International Partners & Certification Programs
Cyber Security Center at Inha University in Tashkent
The Cyber Security Center at Inha University in Tashkent was officially established on April 8, 2022 with the aim of strengthening cooperation in the development of Information and Communication Technologies (ICT), particularly in the field of cybersecurity in cooperation with Cyber Security Center of Uzbekistan. The Center serves as a platform for advancing cybersecurity education, developing professional competencies, and supporting the acquisition of in-demand knowledge and practical skills for students of Inha University in Tashkent and the wider professional community.
The Center promotes collaboration with industry partners and academic institutions to support the development of modern cybersecurity expertise and to contribute to the growth of the national digital ecosystem.
Within the framework of the Cybersecurity Laboratory, the following initiatives are implemented:
- Training and professional development programs for students and cybersecurity specialists;
- Organization of hands-on practical training and laboratory sessions in cybersecurity;
-
Implementation of specialized courses and certification programs in collaboration with leading international partners, including Check Point, EC-Council, CompTIA, Fortinet, Kaspersky, and Group-IB.
Through these activities, the Cyber Security Center aims to strengthen cybersecurity capacity, support talent development, and contribute to the preparation of highly qualified professionals capable of addressing modern cyber threats.
Company logos
International Partners & Certification Programs
The Cyber Security Center at Inha University in Tashkent collaborates with leading global cybersecurity organizations to provide internationally recognized training programs and professional certifications. These partnerships allow students and professionals to develop practical cybersecurity skills aligned with global industry standards.
CompTIA
CompTIA is a globally recognized, vendor-neutral organization that provides industry-leading IT and cybersecurity certifications. Programs such as Security+, Network+, and CySA+ validate essential skills in network security, threat detection, risk management, and incident response. CompTIA certifications are recognized in more than 150 countries and approved under the U.S. Department of Defense cybersecurity workforce framework.
EC-Council
EC-Council is an international organization specializing in cybersecurity certification and training. Its programs, including Certified Ethical Hacker (CEH) and Certified Security Analyst (ECSA), focus on ethical hacking, penetration testing, and advanced cybersecurity defense techniques.
Check Point
Check Point Software Technologies is a global leader in cybersecurity solutions for network, cloud, and endpoint protection. Through academic partnerships, students gain practical knowledge of modern network security architecture and threat prevention technologies.
Fortinet
Fortinet provides advanced cybersecurity training through the Network Security Expert (NSE) Certification Program, covering network security, secure infrastructure, and cyber threat intelligence used by organizations worldwide.
Kaspersky
Kaspersky is a globally recognized cybersecurity company providing expertise in threat intelligence, malware analysis, and digital security. Training programs focus on modern cyber threats, digital forensics, and security operations.
Group-IB
Group-IB specializes in cybercrime investigation, threat intelligence, and digital forensics. Collaboration supports the development of practical cybersecurity skills in cyber threat analysis and incident response.
EC-Council – Certification Programs
About EC-COUNCIL
EC-Council is a globally recognized cybersecurity certification body specializing in ethical hacking, penetration testing, digital forensics, and cybersecurity defense. EC-Council develops internationally recognized programs that validate practical cybersecurity skills and prepare professionals to identify, prevent, and respond to cyber threats.
Key advantages:
- Global Recognition – EC-Council certifications are recognized in 145+ countries worldwide.
- Industry Leadership – Certified Ethical Hacker (CEH) has been a leading ethical hacking certification for over 20 years.
- Government & Enterprise Trust – Certifications are used by government agencies, defense organizations, and global enterprises.
- Hands-on Training – Programs include practical labs, real-world simulations, and advanced cybersecurity tools.
- Career Impact – EC-Council certifications support high-demand cybersecurity careers and professional advancement.
Core Programs
|
Program |
Focus |
Key Skills |
Career Benefits |
|
CEH (Certified Ethical Hacker) |
Ethical Hacking & Penetration Testing |
Vulnerability Assessment, Network Scanning, Exploitation Techniques, Web Application Security, Threat Analysis |
One of the world’s most recognized ethical hacking certifications; prepares professionals for roles such as Penetration Tester, Security Analyst, SOC Analyst, and Cybersecurity Specialist |
|
CPENT (Certified Penetration Testing Professional) |
Advanced Penetration Testing |
Enterprise Network Penetration Testing, Exploiting Complex Environments, Active Directory Attacks, Advanced Network Security Testing |
Develops advanced offensive security skills required for Red Team specialists, Senior Penetration Testers, and Security Consultants |
|
CCISO (Certified Chief Information Security Officer) |
Cybersecurity Leadership & Governance |
Security Governance, Risk Management, Security Program Management, Compliance, Strategic Security Leadership |
Designed for senior cybersecurity professionals and executives pursuing leadership roles such as CISO, Security Director, and Cybersecurity Manager |
Certified Ethical Hacker (CEH) v13
Certified Ethical Hacker (CEH) by EC-Council (USA) is one of the world’s leading certifications in ethical hacking, penetration testing, and cybersecurity defense. For over 20 years, CEH has been recognized globally as a premier credential for cybersecurity professionals.
