Download Brochure
ADMISSIONS OPEN FOR 2026

Certified Cyber Warrior Program

Master Ethical Hacking, Digital Forensics, and Network Defense in a 9-month intensive military-grade simulation program.

6+3 Months Duration Online & Offline Certified Cyber Warrior

About the Course

The Certified Cyber Warrior Program (CCWP) is CIA's flagship offering, a structured 9-month program designed to transform individuals into professional cyber warrior.

Unlike short bootcamps or generic certification courses, CCWP is designed as a comprehensive career-building program. It focuses on developing a "Cyber Warrior Mindset," providing students with the battle-ready skills and knowledge needed to excel in the field.

Key Structure of the Program:

  • Duration: 6 months of intensive training + 3-month guided internship.
  • Approach: Practical-first! 70% hands-on exercises & 30% conceptual learning.
  • Format: Available Online (Virtual Labs) & Offline (Classroom + Hardware Labs).
  • Focus Areas: Ethical Hacking, Penetration Testing, Forensics, SOC Operations, Android Hacking, Hardware Tools, and Dark Web Intelligence.

The course is strictly aligned with global frameworks such as:

  • NICE Cybersecurity Workforce Framework (NIST, USA)
  • MITRE ATT&CK Matrix
  • OWASP Top 10 for Application Security

🎯 Outcome: Upon completion, participants will not only earn a Certificate but also gain the confidence to defend organizations, investigate incidents, and thwart Advanced Persistent Threats (APTs).

Program Structure

Level 1: Foundation

Building the Base

  • Cyber Security Fundamental
  • Networking
  • Footprinting & Reconnaissance
  • Web Testing
  • Ethical Hacking
  • Cyber Crime & Awareness

Level 2: Advanced

Offensive Operations

  • Metaspliot Framework
  • Android Testing
  • Windows Testing
  • Cyber Forensics
  • Hardware Tools

Level 3: War Room

Industry Internship

  • Live VAPT Projects
  • Reporting & Doc.
  • Forensics Investigation
  • SOC Operations

Cyber Warrior Skill

Advanced Warfare
Incident Responder
Offensive & Defensive Training
Core Skills
Foundation
Comprehensive Syllabus

Comprehensive Syllabus

"A carefully crafted industry-aligned cybersecurity roadmap designed to take you from beginner to job-ready expert through real-world labs, attack simulations, and breach-based case studies".


πŸ›‘οΈ Introduction to Cyber Security & Ethical Hacking

πŸ‘‰ Click here to view full syllabus

1. Definition and Importance of Cyber Security
2. Overview of Ethical Hacking
3. Hacking Fundamentals & Types of Hackers
4. Types of Attacks on a System
5. Basic Terminologies in Cyber Security
6. Difference Between Ethical Hacking & Cyber Security
7. Security Triad (Confidentiality, Integrity, Availability)
8. Basics of Malware
9. Introduction to Security Controls
10. Introduction to Linux & Features of Linux
11. Setting Up Hacking Labs
12. Introduction to Kali Linux & Terminology
13. Important Kali Linux Commands
14. Introduction to Famous Kali Linux Tools
15. Social Media Accounts Hacking
16. Social Engineering Toolkit (SET)
17. Email Verification Bypass
18. SMS Verification Bypass
19. SMS, Call & Email Bombing
20. Email Address Spoofing
21. Man-in-the-Middle Attack
22. DNS Spoofing
23. Advanced Phishing Techniques
24. Red Team vs Blue Team vs Purple Team Concepts
25. Evolution of Hacking (Script Kiddies to APTs)
26. Hacker Psychology & Motivation
27. Underground Hacker Culture & Communities
28. Miscellaneous Topics
29. Doubt Session
🌐 Networking Concepts

