Cybersecurity Training

123 courses found


Narrow Search
All (123)
CMMC (2)
Dark Web (3)
EC-Council (21)
Foundation (20)
ISACA (11)
ISC2 (19)
Mile2 (34)
NotSoSecure (9)
Practitioner (4)

C)ISSO: Certified Information Systems Security Officer

Certified Information Systems Security Officer addresses the broad range of industry best practices, knowledge and skills expected of a security manager/officer. The candidate will learn in-depth theory pertaining to the practica...

Delivery Options:

ISC2 Official CISSP Certification Boot Camp

Our Official ISC2 CISSP Certification Boot Camp is a comprehensive review of Cyber security & industry best practices merged with Training Camp’s award-winning comprehensive exam preparation for the rigorous CISSP adaptive exam. ...

Delivery Options:

Certified Information Systems Security Professional (CISSP)

Certified Information Systems Security Professional (CISSP) is one of the world's premier cybersecurity certifications offered for professionals worldwide. This CISSP certification course is ideal for professionals who are lookin...

Delivery Options:

Certified Secure Web Application Engineer - C)SWAE

Organizations and governments fall victim to internet-based attacks every day. In many cases, web attacks could be thwarted but hackers, organized criminal gangs, and foreign agents are able to exploit weaknesses in web applicati...

Delivery Options:

Certified Cloud Security Officer - C)CSO

We also provide practical skills regarding implementing cloud security, auditing and compliance. This is all managed by a unique delivery of cloud security along with the hands-on labs needed to truly understand what is happening...

Delivery Options:

C)DRE: Certified Disaster Recovery Engineer

When a business is hit by a natural disaster, cybercrime or any other disruptive tragedy, how should the organization react? What if the network infrastructure is taken down? Will the business be able to continue operations? How ...

Delivery Options:

C)CSSM: Certified Cybersecurity Systems Manager

Companies will lean on a Certified Cybersecurity Manager, C)CSSM to create solutions for tomorrow's problems, today. When it comes to identifying critical issues and providing effective IS management solutions. The knowledge and ...

Delivery Options:

Certified Security Principles - C)SP

Certified Security Principles course provides the skills necessary to apply and implement technical knowledge of security concepts in today’s security environment. Students will gain an in-depth knowledge of systems security, acc...

Delivery Options:

C)VA: Certified Vulnerability Assessor

The vendor-neutral Certified Vulnerability Assessor certification course helps students understand the importance of vulnerability assessments by providing intricate knowledge and skills in the Vulnerability Assessment arena. The...

Delivery Options:

C)TIA: Certified Threat Intelligence Analyst

CTIA (Certified Threat Intelligence Analyst) course will help security professionals learn how to make good use of the many sources of threat intelligence. It will aid an individual to understand what threat sources are helpful, ...

Delivery Options:

C)DFE: Certified Digital Forensics Examiner

The Certified Digital Forensics Examiner vendor neutral certifications designed to train Cyber Crime and Fraud Investigators whereby students are taught electronic discovery and advanced investigation techniques. This course is ...

Delivery Options:

C)SLO: Certified Security Leadership Officer

The vendor-neutral Certified Security Leadership Officer certification course was designed for mid and upper-level managers as well as any engineers who seek to increase their knowledge in the security arena. The C)SLO course was...

Delivery Options:

C)PSH: Certified PowerShell Hacker

This course is an intense few days covering the keys to hacking with PowerShell. We know that most companies have an Active Directory infrastructure that manages authentication and authorization to most devices and objects within...

Delivery Options:

C)PTC: Certified Penetration Testing Consultant

The vendor-neutral Certified Penetration Testing Consultant course is designed for IT Security Professionals and IT Network Administrators who are interested in taking an in-depth look into specific Penetration tests and techniqu...

Delivery Options:

C)NFE: Certified Network Forensics Examiner

The Certified Network Forensics Examiner vendor neutral certification was developed for a U.S. classified government agency. The C)NFE takes a digital and network forensic skill set to the next level by navigating through over tw...

