Security Training and Seminars

Computer

Security Training Classes Access control, intrusion detection, learn to bulletproof your systems
Some important terms: acl, computer security, intrusion detection, security coding, commands, computers, hardware, internet, programming and software.
Security Training Seminars and Classes
From Online Training Directory
How to Setup & Secure Your Home Computer on-line e-learning cbt (computer based)study at homecourseware Having a secure computer at home is just as important today as is securing computers at work. This course will teach you how to and what steps to make sure your computer is safe. Whether you use your computer for business or pleasure, it is so important that you have a computer that is safe and secure. It is no longer the norm to turn on your computer and use it for games and what not. Now, with  more...
From Lifelong Learning International
Understanding Cyber Crime instructor led trainingbookcomputer lab Cyber crime is the term used to identify crime committed through the use of information technology: computers; mobile telephones; telephones; the Internet or World Wide Web; EPOS systems in retail or distribution crimes. These are just a few examples and the list is growing all the time. A recent report has estimated the cost of cyber crime in UK at 27 billion, 21 billion pounds being borne  more...
From Kenvision Techniks Ltd
ETHICAL HACKING COUNTERMEASURES TRAINING INTERMEDIATE CLASS group study and discussionworkshop / seminarcomputer lab The class starts from the very basic, and builds up to the level where attendees can not only use the tools and techniques to hack various components involved in infrastructure and web hacking, but also walk away with a solid understanding of the concepts on which these tools are based. The course brings together both infrastructure hacking and web hacking. Its intention is to address the world  more...
Web App Ethical Hacking Training Course This training course is a series of educational interactive training sessions where the attendees will gain hands on experience. They will be able to identify security flaws in web applications customized or built for the training course. They will also be able to exploit those security flaws to fully understand the value of fixing those flaws.  more...
From Serebra Learning Corporation
e-Commerce Security on-line e-learning cbt (computer based) This course is intended for students who wish to consider the impact of security issues on e-commerce implementation.  more...
The Professional Teller: Following Security Procedures on-line e-learning cbt (computer based)study at homeweb-based,online cbt,cd ...Security Procedures offers the student an overview of internal and external security measure that banks take, what procedures the student should follow to ensure bank security, and what actions the student should take in response to angry or violent customers and/or suspicious activity. The program also covers the common types of crimes committed against banks, including robbery, kidnapping,  more...
Web Site Security - Internet and Intranet Management and Policies on-line e-learning cbt (computer based) ...Security: Internet and Intranet Management and Policies is the first course in a two-part series. This course will give students the skills and knowledge needed to identify and counter some fundamental security risks and requirements. Students will learn some basic network security skills pertaining to network threat identification and prevention. They will also examine Internet security  more...
Web Site Security: Messaging, Servers, and Viruses on-line e-learning cbt (computer based) ...rse is the second course in a two-part series on Web Site Security. This course will give students the skills and knowledge to identify and prevent more tactical security risks and measures. Students will learn how to implement message security via Pretty Good Privacy (PGP) a de facto messaging security standard. They will also learn how to identify and minimize security risks associated with  more...
Enterprise JavaBeans Part 3: Transactions and Security on-line e-learning cbt (computer based) This final course in the series teaches learners about transaction and security management. The transaction management sections cover the EJB semiautomated transaction management feature, container-managed transactions, bean-managed transactions and synchronization. The security management section addresses EJB architecture support for security management.  more...
e-Commerce Security on-line e-learning cbt (computer based)study at homeweb-based,online cbt,cd This course is intended for students who wish to consider the impact of security issues on e-commerce implementation.  more...
Win2000 Professional Implementing and Monitoring Security on-line e-learning cbt (computer based) ...security policies in Windows 2000. The course begins with an explanation of security policies, such as group policies and local policies, and then discusses how to assign account policies, and how to implement security with the auditing feature of Windows 2000 Professional. You will also learn how the security components of Windows 2000 Professional work, and how to use the Security  more...
Win2000 Server Implementing Local Security and Policies on-line e-learning cbt (computer based) ...security of your Windows 2000 Server computer. It explains the concept of security policies in a Windows 2000 environment, leads you through the process of implementing these policies using the Security Configuration Tool Set, and teaches you to monitor violations of security policies. Next, the course explains the concept of managing local users and groups by using the Local Users and Groups  more...
