As this is the first blog post in our Semurity Academy’s Blog, I would like to take this opportunity to say that we are committed to our vision and mission to provide world-class training in information security. We already have certain courses and workshops that are already active, while we are also developing new ones that will enrich our tracks and training programs. Each course and workshop is carefully designed to address a particular subject in a comprehensive manner. Instead of cramming theories of multiple subjects into one course, we try to focus on a certain subject and cover it deeply with all the necessary technical and practical skills. Thus, our trainees can feel confident to perform real-world security assessment with ease and finesse.
There are four factors that make our training programs unique. First, each course revolves around a certain aspect of information security. It delves deep into that subject and takes the student into a journey of experiences and knowledge whereby they become proficient in conducting industry-standard assessments and procedures. Second, we offer our trainees a well-written, clear, and comprehensive guide or manual (student courseware); the guide contains all what is explained in the course so that the student can review and practice later on. Third, each course is accompanied with sufficient labs and exercises that the trainees conduct during the course. These labs utilize the most important and best security tools available in the industry now. Students learn how use these tools along with their tricks and inner hacks for effective assessment. Finally, we cannot forget that our uniqueness is also due to our skilled and professional instructors who give the course a totally different flavor. Anyone can read a book in security, and anyone can watch free YouTube videos about ethical hacking. However, nothing is compared to being with a talented instructor in live teaching sessions. A talented instructor will engage the student in every minute during the class, and will make sure that the student gets the skill and knowledge in the shortest possible time.
What inspired the creation of Semurity Academy is the thirst of many IT specialists, and graduates of computer science/engineering for learning effective ethical hacking skills. We have seen that there is a lack of comprehensive, creative, and innovative technical training in this domain; and we have taken the initiative to fill this gap. It is true that there are many consulting firms that offer customized training for their clients. However, our vision here is to make a standardized curriculums and training programs that all people in the Information Technology field can benefit from.
Finally, I would like to mention that we have a plan to make our courses accredited and endorsed by an independent third-party advisory committee. This committee will include respected individuals in the Information Security domain, such as, Chief Information Security Officers (CISO’s), CEO’s of security consulting firms, and established consultants. The committee will review our courses on a regular basis, advise on what needs to be changed and enhanced, and then, endorse the course. In this way, students will be assured of the validity of the trainings they receive and will be assured that their employers will recognize their training experience.