Delivery Options:

C)ISSA: Certified Information Systems Security Auditor

Many organizations require an Information System Auditor’s expert knowledge when it comes to identifying critical issues and providing effective auditing solutions. The knowledge and course content provided in the vendor-neutral ...

Delivery Options:

C)ISRM: Certified Information Systems Risk Manager

The vendor-neutral Certified Information Systems Risk Manager certification is designed for IT and IS professionals who are involved with risk identification, assessment & evaluation, risk response, risk monitoring, IS control de...

Delivery Options:

C)CSA: Certified Cyber Security Analyst

Our Certified Cyber Security Analyst course helps you prepare an organization to create a complete end to end solution for proactively monitoring, preventing, detecting, and mitigating threats as they arise in real time. Do no...

Delivery Options:

ISC2 Official ISSEP Certification Boot Camp

Our ISC2 ISSEP Certification Boot Camp is a comprehensive review of systems engineering principles & industry best practices merged with Training Camp’s award-winning comprehensive exam preparation for the CISSP-ISSEP exam. Ou...

Delivery Options:

ISC2 Official SSCP Certification Boot Camp

Our Official ISC2 SSCP Certification Boot Camp is a comprehensive review of security administration & industry best practices merged with Training Camp’s award-winning comprehensive exam preparation for Systems Security Certified...

Delivery Options:

ISC2 Official ISSMP Certification Boot Camp

Our ISC2 ISSMP Certification Boot Camp is a comprehensive review of information security programs & industry best practices merged with Training Camp’s award-winning comprehensive exam preparation for the CISSP-ISSMP exam. Our...

Delivery Options:

ISC2 Official ISSAP Certification Boot Camp

Our ISC2 ISSAP Certification Boot Camp is a comprehensive review of security solutions & industry best practices merged with Training Camp’s award-winning comprehensive exam preparation for the CISSP-ISSAP exam. Our ISSAP Trai...

Delivery Options:

ISC2 Official CGRC Certification Boot Camp

Our Official ISC2 CGRC Certification Boot Camp is a comprehensive review of various risk management frameworks & industry best practices merged with Training Camp’s award-winning comprehensive exam preparation for Governance, Ris...

Delivery Options:

ISC2 Official CSSLP Certification Boot Camp

Our Official ISC2 CSSLP Certification Boot Camp is a comprehensive review of secure software development & industry best practices merged with Training Camp’s award-winning comprehensive exam preparation for CSSLP. CSSLP certi...

Delivery Options:

ISC2 Official CCSP Certification Boot Camp

Our Official ISC2 CCSP Certification Boot Camp is a comprehensive review of Cloud security & industry best practices merged with Training Camp’s award-winning comprehensive exam preparation for the CCSP exam. Our CCSP Training...

Delivery Options:

ISC2 Official Certified in Cybersecurity Certification Boot Camp

Our Official ISC2 Certified in Cybersecurity Certification Boot Camp is a entry-level review of Cyber security & industry best practices merged with Training Camp’s award-winning comprehensive exam preparation for ISC2 exams. ...

Delivery Options:

CISA Exam Boot Camp

The course will begin with a review of the IS audit process based upon internationally accepted audit standards. The student will learn methods for conducting a risk assessment as well as techniques to successfully evaluate the e...

Delivery Options:

ISACA – COBIT 2019 Foundation Certification Boot Camp

Our COBIT 2019 Foundation Certification Boot Camp equips you with the knowledge & skills needed to pass the COBIT 2019 Foundation exam and become a certified COBIT professional. This COBIT framework boot camp is taught by experie...

Delivery Options:

ISACA Official CISM Certification Boot Camp

Our ISACA Official CISM Certification Program is designed to provide students with the knowledge and skills needed to effectively prepare for and pass the Certified Information Security Manager (CISM) examination. Our CISM tra...

