
-
Local administrator privileges
Do you support older operating systems?
Yes. Many of the exercises can be completed on older OS versions. A few of our students are successfully using older equipment to learn cyber security.
Proficiency in the English language
You must have the ability to comfortably read and understand IT documentation written in English. Ideally, they have an IELTS score of 6.5 with no band less than 6 (or equivalent).
Note: You can register for this course without having undertaken an English test.
Prerequisite Skills
- Writing scripts in Python
- Using command line utilities and tools
- Operating virtual machines
- Troubleshooting and resolving software errors
Prerequisite Knowledge
- Knowledge of cyber threats and vulnerabilities
- Knowledge of cyber attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks)
- Knowledge of attack methods and techniques (DDoS, brute force, spoofing, etc.)
- Knowledge of common computer/network infections (virus, Trojan, etc.) and methods of infection (ports, attachments, etc.)
- Knowledge of fundamental cyber operations concepts, terminology/lexicon (i.e., environment preparation, cyber-attack, cyber defense), principles, capabilities, limitations, and effects
- Knowledge of the basics of network security (e.g., encryption, firewalls, authentication, honey pots, perimeter protection)
- Knowledge of the common networking and routing protocols (e.g. TCP/IP), services (e.g., web, mail, DNS), and how they interact to provide network communications
Lab Environment
This course teaches you how to setup and configure your own cybersecurity lab.
There are numerous advantages to creating your own cybersecurity lab rather than paying for one. The cost savings are perhaps the most evident benefit. When compared to the expense of licensing a pre-built lab, creating your own lab can save you thousands of dollars. You also have the option of customizing the lab environment to meet your specific requirements. You can, for example, select the hardware and software that will be used in your lab.
Another advantage of setting up your own cybersecurity lab is that it allows you to learn new skills. Building a lab from the ground up necessitates knowledge of networking, system administration, and other technical subjects. This experience is invaluable in your career as a cybersecurity professional.
We frequently see students who can complete a task in a pre-built lab but cannot complete the same task at work. This is because these labs are meant to lessen work complexity, thereby creating an illusion of personal capabilities. It's also worth noting that you'll be expected to set up your own lab to test tools and techniques in the workplace. Employers may give you the resources to set up virtual computers and networks, but it will be up to you to manage the lab environment and maintain your tools.
Finally, you should know that pre-built labs are not commonly licensed by top cybersecurity professionals. They've realized that setting up a lab is simple, efficient, adaptable, cost-effective, and that it sparks creativity. It also nullifies risk of performing unauthorized actions against systems provisioned by a third-party.
Aptitude Test (Optional)
This is an intermediate course. It includes exercises for novices but assumes that they have competent IT skills and a strong understanding of cybersecurity concepts.
Aptitude Test:
If you're not sure if you'll be able to fully enjoy this course, then contact us via email to organize a free aptitude test. This test will determine whether you meet the course's basic baseline criteria. If you've never studied with us before, it will also introduce you to the MCSI Method™.
Easier Courses:
If you are convinced that this course is too difficult for you, then you should start with something easier. We recommend checking out the following courses:
You won't need to complete all of these easier courses in their entirety. Most likely, you already have adequate skills and only need to fine-tune them before taking an intermediate course like this one. Choose a route, follow it, enhance your skills, and then return to this course in a few months!