Win2000 Active Directory Design Active Directory Security and Replication Strategies on-line e-learning cbt (computer based) ...in Windows 2000, through a discussion of Active Directory security and replication strategies. First, the course explains group policies, different types of group policy objects (GPOs), group policy inheritance and precedence, and how to administer and manage a group policy. You will learn about operations masters, their relation to domain controllers, and how to decide on the appropriate  more...
Win2000 Netwk Security Design Providing Secure Access in a LAN on-line e-learning cbt (computer based) ...security policy concepts and the different ways of implementing security. You will learn to use account policies and local policies and to maintain event logs. Security Templates concepts will be covered as will the configuration of the Security Configuration and Analysis utility. You will learn to use the Encrypting File System (EFS) and to configure SNMP security, RIS, and Terminal Services.  more...
Win2000 Netwk Security Design Providing Secure Access in Remote Netwks on-line e-learning cbt (computer based) ...is course covers demand-dial routing as a feature of RRAS security and also explains the LAN and WAN routing protocols supported by RRAS. You will learn about RRAS security strategies and will learn to configure the RRAS callback options used to verify identities of clients and servers. You will learn about the components of a virtual private network and about the features of the VPN tunneling  more...
Win2000 Netwk Security Design Providing Secure Access-Internet on-line e-learning cbt (computer based) ...security for a private network configured for public access and explains the risks that a network is prone to while using the Internet. You will learn how to protect a network using a firewall and will also learn about the guidelines for placement of Web and FTP servers, application servers, RRAS servers, and DNS servers while configuring a firewall. You will learn how to analyze threats posed  more...
Electronic Commerce Security Issues on-line e-learning cbt (computer based) ... technologies of ecommerce, including electronic commerce security issues and electronic payment systems. Also presented are business strategies for electronic commerce, including branding and technology-enabled relationship management. The course ends with a discussion of topics that are important to e-commerce but are neither business nor technology issues. These topics include project  more...
From Last Minute Training
Websense Web Security 2 Days ...o install, configure, administer and support Websense Web Security Suite software. Through instruction, iLabs (instructor led demos and lab exercises) and hands-on lab practice exercises, you will gain familiarity with the requirements and recommendations of Websense product deployment, installation and configuration, Websense product and component functionality (remote filtering, delegated and  more...
From Accord info Matrix Pvt. Ltd
White Hat Ethical Hacking ...ng( 2003 & 2008 ) Microsoft IIS Web Server training Security Certification Ethical Hacking Web Application Security Linux Certification Red Hat Certified Engineer - RHCE Iptables Firewall training Squid Web Proxy training Sendmail Mail Server training Apache Web Server training Checkpoint Firewall training courses Check Point Certified Security Administrator -  more...
Comptia Security ...A+) & Networking (N+) - Self Confidence Courses Comptia Security Plus Cisco Certification CCNA (Cisco Certified Network associate ) Microsoft Certification MCSE (Microsoft Certified System Engineer) MCSA (Microsoft Certified System Administrator ) MCTS (Microsoft Certified Technology Specialist ) MCITP (Microsoft Certified Information Technology Professional ) Microsoft  more...
From Jodo Institute
EC-Council's - Certified Ethical Hacker (CEHv7) instructor led trainingcoursewaree-bookDVDbookcomputer lab ...s help candidates in getting high profile jobs in Network Security and E-Commerce organizations The goal of the ethical hacker is to help the organization take preemptive measures against malicious attacks by attacking the system himself; all the while staying within legal limits. The CEH Program certifies individuals in the specific network security discipline of Ethical Hacking from a  more...
From the Henderson Group
UNIX USS for RACF Administrators bookworkshop / seminar ...f you are a RACF administrator who doesn't administer USS security too, this course is a must. Now that IBM gives us USS (UNIX under MVS, also known as OMVS) for free with MVS, RACF administrators need to know how to administer USS security. This means learning UNIX security administration, and understanding how USS works with RACF. Securing USS is essential to securing TCP/ IP on the  more...
Advanced RACF Administration bookworkshop / seminar ...security software how to get the most out of it. This advanced RACF training course gives you a powerful understanding of how to use the advanced features of RACF, to support RACF with UNIX, TCP/ IP, the Firewall, and the OS/ 390 WorldWide Web Server. This course will get you ready to deal with RACF and Sysplex, as well as digital certificates and cross-platform security with Single Signon.  more...
