Security Training Courses

Security Training [Instructor-Led & Virtual Classroom]

When you consider just a few of the consequences of a security breach – your proprietary information completely accessible, hefty fines for security lapses, news headlines about your company’s security breach, it becomes obvious: With our cybersecurity courses, you will gain a global perspective of the challenges of designing a secure system, touching on all the cyber roles needed to provide a cohesive security solution. Through lecture, labs, and breakout discussion groups, you will learn about current threat trends across the Internet and their impact on organizational security.

Security Training Courses - Cybersecurity trainingv

7Safe, Blue Coat, and CheckPoint Courses

7Safe Certified Malware Investigator Training (CMI)
7Safe Certified Security Testing Associate (CSTA) - Ethical Hacking Training
7Safe Certified Security Testing Professional (CSTP) - Ethical Hacking II Training
Blue Coat Certified Proxy Administrator Training (BCCPA)
Blue Coat Certified Proxy Professional Training (BCCPP)
Check Point Security Administration Training (CCSA R77.30)
Check Point Security Administration and Security Engineering Bundle Training (R77.30 GAiA) (CCSA+CCSE R77.30)
Check Point Cyber Security Engineering Training (CCSE R80.10)
Check Point Security Master Training (CCSM)
Check Point Certified Security Administrator Training (CCSA) R80 (CCSA R80.10)
Check Point Cyber Security Administrator and Engineering Bundle Training (CCSA+CCSE R80.10)
Check Point Security Engineering Training (CCSE R77.30)

Cisco Security Training Courses

Deploying Cisco ASA Firewall Solutions Training (FIREWALL 2.0)
Implementing Cisco IOS Network Security 3.0 Training (IINS)
Implementing Cisco Intrusion Prevention System v7.0 Training (IPS)
Cisco ASA Express Security v1.5 Training (SAEXS)
Implementing Core Cisco ASA Security v1.0 Training (SASAC)
Implementing Advanced Cisco ASA Security (SASAA)
Securing Cisco Networks with Threat Detection and Analysis Training (SCYBER)
Implementing Cisco Edge Network Security Solutions Training (SENSS)
Securing Email with Cisco Email Security Appliance Parts 1 and 2 2.1 Training (SESA)
Implementing Cisco Secure Mobility Solutions Training (SIMOS)
Implementing Cisco Secure Access Solutions Training (SISAS)
Implementing and Configuring Cisco Identity Services Engine v1.3 Training (SISE)
Implementing Cisco Threat Control Solutions Training (SITCS)
Implementing Cisco Identity Services Engine for Wireless Engineers (SWISE)
Cisco FirePOWER with Gigamon® Inline Deployment (GVFCFP)
FIREPOWER200-Securing Networks with Cisco Firepower Threat Defense (NGFW)
Protecting Against Malware Threats with Cisco AMP for Endpoints v3.0 Training (SSFAMP)
Securing Cisco Networks with Sourcefire Intrusion Prevention System v2.0 Training (SSFIPS)
Securing Cisco Networks with Open Source Snort Training (SSFSNORT)
Securing the Web with Cisco Web Security Appliance 2.1 Training (SWSA)
Deploying Cisco ASA VPN Solutions Training (VPN 2.0)

Cybersecurity Training Courses

Advanced Network Traffic Analysis Training
Access Control, Authentication, and Public Key Infrastructure Training
Advanced Reverse Engineering Malware Training
Advanced Computer Forensics Training
Advanced Ethical Hacking Training
Advanced Security Essentials - Enterprise Defender Training
Advanced Penetration Testing, Exploit Writing, and Ethical Hacking Training
Advanced Digital Forensics, Incident Response, and Threat Hunting Training
Advanced Smartphone Forensics Training
Application Security Training
Automating Information Security with Python Training
Cloud Security Fundamentals Training
Behavioral Malware Analysis Training
Computer Forensics Training
CyberSAFE (Securing Assets for End-Users) Training
Introduction to Cyber Warfare and Operations Design Training
CyberSec First Responder: Threat Detection and Response Training
Cybersecurity Foundations Training
Cyber Threats Detection and Mitigation Training
Cybersecurity Investigations and Network Forensics Analysis Training
Ethical Hacking Training | CEH Certification Training
Defending Mobile Applications Security Essentials Training
Hacker Tools, Techniques, Exploits, and Incident Handling Training
Certified Information Privacy Professional and Technologist Training (CIPP/US, CIPT)
Certified Information Privacy Professional US Private-Sector Training (CIPP/US)
Certified Information Privacy Professional and Manager Training (CIPP/US, CIPM)
Certified Information Privacy Manager Training(CIPM)
Certified Information Privacy Technologist Training(CIPT)
Certified Information Privacy Professional Canada (CIPP/C)
Intrusion Prevention Training
Intrusion Detection In-Depth Training
Fundamentals of Information Systems Security Training
ISACA CSX Practitioner I: Identification and Protection
ISACA CSX Practitioner II: Detection Training
ISACA CSX Practitioner III: Respond and Recover Training
Malicious Network Traffic Analysis Training
Mac Forensic Analysis Training
Memory Forensics In-Depth Training
Mobile Device Security and Ethical Hacking Training
Network Penetration Testing and Ethical Hacking Training
Systems Forensics, Investigation, and Response Training
Reverse Engineering Malware Training
Scada Security Training In Depth
Scada Security Challenges and Solutions Training
Wireless Industrial and Scada Networks Training
Scada and Industrial Computing Applications Training
Security Essentials Training
Securing Linux and Unix Training
Securing Windows and PowerShell Automation Training
Virtualization and Private Cloud Security Training
Wireless Ethical Hacking, Penetration Testing, and Defenses Training
Windows Forensic Analysis Training

