Courses in the Cyber Security track cover a wide range of topics designed to introduce you to modern security vulnerabilities and prepare you to implement effective defensive measures. You’ll receive hands-on training in essential concepts, such as risk management, access control, application security, incident response, and digital forensics. Whether you’re looking to take your current position to the next level, or you’re interested in pursuing a career in cyber security, our expert instructors deliver a balanced combination of theory and tangible skills, so you can meet today’s digital threats with confidence.
No offerings in this track are currently scheduled.
IT Security Fundamentals
This course is for anyone needing a broader perspective of security tools and processes, especially the business unit/application manager who must understand the vulnerabilities that can compromise their business mission and the cost of mitigating that security risk.
This hands-on three day course covers the Top 10 vulnerabilities with Web Applications and how to prevent them. The Top 10 vulnerabilities are based on the OWASP Top 10. This course will explain the most severe data sanitization issues, with good and bad coding examples of each.
NETWORK TRAFFIC ANALYSIS USING WIRESHARK
Network traffic analysis is one of the Top 5 vital cyber security skills. Without an understanding of the traffic on your network, you are operating blindly.
INTRODUCTION TO HACKING, DEFENSE, AND RESPONSE
Cybercrime is at an all time high. Vulnerabilities are exploited daily. What offensive tools and tactics do attackers use to break into our systems? If you don't understand an adversary's offense, you have little chance of successful defense.
INCIDENT RESPONSE AND COMPUTER FORENSICS
This course will prepare you for Incident Response, so you can plan and respond appropriately, rather than play a victim of circumstance. The course also introduces you to digital forensics to aid in Incident Response planning and evidence acquisition and analysis. This course's primary objective is to provide an Incident Response framework that can be tailored for your environment.
WEB APPLICATION SECURITY
Many of us deploy or develop applications that are connected to the Internet. How do we know these are secure? Is it possible to design secure applications to reduce the risk of successful attacks? Insecure web applications are the most commonly attacked systems on the Internet. This course introduces the top vulnerabilities in applications and discusses common, but often overlooked, fixes for each.
SECURITY ARCHITECTURE AND CONTROLS
Understanding how data travels from an attacker system to your corporate or home network is critical. Many successful attacks occur today due to misconfigured devices, such as routers or firewalls. Cyber criminals take advantage of weaknesses in controls and ride insecure architectures to carry out nefarious activities.This course provides a comprehensive understanding of how data travels across the Internet and through your network.
CEH Exam Prep
Our CEH Boot Camp provides you with tools and techniques used by hackers and information security professionals alike to break into an organization. As we put it, “to beat a hacker, you need to think like a hacker.”
CISSP Exam Prep
CISSP is the premier certification for today’s information systems security professional. It remains the premier certification because of the sponsoring organization, the International Information Systems Security Certification Consortium, Inc. The skills and knowledge you gain in this course will help you master the eight CISSP domains and ensure your credibility and success within the information systems security field.
The Network+ course builds on your existing user-level knowledge and experience with personal computer operating systems and networks to present the fundamental skills and concepts that you will need to use on the job in any type of networking career.