How to Audit UNIX and Windows Security ...The class starts by showing you how both UNIX and Windows security work, how they are similar and how they are different. Unlike classes designed for system administrators, this class is designed for auditors. It shows you how the architecture works, how the security works, where the control points are, and how to audit the security. This class will not make you a system administrator; it  more...
From Interskill Learning
1.1 CA ACF2 - Introduction on-line e-learning cbt (computer based) This is course 1 of 7 in the CA ACF2 Security Server Series. The course is delivered via e-Learning. It can be accessed online, at any time, place or location with internet access, or delivered through your own internal LMS (if applicable). The course is available as part of the CA ACF2 Security Server Series, or in a Mainframe Bundle, comprising of the 100 most popular mainframe e-Learning  more...
1.2 CA ACF2 - Defining Environment Controls on-line e-learning cbt (computer based) This is course 2 of 7 in the CA ACF2 Security Server Series. The course is delivered via e-Learning. It can be accessed online, at any time, place or location with internet access, or delivered through your own internal LMS (if applicable). The course is available as part of the CA ACF2 Security Server Series, or in a Mainframe Bundle, comprising of the 100 most popular mainframe e-Learning  more...
1.3 CA ACF2 - For Auditors on-line e-learning cbt (computer based) This is course 3 of 7 in the CA ACF2 Security Server Series. The course is delivered via e-Learning. It can be accessed online, at any time, place or location with internet access, or delivered through your own internal LMS (if applicable). The course is available as part of the CA ACF2 Security Server Series, or in a Mainframe Bundle, comprising of the 100 most popular mainframe e-Learning  more...
1.4 CA ACF2 - Protecting System Access on-line e-learning cbt (computer based) This is course 4 of 7 in the CA ACF2 Security Server Series. The course is delivered via e-Learning. It can be accessed online, at any time, place or location with internet access, or delivered through your own internal LMS (if applicable). The course is available as part of the CA ACF2 Security Server Series, or in a Mainframe Bundle, comprising of the 100 most popular mainframe e-Learning  more...
1.5 CA ACF2 - Protecting Data Integrity on-line e-learning cbt (computer based) This is course 5 of 7 in the CA ACF2 Security Server Series. The course is delivered via e-Learning. It can be accessed online, at any time, place or location with internet access, or delivered through your own internal LMS (if applicable). The course is available as part of the CA ACF2 Security Server Series, or in a Mainframe Bundle, comprising of the 100 most popular mainframe e-Learning  more...
1.6 CA ACF2 - Protecting General Resources on-line e-learning cbt (computer based) This is course 6 of 7 in the CA ACF2 Security Server Series. The course is delivered via e-Learning. It can be accessed online, at any time, place or location with internet access, or delivered through your own internal LMS (if applicable). The course is available as part of the CA ACF2 Security Server Series, or in a Mainframe Bundle, comprising of the 100 most popular mainframe e-Learning  more...
1.7 CA ACF2 - Maintaining ACF2 on-line e-learning cbt (computer based) This is course 7 of 7 in the CA ACF2 Security Server Series. The course is delivered via e-Learning. It can be accessed online, at any time, place or location with internet access, or delivered through your own internal LMS (if applicable). The course is available as part of the CA ACF2 Security Server Series, or in a Mainframe Bundle, comprising of the 100 most popular mainframe e-Learning  more...
2.1 Defining Users to RACF on-line e-learning cbt (computer based) This is course 1 of 3 in the RACF Series. The course is delivered via e-Learning. It can be accessed online, at any time, place or location with internet access, or delivered through your own internal LMS (if applicable). The course is available as part of the RACF Series, or in a Mainframe Bundle, comprising of the 100 most popular mainframe e-Learning titles.  more...
2.3 RACF for System Administrators and Auditors on-line e-learning cbt (computer based) This is course 3 of 3 in the RACF Series. The course is delivered via e-Learning. It can be accessed online, at any time, place or location with internet access, or delivered through your own internal LMS (if applicable). The course is available as part of the RACF Series, or in a Mainframe Bundle, comprising of the 100 most popular mainframe e-Learning titles.  more...
2.2 Protecting System Resources Using RACF on-line e-learning cbt (computer based) This is course 2 of 3 in the RACF Series. The course is delivered via e-Learning. It can be accessed online, at any time, place or location with internet access, or delivered through your own internal LMS (if applicable). The course is available as part of the RACF Series, or in a Mainframe Bundle, comprising of the 100 most popular mainframe e-Learning titles.  more...