πŸ‘‰ Click here to view full syllabus

1. Data Communication Basics
2. Basics of Computer Networks
3. Working of Networks & Types of Networks
4. LAN, MAN, WAN & PAN Differences
5. Client-Server Model vs Peer-to-Peer Networks
6. Unicast, Broadcast, Multicast & Anycast Communication
7. Types of Cables & Connectors
8. Network Devices (Hub, Switch, Router, Bridge, Modem, Access Point)
9. Network Topologies & Devices
10. IP Address (IPv4 vs IPv6)
11. Public, Private & Reserved IP Addresses
12. Subnetting & CIDR Notation Basics
13. IPv6 Basics
14. TCP/IP Protocol Suite
15. Concept of OSI Model – Part 1
16. Concept of OSI Model – Part 2
17. Network Protocols & Port Numbers
18. Ports & Services Mapping
19. DHCP (Dynamic Host Configuration Protocol)
20. ARP & RARP (Address Resolution Protocol)
21. ICMP Protocol (Ping, Traceroute)
22. Domain Name System (DNS)
23. DNS Record Types
24. Network Address Translation (NAT)
25. NAT Types (Static, Dynamic, PAT)
26. Virtual Private Networks (VPNs)
27. VPN Basics (Site-to-Site vs Remote Access)
28. VPN & Proxy Setup
29. Proxy Servers vs Gateways vs Load Balancers
30. Wireless Networking Basics
31. Understanding Firewalls & IDS/IPS
32. Working of Firewalls, IDS & IPS
33. Network Security Best Practices
34. Network Monitoring Tools
35. Packet Analysis with Wireshark
36. Network Mapping (NMAP) Introduction
37. Network Scanning using NMAP – Part 1
38. NMAP – Part 2 & Zenmap
39. Advanced Scanning (Bypassing Firewalls)
40. Miscellaneous Topics
41. Doubt Session
🚨 Cyber Crimes & Awareness (How to be Secure)

πŸ‘‰ Click here to view full syllabus

1. Introduction to Cybercrime
2. History & Evolution of Cybercrime
3. Categories of Cybercrime
4. Types of Cyber Crimes
5. Criminal Mindset
6. Motivation Behind Cyber Crimes
7. Cybercrime Ecosystem
8. Digital Footprints & Why They Matter
9. How to Be Secure Online
10. How to Report Cyber Criminals
11. Difference Between Cyber Crime, Security & Law
12. How to Avoid Phishing & Vishing
13. Strong Passwords & Password Managers Basics
14. Two-Factor Authentication (2FA) Basics
15. Cyber Laws
16. Secure Browsing Practices
17. Secure Use of Social Media
18. Protecting Personal Information Online
19. Preventing Identity Theft
20. Awareness & Training Programs
21. Cyber Bullying & Harassment Prevention
22. Common Scams & Frauds
23. Child Online Safety & Awareness
24. Miscellaneous Topics
25. Doubt Session
πŸ” Information Gathering (Footprinting & Reconnaissance)

πŸ‘‰ Click here to view full syllabus

1. Introduction to Footprinting & Reconnaissance
2. Importance of Information Gathering in Hacking
3. Legal & Ethical Considerations in Reconnaissance
4. Passive vs Active Reconnaissance
5. Types of Information Gathering
6. Passive Information Gathering Techniques
7. Active Information Gathering Techniques
8. OSINT Based Information Gathering
9. OSINT Frameworks & Methodology
10. Doxing
11. Google Hacking Database (GHDB)
12. Nslookup & Whois Lookup
13. Mobile Number Footprinting
14. Website Footprinting
15. SMS, Call & Email Bombing
16. Email Footprinting
17. Image Footprinting
18. Information Gathering Using NMAP
19. Various Information Gathering Tools
20. Information Gathering Using Maltego
21. Information Gathering Methodology
22. Tools: Whois, Nslookup & Dig
23. Social Engineering & OSINT Techniques
24. Network Scanning & Enumeration
25. Identifying & Mapping Targets
26. Shodan & Censys Basics
27. Metadata Extraction from Files
28. Footprinting Automation Introduction
29. Miscellaneous Topics
30. Doubt Session
πŸ’₯ Penetration Testing & Metasploit Framework

πŸ‘‰ Click here to view full syllabus

1. Introduction to Penetration Testing
2. Importance of Penetration Testing in Cybersecurity
3. Legal & Ethical Aspects of Pentesting
4. Types of Penetration Testing
5. Penetration Testing Methodologies
6. Vulnerability Assessment
7. Vulnerability Assessment & Penetration Testing (VAPT)
8. VAPT Methodology
9. Phases of Penetration Testing
10. Scoping & Target Definition in Pentesting
11. Setting Up Penetration Testing Labs (Local & Cloud)
12. Introduction to Metasploit Framework
13. Exploiting Vulnerabilities with Metasploit
14. Post-Exploitation Techniques
15. Writing Custom Exploits
16. Reporting & Documentation of Penetration Tests
17. Windows Hacking using Payloads & Exploits
18. Enumeration Techniques
19. SMTP Enumeration
20. FTP Enumeration
21. RDP & Telnet Services
22. Working with Auxiliaries & Exploits
23. Advanced Exploiting Techniques
24. Hacking over WAN (Port Forwarding)
25. Maintaining Access & Covering Tracks
26. Penetration Testing Projects
27. Doubt Session
πŸ•·οΈ Web Testing using Burp Suite & Bug Bounty

