Register today!

Micro-credentials make a big impact

Learn high-demand cyber security skills in courses created for real-world needs with CyberWave’s micro-credentials.

Student studying at a computer

Your fast track to cyber security expertise

For new learners, established cyber security professionals, and employers looking to enhance their teams’ skills, CyberWave provides easy access to in-demand expertise. Pick one of our career-oriented tracks — a series of preselected courses that give you a complete skill-set for a new role — or take individual micro-credentials to fill more specific skill gaps.

Not sure what track is right for you? See where your unique skills and experiences would be a good fit with the aptitude test. Use code ‘MITT’ for 30% off.

Use discount code MITT to get 30% off

Student pondering while learning from home.
Vulnerability Assessment & Penetration Testing
  • CND
  • CEH
  • CPENT
  • LPT
Software Security
  • CEH
  • CASE .net
  • CASE java
  • ECSA
  • LPT
Network Defense and Operations
  • CSA
  • CTIA
  • ECIH
  • EDRP
  • CAST
Cyber Forensics
  • CEH & CEH
  • ECIH
  • CTIA
  • CHFI
Additional Opportunities to up-skill
  • CGEIT
  • DSF
  • CET
Student pondering while learning from home.

Vulnerability Assessment & Penetration Testing Track

Shape your organization’s cyber security posture with the expertise required to find weak points, assess their severity, and make the right strategic recommendations to strengthen them.

Courses

  • Certified Network Defender (CND)
  • Certified Ethical Hacker (CEH)
  • Certified Penetration Testing (CPENT)
  • Licensed Penetration Tester (LPT)

Software Security Track

Get the skills you need to assess, mitigate, and protect software systems from vulnerabilities – an essential process at every stage of the software lifecycle.

Courses

  • Certified Network Defender (CND)
  • Certified Application Security Engineer (CASE) .Net & Java
  • Certified Security Analyst (CSA)
  • Licensed Penetration Tester (LPT)

Career advancement

Learn skills to help further your career by expanding on existing knowledge, building fundamentals in an additional field, and exploring the future of the cybersecurity industry.

Courses

  • Certified Governance of Enterprise IT (CGEIT)
  • Data Science Fundamentals (DSF)
  • Emerging Technologies (CET)

Network Defense & Operations Track

Learn to detect, identify, and respond to a wide range of threats while gathering essential intelligence that will guide the future of your organization’s cyber security strategy.

Courses

  • Certified Network Defender (CND)
  • Certified SOC Analyst (CSA)
  • Certified Threat Intelligence Agent (CTIA)
  • Certified Incident Handler (CIH)
  • Disaster Recover Professional (EDRP)
  • Advanced Network Defense (CAST)

Cyber Forensics Track

Learn how to investigate incidents, gather admissible evidence, and identify those responsible following cyber attacks.

Courses

  • Certified Network Defender (CND)
  • Certified Ethical Hacker (CEH) & CEH Master Exam
  • Certified Threat Intelligence Agent (CTIA)
  • Certified Incident Handler (CIH)
  • Computer Hacking Forensic Investigator (CHFI)
Student studying a monitor

Micro-credential Breakdown

Explore our micro-credential programs to see exactly what you’ll learn in your track of choice or pick out the individual programs you want to help advance your career.

  • Certified Network Defender (CND)
  • Certified Ethical Hacker (CEH)
  • Certified Penetration Testing (CPENT)
  • Certified SOC Analyst (CSA)
  • Certified Threat Intelligence Agent (CTIA)
  • Certified Incident Handler (CIH)
  • Certified Secure Computer User (CSCU)
  • Certified Governance of Enterprise IT (CGEIT)
  • Data Science Fundamentals (DSF)
  • Emerging Technologies (CET)

Certified Network Defender (CND)

The CND program develops your skills as a network administrator to protect against, detect, respond to, and predict threats to your network. We’ll build on the typical network administrator’s skill set in network components, traffic, performance and utilization, network topology, system locations, and security policies.

You’ll learn all about:

  • Adaptive security strategy and how to protect against, detect, respond to, and predict threats
  • IoT security, including common challenges and how to mitigate them
  • Implementing and managing the security of virtualization technologies
  • Mobile security measures and how to protect your organization’s mobile devices
  • Cloud security and how to implement it in your organization
  • Basic threat intelligence concepts

Try out the course with a First Look session.

Book your session today

Certified Ethical Hacker (CEH)

The CEH program is the leading ethical hacking training and certification program in cyber security. This course gives you the tools to find a system’s weaknesses with the same exploits used by hackers.

You’ll learn all about:

  • Fundamentals of ethical hacking
  • Potential threat vectors and effective countermeasures
  • Emerging areas of IoT, cloud, and mobile hacking
  • How to combat Trojans, malware, backdoors, and more
  • How to hack using mobile devices

Try out the course with a First Look session.

Book your session today

Certified Penetration Testing (CPENT)

The CPENT program is all about giving you the skills you need to succeed as a penetration tester. We emulate real-world testing engagements, helping you gain practical know-how that’s backed by the ability to adapt to new challenges.

You’ll learn all about:

  • Roles and career progression for penetration testers and security analysts
  • Putting theory into practice with our Advanced Penetration Testing Range for a 100% methodology-based program
  • How to deliver a best-in-class range of services
  • Create professional reports
  • Standard templates that help during penetration testing

Try out the course with a First Look session.

