Choose Your Learning Path
Professional cybersecurity training courses designed for your career stage and learning goals
Return HomeFinding the Right Course
Each course addresses different aspects of cybersecurity knowledge and serves different professional needs. Understanding your current position and development goals helps identify which program aligns with your situation.
If you're uncertain which course fits your needs, we welcome conversations about your background and objectives. Our team can provide guidance based on your specific circumstances rather than generic recommendations.
Cybersecurity Foundations
Essential understanding of information security principles and practices for professionals beginning their security journey or business stakeholders needing security literacy.
Core Security Concepts
Threat landscapes, attack vectors, defense mechanisms, and security frameworks explored through case studies and simulated scenarios.
Practical Lab Work
Virtual lab access for hands-on exploration of security tools and concepts in supervised environments.
Real-World Context
Technical and organizational aspects of security presented through scenarios illustrating workplace applications.
Virtual lab access included
Network Security and Defense Strategies
Technical exploration of network-level security concepts for those pursuing technical security roles, with prerequisite of basic networking knowledge.
Security Infrastructure
Firewalls, intrusion detection systems, VPN technologies, and network monitoring tools configured in lab environments.
Traffic Analysis
Network traffic analysis for anomaly detection, balancing defensive techniques with understanding of offensive methodologies.
Hands-On Labs
Extensive lab components throughout the 10-week program for practical implementation experience.
Lab access included
Security Operations and Incident Response
Preparation for security operations center roles and incident response teams, requiring foundational security knowledge as prerequisite.
SOC Operations
Security monitoring, alert triage, threat hunting, and incident handling procedures using industry-standard frameworks.
Incident Scenarios
Simulated incidents throughout the 12-week program, addressing technical analysis and communication aspects.
Professional Tools
Work with industry-standard tools and frameworks used in actual security operations environments.
Scenario-based exercises
Course Comparison
| Feature | Foundations | Network Security | Security Operations |
|---|---|---|---|
| Duration | 8 weeks | 10 weeks | 12 weeks |
| Investment | ¥128,000 | ¥178,000 | ¥248,000 |
| Prerequisites | None | Basic networking | Security foundations |
| Target Audience | IT professionals, business stakeholders | Technical security roles | SOC analysts, incident responders |
| Lab Access | ✓ Included | ✓ Included | ✓ Included |
Ready to Begin?
Not Sure Which Course?
We understand that choosing the right course requires consideration of your background, goals, and current situation. Our team can discuss your specific needs and help identify which program might serve you well.
Request a Consultation →Course Schedule
Courses run on a scheduled basis with specific start dates throughout the year. Contact us to learn about upcoming cohorts and enrollment timelines for your preferred program.
View Schedule →