Top 10 Information Security Tools




Course Start Dates

01 October 2021

10 weeks / 3 months

04 February 2022

10 weeks / 3 months

Course Start Dates

20 Hours (Live Classroom)

2 hours / week


Our priority, your satisfaction!

Hands on demonstration and exercises to understand how to use the most popular and widely used information security tools.

learning goal

Practical Cyber Security!

In this course, you will learn from basic to the most advanced options to use the top 10 information security tools used by penetration testers and ethical hackers.

Top 10 Information Security Tools Training

Head Lecturer: Alejandro Guinea

More than 15 years of experience in the Information Security field.

  • Offensive Security Certified Professional (OSCP)
  • Certified Information Systems Security Professional (CISSP)
  • Information Systems Security Architecture Professional (ISSAP).
  • CISSP Official Instructor
  • Certified Information Systems Auditor (CISA)
  • Certified in Risk and Information Systems Control (CRISC)
  • Certified Ethical Hacker (CEH)
  • ITIL v3 Foundation Certificate in IT Service Management
  • COBIT 5
  • ISO 27001 Lead Implementer

Prerequisites / Equipments

  • Basic IT Background
  • Basic InfoSec knowledge
  • Basic Ethical Hacking knowledge
  • Basic programming skills
  • Basic Linux knowledge
  • A laptop or computer with Kali Linux or a virtualizer to run a Kali Linux virtual machine.
  • Internet connection
  • Laptop with microphone and camera

Target Audience

  • Computer Science / Cyber Security students looking to gain real-world knowledge.
  • Career professionals looking to make the jump into security work.
  • Engineers looking to improve their understanding of security.
  • PenTesters looking to sharpen their skills
  • IT Personal trying to use specific tools to assess their environment
  • Infosec auditors trying to use specific tools to assess the customer’s environment

Course Objectives

After taking this course, the students will have all the knowledge necessary to perform several tasks while using the following tools:

  • Linux commands and bash scripts
  • Wireshark, Tshark and Tcpdump
  • Snort
  • Volatility
  • Netcat
  • Nmap
  • Password crackers
  • Metasploint framework
  • Burpsuite
  • OpenVas and other open-source vulnerability scanners
Swiss Cyber Academy Online Campus

The entire course is live and interactive. All students will have direct access to their own lab, online campus, the teacher’s screen, and the live class itself, they’ll have a big advantage over traditional face-to-face classes.

Live classes are available each week at a specific date/time.

Classes will be recorded for the students so they can review the material.

When will each module be available?

Students will need to finish one module before they move to the next one.

The student will take 10 weeks to complete the course, taking 2 hours per class each week.

How will students interact with the instructor?
  • Live Classes / Video conferencing
  • Email / Instant messaging / Social networks

Students can contact the teacher at any time they want. The teacher will reply as soon as possible.

Live classes will be performed so students can also ask live questions if they have any.

What are the evaluation methods?
  • Tests
  • Live class exercises and presentations
  • Final project presentation

Training Fee

990 CHF

10 Weeks Training Fee
With 90 days Access


After successfully completing the course, the Swiss Cyber Academy provided training certificates for each participant in an electronic format.


Contact us to ask about special offers for Teams

Discover our other courses