Delivery Options:

ISACA Official CRISC Certification Boot Camp

Our 3 Day ISACA Official CRISC Certification Program is geared towards preparing students to pass the Certified in Risk and Information Systems Control examination. Our program represents the culmination of hundreds of hours of i...

Delivery Options:

ISACA Official CGEIT Certification Boot Camp

Our 3 Day ISACA Official CGEIT Boot Camp is geared towards preparing students to pass the Certified in Governance of Enterprise IT exam. The role of Enterprise IT Governance is not always clear to organizations looking to mana...

Delivery Options:

ISACA Official CISA Certification Boot Camp

Our ISACA Official CISA Boot Camp is geared towards preparing students to pass the Certified Information Systems Auditor examination. Our ISACA CISA Boot Camp represents the culmination of hundreds of hours of instructional de...

Delivery Options:

ISACA Official CDPSE Certification Boot Camp

Our 3 Day ISACA Official CDPSE Boot Camp is geared towards preparing students to pass the Certified Data Privacy Solutions Engineer examination. Certified Data Privacy Solutions Engineer (CDPSE) is the first technical experien...

Delivery Options:

Certified Incident Handling Engineer - C)IHE

The Certified Incident Handling Engineer vendor neutral certification is designed to help Incident Handlers, System Administrators, and any General Security Engineers understand how to plan, create and utilize their systems in or...

Delivery Options:

C)PTE/C)PTC: Ethical Hacker Bootcamp

The Certified Penetration Testing Engineer certification course is built firmly upon proven, hands-on, Penetration Testing methodologies utilized by our international group of Penetration Testing consultants. The C)PTE presents i...

Delivery Options:

Certified Ethical Hacker v12

The Certified Ethical Hacker (CEH) credential is the most trusted ethical hacking certification and accomplishment recommended by employers globally. It is the most desired information security certification and represents one of...

Delivery Options:

C)PTE: Certified Penetration Testing Consultant

In this course you will learn 5 Key Elements of Pen Testing; Information Gathering, Scanning, Enumeration, Exploitation and Reporting. Plus, discover the latest vulnerabilities and the techniques malicious hackers are using to ac...

Delivery Options:

C)PEH: Certified Penetration Ethical Hacker

The Certified Professional Ethical Hacker vendor neutral certification course is the foundational training to mile2’s line of penetration testing courses. The CPEH certification training enables students to understand the importa...

Delivery Options:

EC-Council CSA – Certified SOC Analyst Certification Boot Camp

Our Official EC-Council Certified SOC Analyst Certification Boot Camp is a comprehensive review of working in a security operations center & industry best practices merged with Training Camp’s award-winning comprehensive exam pre...

Delivery Options:

EC-Council CTIA – Certified Threat Intelligence Analyst Certification Boot Camp

Our Official EC-Council CTIA Certification Boot Camp is a comprehensive review of threat assessment & industry best practices merged with Training Camp’s award-winning comprehensive exam preparation for the Certified Threat Intel...

Delivery Options:

EC-Council CHFI – Computer Hacking Forensics Investigator Certification Boot Camp

Our Official EC-Council CHFI Certification Boot Camp is a comprehensive review of digital forensics & industry best practices merged with Training Camp’s award-winning comprehensive exam preparation for the CHFI exam. Our CHFI...

Delivery Options:

EC-Council CND – Certified Network Defender Certification Boot Camp

Our Official EC-Council Certified Network Defender Certification Boot Camp is a comprehensive review of network defense & industry best practices merged with Training Camp’s award-winning comprehensive exam preparation for the CN...

Delivery Options:

EC-Council CPENT – Certified Penetration Testing Professional Certification Boot Camp

Our EC-Council Certified Penetration Testing Professional Certification Boot Camp is a comprehensive review of penetration testing in an enterprise network environment, combined with our award-winning CPENT exam preparation. T...