πŸ‘‰ Click here to view full syllabus

1. Introduction to Web Application Security
2. How the Web Works
3. URLs, Query Parameters & HTTP Methods
4. Cookies, Sessions & Authentication Mechanisms
5. Common Web Technologies
6. Same-Origin Policy (SOP) & CORS Basics
7. Introduction to Website Hacking
8. WordPress Website Hacking
9. Setting Up Burp Suite
10. Introduction to Burp Suite (Community Edition)
11. Burp Suite – Proxy, Repeater & Intruder Basics
12. Burp Suite – Decoder, Comparer & Sequencer
13. OTP Bypass using Burp Suite
14. Payment Gateway Bypass using Burp Suite
15. Common Web Vulnerabilities (OWASP Top 10)
16. Performing Web Application Scans
17. Exploiting Web Vulnerabilities
18. Burp Suite Pro Advanced Features
19. Important Burp Suite Extensions
20. Introduction to Bug Bounty Programs
21. Bug Bounty Hunting using Burp Suite
22. Reporting Vulnerabilities
23. Legal & Ethical Aspects of Bug Hunting
24. Website Hacking Project – 1
25. Website Hacking Project – 2
26. Miscellaneous Topics
27. Doubt Session
πŸ“± Android Hacking

πŸ‘‰ Click here to view full syllabus

1. Overview of Android OS & Security Architecture
2. Android File System & Directory Structure
3. Android Application Structure
4. Android Permissions & Security Model
5. Rooting & Jailbreaking Basics
6. OWASP Mobile Top 10 Overview
7. Setting Up Android Hacking Environment
8. Introduction to Android Payloads & Trojans
9. Android Device Hacking using Metasploit
10. Android Application Penetration Testing
11. Exploiting Android Vulnerabilities
12. Reverse Engineering Android Apps (APKTool, JADX)
13. Malware Analysis on Android
14. Introduction to RAT (Remote Access Trojans)
15. Payload Crypting & Making Fully Undetectable
16. Payload Binding
17. Manual Payload Binding
18. Remote Control of Android Devices via Internet
19. Wireless Camera Control & Surveillance
20. Introduction to Android Debug Bridge (ADB)
21. Android Device Testing using ADB
22. Screen Lock Bypass & Password Cracking
23. Introduction to Termux
24. Testing & Hacking using Termux
25. Man-in-the-Middle (MITM) using Android Device
26. Location Tracing Techniques
27. Secure Android App Development Basics
28. Miscellaneous Topics
29. Doubt Session
πŸ–₯️ Windows Testing

πŸ‘‰ Click here to view full syllabus

1. Introduction to Windows OS Architecture
2. Windows File System & Registry Basics
3. Windows User Accounts, Groups & Privileges
4. Windows Authentication Mechanisms
5. Windows Security Features
6. Setting Up Windows Hacking Lab
7. Windows Exploitation Basics
8. Payload Creation for Windows Systems
9. Gaining Access via Exploits
10. Post-Exploitation in Windows
11. Windows RAT (Remote Access Trojans)
12. Maintaining Access in Windows Systems
13. Windows Password Cracking
14. Windows Enumeration (Users, Shares, Services)
15. SMB Exploitation & EternalBlue Attack
16. Mimikatz Basics (Credential Dumping)
17. Keylogging in Windows
18. Windows Remote Desktop Exploitation
19. PowerShell for Windows Hacking
20. Fileless Malware in Windows
21. Windows Event Logs & Covering Tracks
22. Windows Persistence Techniques
23. Active Directory & Domain Controller Basics
24. Lateral Movement in Windows Networks
25. Real-World Windows Exploits & Case Studies
26. Windows Hardening Basics
27. Miscellaneous Topics
28. Doubt Session
πŸ“‘ Wireless Network Testing

