Ethical Hacking: Security Testing and Certified Ethical Hacker
Security Training Courses
Use the search feature below to search our current list of open enrollment classes. If you do not see a date or location that meets your needs, we have many of our courses available in online format delivered over the internet. We can also bring our mobile training lab to your organization for an onsite training session.
Ethical Hacking: Security Testing for Professionals
Learn the techniques used by malicious, black hat hackers to perform a professional white-hat ethical hacking test against your organization's network security. Protect your information assets using an industry-standard security testing methodology.
Advanced Ethical Hacking: Expert Penetration Testing
Leverage your existing penetration testing and ethical hacking skills
to learn new, cutting-edge, methods of network penetration. In this
advanced level Security Training course, you will learn to: write
buffer overflow exploits, perform deep target penetration tests,
write Windows Kernel rootkits, attack network security devices,
and many other advanced ethical hacking techniques.
CHFI Boot Camp
Acquire the skills to detect, mitigate the disastrous consequences of, and discover the origin of many different types of security breaches in this course. Learn how to properly collect evidence from the scene of the crime, and take home a copy of AccessData's FTK Suite. Stop the loss of millions by learning to prevent damage caused by worms, hackers, and disgruntled employees.
SCADA Security: Protecting our Homeland Security
SCADA controls our nations mission critical infrastructure, everything from the power grid to water treatment facilities and various security systems. Gain homeland security skills, by learning to assess and secure SCADA systems.
Enterprise Security Architecture and Assessment: Security from the Ground Up
Build highly available, scalable, security infrastructures without tying yourself to a specific vendor. Learn how to bulletproof your network in this information security training course: gain news skills on enterprise DMZ design techniques, directory services, single sign on as well as window/unix/linux host hardening techniques in this server and network security course.
Web Application Hacking: Breaking Through Port 80
Almost every enterprise application has a component that runs on Port 80. An equivalent number of network and security devices has a web-based management console. Web applications are the future, and are here to stay. Learn the different methods of web application security assessment, web app ethical hacking, and apply these penetration testing techniques against real world web application security configurations.
CISSP Boot camp
Prepare for and achieve the number one security certification, the CISSP, in this rapid results information security training course and boot camp.
Intrusion Prevention: Stopping Hackers Before They Start
Learn the latest defensive technology in Security Training to combat hackers and worms, Intrusion Prevention. You will learn to make use of IPS technology in the most effective and appropriate manner to prevent attacks before they can happen.