Courses in the Cyber Security track cover a wide range of topics designed to introduce you to modern security vulnerabilities and prepare you to implement effective defensive measures. You’ll receive hands-on training in essential concepts, such as risk management, access control, application security, incident response, and digital forensics. Whether you’re looking to take your current position to the next level, or you’re interested in pursuing a career in cyber security, our expert instructors deliver a balanced combination of theory and tangible skills, so you can meet today’s digital threats with confidence.

No offerings in this track are currently scheduled.

IT Security Fundamentals

This course is for anyone needing a broader perspective of security tools and processes, especially the business unit/application manager who must understand the vulnerabilities that can compromise their business mission and the cost of mitigating that security risk.

More Details

Secure Coding

This hands-on three day course covers the Top 10 vulnerabilities with Web Applications and how to prevent them. The Top 10 vulnerabilities are based on the OWASP Top 10.  This course will explain the most severe data sanitization issues, with good and bad coding examples of each. 

More Details


Network traffic analysis is one of the Top 5 vital cyber security skills. Without an understanding of the traffic on your network, you are operating blindly.

More Details


Cybercrime is at an all time high. Vulnerabilities are exploited daily. What offensive tools and tactics do attackers use to break into our systems?  If you don't understand an adversary's offense, you have little chance of successful defense.

More Details


This course will prepare you for Incident Response, so you can plan and respond appropriately, rather than play a victim of circumstance. The course also introduces you to digital forensics to aid in Incident Response planning and evidence acquisition and analysis. This course's primary objective is to provide an Incident Response framework that can be tailored for your environment.

More Details


Many of us deploy or develop applications that are connected to the Internet.  How do we know these are secure?  Is it possible to design secure applications to reduce the risk of successful attacks? Insecure web applications are the most commonly attacked systems on the Internet. This course introduces the top vulnerabilities in applications and discusses common, but often overlooked, fixes for each.

 More Details



Understanding how data travels from an attacker system to your corporate or home network is critical. Many successful attacks occur today due to misconfigured devices, such as routers or firewalls. Cyber criminals take advantage of weaknesses in controls and ride insecure architectures to carry out nefarious activities.This course provides a comprehensive understanding of how data travels across the Internet and through your network.  

More Details

CEH Exam Prep

Our CEH Boot Camp provides you with tools and techniques used by hackers and information security professionals alike to break into an organization. As we put it, “to beat a hacker, you need to think like a hacker.”

More Details

CISSP Exam Prep

CISSP is the premier certification for today’s information systems security professional. It remains the premier certification because of the sponsoring organization, the International Information Systems Security Certification Consortium, Inc.  The skills and knowledge you gain in this course will help you master the eight CISSP domains and ensure your credibility and success within the information systems security field. 

More Details


The Network+ course builds on your existing user-level knowledge and experience with personal computer operating systems and networks to present the fundamental skills and concepts that you will need to use on the job in any type of networking career. 

More Details

* You may unsubscribe from our mailing list at any time using the 'unsubscribe' link at the bottom of every email. You can customize your email subscriptions here. To see how we keep your personal information secure, please visit our privacy policy.