Delivery Options:

EC-Council CEH – Certified Ethical Hacker v12 Certification Boot Camp

Our Official EC-Council CEH Certification Boot Camp is a comprehensive review of ethical hacking & industry best practices merged with Training Camp’s award-winning comprehensive exam preparation for the CEH exam. Our CEH Boot...

Delivery Options:

EC-Council CCT – Certified Cybersecurity Technician Certification Boot Camp

Our EC-Council Certified Cybersecurity Technician Certification Boot Camp is a comprehensive review of entry-level cybersecurity principles & industry best practices merged with Training Camp’s award-winning comprehensive exam pr...

Delivery Options:

EC-Council CCISO – Certified Chief Information Security Officer Certification Boot Camp

Our Official EC-Council CCISO Certification Boot Camp is a comprehensive review of executive levels of information security & industry best practices merged with Training Camp’s award-winning comprehensive exam preparation for th...

Delivery Options:

CMMC-AB – Certified CMMC Professional Certification Boot Camp

This CMMC Assessor Certification course offers a comprehensive understanding of the CMMC model and equips assessors with the necessary technical expertise to engage effectively as members of a C3PAO assessment team. It also pr...

Delivery Options:

CMMC-AB – Certified CMMC Assessor Certification Boot Camp

This CMMC Assessor Certification course offers a comprehensive understanding of the CMMC model and equips assessors with the necessary technical expertise to engage effectively as members of a C3PAO assessment team. It also pr...

Delivery Options:

Dark Web Council Certified Dark Web Analyst Boot Camp

Our Official Dark Web Council CDWA Certification Boot Camp is a comprehensive review of Dark Web and Dark Network-related content merged with Training Camp’s award-winning comprehensive exam preparation. This Certified Dark We...

Delivery Options:

Dark Web Foundations Boot Camp

This Dark Web Foundations Boot Camp is an authoritative course presented by the Dark Web Council. Designed for those curious about the hidden layers of the internet, this course offers a comprehensive, safe, and legal exploration...

Delivery Options:

Dark Web Council – Dark Web Ethics and Privacy Workshop

Our Dark Web Ethics and Privacy workshop is an indispensable course that shines a light on the murky ethical terrain of the Dark Web. Designed for cybersecurity students, privacy advocates, and ethical hackers, this guide not onl...

Delivery Options:

Cybersecurity Defender Boot Camp (CEH/PenTest+)

Our 6-day Cybersecurity Defender Boot Camp is an intensive, all-encompassing training program designed to prepare you for the CEH and Pentest+ exams through a combination of ethical hacking and penetration testing. This intens...

Delivery Options:

Securing Databases | Database Security

Securing Databases is an essential training course for DBAs and developers who need to produce secure database applications and manage secure databases. Data, databases, and related resources are at the heart of most IT infrastru...

Delivery Options:

Fundamentals of Secure Application Development

From proactive requirements to coding and testing, this course covers the best practices any software developer needs to avoid opening up their users, customers and organization to attack at the application layer. We teach only c...

Delivery Options:

IS20 Security Controls

IS20 Controls certification course covers proven general controls and methodologies that are used to execute and analyze the Top Twenty Most Critical Security Controls. This course allows the security professional to see how to i...

Delivery Options:

Hacking Cloud Infrastructure

This 2-day course cuts through the mystery of Cloud Services (including AWS, Google Cloud Platform (GCP) and Azure) to uncover the vulnerabilities that lie beneath. We will cover a number of popular services and delve into both w...

Delivery Options:

Basic Web Hacking

This is an entry-level web application security testing course and also a recommended pre-requisite course before enrolling for our “Advanced Web Hacking” course. This foundation course of “Web Hacking” familiarizes the attendees...

Delivery Options:

Basic Infrastructure Hacking

This is our entry-level infrastructure security testing course and also a recommended pre-requisite course before enrolling for our “Advanced Infrastructure Hacking” course. This foundation course familiarizes the attendees with ...