From Tranchulas
Web App Ethical Hacking Training Course This training course is a series of educational interactive training sessions where the attendees will gain hands on experience. They will be able to identify security flaws in web applications customized or built for the training course. They will also be able to exploit those security flaws to fully understand the value of fixing those flaws.  more...
From Nextec Inc
ITIL V3 Foundation instructor led training Nextec's ITIL V3 Foundation course is a 2. 5 course taking you through the five stages of the ITIL Service Lifecycle: Service Strategy Service Design Service Transition Service Operation Continual Service Improvement Embedded into the ITIL V3 Foundation course is Nextec's unique virtualization, Living the Lifecycle. Woven through all of Nextec ITIL V3 Certification courses, this  more...
Comptia Security Plus instructor led training ...Security+ certification is an internationally recognized validation of the technical knowledge required of foundation-level security practitioners. A Security+ certified individual has successfully proven holding a foundation-level of skill and knowledge in General Security Concepts, Communication Security, Infrastructure Security, Basics of Cryptography and Operational / Organizational  more...
CISSP instructor led training ...nize mastery of an International standard for information security and Understanding of a Common Body of Knowledge (CBK). Certification can enhanced a professionala ™s career and Provide added credibility of being a good network administrator, programmer, or engineer. Security is a hot issue in not only the security and technology filed, but also in any organization that has  more...
From Supremus Group
Comprehensive HIPAA Security Training & Certification Kit (level 2) study at homecoursewareself directedbook The training kit for Certified HIPAA Security Specialist (CHSS)Certification: HIPAA Certification Level 2 Manual This is the official book and most advanced training manual for HIPAA Certification of Certified HIPAA Security Specialist (CHSS). Laminated HIPAA Course Cards These 4-page laminated cards are ideal to use as a quick desktop reference for HIPAA regulations.  more...
From RSH Consulting, Inc.
RACF - Level I Administration instructor led trainingon-line e-learning cbt (computer based)workshop / seminar This course is intended for individuals who need to quickly become knowledgeable and proficient in basic, everyday RACF administration tasks. Unlike other administration courses, this one is specifically designed to give attendees a solid foundation in RACF without overloading them with advanced technical topics, yet it also serves as the ideal springboard for acquiring further skills and  more...
RACF - Audit & Compliance Roadmap instructor led trainingon-line e-learning cbt (computer based)workshop / seminar ...r IT auditors and compliance monitors seeking to identify security vulnerabilities in RACF-protected z/ OS mainframe systems and bring the systems into compliance with government and industry mandated security requirements. Much more than just a simple "how to audit" class, this course will show you how to pinpoint and address serious security exposures of the kinds commonly found during RSH's  more...
From Swarajcomm Technologies
Workshop on Hacking Techniques workshop / seminarcomputer lab Hi: We are conducting a workshop on Ethical Hacking on Oct 18th-19th and 25th and 26th. This will be hands on training held at Hyderabad on weekends in October. Each student will be provided with a system and internet connection with all tools, to have handson feel during training. Vijaykumar@stpl. co. in 040-66773749  more...
From High Technologies Solutions
ERPSAP BASIS Training course in Noida High Technologies Solutions continuously raise standards of professionalism within the IT training industry and to create standards of excellence against which candidates are measured. It provides IT consulting and offshore services, offering end-to-end solutions to a wide variety of customers. T he R/ 3 Basis software is the set of programs and tools which interfaces with computer operating  more...
From RSH Consulting, Inc.
RACF - Securing zOS Unix instructor led trainingon-line e-learning cbt (computer based)workshop / seminarcomputer lab This course is essential for anyone who intends to assume responsibility for maintaining zOS Unix controls or wants to verify their zOS Unix environment is properly secured and monitored. Participants will gain a solid understanding of zOS Unix and how it can be secured in a system protected by RACF. The course will explore the assignment of user UID and group GID Unix identities and offer best  more...
From The Networkers EA
ICT SECURITY AND RISK MANAGEMENT ESSENTIALS ...Security and Risk Management Essentials course is a comprehensive three day programme that provides an overview and analysis of a range of public and private sector ICT (Information and Communication Technologies) security and risk related issues. This programme will provide frameworks and methodologies regarding the ICT security and risk management both from a people and technology  more...
From RSH Consulting, Inc.
