Frequently Asked Questions
Get Your Questions Answered
We've compiled answers to the most common questions regarding our programs, course details, and the enrollment process. Browse the categories below to find the information you're looking for quickly and easily.
This program is designed to equip military, intelligence, and government individuals with cutting-edge cyber skills and knowledge. It covers a range of topics, from fundamental concepts to advanced techniques in areas like offensive operations, penetration testing, and secure system exploitation.
The program is ideal for aspiring cyber professionals, current IT professionals, transitioning military personnel, and organizations looking to upskill their workforce in offensive cyber capabilities.
Graduates can pursue a wide range of in-demand offensive cyber roles, such as Military Cyber Roles, Penetration Tester, Red Team Operator, Exploit Developer, Reverse Engineer, Vulnerability Researcher, and Offensive Security Engineer.
Our program offers a comprehensive curriculum, including cyber fundamentals, network exploitation, cloud exploitation, application exploitation, reverse engineering, threat intelligence, and ethical hacking.
Once downloaded, you have unlimited access to all training materials on your device. There's no expiration date for offline content. Your license remains active indefinitely, allowing you to review materials, retake assessments, and refresh your knowledge whenever needed.
Training can be delivered through various modalities to suit different learning preferences, including instructor-led classroom training, virtual instructor-led training, self-paced online modules, and hands-on labs.
The duration varies depending on the specific course or track you choose. Some courses might be a few days, while comprehensive programs could span several weeks or months. Please check the individual course outlines for detailed duration information.
Generally, a foundational understanding of computer networks and operating systems is beneficial. Some advanced modules may require prior cyber experience or specific certifications. Please refer to the detailed course descriptions for specific requirements.
Our platform is designed to work completely offline. After your initial download and setup, all course materials, exercises, and assessments are stored locally on your device. You can access everything without any internet connection. Simply launch the application from your desktop or start menu to begin training.
The program is designed to prepare participants for various industry-recognized certifications. While we don't directly issue third-party certifications, our curriculum aligns with USCYBERCOM qualifications and Joint Qualification Requirements (JQRs).
All your progress is automatically saved locally on your device as you work through the courses. This includes completed modules, test scores, and time spent on activities. When you connect to the internet, your progress can be synced to your online profile if desired, but this is completely optional.
Financial aid is not currently available for our programs. Please contact your employer or unit for information on how to pay for or request training.
To begin the enrollment process, please visit our contact page and get in touch with an ACTP representative who can guide you through the next steps and provide detailed information.