Courses in the Cyber Security track cover a wide range of topics designed to introduce you to modern security vulnerabilities and prepare you to implement effective defensive measures. You’ll receive hands-on training in essential concepts, such as risk management, access control, application security, incident response, and digital forensics. Whether you’re looking to take your current position to the next level, or you’re interested in pursuing a career in cyber security, our expert instructors deliver a balanced combination of theory and tangible skills, so you can meet today’s digital threats with confidence.

Course Date(s) Time Instructor(s) Hours
Security Fundamentals Aug 27 - Aug 28 Day Espinosa 12
Certified Ethical Hacker (CEH) Boot Camp Sep 17 - Sep 27 Day Espinosa 30
Web Application Security Oct 15 - Oct 24 Evening Espinosa 12

Security Fundamentals

This course provides a comprehensive overview of cyber security fundamentals. 

more…

Dates & Times

Mon, Aug 27, 8:30am to 4:30pm
Tue, Aug 28, 8:30am to 4:30pm

Location

Washington University - Lopata Hall 

map…

Instructor(s)

Christian Espinosa

Certified Ethical Hacker (CEH) Boot Camp

The goal of this course is to help you master an ethical hacking methodology that can be used in a penetration testing or ethical hacking situation. You walk out the door with ethical hacking skills that are highly in demand, as well as the globally recognized Certified Ethical Hacker certification! This course prepares you for EC-Council Certified Ethical Hacker exam 312-50.

more…

Dates & Times

Mon, Sep 17, 5:30pm to 9:30pm
Tue, Sep 18, 5:30pm to 9:30pm
Wed, Sep 19, 5:30pm to 9:30pm
Thu, Sep 20, 5:30pm to 9:30pm
Mon, Sep 24, 5:30pm to 9:30pm
Tue, Sep 25, 5:30pm to 9:30pm
Wed, Sep 26, 5:30pm to 9:30pm
Thu, Sep 27, 5:30pm to 9:30pm

Location

Washington University - Lopata Hall

map…

Instructor(s)

Christian Espinosa

Web Application Security

This course provides a comprehensive overview of application security for developers. Although other types of applications may be discussed the course focuses on web application development and the prevention of hacking through vulnerable web applications. Topics include Application Security Fundamentals, Application Security Threats, and Application Security Assessment.

more…

Dates & Times

Mon, Oct 15, 5:30pm to 8:30pm
Wed, Oct 17, 5:30pm to 8:30pm
Mon, Oct 22, 5:30pm to 8:30pm
Wed, Oct 24, 5:30pm to 8:30pm

Location

Washington University - Lopata Hall 

map…

Instructor(s)

Christian Espinosa

IT Security Fundamentals

This course is for anyone needing a broader perspective of security tools and processes, especially the business unit/application manager who must understand the vulnerabilities that can compromise their business mission and the cost of mitigating that security risk.

More Details


Secure Coding

This hands-on three day course covers the Top 10 vulnerabilities with Web Applications and how to prevent them. The Top 10 vulnerabilities are based on the OWASP Top 10.  This course will explain the most severe data sanitization issues, with good and bad coding examples of each. 

More Details


NETWORK TRAFFIC ANALYSIS USING WIRESHARK

Network traffic analysis is one of the Top 5 vital cyber security skills. Without an understanding of the traffic on your network, you are operating blindly.

More Details


INTRODUCTION TO HACKING, DEFENSE, AND RESPONSE


Cybercrime is at an all time high. Vulnerabilities are exploited daily. What offensive tools and tactics do attackers use to break into our systems?  If you don't understand an adversary's offense, you have little chance of successful defense.

More Details


INCIDENT RESPONSE AND COMPUTER FORENSICS

This course will prepare you for Incident Response, so you can plan and respond appropriately, rather than play a victim of circumstance. The course also introduces you to digital forensics to aid in Incident Response planning and evidence acquisition and analysis. This course's primary objective is to provide an Incident Response framework that can be tailored for your environment.

More Details


WEB APPLICATION SECURITY

Many of us deploy or develop applications that are connected to the Internet.  How do we know these are secure?  Is it possible to design secure applications to reduce the risk of successful attacks? Insecure web applications are the most commonly attacked systems on the Internet. This course introduces the top vulnerabilities in applications and discusses common, but often overlooked, fixes for each.
 

 More Details

 


SECURITY ARCHITECTURE AND CONTROLS

Understanding how data travels from an attacker system to your corporate or home network is critical. Many successful attacks occur today due to misconfigured devices, such as routers or firewalls. Cyber criminals take advantage of weaknesses in controls and ride insecure architectures to carry out nefarious activities.This course provides a comprehensive understanding of how data travels across the Internet and through your network.  

More Details


CEH Exam Prep

Our CEH Boot Camp provides you with tools and techniques used by hackers and information security professionals alike to break into an organization. As we put it, “to beat a hacker, you need to think like a hacker.”

More Details


CISSP Exam Prep

CISSP is the premier certification for today’s information systems security professional. It remains the premier certification because of the sponsoring organization, the International Information Systems Security Certification Consortium, Inc.  The skills and knowledge you gain in this course will help you master the eight CISSP domains and ensure your credibility and success within the information systems security field. 

More Details


Network+

The Network+ course builds on your existing user-level knowledge and experience with personal computer operating systems and networks to present the fundamental skills and concepts that you will need to use on the job in any type of networking career. 

More Details


secret