Cyber Security Center at Inha University in Tashkent

The Cyber Security Center at Inha University in Tashkent was officially established on April 8, 2022 with the aim of strengthening cooperation in the development of Information and Communication Technologies (ICT), particularly in the field of cybersecurity in cooperation with Cyber Security Center of Uzbekistan. The Center serves as a platform for advancing cybersecurity education, developing professional competencies, and supporting the acquisition of in-demand knowledge and practical skills for students of Inha University in Tashkent and the wider professional community.

The Center promotes collaboration with industry partners and academic institutions to support the development of modern cybersecurity expertise and to contribute to the growth of the national digital ecosystem.

Within the framework of the Cybersecurity Laboratory, the following initiatives are implemented:

  • Training and professional development programs for students and cybersecurity specialists;
  • Organization of hands-on practical training and laboratory sessions in cybersecurity;
  • Implementation of specialized courses and certification programs in collaboration with leading international partners, including Check Point, EC-Council, CompTIA, Fortinet, Kaspersky, and Group-IB.

Through these activities, the Cyber Security Center aims to strengthen cybersecurity capacity, support talent development, and contribute to the preparation of highly qualified professionals capable of addressing modern cyber threats.

Company logos


International Partners & Certification Programs

The Cyber Security Center at Inha University in Tashkent collaborates with leading global cybersecurity organizations to provide internationally recognized training programs and professional certifications. These partnerships allow students and professionals to develop practical cybersecurity skills aligned with global industry standards.

CompTIA

CompTIA is a globally recognized, vendor-neutral organization that provides industry-leading IT and cybersecurity certifications. Programs such as Security+, Network+, and CySA+ validate essential skills in network security, threat detection, risk management, and incident response. CompTIA certifications are recognized in more than 150 countries and approved under the U.S. Department of Defense cybersecurity workforce framework.

EC-Council

EC-Council is an international organization specializing in cybersecurity certification and training. Its programs, including Certified Ethical Hacker (CEH) and Certified Security Analyst (ECSA), focus on ethical hacking, penetration testing, and advanced cybersecurity defense techniques.

Check Point

Check Point Software Technologies is a global leader in cybersecurity solutions for network, cloud, and endpoint protection. Through academic partnerships, students gain practical knowledge of modern network security architecture and threat prevention technologies.

Fortinet

Fortinet provides advanced cybersecurity training through the Network Security Expert (NSE) Certification Program, covering network security, secure infrastructure, and cyber threat intelligence used by organizations worldwide.

Kaspersky

Kaspersky is a globally recognized cybersecurity company providing expertise in threat intelligence, malware analysis, and digital security. Training programs focus on modern cyber threats, digital forensics, and security operations.

Group-IB

Group-IB specializes in cybercrime investigation, threat intelligence, and digital forensics. Collaboration supports the development of practical cybersecurity skills in cyber threat analysis and incident response.


EC-Council – Certification Programs

About EC-COUNCIL

EC-Council is a globally recognized cybersecurity certification body specializing in ethical hacking, penetration testing, digital forensics, and cybersecurity defense. EC-Council develops internationally recognized programs that validate practical cybersecurity skills and prepare professionals to identify, prevent, and respond to cyber threats.

Key advantages:

  • Global Recognition – EC-Council certifications are recognized in 145+ countries worldwide.
  • Industry LeadershipCertified Ethical Hacker (CEH) has been a leading ethical hacking certification for over 20 years.
  • Government & Enterprise Trust – Certifications are used by government agencies, defense organizations, and global enterprises.
  • Hands-on Training – Programs include practical labs, real-world simulations, and advanced cybersecurity tools.
  • Career Impact – EC-Council certifications support high-demand cybersecurity careers and professional advancement.

Core Programs

Program

Focus

Key Skills

Career Benefits

CEH (Certified Ethical Hacker)

Ethical Hacking & Penetration Testing

Vulnerability Assessment, Network Scanning, Exploitation Techniques, Web Application Security, Threat Analysis

One of the world’s most recognized ethical hacking certifications; prepares professionals for roles such as Penetration Tester, Security Analyst, SOC Analyst, and Cybersecurity Specialist

CPENT (Certified Penetration Testing Professional)

Advanced Penetration Testing

Enterprise Network Penetration Testing, Exploiting Complex Environments, Active Directory Attacks, Advanced Network Security Testing

Develops advanced offensive security skills required for Red Team specialists, Senior Penetration Testers, and Security Consultants

CCISO (Certified Chief Information Security Officer)

Cybersecurity Leadership & Governance

Security Governance, Risk Management, Security Program Management, Compliance, Strategic Security Leadership

Designed for senior cybersecurity professionals and executives pursuing leadership roles such as CISO, Security Director, and Cybersecurity Manager

 

Certified Ethical Hacker (CEH) v13

Certified Ethical Hacker (CEH) by EC-Council (USA) is one of the world’s leading certifications in ethical hacking, penetration testing, and cybersecurity defense. For over 20 years, CEH has been recognized globally as a premier credential for cybersecurity professionals.