Book your session today

Certified SOC Analyst (CSA)

The CSA program is perfect for current and aspiring Tier I and Tier II SOC analysts looking to achieve proficiency in performing entry-level and intermediate-level operations. It covers the fundamentals of SOC operations, log management and correlation, SIEM deployment, advanced incident detection, and incident response.

You’ll learn all about:

  • SOC processes, procedures, technologies, and workflows
  • Attacker tools, tactics, and procedures to identify indicators of compromise
  • Security information and event management
  • How to develop threat cases, create reports, and more
  • Planning, organizing, and performing threat monitoring and analysis
  • Preparing briefings and reports
  • SOC and IRT collaboration for better incident response

Try out the course with a First Look session.

Book your session today

Certified Threat Intelligence Agent (CTIA)

The CTIA program is a method-driven course that gives you the tools to plan threat intelligence projects, build a threat intelligence report, and disseminate the findings throughout your organization.

You’ll learn all about:

  • How to prepare and run a program that provides actionable threat intelligence
  • Developing predictive capabilities for your organization
  • Training other information security professionals to develop threat intelligence programs
  • What the threat intelligence role entails and how to succeed in it
  • How to enhance your skills and boost employability

Try out the course with a First Look session.

Book your session today

Certified Incident Handler (CIH)

The CIH program gives you the fundamental skills to detect and respond to the full range of computer threats in an information system. It covers the underlying principles and techniques you need to overcome everything from network security incidents or malicious code to insider attack threats.

You’ll learn all about:

  • Detecting and responding to security threats and breaches
  • How to liaison with legal and regulatory authorities
  • Handling incidents and conducting assessments
  • Responding to incidents like malicious code, network attacks, and insider attacks

Try out the course with a First Look session.

Book your session today

Certified Secure Computer User (CSCU)

The CSCU program teaches you the fundamentals of protecting your information assets. You’ll be immersed into an interactive environment, where you’ll learn how to confidently work, study, and play online.

You’ll learn all about:

  • Basic online security principles
  • Mitigating your exposure
  • Identifying and avoiding a wide range of computer and network security threats
  • Safely using email, social media, cloud storage, mobile devices, and more

Try out the course with a First Look session.

Book your session today

Certified Governance of Enterprise IT (CGEIT)

The CGEIT program will develop the skills and knowledge necessary to successfully establish the governance of enterprise IT, manage IT resources and performance, and develop sound strategy for IT risk optimization. 

You’ll learn all about:

  • Governance of Enterprise IT
  • Technology and Information Governance
  • IT Resource Planning and Optimization
  • Benefits Realization 
  • Risk Management and Strategy 

Try out the course with a First Look session.

Book your session today

Data Science Fundamentals (DSF)

Data Science Fundamentals is an introductory course in data science, a field vital to business survival, job stability, and national security. Upon completion of this course you’ll possess the necessary knowledge and skill to collect, analyze, and understand data in the constantly evolving tech landscape.

You’ll learn all about:

  • Data Characteristics and Governance
  • Data in Information Systems
  • Statistical Analysis
  • Data Classification and Management
  • Data Processing with Machine Learning

Try out the course with a First Look session.

Book your session today

Emerging Technologies (CET)

The Emerging Technologies course introduces you to four emerging tech topics – Artificial Intelligence, Blockchain, Cloud Computing, and Internet of Things. By completing this course you will develop a strong understanding of each emerging field and why they are vital to future business survival, job stability, and national security. 

You’ll learn all about:

  • Cloud Fundamentals, Models, Concepts, Support, and Governance
  • Artificial Intelligence Concepts, Models, Algorithms, and Implementation
  • Internet of Things Fundamentals, Design, Architecture and Applications
  • Blockchain Principles, Infrastructure, and Usage

Try out the course with a First Look session.

Book your session today

Make Waves in the Cyber Security Community

CyberWave hosts a wide range of industry events, making it easy for you to build lasting connections, learn new skills, and have fun doing it. Stay tuned for upcoming events.

Upcoming events

No events scheduled currently

Building looking up from street view.

Welcome to CyberWave

Recognizing the rising demand for professionals with a combination of specialized skills, MITT responded with CyberWave — a centre dedicated to addressing the labour shortage in cyber security and providing a hub for thought-leadership, work-integrated learning, and applied research in this rapidly-evolving sector.

If you’re looking to pivot into a new career or just contemplating your next step, CyberWave at MITT is the perfect place to make your move. CyberWave has joined with leading employers and globally recognized certification institutes to deliver focused training in some of the most sought after specializations in cyber security.

No matter your experience, CyberWaves micro-credentials will provide you with the technical and interpersonal skills you need to take the next step in your career.

Student writing down notes

It’s commonly accepted among cyber security professionals that it isn’t a matter of if you’ll experience a breach, but when. When it comes to protecting your digital and physical assets, the best defence is a good offensive strategy. In other words, if you want to stay ahead of threats, it’s time to invest in talent. Whether it’s implementing a cyber-awareness program, engaging in work-integrated learning, upskilling team members in cyber security specializations, or re-training individuals with transferable skills for new roles, CyberWave is your partner in learning.

Monitor with code displayed on the screen

Course catalogue