RACF - Level II Administration This course is intended for individuals who have mastered basic RACF administration or technical support tasks and are ready to advance their RACF technical skills and knowledge to the next level. Attendees will learn methods, tips, and "best practices" for more technically advanced RACF administration and support tasks such as setting up Started Task IDs, defining new general resource classes,  more...
RACF - Level III Administration Audit and Compliance instructor led trainingon-line e-learning cbt (computer based)workshop / seminar This course is designed for seasoned RACF administrators, technicians, auditors, and compliance monitors seeking to improve RACF protections for critical system resources. This technically-rich course will show you how to implement, remediate, and review complex controls for CICS commands and resources, TSO authorities, programs, and data storage management functions. Attendees will learn the  more...
From K-Secure
Intrusion Analysis instructor led trainingworkshop / seminarcomputer lab ...security monitoring is the ability to examine the packet decode from network intrusion detection systems. A skilled intrusion analyst will be able to analyze the packet to reduce the likelihood of false positives. A skilled intrusion analyst will also be able to proactively update signatures and apply new filters to deal with the emerging threats. This course provides in-depth knowledge about  more...
From U-OPT Software Technologies
SAP ONLINE TRAINING FOR MDM BI XIPI EP ABAPWORKFLOW HRabapworkflow webdynproBASIS RUNSAPBIWPSCSSOLUTION MANAGER ABAP-HRNETWEAVE instructor led trainingon-line e-learning cbt (computer based)study at home ... SAP MDM, EP, BW/ BI 7. 0, FI/ CO, HR , ABAP , BASIS & SECURITY, SD ,CRM , MM ,PP, HR, ABAP-HR , PI/ XI TRAINING, QA TRAINING TRAINING HIGHLIGHTS : a Highly Qualified Instructors in IT industry a Limited enrollment. ONLINE Training (Using Desktop Sharing Method) one-to-one training, highly interactive a You can get trained from where you are. a Remote training from  more...
From K-Secure
Packet Master - A Program on Packet Analysis and Packet Crafting workshop / seminar ...red if you are a pentester / ethical hacker, a network or security administrator, intrusion analyst, forensic analyst, application security tester, researcher of vulnerabilities, or you deploy or audit firewalls and IDS, or you write custom IDS signatures. If you already acquire the skill to analyze packets, learning Scapy would just do wonders in doing your job much more efficiently and making  more...
From Arthur McNeil Institute
Cisco Secure Intrusion Detection System Version (CSIDS) instructor led training ...ftware Overview of VPN and IPSec Technologies Network Security Fundamentals VPN3000 Concentrator Series Hardware Overview Profile-, signature-, host-, and network-based intrusion detection. Cisco VPN3000 Concentrator for Remote Access Using Pre-Shared Keys Purpose of the Security Wheel Cisco Secure VPN 3000 for Remote Access Using Digital Certificates Alarm Management Cisco  more...
From Rtek 2000
SECURITY+ Certification Program (CompTIA) instructor led trainingstudy at homegroup study and discussioncomputer lab RTEK 2000 offers Security+ Certification program as the primary course you will need to take if your job responsibilities include securing network services, network devices, and network traffic. CompTIA Security+ certification provides the first global standard of competency for foundation-level security practitioners those with two years of computing networking experience.  more...
From Applied Computer Training & Technology
Security+ instructor led trainingstudy at homegroup study and discussioncomputer lab ...Security+ class was developed to meet current demands of DOD (Department of Defense) and the growing needs of the computer industry. It provides the student with the level of knowledge needed as part of the DOD and industry requirements for employment as an entry-level computer technician with security tasks. Students gain a solid background on security concerns, communications,  more...
CISCO Pix instructor led trainingstudy at homegroup study and discussioncomputer lab ...ll. The student will also learn the basics of creating a security policy and understanding how the Cisco Pix firewall helps to enforce the security policy itself. This course, with the combination of theory and hands-on labs, will provide an immediate benefit to systems or network professionals who deal with or have an interest in Cisco Firewalls. Tuition Includes: Total training hours:  more...
CISSP Prep instructor led trainingstudy at homegroup study and discussioncomputer lab ...ication requirements for the Certified Information System Security Professional (CISSP) Certification. This certification is rapidly becoming a requirement for employment as an entry-level computer technician with security tasks. Students gain a solid background on security concerns, communications, infrastructure, basic cryptography, and operational and organizational security. Tuition  more...