πŸ‘‰ Click here to view full syllabus

1. Basics of Wireless Networks
2. Wi-Fi Standards & Protocols
3. Introduction & Working of Wi-Fi
4. Wireless Encryption Fundamentals
5. Wireless Network Security Protocols
6. Wi-Fi Authentication & Key Management
7. Wireless Hardware & Radios
8. Setting Up Wireless Testing Lab
9. Wi-Fi Hacking using Raspberry Pi
10. Wireless Network Scanning & Enumeration
11. Attacking WEP, WPA & WPA2 Networks
12. Rogue Access Points & Evil Twin Attacks
13. Hacking using Fake Wi-Fi Access Point
14. Wireless Sniffing & Traffic Analysis
15. Jamming & Denial of Service Attacks
16. Wireless Attack Tools & Scripts
17. Bluetooth & BLE Security Basics
18. Wireless Hardening & Mitigation Techniques
19. Wireless Forensics & Incident Response
20. Miscellaneous Topics
βš”οΈ Miscellaneous Attacks & Tools

πŸ‘‰ Click here to view full syllabus

1. Introduction to Miscellaneous Attacks
2. DNS & DNSSEC Attacks
3. DoS & DDoS Attacks
4. Email Attacks (Spoofing, Phishing, Spamming)
5. Physical Security Attacks (USB Drops, Lock Picking)
6. IoT Security & Attacks
7. Cloud Security & Attacks
8. Social Engineering Attacks
9. Advanced Persistent Threats (APT)
10. Password Sniffing
11. Brute Force Attacks
12. Dictionary Attacks
13. SQL Injection Attacks
14. Windows Password Cracking
15. Browser Exploitation Framework (BeEF)
16. Nessus Tool Installation & Working
17. Shell Scripting Basics
18. Session Hijacking
19. Reverse Engineering Basics
20. Advanced Man-in-the-Middle (MITM) Attacks
21. Flooding Attacks
22. Wireshark – Part 1
23. Wireshark – Part 2
24. Introduction to Keyloggers
25. Introduction to Malware & Viruses
26. Working with Ransomware
27. Using Proxychains
28. Call Spoofing
29. SIM Cloning
30. Introduction to Capture The Flag (CTF)
31. Various CTF Techniques
32. Exploit Development Basics
33. Basics of Malware Types
34. Understanding Botnets
35. Rootkits Basics & Working
36. File Upload Vulnerabilities & Exploitation
37. Exploit Kits Basics
38. Introduction to Security Testing Tools
39. Basics of Threat Intelligence
40. Miscellaneous Topics
41. Doubt Session
πŸ”§ Important Hacking Tools (Hardware)

πŸ‘‰ Click here to view full syllabus

1. Introduction to Hardware Hacking
2. Safety, Legal & Ethical Concerns in Hardware Hacking
3. Basics of Electronics for Hackers
4. Understanding Microcontrollers
5. Basics of SDR (Software Defined Radio)
6. Overview of Hardware Hacking Tools
7. Introduction to USB Rubber Ducky
8. Hacking using USB Rubber Ducky
9. Tips & Tricks using Rubber Ducky
10. Introduction to Raspberry Pi
11. Using Raspberry Pi for Hacking
12. Wi-Fi Hacking using Raspberry Pi Pico
13. DoS/DDoS Attacks using Hardware Tools
14. Advanced SDR for Hacking
15. Hardware Keyloggers & Their Use
16. SIM Card Cloning Tools
17. Introduction to Network Jammers
18. Working Model of Network Jammers
19. ATM/POS Skimmers Basics
20. Introduction to Car Hacking (OBD-II & CAN Bus)
21. Wireless Signal Jamming Basics
22. Building DIY Low-Cost Hacking Gadgets
23. Miscellaneous Topics
24. Doubt Session
πŸ§ͺ Digital & Cyber Forensics