The latest CEH v13 introduces the world’s first ethical hacking certification with a 4-phase AI-powered learning framework, combining theoretical knowledge with hands-on practical training.

Key Advantages

  • Global Leadership – CEH has been the world’s leading ethical hacking certification for more than 20 years.
  • Industry Recognition – Ranked 12th among the Top 75 Highest-Paying IT Certifications globally.
  • AI-Driven Training – CEH v13 introduces the industry’s first AI-powered cybersecurity learning framework.
  • Practical Expertise – Training includes 350+ ethical hacking tools and hands-on iLabs environments.
  • Comprehensive Curriculum20+ modules covering modern cyberattack techniques and defense strategies.
  • Career Advancement – CEH certification supports higher salaries and faster career growth in cybersecurity.
  • Global Competitions – Access to international Capture-the-Flag (CTF) cybersecurity competitions.
  • CEH Master Pathway – Opportunity to achieve the advanced CEH Master certification.

The program equips professionals with the skills needed to identify vulnerabilities, conduct penetration testing, and protect organizations from modern cyber threats.

Certified Ethical Hacker Powered by AI curriculum includes:

Learn

Course Outline

Module 01

Introduction to Ethical Hacking

Learn the fundamentals and key issues in information security, including the basics of ethical hacking, information security controls, relevant laws, and standard procedures.

Module 02

Footprinting and Reconnaissance

Learn how to use the latest techniques and tools for footprinting and reconnaissance, a critical pre-attack phase of ethical hacking

Module 03

Scanning Networks

Learn different network scanning techniques and countermeasures.

Module 04

Enumeration

Learn various enumeration techniques, including Border Gateway Protocol (BGP) and Network File Sharing (NFS) exploits and associated countermeasures.

Module 05

Vulnerability Analysis

Learn how to identify security loopholes in a target organization’s network, communication infrastructure, and end systems. Different types of vulnerability assessment and vulnerability assessment tools are also included.

Module 06

System Hacking

Learn about the various system hacking methodologies used to discover system and network vulnerabilities, including steganography, steganalysis attacks, and how to cover tracks.

Module 07

Malware Threats

Learn about different types of malware (Trojan, viruses, worms, etc.), APT and fileless malware, malware analysis procedures, and malware countermeasures.

Module 08

Sniffing

Learn about packet sniffing techniques and their uses for discovering network vulnerabilities, plus countermeasures to defend against sniffing attacks.

Module 09

Social Engineering

Learn social engineering concepts and techniques, including how to identify theft attempts, audit human-level vulnerabilities, and suggest social engineering countermeasures.

Module 10

Denial-of-Service

Learn about different Denial of Service (DoS) and Distributed DoS (DDoS) attack techniques, plus the tools used to audit a target and devise DoS and DDoS countermeasures and protections.

Module 11

Session Hijacking

Learn the various session-hijacking techniques used to discover network-level session management, authentication, authorization, and cryptographic weaknesses and associated countermeasures.

Module 12

Evading IDS, Firewalls, and Honeypots

Learn about firewalls, intrusion detection systems (IDS), and honeypot evasion techniques; the tools used to audit a network perimeter for weaknesses; and countermeasures.

Module 13

Hacking Web Servers

Learn about web server attacks, including a comprehensive attack methodology used to audit vulnerabilities in web server infrastructures and countermeasures.

Module 14

Hacking Web Applications

Learn about web application attacks, including a comprehensive hacking methodology for auditing vulnerabilities in web applications and countermeasures.

Module 15

SQL Injection

Learn about SQL injection attack techniques, evasion techniques, and SQL injection countermeasures.

Module 16

Hacking Wireless Networks

Learn about different types of encryption, threats, hacking methodologies, hacking tools, security tools, and countermeasures for wireless networks.

Module 17

Hacking Mobile Platforms

Learn mobile platform attack vectors, Android and iOS hacking, mobile device management, mobile security guidelines, and security tools.

Module 18

IoT Hacking

Learn different types of Internet of Things (IoT) and operational technology (OT) attacks, hacking methodologies, hacking tools, and countermeasures.

Module 19

Cloud Computing

Learn different cloud computing concepts, such as container technologies and serverless computing, various cloud computing threats, attacks, hacking methodologies, and cloud security techniques and tools.

Module 20

Cryptography

Learn about encryption algorithms, cryptography tools, Public Key Infrastructure (PKI), email encryption, disk encryption, cryptography attacks, and cryptanalysis tools.