Incident Handling & Response instructor led trainingstudy at homegroup study and discussioncomputer lab ...requirements for employment as an entry-level information security technician. Students gain incident handling goals and principles. This class describes risk analysis and how this activity is used in incident handling, explains and applies a methodology for incident handling, describes honeypots and their uses, discusses special considerations in dealing with insider attacks, and explains and  more...
Intrusion Detection instructor led trainingstudy at homegroup study and discussioncomputer lab This course was developed to meet current demands of DOD (Department of Defense) and the growing needs of the computer industry. It provides the student with the level of knowledge needed as part of the DOD and industry requirements for employment as an entry-level security intrusion analyst. This course is designed to give students practical, working knowledge in intrusion detection and traffic  more...
Vulnerability Assessment instructor led trainingstudy at homegroup study and discussioncomputer lab The Vulnerability Assessment class was developed to meet current demands of DOD (Department of Defense) and the growing needs of the computer industry. It provides the student with the level of knowledge needed as part of the DOD and industry requirements for employment as an entry-level information security technician. Students gain a solid background on how to identify current network security  more...
From Mile2
Social Engineering instructor led traininggroup study and discussionbook This course is not specifically targeted to IT or security personnel alone but rather is designed to teach the participants the skills used by Social Engineers to facilitate the extraction of information from an organization using technical and non-technical methods.  more...
From IAPS
Secure Programming Techniques instructor led trainingworkshop / seminartrain the trainercomputer lab ...l programming techniques for developing and enhancing the security of applications. Secure development concepts, techniques and goals are identified. Primary methods of attack and perpetrators are surveyed and concrete recommendations are given to prevent each type of attack. A list of secure programming do's and don'ts is included. Guidelines for both testing software and code reviews are  more...
IT Security: Management Briefing instructor led trainingworkshop / seminartrain the trainer ...security incidents can be minimized and enables managers to develop strategies to protect their organization's information assets. Participants will learn management's essential role in supporting computer security and how to develop effective practices that make security a daily corporate-wide habit. The course will reveal the nature of threats and behavioral habits of malicious users and how  more...
From New Horizons Albany - Tech Valley
Information Security instructor led training You will be able to apply the techniques that you learn to everyday job activities. With the following information security courses you will learn everything that you need to know about security in order to avoid security threats and deal with them when they do occur.  more...
From New Horizons Charlotte
Information Security instructor led training You will be able to apply the techniques that you learn to everyday job activities. With the following information security courses you will learn everything that you need to know about security in order to avoid security threats and deal with them when they do occur.  more...
From Identity Solutions Ltd
Essentials of Biometrics instructor led trainingworkshop / seminar Discover the Essentials of Biometrics A one day training course designed to give a comprehensive understanding of the different Biometric technologies and the key considerarions for implementation. This course is designed as an introductory course for anyone who needs a general understanding of Biometrics  more...
Introduction to Identity Management instructor led trainingworkshop / seminar Identity Management Systems (IDMs) are core elements in securing premises and data. This course is designed to provide a solid grounding in tne priciples of IDMs and to deliver sufficient knowledge for IT and Security Managers to make informed decisions regarding system implementation.  more...
From SELF Quotient Innovations India Pvt. Ltd.
Secure Software Development Interactive and Demo based instructor led Objective: At the end of training, trainees will have clear understanding of: 1. Common vulnerabilities 2. Languages and system that they impact 3. Detection and Defenses against them  more...
Threat Modeling Interactive and Demo based instructor led Please visit http://www.selfquotient.co.in/trainings.html SS_TM  more...
From Wintrac Inc.
Strategic Infrastructure Security ...Security Certified Program SC0-471 certification exam. The Strategic Infrastructure Security (SIS) course is designed to follow the hands-on skills utilized in the Tactical Perimeter Defense (TPD) course. The SIS course continues with hardening of strategic elements of your infrastructure, such as your Windows and Linux servers, and goes into detail on one of the most critical areas to  more...
From Reckon IT Training & Consulting
Information Security Foundation based on ISOIEC 27002 ISFS group study and discussioncoursewarecd rombookworkshop / seminar ...Security Management Foundation certification training course fully prepares every participant for EXINa ™s a ISO/ IEC 27002 Information Security Management Foundationa certification examination. The ISO/ IEC 27002 Foundation certification training course provides IT professionals working in an Information Security Management (ISM) improvement environment with a clear understanding of  more...
From Wintrac Inc.
