Skip to content
Get 10% Discount on Every Courses
Login/Register
Call: +91-9930824239
Email: services@macksofy.com
Macksofy TrainingsMacksofy Trainings
  • About Us
    • About Macksofy Technologies | Cyber Security Training
    • Our Esteem Clients
  • Courses

      Beginner

      • SEC-100 CyberCore Security Essentials
      • Certified Ethical Hacker CEHV13 with Artificial Intelligence
      • Certified Ethical Hacker with Artificial Intelligence CEHV13 Practical
      • Certified Ethical Hacker CEHv12
      • The Certified SOC Analyst CSA
      • Certified Threat Intelligence Analyst (CTIA)
      • Computer Hacking Forensic Investigator (CHFI)
      • Foundational Wireless Network PEN 210 Course

      Intermediate

      • SEC-100 CyberCore Security Essentials
      • SOC-200: Foundational Security Operations and Defensive Analysis
      • Foundational Wireless Network PEN 210
      • Certified Threat Intelligence Analyst (CTIA)
      • The Certified SOC Analyst CSA
      • Advanced Windows Exploitation EXP-401
      • Advanced macOS Control Bypasses EXP-312

      Professional

      • Certified Penetration Testing Professional CPENT
      • Advanced macOS Control Bypasses OSMR | EXP 312
      • Windows User Mode Exploit Development OSED | EXP 301
      • OSWE | WEB 300 Advanced Web Attacks and Exploitation
      • OSWA | WEB 200 Foundational Web Application Assessments with Kali Linux
      • OSEP | PEN-300 Advanced Evasion Techniques and Breaching Defenses
      • OSCP | PEN 200 Penetration Testing with Kali Linux
  • Certifications
    • Offsec Certification Voucher
    • EC Council Certification Voucher
  • Our Training
    • OSCP+ Training and Certification
    • Sec 100 Cybercore Security Essentials
    • Certified Ethical Hacker (CEH) V13
    • Certified Ethical Hacker Training
    • Certified Threat Intelligence Analyst (CTIA)
    • OSWE (WEB-300) Training And Certification Offsec India
    • The Certified Penetration Testing Professional (CPENT)
    • Computer Hacking Forensic Investigator CHFI
  • Blog
  • Contact Us
Enroll Now
Macksofy TrainingsMacksofy Trainings
  • About Us
    • About Macksofy Technologies | Cyber Security Training
    • Our Esteem Clients
  • Courses

      Beginner

      • SEC-100 CyberCore Security Essentials
      • Certified Ethical Hacker CEHV13 with Artificial Intelligence
      • Certified Ethical Hacker with Artificial Intelligence CEHV13 Practical
      • Certified Ethical Hacker CEHv12
      • The Certified SOC Analyst CSA
      • Certified Threat Intelligence Analyst (CTIA)
      • Computer Hacking Forensic Investigator (CHFI)
      • Foundational Wireless Network PEN 210 Course

      Intermediate

      • SEC-100 CyberCore Security Essentials
      • SOC-200: Foundational Security Operations and Defensive Analysis
      • Foundational Wireless Network PEN 210
      • Certified Threat Intelligence Analyst (CTIA)
      • The Certified SOC Analyst CSA
      • Advanced Windows Exploitation EXP-401
      • Advanced macOS Control Bypasses EXP-312

      Professional

      • Certified Penetration Testing Professional CPENT
      • Advanced macOS Control Bypasses OSMR | EXP 312
      • Windows User Mode Exploit Development OSED | EXP 301
      • OSWE | WEB 300 Advanced Web Attacks and Exploitation
      • OSWA | WEB 200 Foundational Web Application Assessments with Kali Linux
      • OSEP | PEN-300 Advanced Evasion Techniques and Breaching Defenses
      • OSCP | PEN 200 Penetration Testing with Kali Linux
  • Certifications
    • Offsec Certification Voucher
    • EC Council Certification Voucher
  • Our Training
    • OSCP+ Training and Certification
    • Sec 100 Cybercore Security Essentials
    • Certified Ethical Hacker (CEH) V13
    • Certified Ethical Hacker Training
    • Certified Threat Intelligence Analyst (CTIA)
    • OSWE (WEB-300) Training And Certification Offsec India
    • The Certified Penetration Testing Professional (CPENT)
    • Computer Hacking Forensic Investigator CHFI
  • Blog
  • Contact Us

Terms & Condition

  • Home
  • Terms & Condition
Breadcrumb Abstract Shape
Breadcrumb Abstract Shape
Breadcrumb Abstract Shape

Terms and Conditions

Welcome to Macksofytrainings.com. By purchasing our cybersecurity e-course vouchers or accessing our training platform, you agree to comply with and be bound by the following terms and conditions. Please read them carefully.

1. Acceptance of Terms

By creating an account or purchasing a course voucher, you acknowledge that you have read, understood, and agreed to these Terms and Conditions, as well as our Privacy Policy and Return Policy.

2. User Accounts and Security

  • Account Responsibility: You are responsible for maintaining the confidentiality of your login credentials. Any activity occurring under your account is your sole responsibility.

  • Single User License: Each purchase grants a single-user license. Sharing account credentials or voucher codes with third parties is strictly prohibited.

  • Account Termination: Macksofytrainings.com reserves the right to suspend or terminate accounts suspected of unauthorized sharing or fraudulent activity without a refund.

