Terms of Service

These terms govern your use of CyberGuard Academy's cybersecurity training services, virtual environments, and educational platforms.

Last updated: August 1, 2025

Service Agreement Overview

Welcome to CyberGuard Academy's comprehensive cybersecurity training platform. These Terms of Service establish the framework for your access to and use of our professional cybersecurity education services, including online courses, virtual laboratories, certification programs, and related educational resources.

By enrolling in any CyberGuard Academy program, accessing our training platforms, or using our services, you agree to be bound by these terms. These terms ensure a secure, professional, and effective learning environment for all students pursuing cybersecurity excellence.

Important: Please read these terms carefully before enrolling in any cybersecurity training program. Your continued use of our services constitutes acceptance of these terms and any future modifications.

1Service Usage Terms

Acceptable Use Policy

  • Educational Purpose: All cybersecurity training tools and virtual environments must be used exclusively for legitimate educational purposes
  • Ethical Conduct: Students must adhere to ethical hacking principles and responsible disclosure practices at all times
  • Skill Development: Services are intended for developing defensive cybersecurity capabilities and professional expertise
  • Legal Compliance: All activities must comply with Sri Lankan cybersecurity laws and international ethical standards
  • Academic Integrity: Students must complete assessments and practical exercises using their own knowledge and skills

Prohibited Uses

  • Malicious Activities: Using training environments for actual attacks, malware development, or unauthorized penetration testing
  • Unauthorized Access: Attempting to access systems, networks, or data outside of designated training environments
  • Service Disruption: Activities that interfere with other students' learning or compromise platform stability
  • Content Violation: Sharing, distributing, or misusing proprietary training materials, lab environments, or assessment content
  • Account Misuse: Sharing login credentials, creating fake accounts, or impersonating other students or instructors

Service Access Requirements

  • Age Requirement: Students must be at least 18 years old or have parental consent for cybersecurity training
  • Identity Verification: Valid identification required for certification programs and advanced security courses
  • Technical Requirements: Compatible devices and reliable internet connection necessary for virtual lab access
  • Payment Compliance: Current payment status required for continued access to premium training resources
  • Professional Conduct: Commitment to maintaining professional standards throughout the cybersecurity training program

Fair Usage Guidelines

  • Resource Allocation: Virtual lab environments have usage limits to ensure fair access for all students
  • Bandwidth Considerations: Reasonable use of network resources for training activities and content downloads
  • Storage Limits: Personal project storage within allocated limits for each cybersecurity training program
  • Support Requests: Reasonable use of technical support and instructor assistance services
  • Platform Stability: Activities should not negatively impact the learning experience of other cybersecurity students

2Account Management & Security

Account Creation Requirements

  • • Valid email address for account verification and course communications
  • • Strong password meeting our cybersecurity training platform standards
  • • Accurate personal information for certification and professional verification
  • • Agreement to receive important course updates and security notifications
  • • Consent to our privacy policy and data protection practices

Account Security Responsibilities

  • • Maintaining confidentiality of login credentials and access tokens
  • • Immediately reporting suspected unauthorized access or security breaches
  • • Regular password updates and enabling two-factor authentication when available
  • • Securing devices used to access cybersecurity training environments
  • • Compliance with our incident reporting procedures for security concerns

Account Suspension & Termination

  • • Violation of ethical hacking principles or acceptable use policies
  • • Attempted unauthorized access to systems outside training environments
  • • Sharing proprietary training materials or assessment content
  • • Non-payment of fees or fraudulent payment activities
  • • Behavior that compromises the learning environment or platform security

Multiple Account Policies

  • • One primary account per individual student for certification integrity
  • • Corporate accounts available for enterprise cybersecurity training programs
  • • Transfer procedures available for account migration between programs
  • • Family or educational institution group accounts with special terms
  • • Account consolidation services for students with multiple enrollments

3Service Availability & Modifications

Service Uptime & Maintenance

Availability Standards

  • • 99.5% uptime target for core training platforms
  • • 24/7 availability for self-paced learning modules
  • • Scheduled maintenance windows with advance notice
  • • Emergency maintenance procedures for security updates

Maintenance Procedures

  • • 48-hour advance notice for planned maintenance
  • • Off-peak scheduling to minimize learning disruption
  • • Automatic progress saving and session recovery
  • • Alternative resources during maintenance periods

Feature Availability & Updates

Core Features

  • • Course content and video lectures
  • • Virtual laboratory environments
  • • Assessment and certification systems
  • • Student progress tracking and analytics

Enhanced Features

  • • Live instructor sessions and mentoring
  • • Advanced simulation environments
  • • Industry networking and job placement services
  • • Premium cybersecurity tools and resources

Geographic Restrictions & Access

CyberGuard Academy's cybersecurity training services are primarily designed for students in Sri Lanka and the South Asian region. Some features may be restricted based on:

  • Legal Compliance: Local cybersecurity laws and educational regulations
  • Licensing Agreements: Software and tool licensing restrictions by region
  • Infrastructure Limitations: Network latency and server capacity considerations
  • Certification Validity: Professional certification recognition by jurisdiction

Service Modifications & Updates

CyberGuard Academy reserves the right to modify, update, or discontinue services to maintain the highest standards of cybersecurity education:

  • • Course content updates to reflect current cybersecurity threats and trends
  • • Platform enhancements for improved learning experiences and security
  • • New feature rollouts based on student feedback and industry requirements
  • • Legacy system retirement with appropriate migration support and notice

4Intellectual Property & Content Rights

Content Ownership

  • • All course materials, videos, and training content are proprietary to CyberGuard Academy
  • • Virtual lab environments and cybersecurity simulation tools remain our intellectual property
  • • Assessment questions, practical exercises, and certification materials are protected content
  • • Training methodologies and educational frameworks are proprietary knowledge assets

User-Generated Content Rights

  • • Students retain ownership of original projects and portfolio work created during training
  • • CyberGuard Academy may showcase exceptional student work for promotional purposes with consent
  • • Forum discussions and peer collaboration remain subject to our community guidelines
  • • Research contributions may be used for educational improvement with proper attribution

License Grants

  • • Limited, non-transferable license to access training materials during enrollment period
  • • Personal use license for downloaded resources and reference materials
  • • Professional use rights for skills and knowledge gained through cybersecurity training
  • • Certification display rights upon successful program completion

Copyright & Trademark Notices

  • • CyberGuard Academy name and logo are registered trademarks
  • • Third-party software and tools used in training maintain their respective copyrights
  • • Students must respect all intellectual property rights of training partners and vendors
  • • Proper attribution required when referencing CyberGuard Academy training in professional contexts

Intellectual Property Violations

Unauthorized use, reproduction, or distribution of CyberGuard Academy's intellectual property may result in:

  • • Immediate account suspension and program termination
  • • Legal action for copyright infringement and damages
  • • Permanent ban from all CyberGuard Academy services and programs
  • • Notification to relevant professional bodies and potential employers

5Payment Terms & Refund Policy

Payment Structure

  • Full Payment: Complete program fee due upon enrollment
  • Installment Plans: 3-6 month payment options available
  • Early Bird Discounts: Up to 15,000 LKR savings for early registration
  • Corporate Rates: Special pricing for enterprise training programs
  • Currency: All fees quoted in Sri Lankan Rupees (LKR)

Refund Conditions

  • 7-Day Guarantee: Full refund within first week of program start
  • Partial Refunds: Pro-rated refunds up to 30% program completion
  • Medical Withdrawals: Special consideration for documented health issues
  • Service Interruption: Refunds for extended technical difficulties
  • Processing Time: Refunds processed within 14 business days

Questions & Support

For questions about these Terms of Service, account issues, or service-related concerns, please contact our student support team.