Courses in the Cyber Security track cover a wide range of topics designed to introduce you to modern security vulnerabilities and prepare you to implement effective defensive measures. You’ll receive hands-on training in essential concepts, such as risk management, access control, application security, incident response, and digital forensics. Whether you’re looking to take your current position to the next level, or you’re interested in pursuing a career in cyber security, our expert instructors deliver a balanced combination of theory and tangible skills, so you can meet today’s digital threats with confidence.
|Security Fundamentals||Aug 27 - Aug 28||Day||Espinosa||12|
|Certified Ethical Hacker (CEH) Boot Camp||Sep 17 - Sep 27||Day||Espinosa||30|
|Web Application Security||Oct 15 - Oct 24||Evening||Espinosa||12|
Certified Ethical Hacker (CEH) Boot Camp
The goal of this course is to help you master an ethical hacking methodology that can be used in a penetration testing or ethical hacking situation. You walk out the door with ethical hacking skills that are highly in demand, as well as the globally recognized Certified Ethical Hacker certification! This course prepares you for EC-Council Certified Ethical Hacker exam 312-50.more…
Dates & Times
Mon, Sep 17, 5:30pm to 9:30pm
Tue, Sep 18, 5:30pm to 9:30pm
Wed, Sep 19, 5:30pm to 9:30pm
Thu, Sep 20, 5:30pm to 9:30pm
Mon, Sep 24, 5:30pm to 9:30pm
Tue, Sep 25, 5:30pm to 9:30pm
Wed, Sep 26, 5:30pm to 9:30pm
Thu, Sep 27, 5:30pm to 9:30pm
Web Application Security
This course provides a comprehensive overview of application security for developers. Although other types of applications may be discussed the course focuses on web application development and the prevention of hacking through vulnerable web applications. Topics include Application Security Fundamentals, Application Security Threats, and Application Security Assessment.more…
Dates & Times
Mon, Oct 15, 5:30pm to 8:30pm
Wed, Oct 17, 5:30pm to 8:30pm
Mon, Oct 22, 5:30pm to 8:30pm
Wed, Oct 24, 5:30pm to 8:30pm
IT Security Fundamentals
This course is for anyone needing a broader perspective of security tools and processes, especially the business unit/application manager who must understand the vulnerabilities that can compromise their business mission and the cost of mitigating that security risk.
This hands-on three day course covers the Top 10 vulnerabilities with Web Applications and how to prevent them. The Top 10 vulnerabilities are based on the OWASP Top 10. This course will explain the most severe data sanitization issues, with good and bad coding examples of each.
NETWORK TRAFFIC ANALYSIS USING WIRESHARK
Network traffic analysis is one of the Top 5 vital cyber security skills. Without an understanding of the traffic on your network, you are operating blindly.
INTRODUCTION TO HACKING, DEFENSE, AND RESPONSE
Cybercrime is at an all time high. Vulnerabilities are exploited daily. What offensive tools and tactics do attackers use to break into our systems? If you don't understand an adversary's offense, you have little chance of successful defense.
INCIDENT RESPONSE AND COMPUTER FORENSICS
This course will prepare you for Incident Response, so you can plan and respond appropriately, rather than play a victim of circumstance. The course also introduces you to digital forensics to aid in Incident Response planning and evidence acquisition and analysis. This course's primary objective is to provide an Incident Response framework that can be tailored for your environment.
WEB APPLICATION SECURITY
Many of us deploy or develop applications that are connected to the Internet. How do we know these are secure? Is it possible to design secure applications to reduce the risk of successful attacks? Insecure web applications are the most commonly attacked systems on the Internet. This course introduces the top vulnerabilities in applications and discusses common, but often overlooked, fixes for each.
SECURITY ARCHITECTURE AND CONTROLS
Understanding how data travels from an attacker system to your corporate or home network is critical. Many successful attacks occur today due to misconfigured devices, such as routers or firewalls. Cyber criminals take advantage of weaknesses in controls and ride insecure architectures to carry out nefarious activities.This course provides a comprehensive understanding of how data travels across the Internet and through your network.
CEH Exam Prep
Our CEH Boot Camp provides you with tools and techniques used by hackers and information security professionals alike to break into an organization. As we put it, “to beat a hacker, you need to think like a hacker.”
CISSP Exam Prep
CISSP is the premier certification for today’s information systems security professional. It remains the premier certification because of the sponsoring organization, the International Information Systems Security Certification Consortium, Inc. The skills and knowledge you gain in this course will help you master the eight CISSP domains and ensure your credibility and success within the information systems security field.
The Network+ course builds on your existing user-level knowledge and experience with personal computer operating systems and networks to present the fundamental skills and concepts that you will need to use on the job in any type of networking career.