3. Intellectual Property Rights

All content provided on Macksofytrainings.com—including videos, lab manuals, code snippets, graphics, and exam simulations—is the exclusive property of Macksofytrainings.com or its licensors.

  • Restrictions: Users may not record, copy, redistribute, sell, or “scrape” course content for any purpose.

  • Usage: Content is provided for individual educational use only.

4. Ethical Conduct & Lab Usage

As a provider of cybersecurity training, we maintain strict ethical standards:

  • Legal Compliance: You agree to use the skills learned on this platform for legal, “White Hat,” and ethical purposes only.

  • Prohibited Actions: Using our lab environments or tools to perform unauthorized attacks on third-party networks or systems is grounds for immediate expulsion and potential legal action.

  • Lab Access: Lab environments are provided for the duration specified in your voucher. Abuse of lab resources (e.g., crypto-mining, hosting illegal content) will result in an immediate ban.

5. Voucher Redemption and Validity

  • Vouchers must be redeemed within the specified validity period (standardly 12 months from purchase).

  • Vouchers are non-transferable once they have been activated on a specific user profile.

  • It is the user’s responsibility to ensure their hardware and internet connection meet the minimum technical requirements listed on our site.

6. Limitation of Liability

Macksofytrainings.com provides educational content “as is.” While we strive for 100% accuracy, we do not guarantee that:

  • The content will result in passing a third-party certification exam.

  • The website will be uninterrupted or error-free.

  • The skills taught will guarantee employment or specific career outcomes.

7. Modifications to Service

We reserve the right to update course content, replace lab environments, or modify the platform interface at any time to ensure the material remains current with evolving cybersecurity threats.

8. Governing Law

These terms are governed by and construed in accordance with the laws of [Insert Your Country/State], and you irrevocably submit to the exclusive jurisdiction of the courts in that location.


Key Highlights for Students

TopicRule
SharingStrictly prohibited; one account per person.
EthicsSkills must be used for legal/ethical purposes only.
AccessContent access expires based on voucher terms.
LabsMonitored for abuse; unauthorized activity leads to bans.

Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nis aliquip commodo consequat aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat.

9. Corporate and Bulk Purchase Provisions

For organizations or educational institutions purchasing vouchers in volume (“Bulk Orders”), the following terms apply:

  • Voucher Distribution: The purchasing entity is responsible for the secure distribution of vouchers to its authorized employees or students.

  • Seat Management: Once a voucher is redeemed by an individual, that “seat” is locked to that user. Licenses cannot be “recycled” or transferred to a different employee once the course has been accessed.

  • Reporting: Upon request, Macksofytrainings.com can provide progress reports for bulk-enrolled users, provided it aligns with our Privacy Policy and local data protection laws (e.g., GDPR).

  • Audit Rights: Macksofytrainings.com reserves the right to audit the use of bulk vouchers to ensure compliance with the “Single User License” policy.

10. Third-Party Exam & Brand Disclaimer

Macksofytrainings.com offers preparatory materials for various industry certifications.

  • Trademark Acknowledgment: All trademarks, service marks, and logos (e.g., CompTIA, EC-Council, Cisco, ISACA, AWS, Microsoft) are the property of their respective owners. Macksofytrainings.com is an independent training provider and, unless explicitly stated, is not officially affiliated with or endorsed by these organizations.

  • Exam Vouchers: If a training bundle includes a third-party exam voucher, that voucher is subject to the terms and expiration policies of the issuing body (e.g., Pearson VUE). We are not responsible for exam failures or the inability to schedule an exam before the voucher expires.

  • Certification Guarantee: While our courses are designed to align with official exam objectives, Macksofytrainings.com does not guarantee a passing score on any third-party certification exam.


Summary of New Clauses

CategoryKey Policy
Bulk SeatsCannot be transferred between employees after redemption.
TrademarksMention of brands (like CompTIA) is for descriptive purposes only.
Exam VouchersSubject to the third-party provider’s (e.g., Pearson VUE) rules.
ResultsCourse completion $\neq$ Automatic Certification.
macksofy_white (1)

Welcome To Macksofy Technologies Cyber Security Training Certification Courses Macksofy Ethical Hacking Training Institute develops and delivers proprietary vendor neutral professional certifications like for the cyber security industry.

Popular Courses

  • SEC 100 Course
  • Certified Ethical Hacker (CEH) Version 13
  • PEN 200 Course
  • Penetration Testing Professional CPENT

Useful Links

  • Privacy Policy
  • Terms & Condition
  • Refund and Returns Policy

Get Contact

  • Phone: +91-9930824239
  • E-mail: services@macksofy.com
  • Location: Mumbai | Hyderabad | Dubai | Oman | Canada
Icon-facebook Icon-linkedin2 Icon-instagram Icon-twitter

Disclaimer: Some graphics used on this website are sourced from public domains and are freely available for use. This site may also contain copyrighted material whose use has not always been specifically authorized by the copyright owner. All product names, trademarks, and brands mentioned are the property of their respective owners. Certification titles referenced are trademarks of the issuing organizations.

References to companies, products, and services on this website are for identification purposes only. We do not own, claim copyright over, or have explicit permission to use these names, logos, or trademarks, and their inclusion does not imply endorsement.

For further information or concerns, please contact us directly.

©2024. All rights reserved by Macksofy Technology.
Macksofy TrainingsMacksofy Trainings

Sign in

Lost your password?

Sign up

Already have an account? Sign in