 

The CEH Exams at a Glance

Exam Details

CEH Knowledge Exam

CEH Practical Exam

Number of Questions/ Practical Challenges

125 Questions

20 Practical Challenges

Test Duration

4 Hours

6 Hours

Test Format

MCQ

iLabs Cyber Range

Test Availability

ECC Exam, Vue

ASPEN, iLabs

Exam Prefix

312-50 (ECC Exam), 312-50 (VUE)

Passing Score

60% – 85%

60% – 85%


CompTIA Certification Programs

About CompTIA:

CompTIA (Computing Technology Industry Association) is a globally recognized, vendor-neutral organization that develops industry-leading certifications validating IT and cybersecurity skills.

Key advantages:

  • Global Recognition – CompTIA certifications are recognized by employers in 150+ countries worldwide.
  • Industry Demand – 1 in 5 IT professionals in North America hold at least one CompTIA certification.
  • Government Approved – Certifications are approved under the S. Department of Defense (DoD 8140.03M) workforce framework.
  • Vendor-Neutral Skills – Knowledge applicable across multiple technologies and platforms.
  • Structured Career Path – Certifications range from foundational to advanced levels (A+, Network+, Security+, CySA+, PenTest+, CASP+).
  • CompTIA certifications provide internationally recognized validation of professional IT competencies and support career development in cybersecurity, networking, and IT infrastructure.

Core Programs:

Program

Focus

Key Skills

Career Benefits

Network+

Networking & Protocols

Configuration, Management, Troubleshooting, Security

Foundation for networking careers, prerequisite for specialized certs, industry-recognized

Security+

Cybersecurity & Data Protection

Threat Management, Vulnerability Assessment, Incident Response, Cryptography

Entry-level security certification, opens doors to cybersecurity roles, DoD approved

Linux+

Linux Administration

Systems Management, Security Hardening, Scripting & Automation, Containers

Supports enterprise Linux systems, cloud & cybersecurity infrastructure, hands-on enterprise skills

 

CompTIA Security+

CompTIA Security+ is the premier global certification that establishes the essential skills required for core security functions and a career in IT security. It showcases professionals’ capabilities in securing networks, applications, and devices, ensuring data integrity, confidentiality, and availability. CompTIA Security+ focuses on practical, hands-on skills to tackle real-world challenges. As the most widely recognized credential, it is invaluable for advancing in the dynamic field of cybersecurity.

 

Key Features:

  • Global Cybersecurity Benchmark – One of the most widely recognized entry-level cybersecurity certifications worldwide.
  • Core Security Skills Validation – Covers threat management, network security, identity management, risk management, and cryptography.
  • Performance-Based Certification – Exams include practical, scenario-based questions that test real-world cybersecurity skills.
  • Hands-on Security Knowledge – Focuses on identifying threats, managing vulnerabilities, and implementing security controls.
  • Career Opportunities – Prepares professionals for roles such as Security Analyst, SOC Analyst, Systems Administrator, and Network Security Engineer.
  • Strong Foundation for Advanced Certifications – Serves as a pathway to advanced cybersecurity certifications (CySA+, PenTest+, CASP+).

Security + curriculum includes:

Time

Learn

Course Outline

Week 1

Module 01

Comparing and contrasting various types of security controls·

Summarizing fundamental security concepts (Part 1)

Module 02

Summarizing fundamental security concepts (Part 2)

Importance of change of management processes and the impact of security

Week 2

Module 03

Importance of using appropriate cryptography solutions

Module 04

Comparing and contrasting common threat actors and motivations

Threat vectors and attack surfaces

Week 3

Module 05

Various types of vulnerabilities

Module 06

Analyzing indicators of malicious activity

Week 4

Module 07

The purpose of mitigation techniques used to secure the enterprise

Comparing and contrasting the security implications of different architecture models (Part 1)

Module 08

Comparing and contrasting the security implications of different architecture models (Part 1)

Applying security principles to secure enterprise infrastructure

Week 5

Module 09

Comparing and contrasting concepts and strategies to protect data

Explain the importance of resilience and recovery in security architecture

Module 10

Applying common security techniques to computing resources

The security implications of proper hardware, software, and data asset management

Week 6

Module 11

Activities associated with vulnerability management

Security alerting and monitoring concepts and tools

Module 12

Modifying enterprise capabilities to enhance security

Implement and maintain identity and access management

Week 7

Module 13

Importance of automation and orchestration

Incident response activities

Use data sources to support an investigation

Module 14

Elements of effective security governance

Elements of the risk management process

Week 8

Module 15

Processes associated with third-party risk

Elements of effective security compliance

Types and purposes of audits and assessments

Module 16

Implement security awareness practices + Full review

 

Security+ Exam at a glance

Exam Details

 

CompTIA Security+ Exam

Number of Questions / Practical Challenges

Maximum 90 questions (multiple-choice and performance-based questions)

Test Duration

90 minutes

Test Format

Multiple Choice + Performance-Based Questions (PBQs)

Test Availability

Pearson VUE Testing Centers and Online Proctored Exam at IUT

Exam Code

SY0-701

Passing Score

750 / 900