πŸ‘‰ Click here to view full syllabus

1. Introduction to Digital Forensics
2. History & Evolution of Digital Forensics
3. Importance & Scope of Digital Forensics in Cybersecurity
4. Types of Digital Evidence (Volatile & Non-Volatile)
5. Chain of Custody & Legal Admissibility of Evidence
6. Basics of Incident Response & Its Relation to Forensics
7. Computer Forensics Fundamentals
8. Computer Forensics Investigation Process
9. Forensic Investigation Methodology
10. Collecting & Preserving Digital Evidence
11. Analyzing Digital Evidence
12. Understanding Hard Disk & File Systems
13. Data Acquisition & Duplication
14. Defeating Anti-Forensic Techniques
15. Using Forensic Tools (FTK, EnCase)
16. Windows Forensics
17. Linux & Mac Forensics
18. Network Forensics
19. Mobile Device Forensics
20. Investigating Web Attacks
21. Dark Web Forensics
22. Investigating Email Crimes
23. Malware Forensics
24. Autopsy Tool Installation
25. Introduction to Autopsy
26. Reporting Forensic Findings
27. Deleted Data Recovery using Autopsy
28. Recovering Data from Virtual Disks
29. Miscellaneous Topics
30. Doubt Session
πŸ” Cryptography Basics

πŸ‘‰ Click here to view full syllabus

1. Introduction to Cryptography
2. History & Evolution of Cryptography
3. Importance of Cryptography in Cybersecurity
4. Difference Between Encoding, Hashing & Cryptography
5. Types of Cryptography (Symmetric, Asymmetric, Hybrid)
6. Symmetric vs Asymmetric Encryption
7. Common Cryptographic Algorithms (AES, DES, RSA, ECC, Blowfish)
8. Stream vs Block Ciphers Basics
9. Implementing Encryption in Systems
10. Cryptographic Attacks (Known-Plaintext, Chosen-Plaintext, Birthday Attack)
11. Hashing Algorithms (MD5, SHA Family, BLAKE2)
12. Cryptography Tools (GPG, OpenSSL, Hashcat)
13. Encoding Tools (Base64, URL Encoding, Hex)
14. Hash Functions & Digital Signatures
15. Public Key Infrastructure (PKI)
16. Certificates, SSL/TLS Basics & HTTPS
17. Key Management Fundamentals
18. Doubt Session
πŸ•ΆοΈ Deep & Dark Web

πŸ‘‰ Click here to view full syllabus

1. Understanding the Dark Web
2. Difference Between Surface Web, Deep Web & Dark Web
3. Onion Services & Hidden Networks
4. Dark Web Safety & Best Practices
5. Introduction to Tor Browser
6. Tor Network & Anonymity
7. Accessing Dark Web Safely
8. Threat Analysis on Dark Web
9. Dark Web Marketplaces
10. Dark Web Forums & Communities
11. Legal & Ethical Considerations
12. Cryptocurrency Basics (Bitcoin, Monero Introduction)
13. Introduction to Carding
14. How Carding Works
15. Digital Footprinting & OPSEC on Dark Web
16. Miscellaneous Topics
17. Doubt Session
🧠 Hacker’s Case Studies, Methodologies & Mentality

πŸ‘‰ Click here to view full syllabus

1. Introduction to Hacker Mindset
2. Types of Hackers
3. Hacker Ethics & Rules of Engagement
4. Hacker Tools & Learning Path Overview
5. Famous Hacking Cases & Their Impact
6. Methodologies Used by Hackers
7. Hacker Reconnaissance & Footprinting Mindset
8. Psychological Aspects of Hackers
9. Studying Hacker Profiles
10. Lessons from Real-World Attacks
11. Building Your Own Methodology
12. Importance of Anonymity in Hacking
13. Increasing Hacking Knowledge & Skills
14. Continuous Learning & Staying Updated
15. Red Team vs Blue Team vs Purple Team Mentality
πŸ“Š Aptitude & Logic Building

πŸ‘‰ Click here to view full syllabus

1. Introduction to Aptitude & Logical Thinking
2. Basics of Problem-Solving (Step-by-Step Approach)
3. Types of Logical Reasoning
4. Pattern Recognition & Sequence Solving
5. Critical Thinking in Cybersecurity
6. Cybersecurity Challenges & Competitions
7. Verbal Reasoning & Comprehension
8. Quantitative Aptitude Basics
9. Capture The Flag (CTF) Competitions
10. Developing Problem-Solving Skills
11. Project – Beginner Level CTF/Challenge
12. Project – Intermediate CTF/Logic Challenge
13. Miscellaneous Topics
🧩 Integrated Across the Course

