At Cyber Helmets (“Website,” “Service,” “We,” “Us,” or “Our”), we prioritize the security and privacy of our users. This Privacy Policy explains how we collect, use, share, and protect your personal information when you use our website and purchase our cybersecurity training courses.
1. Information We Collect
a. Personal Information: When you register, purchase courses, or interact with our website, we may collect personal information such as your name, email address, billing information, and other details necessary for providing our services.
b. Usage Information: We may collect information about how you interact with our website, including your IP address, device information, browser type, pages visited, and cookies for analytics and website optimization.
2. Use of Information
a. Service Provision: We use your personal information to provide and improve our courses, process payments, and communicate with you regarding your account and course updates.
b. Marketing Communication: With your consent, we may send promotional materials, newsletters, or marketing communications related to our courses. You can opt out of these communications at any time.
3. Use of Google reCAPTCHA
We use Google reCAPTCHA to protect our forms from spam, abuse and automated submissions. The tool collects device- and user-interaction data (such as IP address, browser and cookie data, mouse movements and time on page) which is sent to and processed by Google, including on servers outside the European Economic Area. The use of reCAPTCHA is subject to Google’s Privacy Policy and Terms of Service, and Cyber Helmets does not use the data for any additional unrelated purposes.
4. Data Sharing and Disclosure
a. Third-Party Service Providers: We may share your information with trusted third-party service providers who assist us in delivering our services, such as payment processors or analytics tools. These parties are obligated to maintain the confidentiality and security of your information.
b. Legal Compliance: We may disclose your information if required to comply with legal obligations, enforce our Terms of Service, or protect our rights, property, or safety.
5. Data Security
We implement industry-standard security measures to protect your personal information from unauthorized access, alteration, disclosure, or destruction.
6. Data Retention
We retain your personal information for as long as necessary to fulfill the purposes outlined in this Privacy Policy unless a longer retention period is required or permitted by law.
7. Your Rights
a. Access and Correction: You have the right to access and correct your personal information held by us. You can update your account information or contact us to exercise these rights.
b. Data Deletion: You can request the deletion of your account and personal information. However, certain information may be retained for legal or legitimate business purposes.
8. Children’s Privacy
Our services are not directed to individuals under the age of 13. We do not knowingly collect personal information from children. If you believe we have collected information from a child, please contact us to remove the information.
9. Changes to this Policy
We reserve the right to update or modify this Privacy Policy. Any changes will be reflected on this page with a revised effective date. We encourage you to review this Privacy Policy periodically.
10. Contact Information
If you have any questions, concerns, or requests regarding this Privacy Policy or our data practices, please contact us at info@cyberhelmets.com.
To provide the best experiences, we and our partners use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us and our partners to process personal data such as browsing behavior or unique IDs on this site and show (non-) personalized ads. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Click below to consent to the above or make granular choices. Your choices will be applied to this site only. You can change your settings at any time, including withdrawing your consent, by using the toggles on the Cookie Policy, or by clicking on the manage consent button at the bottom of the screen.
Syllabus:
Intro to GCP
Exploitation of GCP Services
Methodologies
Security Services
Syllabus:
Intro to AWS
Exploitation of AWS Services
Methologies
Common Detection Mechanisms
Syllabus:
Azure Basics
Exploitation of Azure Services
Methologies
Common Detection Mechanisms
Fundamentals and Setup
Advanced Techniques and Practical Application
Advanced Techniques and Practical Application
Fundamentals & Setup