Delivery Options:

Advanced Infrastructure Hacking

Our Advanced Infrastructure Hacking course is designed for those who wish to push their knowledge. Whether you are Pen Testing, Red Teaming or trying to get a better understanding of managing vulnerabilities in your environment, ...

Delivery Options:

Advanced Web Hacking

Much like our popular Advanced Infrastructure Hacking class, this class talks about a wealth of hacking techniques to compromise web applications, APIs, cloud components and other associated end-points. This class focuses on spec...

Delivery Options:

Hacking 101

This 1-day course will teach you the foundations of Pen Testing and how to find and exploit vulnerabilities within different technologies. This introductory course will train attendees in understanding Pen Testing and provide bac...

Delivery Options:

Hacking and Securing Cloud Infrastructure

This 4-day course cuts through the mystery of Cloud Services (including AWS, Azure, and Google Cloud Platform) to uncover the vulnerabilities that lie beneath. We will cover a number of popular services and delve into both what m...

Delivery Options:

DevSecOps Training

This 2-day intermediate course will show you how to automate security in a fast-paced DevOps environment using various open-source tools and scripts. We have delivered this training for Virtual OWASP AppSec Days Conference to an ...

Delivery Options:

Certified Virtualization Forensics Examiner - C)VFE

This course brings together two challenging areas facing IT security professionals today: incident response and virtualization. Forensics is at the heart of incident response, and therefore this training will focus on how to gath...

Delivery Options:

Information Systems Certification and Accreditation Professional - ISCAP

Information Systems Certification and Accreditation Professional certification training quantify the process of certifying, reviewing and accrediting an information system by IT professionals. This certification is designed to p...

Delivery Options:

C)WSE: Wireless Security Engineer

A Wireless Security Engineer designs, implements, and maintains secure wireless networks. They assess security risks and vulnerabilities, configure security solutions, and ensure the confidentiality, integrity, and availability o...

Delivery Options:

Certified Information Security Management Systems—Lead Auditor

The Certified Information Security Management Systems—Lead Auditor certification course prepares students to competently lead audits of information security management systems (“ISMS”) to ensure that they meet ISO/IEC 27001 stand...

Delivery Options:

Certified Information Security Management Systems—Lead Implementer

The Certified Information Security Management Systems—Lead Implementer certification course prepares students to help any organization through the process of implementing an information security management systems (“ISMS”) that i...

Delivery Options:

C)HISSP: Certified Healthcare IS Security Practitioner

The vendor-neutral Certified Healthcare Information Systems Security Practitioner certification course covers the skills and knowledge to implement the best IT Healthcare Practices, as well as, regulatory compliance and standards...

Delivery Options:

Certified Virtualization & Cloud Principles - C)VCP

The Cloud is being widely adopted today for a diverse set of reasons! But why? What can we expect? How is it implemented? Is it secure? There are many additional questions that can be asked related to this fast adoption of cloud ...

Delivery Options:

Red Team vs Blue Team

Mile2’s Ultimate Red vs Blue Team Course is built to provide intense hands-on sessions that emulate real-world cyber warfare and defense scenarios. You will implement principles and behaviors you have learned to combat malicious ...

Delivery Options:

C)VE: Certified Virtualization Engineer

This fast-paced, high energy, hands-on course provides not only the foundation needed for a top performing software-defined data center, it also provides the latest in virtualization and cloud technologies which gives the enginee...

Delivery Options:

C)SA1: Certified Security Awareness 1

The Security Awareness 1, C)SA 1, certification course is intended for anyone that uses a computer on the internet. Attendees will learn the security threats inherent to today's workplace as well as the countermeasures associated...

Delivery Options:

C)SA2: Certified Security Awareness 2

Certified Security Awareness 2 course is to help the student take organizational cyber awareness to the next level. Attendees will understand the security threats that are associated within a company culture. The Certified Secur...

Delivery Options:

C)ITP: Certified IT Principles

The Certified Information Technology Principles - C)ITP certification course, is intended for anyone interested in learning computer fundamentals and IT Security. The C)ITP provides essential technology competencies and enhances ...

