Archives of Other Courses

CEH

[button color=”#000000″ background=”#ff9900″ size=”large” src=”./call-schedule”]Register Now![/button] Course Description This class will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by […]
Read More

CISSP

[button color=”#000000″ background=”#ff9900″ size=”large” src=”./call-schedule”]Register Now![/button] Course Description In this course, students will analyze a wide range of information systems security subjects that are organized into 10 domains for CISSP exam certification. Who Should Attend? This course is intended for experienced IT security-related practitioners, auditors, consultants, investigators, or instructors, including network or security analysts and […]
Read More

CISM

[button color=”#000000″ background=”#ff9900″ size=”large” src=”./call-schedule”]Register Now![/button] Course Description The focus of this course is in-depth coverage of the four domains required to pass the CISM exam: Information Security Governance Information Risk Management and Compliance Information Security Program Development and Management Information Security Incident Management Who Should Attend? Experienced information security managers and those who have […]
Read More

CISA

[button color=”#000000″ background=”#ff9900″ size=”large” src=”./call-schedule”]Register Now![/button] Course Description The field of information systems is growing and changing at an increasingly fast pace. Organizations are investing in and relying on a secure and efficient IT infrastructure to maintain business and meet business goals and objectives. Information systems auditing plays a crucial role in developing and maintaining […]
Read More

Security+

[button color=”#000000″ background=”#ff9900″ size=”large” src=”./call-schedule”]Register Now![/button] Course Description You will implement and monitor security on networks, applications, and operating systems, and respond to security breaches. Course Objectives Upon successful completion of this course, students will be able to: Identify the fundamental concepts of computer security. Identify security threats and vulnerabilities. Examine network security. Manage application, […]
Read More