InfoSec Institute
| About UsSecurity Training CoursesTraining Delivery Options | Why Choose InfoSec? | Contact Us |  
Small Class Size
Hands On Security Training
Cutting-Edge Course Content
Satisfaction Guarantee
World Renown Instructors
Boot Camp Style Training
Luxury Accommodations

Enterprise Security Awareness:

 
Security Awareness for IT Users
Security Awareness for IT Pros
Security Awareness for Software Developers

Hands-On Security Training:

 
Ethical Hacking
Advanced Ethical Hacking
Penetration Testing - 10 Day
Intrusion Prevention
Computer Forensics Training
Advanced Computer Forensics
Data Recovery Training
Security Architecture Design
Application Security
SCADA Security
Reverse Engineering Training
Information Security Training
DIACAP Training
Incident Response and Network Forensics
VOIP Security Course
Wireless Security Training
On-Site Training

Certification Preparation Training:

 
CEH Boot Camp
CISSP Boot Camp
CISA Boot Camp
CISM Boot Camp
ECSA/LPT Boot Camp
Security+ Boot Camp
On-Site Training

Online Professional Development:

 
Hacker Training Online
Advanced Hacking Online
Penetration Testing Online
Intrusion Prevention Online
Reverse Engineering Online
Computer Forensics Online
SCADA Security Online
Data Recovery Online
Security Architecture Online
Application Security Online
CISSP Boot Camp Online
CISM Boot Camp Online
CISA Boot Camp Online


Small Class Size
Bring a Friend Discount
Hands-On Instruction
World Renown Instructors


  Ask a Technical Student Coordinator A Question

Name: Business Phone No: Email:  Ask a Student Coordinator a Question: 
 
Find Out Pricing
Course Catalog
Get A Detailed Syllabus
Ask a Question

Ethical Hacking: Security Testing and Certified Ethical Hacker

Security Training Courses

Use the search feature below to search our current list of open enrollment classes. If you do not see a date or location that meets your needs, we have many of our courses available in online format delivered over the internet. We can also bring our mobile training lab to your organization for an onsite training session.

 

 

Ethical Hacking: Security Testing for Professionals
Learn the techniques used by malicious, black hat hackers to perform a professional white-hat ethical hacking test against your organization's network security. Protect your information assets using an industry-standard security testing methodology.

Advanced Ethical Hacking: Expert Penetration Testing
Leverage your existing penetration testing and ethical hacking skills to learn new, cutting-edge, methods of network penetration. In this advanced level Security Training course, you will learn to: write buffer overflow exploits, perform deep target penetration tests, write Windows Kernel rootkits, attack network security devices, and many other advanced ethical hacking techniques.

Computer Forensics: CHFI Boot Camp
Acquire the skills to detect, mitigate the disastrous consequences of, and discover the origin of many different types of security breaches in this course. Learn how to properly collect evidence from the scene of the crime, and take home a copy of AccessData's FTK Suite. Stop the loss of millions by learning to prevent damage caused by worms, hackers, and disgruntled employees.

SCADA Security: Protecting our Homeland Security
SCADA controls our nations mission critical infrastructure, everything from the power grid to water treatment facilities and various security systems. Gain homeland security skills, by learning to assess and secure SCADA systems.

Enterprise Security Architecture and Assessment: Security from the Ground Up
Build highly available, scalable, security infrastructures without tying yourself to a specific vendor. Learn how to bulletproof your network in this information security training course: gain news skills on enterprise DMZ design techniques, directory services, single sign on as well as window/unix/linux host hardening techniques in this server and network security course.

Web Application Hacking: Breaking Through Port 80
Almost every enterprise application has a component that runs on Port 80. An equivalent number of network and security devices has a web-based management console. Web applications are the future, and are here to stay. Learn the different methods of web application security assessment, web app ethical hacking, and apply these penetration testing techniques against real world web application security configurations.

CISSP Boot camp
Prepare for and achieve the number one security certification, the CISSP, in this rapid results information security training course and boot camp.

Intrusion Prevention: Stopping Hackers Before They Start
Learn the latest defensive technology in Security Training to combat hackers and worms, Intrusion Prevention. You will learn to make use of IPS technology in the most effective and appropriate manner to prevent attacks before they can happen.

 

 

  Ask a Technical Student Coordinator A Question

Name: Business Phone No: Email:  Ask a Student Coordinator a Question: