Additional Course Listings Offered to Customers
Contact us to schedule one of these custom courses today: [email protected]
Cybersecurity Fundamentals
This course focuses on help increase security awareness within your organization and aligns with the EC Council - Certified Secure Computer User (CSCU) certification. Topics covered include Foundations of Security, Securing Operating Systems, Protecting System Using Antiviruses, Data Encryption, Data Back Up & Disaster Recovery, Steganography, Securing Network Connections, Securing Online Transactions, Securing Email Communications, Social Engineering and Identity Theft, Security on Social Networking Sites, Information Security & Legal Compliance and Securing Mobile Devices
Mobile Forensics
This course focuses on smartphones as sources of evidence. The class will utilize tools to forensically analyze images taken from cell phones and desktop machines. Attendees will be taught how to recover and analyze data that can be used in investigations and security incident response.
Violent Python
This course shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. The class focuses on how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts.
Intro to MetaSploit
This course focuses on introducing students to MetaSploit and challenges them with command line interaction. Users will utilize MetaSploit and be taught how to footprint and scan, define payloads, target attacks, automate scripts and attack machines with the intent that they will be better prepared to handle incidents that happen on their network.
Open Source Intelligence
The Open Source Intelligence course is a survey of over 50 openly available information resources that can be used to plan and implement an effective defensive strategy within your organization.
Basic Snort Rule Development
Significant effort will be spent teaching students about each parameter with IPv4 and IPv6 protocols. Students will then be introduced how to craft snort rules with a focus on detection mis-configurations and malicious activity on organizational networks.
Basic Suricata Rule Development
This course spends time teaching students about each parameter with IPv4 and IPv6 protocols. Since its introduction, Suricata has challenged Snort as an effective signature based intrusion detection system and will provide students with another method of detecting activities on their organizational networks.
Wireless Hacking and Mapping
This course will introduce students to IEEE 802.11 WLAN protocol and introduce students to numerous wireless tools that can be used to detect and analyze wireless signals. Students will be taught how to configure hardware and software in a way that will allow them to assess organizational wireless security posture.
Passive and Active Network Scanning
This course will introduce students to state-of-the-art tools that conduct passive and active network scanning. Individuals that able to develop these skill sets will be able to effectively identify threats to their organizations and stay ahead of threats.
This course focuses on help increase security awareness within your organization and aligns with the EC Council - Certified Secure Computer User (CSCU) certification. Topics covered include Foundations of Security, Securing Operating Systems, Protecting System Using Antiviruses, Data Encryption, Data Back Up & Disaster Recovery, Steganography, Securing Network Connections, Securing Online Transactions, Securing Email Communications, Social Engineering and Identity Theft, Security on Social Networking Sites, Information Security & Legal Compliance and Securing Mobile Devices
Mobile Forensics
This course focuses on smartphones as sources of evidence. The class will utilize tools to forensically analyze images taken from cell phones and desktop machines. Attendees will be taught how to recover and analyze data that can be used in investigations and security incident response.
Violent Python
This course shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. The class focuses on how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts.
Intro to MetaSploit
This course focuses on introducing students to MetaSploit and challenges them with command line interaction. Users will utilize MetaSploit and be taught how to footprint and scan, define payloads, target attacks, automate scripts and attack machines with the intent that they will be better prepared to handle incidents that happen on their network.
Open Source Intelligence
The Open Source Intelligence course is a survey of over 50 openly available information resources that can be used to plan and implement an effective defensive strategy within your organization.
Basic Snort Rule Development
Significant effort will be spent teaching students about each parameter with IPv4 and IPv6 protocols. Students will then be introduced how to craft snort rules with a focus on detection mis-configurations and malicious activity on organizational networks.
Basic Suricata Rule Development
This course spends time teaching students about each parameter with IPv4 and IPv6 protocols. Since its introduction, Suricata has challenged Snort as an effective signature based intrusion detection system and will provide students with another method of detecting activities on their organizational networks.
Wireless Hacking and Mapping
This course will introduce students to IEEE 802.11 WLAN protocol and introduce students to numerous wireless tools that can be used to detect and analyze wireless signals. Students will be taught how to configure hardware and software in a way that will allow them to assess organizational wireless security posture.
Passive and Active Network Scanning
This course will introduce students to state-of-the-art tools that conduct passive and active network scanning. Individuals that able to develop these skill sets will be able to effectively identify threats to their organizations and stay ahead of threats.