Delivery Options:

IS18 Controls

The IS18 Controls – IS18 certification course is intended for anyone interested in learning effective information systems governance and management. This 4-day training course focuses on the implementation and analysis of the IS1...

Delivery Options:

Certified PowerShell Hacking/Red Team vs Blue Team Boot Camp

The Red Team vs Blue Team is a scenario-based, hands-on lab experience. The goal is to put together items learned during Mile2 courses and apply them in this environment. It consists of two days (four scenarios) ranging from easy...

Delivery Options:

Ultimate Pen Test Bootcamp

The C)PTE exam covers a broad base of Penetration Testing areas to ensure that applicants can effectively manage the Penetration Testing process. A Certified Penetration Testing Engineer imagines all of the ways that a hacker can...

Delivery Options:

C)RMFA: Risk Management Framework Analyst

This Risk Management Framework Analyst training quantifies the process of certifying, reviewing, and accrediting an information system by IT professionals. This course was created as a standard to measure the set of skills that s...

Delivery Options:

Certified Cloud Security Professional (CCSP)

The Certified Cloud Security Professional (CCSP) course is a certification aimed at professionals looking to apply security measures in cloud-based environments. The certification is an industry-recognized credential that demonst...

Delivery Options:

AppSec for Developers

In this 2-Day Intermediate hands-on course delegates will gain an understanding of application security vulnerabilities including the industry standard OWASP Top 10 list and learn strategies to defend against them. Pen testing...

Delivery Options:

C)CSFO: Cybersecurity Framework Officer

This course prepares an organization to understand, utilize, and implement the CyberSecurity Framework (CSF) to enable a secure information systems infrastructure and maintain compliance within any DoD infrastructure. This c...

Delivery Options:

Systems Security Certified Practitioner (SSCP)

The Official (ISC)² SSCP training provides a comprehensive review of the knowledge required to implement, monitor and administer IT infrastructure in accordance with information security policies and procedures that ensure data c...

Delivery Options:

Information Security for the IT Professional

Information security is part of every IT professional’s job. Hackers are constantly trying to compromise your networks, steal sensitive data, and overwhelm your systems. Planning, implementing, enforcing, or even removing securit...

Delivery Options:

Healthcare Information Security and Privacy Practitioner (HCISPP)

The Official (ISC)² HCISPP training provides a comprehensive review of the knowledge required to implement, manage or assess the appropriate security and privacy controls of a healthcare organization. This training course will he...

Delivery Options:

CISSP Certification Exam Prep - 6 Week Course

The CISSP is one of the oldest and most respected certifications for today’s information systems security professional. It remains the premier certification because the International Information Systems Security Certification Con...

Delivery Options:

CISSP & EC-Council CEH Bundle

The CISSP training is an advanced course designed to meet the high demands of the information security industry by preparing students for the Certified Information Systems Security Professional (CISSP) exam. Ethical Hacking an...

Delivery Options:

Certified Cyber Forensics Professional Training (CCFP)

This is five-day class designed for the person who wishes to take and pass the CCFP exam. Students will learn basic forensic science along with the concepts of phone and computer forensics.

Delivery Options:

CAP Training (3-day)

Our CAP Boot Camp training program is consistently recognized as the most reputable course to and prepare you for the Certification and Accreditation (CAP) certification exam. The CAP exam is grown in popularity in the Informatio...

Delivery Options:

ISC2 Official HCISPP Certification Boot Camp

The (ISC)² Board of Directors conducted a thorough evaluation of the entire (ISC)² certification portfolio. This review is conducted periodically to ensure (ISC)² credentials meet the highest industry standards, ranging from impa...

Delivery Options:

CRISC Boot Camp

The Certified in Risk and Information Systems Control™ certification (CRISC™, pronounced “see-risk”) is designed for IT professionals who have hands-on experience with risk identification, assessment, and evaluation; risk respons...