CWNA AND CWSP COMBINATION ...e return on investment. Insufficient understanding of the security implications of wireless can lead to catastrophic results. This course enables an individual to plan, select, and implement the appropriate wireless hardware and deploy the correct security controls to support a typical environment. A focus on RF (radio frequency) technologies in a vendor neutral environment, with hands-on  more...
CERTIFIED PENETRATION TESTING SPECIALIST CPTS is built upon proven hands-on Penetration Testing methodologies as utilized by our international group of vulnerability consultants. Mile2 trainers keep abreast of their expertise by practicing what they teach because we believe that an equal emphasis on theoretical and real world experience is essential for effective knowledge transfer to you, the student. The CPTS presents information on  more...
CERTIFIED DIGITAL FORENSIC EXAMINER Computer Forensics was developed by U. S. federal law enforcement agents during the mid to late 1980s to meet the challenges of white-collar crimes being committed with the assistance of a PC. By 1985 enforcement agents were being trained in the automated environment and by 1989 software and protocols were beginning to emerge in the discipline. The Certified Digital Forensics Examiner program is  more...
CISSP AND CISSO COMBINATION ...security certification and one of the most difficult certifications to achieve, making training an important part of exam preparation. This 5-day course is designed to ensure a solid understanding of the popular 10 Security Domains areas of the Common Body of Knowledge (CBK). Students will learn about security policy development, secure software development procedures, network vulnerabilities,  more...
Computer Hacking Forensic Investigator v3 The CHFI course will give participants the necessary skills to identify an intruder's footprints and to properly gather the necessary evidence to prosecute. Many of today's top tools of the forensic trade will be taught during this course, including software, hardware and specialized techniques. The need for businesses to become more efficient and integrated with one another, as well as the home  more...
Certified Network Defense Architect 50 ...ledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy  more...
Tactical Perimeter Defense ...Security Certified Program SC0-451 certification exam. The Tactical Perimeter Defense course is designed to provide network administrators and certification candidates with hands-on tasks on the most fundamental perimeter security technologies. The network perimeter is often the first line of defense in an organizationa ™s network, and this course covers the issues every administrator must  more...
Ethical Hacking and Countermeasures 50 (CEH) You might find yourself asking, why choose this course, when there are several out there. The truth is that there cannot be any single course that can address all the issues in a detailed manner. Moreover, the rate at which exploits/ tools/ methods are being discovered by the security community makes it difficult for anybody to cover all of this information in one course. However, this doesna  more...
EC Council Ethical Hacking and Countermeasures 50 (CEH) You might find yourself asking, why choose this course, when there are several out there. The truth is that there cannot be any single course that can address all the issues in a detailed manner. Moreover, the rate at which exploits/ tools/ methods are being discovered by the security community makes it difficult for anybody to cover all of this information in one course. However, this doesna  more...
EC Council Security Analyst (ECSA) ...ts and securely connect to another system over a network. Security5 certification utilizes the working knowledge a computer user possesses to achieve better efficiency in using computing resources. The certification is targeted towards today? s knowledge workers who use computing resources in their daily activities. It educates them on practical aspects of security and networking to give them  more...
Security 5- Security Fundamentals v1.0 ...ts and securely connect to another system over a network. Security5 certification utilizes the working knowledge a computer user possesses to achieve better efficiency in using computing resources. The certification is targeted towards today? s knowledge workers who use computing resources in their daily activities. It educates them on practical aspects of security and networking to give them  more...
Computer Hacking Forensic Investigator The CHFI course will give participants the necessary skills to identify an intruder's footprints and to properly gather the necessary evidence to prosecute. Many of today's top tools of the forensic trade will be taught during this course, including software, hardware and specialized techniques. The need for businesses to become more efficient and integrated with one another, as well as the home  more...
Certified Information Systems Security Professional (CISSP) ...Security Professional (CISSP) ®. With your completion of the prerequisites and necessary years of experience, you are firmly grounded in the knowledge requirements of todaya ™s security professional. This course will expand upon your knowledge by addressing the essential elements of the 10 domains that comprise a Common Body of Knowledge (CBK) ® for information systems security  more...
Enterprise Security Solutions ...Security Solutions is designed to provide network administrators and security architects with an awareness of security-related issues and the essential skills they need to implement security in a given network. It is the second course offered in the second level of the Security Certified Program. This course is preceded by Advanced Security Implementation (ASI). You can get a complete list of  more...
