After completing WAHS certification training, individuals will gain skills in identifying, exploiting, and preventing web application vulnerabilities. They will also learn how to perform advanced techniques for penetration testing and securing web applications. Additionally, they will understand how to use … Continue reading
Security Outlines
EC-Council Certified Chief Information Security Officer (C-CISO)
Course Overview In this 4-Day class, students will learn in-depth content in each of the 5 CCISO Domains. The CCISO Certification is an industry-leading program that recognizes the real-world experience necessary to succeed at the highest executive levels of information … Continue reading
EC-Council Certified Threat Intelligence Analyst (CTIA)
Course Overview Do you possess an analytical mind? Is critical thinking a part of who you are? Then you’ve come to the right place. A Certified Threat Intelligence Analyst (CTIA) acts as a force multiplier for organizations looking to reinforce … Continue reading
EC-Council Certified Penetration Tester (CPENT) – DoD 8140
Course Overview EC-Council’s Certified Penetration Tester (CPENT) program teaches you how to perform an effective penetration test in an enterprise network environment that must be attacked, exploited, evaded, and defended. If you have only been working in flat networks, CPENT’s … Continue reading
EC-Council Certified Cybersecurity Technician (C|CT)
Course Overview EC-Council’s C|CT certification immerses students in well-constructed knowledge transfer. Training is accompanied by critical thinking challenges and immersive lab experiences that allow candidates to apply their knowledge and move into the skill development phase in the class itself. … Continue reading
CISM
Certified Information Security Manager Course Overview Our ISACA CISM course provides a common body of knowledge for information security management. This course reviews information risk management as the basis of information security, information security governance, the development and management of … Continue reading
CYBERSECURITY 1st RESPONDER: THREAT DETECTION AND RESPONSE – DoD 8140
This 5 day course covers the duties of those who are responsible for monitoring and detecting security incidents in information systems and networks, and for executing a proper response to such incidents. Depending on the size of the organization, this … Continue reading
Federal Risk Management Framework (RMF) Implementation 3.1: DoD/IC Edition
Students in this 3 day course will learn the DoD Risk Management and Risk Management Framework governance structure for resolving Cybersecurity conflicts throughout the acquisition and sustainment of the systems lifecycle. Course Outline Chapter 1: Introduction Key concepts including assurance, … Continue reading
Windows 10 Security Audit
This 3 day class is designed to be used to introduce cyber security for users and administrators of Microsoft ® Windows 10. This class is intended for an audience that has no background knowledge in security, but where students have … Continue reading
CSSLP Boot Camp
This 5 day CSSLP Boot Camp prepares students for the Certified Secure Software Lifecycle Professional (CSSLP) certification exam, the premier security certification created and administered by the International Systems Security Certification Consortium (ISC²). The CSSLP is the only certification in … Continue reading