Delivery Options:

Incident Response and Network Forensics Training Boot Camp

This is a hands-on Incident Response course that covers the essential information you need to know in order to properly detect, contain and mitigate security incidents. Security incidents are a way of life in the modern world, an...

Delivery Options:

CISM Certification Prep

CISM certification program was developed by the Information Systems Audit and Control Association (ISACA) for experienced Information security management professionals with work experience in developing and managing information s...

Delivery Options:

ISACA Official CET Certification Boot Camp

Our ISACA Official CET Certification Program is designed to provide students with the knowledge and skills needed to effectively prepare for and pass the Certified in Emerging Technology (CET) examination. Our CET training pro...

Delivery Options:

Certified Chief Information Security Officer (CCISO)

The Certified Chief Information Security Officer (CCISO) is a globally recognized certification that validates a professional’s expertise in executive-level management of information security. It is centered on real-world experie...

Delivery Options:

Computer Hacking Forensic Investigator (CHFI)

Gain knowledge and experience with essential security systems through the exploration of common ethical hacking topics. EC-Council released the most advanced computer forensic investigation program in the world. This course cover...

Delivery Options:

EC Council Disaster Recovery Professional (EDRP)

EDRP provides the professionals with a strong understanding of business continuity and disaster recovery principles, including conducting business impact analysis, assessing of risks, developing policies and procedures, and imple...

Delivery Options:

GIAC Network Forensic Analyst (GNFA)

The GIAC Network Forensic Analyst (GNFA) certification validates a practitioner's ability to perform examinations employing network forensic artifact analysis. GNFA certification holders have demonstrated an understanding of the ...

Delivery Options:

EC-Council Certified Security Analyst (ECSA)

This course will be invaluable to software developers and programmers alike to code and develop highly secure applications and web applications. This is done throughout the software life cycle that involves designing, implementin...

Delivery Options:

EC-Council Certified Network Defender (CND)

Certified Network Defender (CND) is a vendor-neutral, hands-on, instructor-led comprehensive network security certification training program. It is a skills-based, lab intensive program based on a job-task analysis and cybersecur...

Delivery Options:

Certified Incident Handler (CIH)

The Certified Incident Handler E|CIH is a method-driven program that uses a holistic approach to cover vast concepts concerning organizational incident handling and response from preparing and planning the incident handling respo...

Delivery Options:

EC-Council ECIH – Certified Incident Handler Certification Boot Camp

Our EC-Council Certified Incident Handler Certification Boot Camp is a comprehensive review industry best practices merged with Training Camp’s award-winning comprehensive exam preparation for the ECIH exam. Our ECIH training ...

Delivery Options:

Fundamentals of Cybersecurity Supply Chain Risk Management (C-SCRM)

This two-day course consists not only of training in understanding Cybersecurity Supply Chain Risk Management (C-SCRM), but also provides guidance in preparing organizations to deal with the myriad of risks that come from the sup...

Delivery Options:

NIST Cybersecurity Framework (NCSF) Practitioner

The NIST Cybersecurity Framework (NCSF) Practitioner program teaches the knowledge to prepare for the NSCF Practitioner exam plus the skills and abilities to design, build, test, manage and improve a cybersecurity program based o...

Delivery Options:

NIST Cybersecurity Framework (NCSF) Bootcamp

This program includes a comprehensive student guide for both NCSF Foundation and Practitioner course topics. The optional certification exam is through ACQUIROS. Student must pass a 180 minute, 125 question closed book multipl...

Delivery Options:

NIST Cybersecurity Framework (NCSF) Foundation

The NIST Cybersecurity Framework (NCSF) Foundation Training course is designed for anyone in an organization who needs to understand the basics of cybersecurity, the components of the NIST CSF, and how the NIST CSF aligns to risk...

Delivery Options:

Certified Authorization Professional Certification Prep

This course is designed for the information security practitioner who champions system security commensurate with an organization's mission and risk tolerance while meeting legal and regulatory requirements. The Certified Authori...