The latest CEH v13 introduces the world’s first ethical hacking certification with a 4-phase AI-powered learning framework, combining theoretical knowledge with hands-on practical training.
Key Advantages
- Global Leadership – CEH has been the world’s leading ethical hacking certification for more than 20 years.
- Industry Recognition – Ranked 12th among the Top 75 Highest-Paying IT Certifications globally.
- AI-Driven Training – CEH v13 introduces the industry’s first AI-powered cybersecurity learning framework.
- Practical Expertise – Training includes 350+ ethical hacking tools and hands-on iLabs environments.
- Comprehensive Curriculum – 20+ modules covering modern cyberattack techniques and defense strategies.
- Career Advancement – CEH certification supports higher salaries and faster career growth in cybersecurity.
- Global Competitions – Access to international Capture-the-Flag (CTF) cybersecurity competitions.
- CEH Master Pathway – Opportunity to achieve the advanced CEH Master certification.
The program equips professionals with the skills needed to identify vulnerabilities, conduct penetration testing, and protect organizations from modern cyber threats.
Certified Ethical Hacker Powered by AI curriculum includes:
|
Learn |
Course Outline |
|
Module 01 Introduction to Ethical Hacking |
Learn the fundamentals and key issues in information security, including the basics of ethical hacking, information security controls, relevant laws, and standard procedures. |
|
Module 02 Footprinting and Reconnaissance |
Learn how to use the latest techniques and tools for footprinting and reconnaissance, a critical pre-attack phase of ethical hacking |
|
Module 03 Scanning Networks |
Learn different network scanning techniques and countermeasures. |
|
Module 04 Enumeration |
Learn various enumeration techniques, including Border Gateway Protocol (BGP) and Network File Sharing (NFS) exploits and associated countermeasures. |
|
Module 05 Vulnerability Analysis |
Learn how to identify security loopholes in a target organization’s network, communication infrastructure, and end systems. Different types of vulnerability assessment and vulnerability assessment tools are also included. |
|
Module 06 System Hacking |
Learn about the various system hacking methodologies used to discover system and network vulnerabilities, including steganography, steganalysis attacks, and how to cover tracks. |
|
Module 07 Malware Threats |
Learn about different types of malware (Trojan, viruses, worms, etc.), APT and fileless malware, malware analysis procedures, and malware countermeasures. |
|
Module 08 Sniffing |
Learn about packet sniffing techniques and their uses for discovering network vulnerabilities, plus countermeasures to defend against sniffing attacks. |
|
Module 09 Social Engineering |
Learn social engineering concepts and techniques, including how to identify theft attempts, audit human-level vulnerabilities, and suggest social engineering countermeasures. |
|
Module 10 Denial-of-Service |
Learn about different Denial of Service (DoS) and Distributed DoS (DDoS) attack techniques, plus the tools used to audit a target and devise DoS and DDoS countermeasures and protections. |
|
Module 11 Session Hijacking |
Learn the various session-hijacking techniques used to discover network-level session management, authentication, authorization, and cryptographic weaknesses and associated countermeasures. |
|
Module 12 Evading IDS, Firewalls, and Honeypots |
Learn about firewalls, intrusion detection systems (IDS), and honeypot evasion techniques; the tools used to audit a network perimeter for weaknesses; and countermeasures. |
|
Module 13 Hacking Web Servers |
Learn about web server attacks, including a comprehensive attack methodology used to audit vulnerabilities in web server infrastructures and countermeasures. |
|
Module 14 Hacking Web Applications |
Learn about web application attacks, including a comprehensive hacking methodology for auditing vulnerabilities in web applications and countermeasures. |
|
Module 15 SQL Injection |
Learn about SQL injection attack techniques, evasion techniques, and SQL injection countermeasures. |
|
Module 16 Hacking Wireless Networks |
Learn about different types of encryption, threats, hacking methodologies, hacking tools, security tools, and countermeasures for wireless networks. |
|
Module 17 Hacking Mobile Platforms |
Learn mobile platform attack vectors, Android and iOS hacking, mobile device management, mobile security guidelines, and security tools. |
|
Module 18 IoT Hacking |
Learn different types of Internet of Things (IoT) and operational technology (OT) attacks, hacking methodologies, hacking tools, and countermeasures. |
|
Module 19 Cloud Computing |
Learn different cloud computing concepts, such as container technologies and serverless computing, various cloud computing threats, attacks, hacking methodologies, and cloud security techniques and tools. |
|
Module 20 Cryptography |
Learn about encryption algorithms, cryptography tools, Public Key Infrastructure (PKI), email encryption, disk encryption, cryptography attacks, and cryptanalysis tools. |
The CEH Exams at a Glance
|
Exam Details |
CEH Knowledge Exam |
CEH Practical Exam |
|
Number of Questions/ Practical Challenges |
125 Questions |
20 Practical Challenges |
|
Test Duration |
4 Hours |
6 Hours |
|
Test Format |
MCQ |
iLabs Cyber Range |
|
Test Availability |
ECC Exam, Vue |
ASPEN, iLabs |
|
Exam Prefix |
312-50 (ECC Exam), 312-50 (VUE) |
— |
|
Passing Score |
60% — 85% |
60% — 85% |
CompTIA Certification Programs
About CompTIA:
CompTIA (Computing Technology Industry Association) is a globally recognized, vendor-neutral organization that develops industry-leading certifications validating IT and cybersecurity skills.