Advanced Security Implementation ...de the foundation knowledge to network administrators and security professionals who are seeking to learn about advanced security issues surrounding PKI and biometrics. Advanced Security Implementation is designed to provide network administrators and security architects with an awareness of security-related issues and the essential skills they need to implement security in a given network. It  more...
Network Defense and Countermeasures (Second Edition) ...ed to provide network administrators with an awareness of security-related issues and the essential skills they need to implement security in a given network. This is the second course of the Security Certified Program's level one certification track (the SCNP), and focuses primarily on defensive network technologies, such as firewalls and intrusion detection systems. You can get a complete  more...
Hardening the Infrastructure Hardening the Infrastructure is designed to provide Network Administrators with an awareness of security-related issues and the essential skills they need to implement security in a given network. It is the first course offered in the first level of the Security Certified Program. You can get a complete list of other Security classes at  more...
Network Defense And Countermeasures Network Defense and Countermeasures is the second course in the first level of the Security Certified Program. This course focuses on students' understanding of the architecture for network defense. You can get a complete list of other Security classes at http://www.wintrac.com/courses/coursesSecurity.asp  more...
Network Security Fundamentals ...Security Fundamentals is designed to provide Network Administrators with an awareness of security-related issues and the essential skills they need to implement security in a given network. This course is the first course offered in Level One: Defense of the Security Certified Program. You can get a complete list of other Security classes at  more...
Security Fundamentals (Security) ...Security is one of the key issues facing governmental, business and academic organizations today. The combined threats from hacking, international cyber terrorism and lax security pose a real risk to business and government alike. This one-day course will help employees at all levels of an organization to understand the importance of data security, recognize security risks and the measures  more...
Linux Network Security (Security) ...security, and makes an excellent companion class to the GL550: Host Security course. Protocols used in Linux, UNIX, and Windows are examined. After a detailed discussion of the TCP/ IP suite component protocols and Ethernet operation, the student practices using various tools to capture, analyze, and generate IP traffic. Students then explore the tools and techniques used to exploit protocol  more...
SCP Level One - Network Security Fundamentals ...a wide range of network technologies with an awareness of security-related issues and the essential skills they need to implement security in a given network. This instructor-led 5-day classroom delivery with structured hands-on activities is the first course in Level One of the Security Certified Program. After completion of this course, students wishing to complete Level One should take the  more...
SCP Level One - Network Defense Countermeasures ...ties. It is the second course in the first level of the Security Certified Program, focusing on the student's understanding of the architecture for network defense. The course is designed for the student who is a network administrator responsible for maintaining a wide range of networking technologies. Students will work with layered network defense structures and implement firewalls on  more...
SCP Level Two - PKI Concepts Planning PKI Concepts and Planning is a combination of instructor-led lecture, in-class discussions, and hands-on lab exercises. There are six domains covered in the course, covering issues such as: Cryptography Fundamentals Digital Signatures Biometric Fundamentals PKI Fundamentals This course is intended for network administrators, network security administrators, firewall and server  more...
SCP Level Two - PKI Biometrics (security) PKI and Biometrics Implementation is a combination of instructor-led lecture, in-class discussions, and hands-on lab exercises. There are six domains covered in the course, covering issues such as: PKI Solutions File Encryption Solutions Deploying a Certificate Server Secure E-Mail Implementation This course is intended for network administrators, network security administrators,  more...
CISSP ...ls becomes critical to ensuring that higher standards for security are achieved. Training for the CISSP exam covers all ten domains of the Common Body of Knowledge. This course should be attended by network and firewall administrators, information security officers, and anyone interested in understanding the principles, best practices, and core concepts of information systems security.  more...
Hack and Defend ...esent in most networks. The ultimate guide to network security, the course walks through the process of assessing and then correcting the vulnerabilities present within information systems. Specific countermeasures and generalized secure design principles are covered. Real-world lab environment includes Cisco routers and the Linux, Windows 9x, NT, 2000, and XP operating systems.  more...
From IAHS Academy (Mahindra Special Services Group)
Certified Information Assurance Officer coursewarebook ...security in accordance with local policy a Contributes to development and management of Security Operating Procedures for new IT systems a Review requests for change; rejecting or escalating requests that breach security operating procedures a Provides advice on compliance with IT security policy a Alerts the Manager to changes in system use that might affect the level of  more...
Sell Security training?
Custom Search
tcw11-v473M-03/27/17-00:59:23-()[A]-[A]-[A]