Delivery Options:

NIST Cybersecurity Framework (NCSF) Ransomware Risk Management

Ransomware has become one of the greatest threats to organizations around the world. Attackers encrypt your data and demand payment to restore access. The best defense against a ransomware attack is to prevent it from ever happen...

Delivery Options:

Aligning NIST Risk Frameworks (CSF/RMF)

This three-day Integrating NIST Frameworks (CSF/RMF) course helps students to understand the background and integration of several key frameworks from the National Institute of Standards and Technology (NIST). The course explains...

Delivery Options:

GIAC® Security Essentials Certification (GSEC)

Security is all about making sure you focus on the right areas of defense. You will learn the language and underlying theory of computer and information security. You will gain the essential and effective security knowledge you w...

Delivery Options:

Focal Point - Hacker Methodologies Security Professional

This course teaches students the processes threat actors use to break into organizations’ networks and steal their most sensitive data. Utilizing industry-standard penetration testing and auditing software, attendees will learn t...

Delivery Options:

Focal Point - Automated Network Defense

This course teaches how to defend enterprise infrastructure at scale using a combination of tools and platforms such as IDS/IPS, firewalls, and SIEMs. Configuring and tuning these systems properly maximize their effectiveness at ...

Delivery Options:

Focal Point - Network Forensics and Investigation II

Building on the skills developed in the Network Forensics and Investigation course, students will learn how to use advanced features in tools such as Elastic, Wireshark, Zeek and Suricata, how to apply threat intelligence to enri...

Delivery Options:

Focal Point - Python for Network Defenders

This course was created for novice programmers or those new to Python and designed for a very hands-on instructional experience. You will learn the foundations of Python including modules, classes, functions, object types, numeri...

Delivery Options:

Focal Point - Network Forensics and Investigation I

Network Forensics and Investigation teaches attendees to differentiate between normal and abnormal network traffic, track the flow of packets through a network, and attribute conversations and actions taken over a network segment...

Delivery Options:

SNSA - SonicWall Network Security Administrator

The SonicWall Network Security Administrator (SNSA) for SonicOS 7.0curriculum provides students the required background, knowledge, and hands-on experience to begin designing, implementing, and troubleshooting SonicWall Network S...

Delivery Options:

Cybersecurity Specialization: Governance, Risk, and Compliance

Cybersecurity Specialization: Governance, Risk, and Compliance will give you an understanding of the current laws and regulations that drive the creation of a governance system of rules, practices, and processes by which a compan...

Delivery Options:

Certified Network Defender (CND)

EC-Council has reviewed the entire CND space as designated by the Department of Defense as IAT I, II, III and IAM I, II, III as well as the NICE Framework KSA’s as they relate to cyber defense and day-to-day cyber operations. Wit...

Delivery Options:

Cybersecurity First Responder: Threat Detection and Response (CFR)

This course covers the duties of those who are responsible for monitoring and detecting security incidents in information systems and networks, and for executing a proper response to such incidents. Depending on the size of the o...

Delivery Options:

How to be Cyber Secure

At the end of this Cyber Security workshop, team members will understand the importance and impacts of common information security challenges, and how to avoid or solve them. The workshop helps everyone on the team understand how...

Delivery Options:

Cybersecurity with Metron

This 5-day course will provide a comprehensive introduction to the capabilities of Metron. The student will begin with installing Metron. After learning Metron’s domain specific languages (DSL), the Stellar Query and the Stellar ...

Delivery Options:

Practical CyberSecurity Boot Camp

This three-day cybersecurity training course teaches security professionals how to identify business requirements and turn those requirements into a highly functional, cost-effective information security management system. Led by...

Delivery Options:

Incident Response Training

This workshop will provide basic information on establishing an incident response program so that you can prepare your organization for an incident investigation. The initial focus of the training will be on identifying the proce...

Delivery Options: