logo
bg

Defensive Security

CyberNinja

SOCNinja

DFIRNinja

bg

Cloud Security

CloudNinja

DevOpsNinja

CloudSecNinja

Coming Soon!
bg

Offensive Security

OffSecNinja

CloudHackNinja

Coming Soon!
bg

GRC Security

GRCNinja

ISONinja

Coming Soon!
bg

Explore Cyber Career Launchers

You've done the work - Now let's get you hired!

Get Hired Now!

Future Job Ready Tracks

Be first to know about our next specialised cybersecurity training tracks. Get priority access to tomorrow's most in-demand skills.

bg

Defensive Security

Practical Certified Security Analyst (PCSA)

Practical Linux CLI Essentials (PLCE)

Practical Windows CLI Essentials (PWCE)

bg

Offensive Security

Practical Certified OffSec Associate (PCOSA)

Practical Certified OffSec Professional (PCOSP)

Coming Soon!

bg

Cloud Security

Practical Certified Cloud Security Associate (PCCSA)

Practical Certified Cloud Security Engineer (PCCSE)

Coming Soon!

bg

GRC Security

Practical Certified GRC Analyst (PCGA)

Practical Certified GRC Professional (PCGP)

Coming Soon!

Future Courses

Be first to know about our next expert-designed cybersecurity courses. Get priority access to hands-on practical training that builds job-ready skills.

bg

CompTIA Certifications

A+

CASP+

Cloud+

Cloud Essentials+

CloudNetX

CySA+

Linux+

Network+

PenTest+

Server+

Security+

SecurityX

LPI Certifications

LPIC-1

LPIC-2

LPIC-3 Mixed Environments

LPIC-3 Security

LPIC-3 Virtualization and Containerization

LPIC-3 High Availability and Storage Clusters

SBT Certifications

Blue Team Level 1

Blue Team Level 2

Certified Security Operations Manager (CSOM)

bg

Home

About Us

LynkProject

Sponsor a Learner

Join The Mission

FAQ

Home

About Us

Job Ready Tracks

Courses

Certifications

Events

LynkProject

Freemium

Articles

Join The Mission

Sponsor a Learner

FAQ

Privacy Policy
Cookies Policy
Acceptable Use Policy
Job & Money Back Guarantee – T&Cs

CyLynk Acceptable Use Policy

This policy is effective as of 29th July 2024. Please note that this AUP may be updated from time to time.

LAST UPDATED 6TH AUGUST 2025

1. Scope and Application

1.1 Coverage

This AUP applies to all users, including students, mentors, instructors, administrators, and visitors accessing CyLynk services via web, mobile, or API. It includes use of virtual labs, participation in courses and forums, and communications through CyLynk channels.

1.2 User Categories

Describes the roles covered: Students/Learners, Mentors/Instructors, Contributors, Administrators, and Visitors.

1.3 Binding Agreement

This AUP forms part of your agreement with CyLynk and must be read with the Terms of Service, Privacy Policy, and specific program agreements.

2. Permitted Uses

2.1 Educational Activities

Participation in courses, accessing content, completing assignments, and engaging in labs.

Respectful communication, group collaboration, and constructive feedback.

Professional development including networking, mentorship, and events.

2.2 Research and Innovation

Security research in approved labs, tool development, participation in authorized programs.

2.3 Platform Interaction

Profile creation, downloading learning materials, providing feedback for improvement.

3. Prohibited Activities

3.1 Security Violations

Unauthorized access, exploitation, or circumvention of security systems.

Malicious activities like malware, DDoS, or unauthorized scanning.

Unapproved security testing or ethical hacking.

3.2 Platform Misuse

Sharing credentials, impersonation, resource abuse, unauthorized resale.

Technical manipulation or reverse engineering.

3.3 Content and Communication Violations

Harassment, hate speech, inappropriate content, discrimination.

Spam, doxxing, or defamatory behavior.

3.4 Intellectual Property and Legal Violations

Copyright infringement, legal violations, or unethical use.

4. User Responsibilities and Obligations

4.1 Account Security

Protect credentials, report incidents, use MFA.

4.2 Accurate Information

Provide truthful data, verify identity, ensure assignment authenticity.

4.3 Respectful Engagement

Maintain professionalism, inclusivity, and resolve conflict respectfully.

4.4 Compliance and Continuous Learning

Stay updated, comply with laws, uphold ethical standards.

5. Monitoring, Investigation, and Enforcement

5.1 Monitoring Capabilities

Automated and manual reviews for policy compliance and performance tracking.

5.2 Investigation Process

Step-by-step investigation including user communication and evidence review.

5.3 Enforcement Actions

Warnings, feature restrictions, account termination, and legal reporting.

5.4 Appeal Process

Users may appeal enforcement actions with supporting evidence.

6. Reporting Violations and Concerns

6.1 Reporting Mechanisms

Contact: security@cylynk.com, support portal, or emergency line 1300 CYLYNK.

6.2 Information to Include

Details, screenshots, contact (optional).

6.3 Protection for Reporters

Non-retaliation, confidentiality, and investigative support.

7. Special Considerations for Cybersecurity Education

7.1 Ethical Hacking and Penetration Testing

Must occur in designated labs with written permission and compliance.

7.2 Use of Security Tools

Only in approved labs with proper documentation and data protection.

7.3 Industry Networking and Collaboration

Maintain professional standards, confidentiality, and responsible knowledge sharing.

discord
discord

Join Our Ninja Discord Community

logo

Learn faster. Grow stronger. With community.

Connect with fellow learners, ask questions, share ideas, and get real-time support.

Cyberlynk logo
Follow Us
LinkedIn
Facebook
Instagram
YouTube
Twitch
X / Twitter
Discord
GitHub
Reddit