πŸ‘‰ Click here to view full syllabus

1. Introduction to Miscellaneous Hacking Concepts
2. Understanding System Vulnerabilities & Weak Points
3. Basics of CCTV Systems & How They Work
4. Introduction to PDF Exploits & Malicious Documents
5. Basics of Remote Access Trojans (RATs) & Their Operation
6. Website Admin Panels & Login Mechanisms
7. Basics of SQL Mapping & Injection Concepts
8. Introduction to Ransomware & Safe Decryption Practices
9. Port Forwarding & Free Service Concepts
10. Introduction to Viruses & Their Spread Mechanisms
11. Scripting Basics for Automation (Python, Bash)
12. Server Basics & Common Exploitation Techniques
13. System Exploitation Fundamentals
14. Active Directory Basics (Users, Groups, Permissions)
15. Pivoting Attack Fundamentals

Program Timeline

Phase 1: Foundation

Month 1-3 (Core Skills)

Phase 2: Advanced

Month 4-6 (Attack & Defense)

9

Months Total

Phase 3: Internship

Month 7-9 (Live Projects)

Course Benefits

Practical Focus
  • 70% Hands-on Labs
  • Real-world Tools
  • CTF Challenges
  • Hardware Kits
Expert Mentors
  • Industry Veterans
  • Live Hacking Demos
  • 1-on-1 Guidance
  • Career Mentorship
Job Guarantee
  • 100% Assistance
  • Resume Building
  • Mock Interviews
  • HR Connections
Certification
  • MITRE
  • Internship Letter
  • Hall of Fame
  • Digital Badge
Networking
  • Alumni Club
  • Discord Server
  • Hackathons
  • Meetups
Materials
  • Recorded Sessions
  • LMS Access
  • E-Books
  • Tools Repo
Live Projects
  • Bug Bounty
  • VAPT Projects
  • Forensic Cases
  • Malware analysis
Affordable
  • EMI Options
  • Scholarships
  • Early Bird Offer
  • Best ROI

Your Path to Glory

01

Enroll

Registration & Setup

02

Learn

6 Months Intensive Training

03

Exam & CTF

Practical Simulations

04

Internship

3 Months Live Projects

05

Job Ready

Placement Assistance

Career Path

Entry Level

0-2 Years

  • SOC Analyst
  • Network Tester
  • Bug Bounty Hunter
  • Android Tester
  • Jr. Ethical Hacker

Mid Level

2-5 Years

  • Forensic Investigator
  • Cloud Security Specialist
  • Malware Analyst
  • Threat Intelligence Analyst
  • Security Consultant

Advanced Level

5+ Years

  • Red Team Expert
  • Blue Team Expert
  • Cyber Crime Investigator
  • Security Architect
  • CISO / Director

Meet Our Instructors

Mohit Yogi
INSTRUCTOR,CIA

Mr. Mohit Yogi

Cyber Security Engineer
6+ Years Experience Signal Intelligence Cyber Forensics Expert

Specializes in Signal Intelligence and Cyber Forensics, Worked with Various Intelligence Department as a Cyber Security Expert.

Core Skills:

Malware Analysis Signal Intelligence Cyber Forensics Red Hat Certified
Jayesh Rathod
INSTRUCTOR,CIA

MR. Jayesh Rathod

Cyber Security Engineer & VAPT Specialist
Instructor
Bug Bounty Hunter Web & Mobile Pentester

Expert in Web, Mobile, and Penetration Testing. Focuses on offensive security strategies and finding critical vulnerabilities.

Core Skills:

Web/API Testing Bug Hunting VAPT

Choose Your Path

Master Hacking with CIA's Industry Standard Training

πŸŽ‰ LIMITED TIME OFFER: First Batch (25 Students)! πŸŽ‰

Online Live Batch

Virtual Labs & Cloud Access

SAVE 33%
β‚Ή45,000 β‚Ή30,000

+ 18% GST

  • Virtual Labs: 24/7 Access
  • Recordings: Backup Available
  • Certification: CIA Certified
Register Now

Contact CIA

Ready to become a Cyber Warrior? Reach out to us.

Address

Cyber Intelligence Agency, Hero Honda Chowk, Narnaul, Haryana 123001

Call Us

+91 85291 45541
+91 74968 49970
+91 82007 48270

Email

cia.info.help@gmail.com
info.cyberintelligenceagency@gmail.com

Quick Enquiry on WhatsApp

Chat with our team instantly for course details, fees, and admissions.

Chat on WhatsApp

Connect With Us

πŸ’¬ Chat instantly or πŸš€ register now for priority access

Classy CCWP Popup