Archives: Courses

Cyber Security Graduate Accelerator Program

Cyber Security Graduate Accelerator Program with Guaranteed Internship

Duration: 14 weeks (320 hours of combined training and internship)
Investment: AUD 2,450 full price or AUD 200 per week
First Week Completely Free – Experience It, Then Decide!

The Graduate Accelerator Program with Guaranteed Internship is a 14-week, immersive experience designed for University of Melbourne students eager to launch a career in cybersecurity. The world of cybersecurity is evolving at lightning speed, with AI-driven threats, advanced penetration techniques, and rapid changes in global security standards. Our program propels you straight into this dynamic landscape—combining elite training, hands-on internship experience, and job market alignment tailored to Australia’s booming cybersecurity sector.

What’s Inside?


Cutting-Edge Penetration Testing and Ethical Hacking Training Course: NCSC-assured and delivered by Tranchulas (a CREST Cyber Training Provider), normally AUD 3,000—yours at no extra cost. Tranchulas Hands-On Penetration Testing and Ethical Hacking training course is Assured Training in association with the National Cyber Security Centre (NCSC), UK. The course material has been rigorously assessed against the exacting standards of NCSC. The quality of the trainers’ delivery and the course administration has been quality checked and approved by APMG.

NCSC Assured Training

 

 

AI-Infused Cybersecurity Training: Learn how AI and Machine Learning are reshaping cyber defense, from detecting sophisticated attacks in real-time to analyzing massive threat intelligence data.

Guaranteed Internship Placement: Acquire real-world exposure in a professional environment, working on live projects and collaborating with industry experts.

Dedicated Office Space & Onsite Collaboration for true team-based learning

First Week Free: Try our program without commitment. Get a taste of the latest cyber tools, meet your mentors, and immerse yourself in next-gen cybersecurity methods before making any decision.

Prerequisites

  • Basic knowledge of TCP/IP
  • Participants must bring their own laptops

Why Choose This Program?


Next-Gen Skills with AI-Driven Edge: Don’t just learn yesterday’s tools—master tomorrow’s. Our curriculum integrates AI-driven threat modeling, automated vulnerability detection, and emerging defensive frameworks so you’re ready to tackle the most advanced attacks.

Hands-On Ethical Hacking & Penetration Testing Course (30 Hours): Delivered by Tranchulas, a CREST Cyber Training Provider, this NCSC-assured course is normally AUD 3,000. It’s fully included—no extra fees. You’ll master the tools, methodologies, and real-world tactics Australian employers value. Gain direct experience handling vulnerabilities, executing penetration tests, and defending against sophisticated threats.

Real-World Internship & Office Collaboration: Immerse yourself in our professional workspace, working side-by-side with mentors and peers.

Online Labs Access Throughout the Internship: Practice and perfect your skills anytime. Our online labs simulate real attack scenarios and security challenges, accelerating your learning and boosting your confidence.

Australian Market Focus: Become instantly valuable to local employers by mastering Australian security frameworks like Essential Eight and other region-specific benchmarks. You’ll graduate fully prepared to hit the ground running in Australian cybersecurity roles.

Career-Focused Guidance: Resume overhauls, LinkedIn tuning, mock interviews, and job placement support give you the competitive advantage to stand out in Australia’s rapidly growing cyber talent pool.

Internship: Step into the Real World


Your skills won’t just stay in the classroom. You’ll join industry professionals, tackle actual cyber challenges, and gain hands-on experience that sets you apart from other graduates. This practical exposure builds your network and positions you as a proven cybersecurity professional.

Onsite Office Hours: Work part of the week at our office in Melbourne CBD with fellow interns and mentors. Sharpen your teamwork abilities, and learn to thrive under real-world conditions.

Australian Market Focus & Essential Eight Readiness


Australia’s cybersecurity landscape is booming. Employers demand professionals versed in local frameworks, especially the Essential Eight mitigation strategies. This program ensures you’re not only job-ready but also aligned with the precise standards Australian organizations seek. You’ll graduate with skills that let you hit the ground running on day one.

Career-Ready Support


Resume & LinkedIn Optimization: Highlight your achievements and technical expertise to attract Australian recruiters.

Mock Interviews & Personalized Coaching: Build interview confidence, refine your pitch, and learn how to stand out.

Job Placement Assistance: We leverage our industry connections to help you secure meaningful roles in top Australian cybersecurity firms.

The Future of Cybersecurity is AI-Driven—Be Part of It


Ransomware, supply chain exploits, and generative AI-based phishing are just a few modern threats impacting Australian organizations. We prepare you not only for standard pen testing tasks but also for the AI-enhanced threats of tomorrow. We ensure you’re well ahead of the curve.

Who Should Apply?


Exclusively for University of Melbourne students ready to fast-track their cybersecurity careers. Whether you’re a new grad, career changer, or an IT student specializing in cyber, this program offers the expertise, credentials, and network that sets you miles ahead of traditional grads.

First Week Free—Try Before You Commit: Get a taste of our training and mentorship with no upfront risk. We’re confident you’ll see the value immediately.

Secure Your Future in Cybersecurity


Don’t miss out on a future-proofed skill set, direct industry immersion, and top-tier credentials. With your first week free, there’s zero risk in sampling this transformative experience.

read more share

Hands-On Penetration Testing and Ethical Hacking Training Course

Hands-On Penetration Testing and Ethical Hacking Training Course

This training course offers a collection of live demonstrations featuring a variety of hacking and defensive techniques used by hackers. Tranchulas online labs are available 24×7 for practising the techniques and tools demonstrated by our instructor during the training course.


Tranchulas Hands-On Penetration Testing and Ethical Hacking training course is Assured Training in association with the National Cyber Security Centre (NCSC), UK. The course material has been rigorously assessed against the exacting standards of NCSC. The quality of the trainers’ delivery and the course administration has been quality checked and approved by APMG.

Addressing the Need

The need to understand hacker and his methods are vital for better-defending networks. This training course is designed for students who want to get acquainted with the world of hacking.

About the Training

Because security is an ever-changing battlefield, Tranchulas Hands-on Penetration Testing exposes you to the latest in network and application vulnerabilities and defences. Our instructor will illustrate each technology’s default security posture, installation weaknesses, methods hackers use to circumvent “secure” settings, and countermeasures for each vulnerability.

Prerequisites

  • Basic knowledge of TCP/IP
  • Participants must bring their own laptops


CPTP Certification

iisp_training-logo

This course leads to Tranchulas Certified Penetration Testing Professional (CPTP) certification. Tranchulas CPTP is accredited by Institute of Information Security Professionals (IISP), UK. CPTP will test your technical skills in a live network where you are expected to discover and exploit security vulnerabilities. Students are required to pass our online labs in order to receive CPTP certification.

Tranchulas Online Labs

Tranchulas Online Labs are available 24×7 for practising hacking techniques and tools demonstrated by our instructor during the training course. Online Labs simulate a corporate network with several subnets, each protected by a firewall. All machines on the network can be exploited and have different difficulty levels.

Students are required to discover and exploit vulnerabilities in order to pass online labs and receive Tranchulas Certified Penetration Testing Professional (CPTP) Certification.

Post Training Support

You can connect with Tranchulas Online labs for 90 days to practice your hacking kung-fu after the training course. During this time our technical team will provide you email/phone/skype support in order to ensure the skills acquired on the training course are being applied correctly.

About the Trainer

Tranchulas training and workshops are conducted by world’s top information security experts. Our instructors are featured speakers at renowned security conferences such as Hack in the Box Malaysia, InfoSek Slovenia, Hack.lu Luxembourg, CONFidence Krakow, Troopers, Shakacon, OWASP Europe and BruCON Belgium.

Training Testimonial

Tranchulas provided a professionally run, hands-on technical training course – Ethical Hacking and Penetration testing. The course was outstanding and gave real practical insights and examples of the skills and tools required by professional penetration testers. Tranchulas CEO Zubair Khan, who’s technical background and knowledge of the security industry is second to none, presented the course in an efficient and structured manner. Lots of interesting insights and anecdotes were added from his experience around the globe working with a variety of industries and governments. Plenty of hands-on exercises were provided to allow course participants to really learn and understand the content being delivered. I thoroughly recommend Tranchulas and the course to anyone interested in developing and honing their skills in information security and penetration testing.Mark Brown, British Airways

 

Additional Information

What You Will Receive
  • Hacking Field Kit – If you register one week before the training
  • Access to Tranchulas Online Labs via VPN for 90 days to practice your hacking kung-fu learnt during the course
  • Training Manual
  • Rules of engagement and scope sheets for professional penetration tests
  • Certificate of Attendance
  • Tranchulas Hacker T-Shirt
Laptop Requirements
IMPORTANT – PARTICIPANTS MUST BRING THEIR OWN LAPTOPS

Minimum Laptop Requirements

  • CPU: 1.5 GHz or higher
  • Minimum 4 GB RAM
  • 25 GB of free space on your Hard Drive
  • Wireless 802.11 b/g
  • Should have the capability to have local administrator access within the Operating system and disable antivirus if required.
  • You must set up a Windows Virtual machine on your system if your primary OS is not windows. Please let us know if you need any help with it and our support team will gladly help you.
Who Should Attend
  • Information security professionals
  • IT personnel looking to enhance their technical skills and knowledge
  • Penetration testers
  • Ethical hackers
  • Information System Auditors
  • IT Security Managers
  • Anyone who wants to better understand hacking tools and techniques
  • Incident Handlers
*Register 1 week before the training date and get this Hak5 Hacking Field Kit for FREE

The Hacking Field Kit Includes

Exclusive Tools

Wifi Pineapple NANO, USB Rubber Ducky, LAN Turtle

Book

Hak5 Field Kit Pocket Guide: Essentials of Operation

Accessories

USB OTG adapter, USB male-female Y-Cable, Micro SD USB card reader, Softcover equipment organizer, Key-ring flight tag

*Subject to availability.
**For UK, US and Australia customers only.

read more share

Hands-On Web Application Penetration Testing Training Course

Hands-On Web Application Penetration Testing Training Course

This training course is a series of educational interactive training sessions where the attendees will gain hands-on experience. They will be able to identify security flaws in web applications customised or built for the training course. They will also be able to exploit those security flaws to understand the value of fixing those flaws fully.

 

Tranchulas Hands-On Web Application Penetration Testing Training Course is Assured Training in association with the National Cyber Security Centre (NCSC), UK. The course material has been rigorously assessed against the exacting standards of NCSC. The quality of the trainers’ delivery and the course administration has been quality checked and approved by APMG.

Prerequisites

  • Basic knowledge of HTML and JavaScript
  • Participants must bring their laptops

CWASP Certification

iisp_training-logo

This course leads to Tranchulas Certified Web Application Security Professional (CWASP) certification. Tranchulas CWASP is accredited by Institute of Information Security Professionals (IISP), UK. Certified Web Application Security Professional (CWASP) is an exclusive certification which will test your technical skills on a live but simulated web application where you are expected to discover and exploit security vulnerabilities. Students are required to pass our online lab test to receive CWASP certification.

Training Online Labs

 

Tranchulas Online Labs are available 24×7 for practising web attacks learnt during the training course. Online labs have several web applications based on real-world scenarios which can be exploited and have different difficulty levels. Vulnerabilities include but are not limited to XSS, SQL Injection, CSRF, cookie manipulation, local file inclusion. Students are required to discover and exploit vulnerabilities to pass online labs and receive Tranchulas Certified Web Application Security Professional (CWASP) Certification.

Post Training Support

 

You can connect with Tranchulas Online labs for 90 days to practice your hacking kung-fu after the training course. During this time, our technical team will provide you email, phone and skype support to ensure the skills acquired on the training course are being applied correctly.

About the Trainer

 

Tranchulas training and workshops are conducted by the world’s top information security experts. Our instructors are featured speakers at renowned security conferences such as Hack in the Box Malaysia, InfoSek Slovenia, Hack.lu Luxembourg, CONFidence Krakow, Troopers, Shakacon, OWASP Europe and BruCON Belgium.

Additional Information

 

What You Will Receive

  • Access to Tranchulas Online Labs via VPN for 90 days to practice your hacking kung-fu learnt during the course
  • Training Manual
  • Rules of engagement and scope sheets for professional penetration tests
  • Certificate of Attendance
  • Tranchulas Hacker T-Shirt

Laptop Requirements
IMPORTANT – PARTICIPANTS MUST BRING THEIR OWN LAPTOPS

Minimum Laptop Requirements

  • CPU: 1.5 GHz or higher
  • Minimum 4 GB RAM
  • 25 GB of free space on your Hard Drive
  • Wireless 802.11 b/g
  • Should have the capability to have local administrator access within the Operating system and disable antivirus if required.

Who Should Attend

  • Information security professionals
  • Penetration testers
  • Ethical hackers
  • Web Application Developers
  • Website designers
  • Anyone who wants to better understand hacking tools and techniques

read more share

CISM – Certified Information Security Manager Training Course

CISM Exam Preparation Training

The CISM certification is one of the leading international IS certification designed for those who manage, design, oversee and/or assess an enterprise’s information security. The CISM certification promotes international information security practices and provides executive management with assurance that those earning the designation have the required experience and knowledge to provide effective security management.

This four-day CISM exam preparation course is designed to help you pass the CISM exam via in-depth lectures and discussions.

Who should attend this course?
  • Information security managers
  • Information security professionals
  • Information security auditors
  • Compliance personnel
  • CISOs and CIOs
What will you learn?

This course provides the core CISM competencies required by professionals planning to sit the CISM exam, and prepares you for the exam in a systematic and comprehensive way.

In-depth coverage of the four CISM job practice domains required to pass the exam:

Domain 1 – Information Security Governance
Domain 2 – Information Risk Management and Compliance
Domain 3 – Information Security Program Development and Management
Domain 4 – Information Security Incident Management

Exam

Please note, the CISM exam is booked separately through ISACA. Exam is conducted three times a year during the months of June, September and December. ISACA has strict booking dates for the exam. For more details please check out ISACA website.

CISM Review Manual

You’ll receive a free copy of ISACA’s latest CISM Review Manual which is essential for any exam candidate.

Trainers

Tranchulas trainings and workshops are conducted by world’s top information security experts. Our trainers are CISM certified with over 10 years of training and information security experience and are featured speakers at renowned security  conferences.

read more share