DoD Directive 8570.1 Compliance Courses

Advanced Digital Forensics, Incident Response, and Threat Hunting Training
CAP Certification Training | Certified Authorization Professional Training
CASP Training | CompTIA Advanced Security Practitioner Training
CEH Certification Training | Certified Ethical Hacker Training
CISA Training | Certified Information Systems Auditor Training
CISM Training | Certified Information Security Manager Training
Fundamentals of Information Security Training
CISSP Training | Certified Information Systems Security Professional Training
ISSEP Training | Information System Security Engineering Professional Training
ISSAP Training | Information System Security Architecture Professional Training
ISSMP Training | Information System Security Management Professional
SSCP Training | System Security Certified Practitioner
Securing Cisco Networks with Threat Detection and Analysis Training v1.2 (SCYBER)
CompTIA A+ Certification Training
CompTIA Network+ Certification Training
CompTIA Security+ Certification Training
Cybersecurity Procedures Overview, DoDI 8500.01
DCOE Training | Defensive Cyber Operations Engineer
CAP Certification Training | Certified Authorization Professional
CASP Training | CompTIA Advanced Security Practitioner
CEH Certification Training | Certified Ethical Hacker
CHFI Training | Certified Computer Hacking Forensic Investigator
CISA Training | Certified Information Systems Auditor
CISM Training | Certified Information Security Manager
CSSLP Training | Certified Secure Software Lifecycle Professional
CSFI-CSCOE | Certified SCADA Cyberspace Operations Engineer
CISSP Training | Certified Information Systems Security Professional
ISSEP Training | Information System Security Engineering Professional
ISSAP Training | Information System Security Architecture Professional
ISSMP Training | Information System Security Management Professional
SSCP Training | System Security Certified Practitioner
SMSP Certification Training | Social Media Security Professional
Fundamentals of Information Security Training
ECSA Certification Training | EC-Council Certified Security Analyst
HIT Certification Training | CompTIA Healthcare IT Technician Certification
HCISPP Certification Training | Healtcare Information Security and Privacy Practitioner Training
RMF Procedures Overview , DoDI 8510.01
RMF Training | Introduction to Risk Management Framework
RMF Training, Risk Management Framework Implementation
Risk Management Framework for Federal Systems Indepth Training
Risk Management Framework (RMF) for Federal Security Controls Assessors Training (SCA)
Risk Management Framework for DoD & Intelligence Communities Information Technology Training In-depth
Risk Management Framework for DoD Security Controls Assessors Training (SCA)

Industrial Control Systems Courses

Assessing and Exploiting Control Systems Training
Active Defense and Incident Response Training
Critical Infrastructure and Control System Cybersecurity Training
Essentials for NERC Critical Infrastructure Protection Training
Introduction to Industrial Control Systems Cybersecurity Training
Industrial Control Systems Network Protocols Training
Scada Security Training In Depth
Scada Security Challenges and Solutions Training
Wireless Industrial and Scada Networks Training
Scada and Industrial Computing Applications Training
Smart Grid Cybersecurity Training

Security Certification Courses

CompTIA A+ Certification Training
CompTIA Network+ Certification Training
CompTIA Security+ Certification Training
Cybersecurity Procedures Overview, DoDI 8500.01
DCOE Training | Defensive Cyber Operations Engineer
CAP Certification Training | Certified Authorization Professional
CASP Training | CompTIA Advanced Security Practitioner
Cisco CCNAX Certification Training
CEH Certification Training | Certified Ethical Hacker
CHFI Training | Certified Computer Hacking Forensic Investigator
CISA Training | Certified Information Systems Auditor
CISM Training | Certified Information Security Manager
CSSLP Training | Certified Secure Software Lifecycle Professional
CSFI-CSCOE | Certified SCADA Cyberspace Operations Engineer
CSFI-CSCOE | Certified SCADA Cyberspace Operations Engineer Training
CIPP Training| Certified Information Privacy Professional Training US Private-Sector
CIPP Training | Certified Information Privacy Professional Training US Government
CIPM Training | Certified Information Privacy Manager Training
CIPT Training | Certified Information Privacy Technologist Training
DCOE Training | Defensive Cyber Operations Engineer Training
CISSP Training | Certified Information Systems Security Professional
ISSEP Training | Information System Security Engineering Professional
ISSAP Training | Information System Security Architecture Professional
ISSMP Training | Information System Security Management Professional
Linux+ Training Certification Training
SSCP Training | System Security Certified Practitioner
SMSP Certification Training | Social Media Security Professional
Fundamentals of Information Security Training
ECSA Certification Training | EC-Council Certified Security Analyst
HIT Certification Training | CompTIA Healthcare IT Technician Certification
HCISPP Certification Training | Healtcare Information Security and Privacy Practitioner Training
RMF Procedures Overview , DoDI 8510.01
RMF Training | Introduction to Risk Management Framework
RMF Training, Risk Management Framework Implementation