Key advantages:
- Global Recognition – CompTIA certifications are recognized by employers in 150+ countries worldwide.
- Industry Demand – 1 in 5 IT professionals in North America hold at least one CompTIA certification.
- Government Approved – Certifications are approved under the S. Department of Defense (DoD 8140.03M) workforce framework.
- Vendor-Neutral Skills – Knowledge applicable across multiple technologies and platforms.
- Structured Career Path – Certifications range from foundational to advanced levels (A+, Network+, Security+, CySA+, PenTest+, CASP+).
- CompTIA certifications provide internationally recognized validation of professional IT competencies and support career development in cybersecurity, networking, and IT infrastructure.
Core Programs:
|
Program |
Focus |
Key Skills |
Career Benefits |
|
Network+ |
Networking & Protocols |
Configuration, Management, Troubleshooting, Security |
Foundation for networking careers, prerequisite for specialized certs, industry-recognized |
|
Security+ |
Cybersecurity & Data Protection |
Threat Management, Vulnerability Assessment, Incident Response, Cryptography |
Entry-level security certification, opens doors to cybersecurity roles, DoD approved |
|
Linux+ |
Linux Administration |
Systems Management, Security Hardening, Scripting & Automation, Containers |
Supports enterprise Linux systems, cloud & cybersecurity infrastructure, hands-on enterprise skills |
CompTIA Security+
CompTIA Security+ is the premier global certification that establishes the essential skills required for core security functions and a career in IT security. It showcases professionals’ capabilities in securing networks, applications, and devices, ensuring data integrity, confidentiality, and availability. CompTIA Security+ focuses on practical, hands-on skills to tackle real-world challenges. As the most widely recognized credential, it is invaluable for advancing in the dynamic field of cybersecurity.
Key Features:
- Global Cybersecurity Benchmark – One of the most widely recognized entry-level cybersecurity certifications worldwide.
- Core Security Skills Validation – Covers threat management, network security, identity management, risk management, and cryptography.
- Performance-Based Certification – Exams include practical, scenario-based questions that test real-world cybersecurity skills.
- Hands-on Security Knowledge – Focuses on identifying threats, managing vulnerabilities, and implementing security controls.
- Career Opportunities – Prepares professionals for roles such as Security Analyst, SOC Analyst, Systems Administrator, and Network Security Engineer.
- Strong Foundation for Advanced Certifications – Serves as a pathway to advanced cybersecurity certifications (CySA+, PenTest+, CASP+).
Security + curriculum includes:
|
Time |
Learn |
Course Outline |
|
Week 1 |
Module 01 |
Comparing and contrasting various types of security controls· Summarizing fundamental security concepts (Part 1) |
|
Module 02 |
Summarizing fundamental security concepts (Part 2) Importance of change of management processes and the impact of security |
|
|
Week 2 |
Module 03 |
Importance of using appropriate cryptography solutions |
|
Module 04 |
Comparing and contrasting common threat actors and motivations Threat vectors and attack surfaces |
|
|
Week 3 |
Module 05 |
Various types of vulnerabilities |
|
Module 06 |
Analyzing indicators of malicious activity |
|
|
Week 4 |
Module 07 |
The purpose of mitigation techniques used to secure the enterprise Comparing and contrasting the security implications of different architecture models (Part 1) |
|
Module 08 |
Comparing and contrasting the security implications of different architecture models (Part 1) Applying security principles to secure enterprise infrastructure |
|
|
Week 5 |
Module 09 |
Comparing and contrasting concepts and strategies to protect data Explain the importance of resilience and recovery in security architecture |
|
Module 10 |
Applying common security techniques to computing resources The security implications of proper hardware, software, and data asset management |
|
|
Week 6 |
Module 11 |
Activities associated with vulnerability management Security alerting and monitoring concepts and tools |
|
Module 12 |
Modifying enterprise capabilities to enhance security Implement and maintain identity and access management |
|
|
Week 7 |
Module 13 |
Importance of automation and orchestration Incident response activities Use data sources to support an investigation |
|
Module 14 |
Elements of effective security governance Elements of the risk management process |
|
|
Week 8 |
Module 15 |
Processes associated with third-party risk Elements of effective security compliance Types and purposes of audits and assessments |
|
Module 16 |
Implement security awareness practices + Full review |
Security+ Exam at a glance
|
Exam Details
|
CompTIA Security+ Exam |
|
Number of Questions / Practical Challenges |
Maximum 90 questions (multiple-choice and performance-based questions) |
|
Test Duration |
90 minutes |
|
Test Format |
Multiple Choice + Performance-Based Questions (PBQs) |
|
Test Availability |
Pearson VUE Testing Centers and Online Proctored Exam at IUT |
|
Exam Code |
SY0-701 |
|
Passing Score |
750 / 900 |