F5, McAfee and Symantec Courses

McAfee Endpoint Protection: Data Loss Prevention Endpoint Administration Training
McAfee Endpoint Protection: Host Intrusion Prevention Administration Training
McAfee Firewall Enterprise System Administration Training
McAfee Network Security: Advanced Threat Defense Administration Training
McAfee Network Security: Network Data Loss Prevention Administration Training
McAfee Network Security: Network Security Platform Administration Training
Symantec NetBackup 7.6 Bare Metal Restore: Administration Training (NBBMRA)
Symantec Data Loss Prevention 14.0: Administration Training (DLP14)
Symantec Endpoint Protection 12.1: Administration Training (SEP_OLD)
Symantec Client Management Suite 7.6: Administration (CMSA)
Symantec Client Management Suite 7.5: Implementation (CMSI)
F5-Configuring BIG-IP LTM v13: Local Traffic Manager (LTM13)
F5 Configuring BIG-IP AFM v13: Advanced Firewall Manager Training (AFM13)
F5 - Configuring BIG-IP Global Traffic Manager Training v11(GTM)
F5 Configuring BIG-IP ASM v13: Application Security Manager Training (ASM13)
F5 Administering BIG-IP v13 Training (ADM13)
F5 Configuring BIG-IP APM v13: Access Policy Manager (APM13)
F5 Networks Developing iRules for BIG-IP v13 Training (4686)
F5 Troubleshooting BIG-IP v13 Training (TS13)
F5 Configuring BIG-IP DNS v13: Domain Name System Training (formerly GTM) (DNS13)
FortiGate Security Systems I Training
FortiGate Security Systems II Training
Network Security Reporting - FortiAnalyzer Training
Email Security Training - FortiMail Training
Web Application Firewall Training - FortiWeb Training
Wireless LAN - FortiAP Training

Juniper/Palo Alto Networks Courses

JUNOS Routing Essentials Training (JRE)
JUNOS Security Training (JSEC)
JUNOS Intermediate Routing Training(JIR)
JUNOS Enterprise Switching Training(JEX)
Junos Security (JSEC)
Juniper - Advanced Junos Security (AJSEC)
Juniper Junos Intrusion Prevention System Functionality Training (JIPS)
Palo Alto Networks Firewall 8.0 Essentials: Configuration Management Training (EDU-210)
Palo Alto Networks Panorama 8.0 : Manage Multiple Firewalls (EDU- 221)
Palo Alto Networks Firewall 8.0 : Debug and Troubleshoot (EDU-311)
Palo Alto Networks: TRAPS 3.4: Install, Configure, and Manage
Symantec Data Center Security: Server Advanced 6.0 Training
Symantec Endpoint Protection 12.1: Administration Training
Symantec Endpoint Protection 12.x: Maintain and Troubleshoot Training
Symantec Data Loss Prevention 14.0: Administration Training (DLP14)
Symantec NetBackup 7.6 Bare Metal Restore: Administration Training (NBBMRA)
Symantec Ghost Solution Suite 3.0 Administration Training
Juniper - Junos Foundations: JNCIA-Junos Boot Camp (IJOS, JRE)
Juniper - JNCIS Enterprise Routing and Switching Certification Boot Camp (JIR, JEX)
Palo Alto Networks Firewall 7.1: Install, Configure and Manage Training (EDU-201)
Palo Alto Networks Firewall 7.1: Manage Cyberthreats Training (EDU-231)

Software Security Training Courses

Application Security Training
Defending Web Applications Security Essentials Training
Secure Coding in C/C++ Training
Secure Coding in .NET - C#/ASP.NET Training
Secure Coding for Android Platform Training
Secure Coding for iOS Platform Training
Secure Coding for PHP Training
Secure Coding in Java/JEE: Developing Defensible Applications Training
Secure Coding in .NET: Developing Defensible Applications Training

Other Security Training Courses

Analyst Notebook Basic Training
Analyst Notebook Advanced Training
Analyst Notebook Complete Training
Analyst Notebook Premium Complete Training
Analyst Notebook Charting + iBase Training
iBase User Training
iBase Designer Training
IoT Security Training | IoT Security Awareness
DIACAP Training In Depth Training
Incident Response and Network Forensics Training
IPv6 Security Training | IP Version 6 Security
Network Traffic Analysis Training
Network Security, Firewalls, and VPNs Training
Managing Risk in Information Systems Training
SonicWALL Network Security Advanced Administration
VoIP Security Training | Voice over IP Security
Troubleshooting TCP/IP Networks with Wireshark Training
Wireless LAN Security Training
Wireless Security Training

No Comments Yet.

Leave a comment