Michele M Jordan

Network Intelligence (I) Pvt. Ltd.

This 3-day hands-on workshops covers the hacking techniques from the perspective of professional providing penetration testing services. It covers the open-source and commercial tools available, dealing with false-positives, demonstrating return on invest ...

Category Ethical Hacking
ModifiedNever
LEVER Technology Group plc

This course is designed to educate IT support staff to allow them to defend their systems against hacking attacks. During this course, delegates learn about the hacker mindset and become familiar with the tools and methodologies that are used to attack sy ...

Category Ethical Hacking
ModifiedNever
Commercial
Pricing Model

CPTS has been built upon proven, hands-on Penetration Testing methodologies as utilized by Mile2's international group of specialized consultants. There is an equal emphasis on theoretical and real world experience for effective knowledge transfer to the ...

Category Ethical Hacking
Modified
ISECOM - Institute for Security and Open Methodologies

The premise of the training course is to support the necessary knowledge transfer for a person to be considered a capable, resourceful, and self-sufficient security tester. The training course focuses on the technical skills necessary for security testing ...

Category Ethical Hacking
ModifiedNever
NTG Clarity Networks Inc

5-Day Course. The course will combine interactive classroom instruction, demonstrations and hand on lab activities. The objective of this course is to level the playing field between security professionals and the most competent cyber criminals and terror ...

Category Ethical Hacking
ModifiedNever
Commercial
Pricing Model

Reality, Theory and Practice! This course is the "How did they do that?" of modern hacking attacks. From start to finish we will lead you through the full compromise of a company's IT systems, explaining the tools and technologies, but especially the thin ...

Category Ethical Hacking
Modified
InfoSec Institute

Our most popular information security training course goes in-depth into the techniques used by malicious, black hat hackers with attention getting lectures and hands-on lab exercises. While these hacking skills can be used for malicious purposes, Ethical ...

Category Ethical Hacking
ModifiedNever
InfoSec Institute

In Advanced Ethical Hacking: Expert Penetration Testing, you will delve deep into the less well-known, less obvious, and consequently more difficult to master techniques that are available today to penetration testers. you will walk out the door with the ...

Category Ethical Hacking
ModifiedNever
Commercial
Pricing Model

The purpose of this course is to show network/system administrators and security personnel how they can secure their system/network, by informing them about how they can attack and hack into a network and infrastructure. By explaining what vulnerabilities ...

Category Ethical Hacking
Modified
Commercial
Pricing Model

f your organization has an Internet connection or one or two disgruntled employees (and whose doesn't!), your computer systems will get attacked. From the five, ten, or even one hundred daily probes against your Internet infrastructure to the malicious in ...

Category Ethical Hacking
Modified
Learning Tree International

In this hands-on course, you identify where your networks and systems are vulnerable to attack from hackers. You learn about the methods and techniques used by hackers and how to counter with effective defense measures.

Category Ethical Hacking
ModifiedNever
See Security Technologies Ltd - Israel

Although the course is extremely practical and technical in nature, it not only leads the participant through all the tools, technologies and techniques used by attackers, but will teach the thinking, strategies and methodologies used by attackers so as t ...

Category Ethical Hacking
ModifiedNever
Canaudit, Inc

This five-day class is designed for those security officers, IT auditors and administrators who want to learn how to penetration test their organization?s network. This class, taught by two members of the Canaudit "Strike Force", will teach you how to at ...

Category Ethical Hacking
ModifiedNever
Commercial
Pricing Model

Because security is an ever-changing battlefield, Ultimate Hacking exposes you to the latest in web application and network vulnerabilities and defenses. From Windows and Unix hosts to web applications and backend databases, instructors will illustrate ea ...

Category Ethical Hacking
Modified
Ultimate Hacking
Information Security Group, Royal Holloway, University of London

The ISG offers an advanced MSc degree as an interdisciplinary course which embraces a range of technologies such as cryptography, computer security, and fraud detection, and also includes the study of how security can best be managed. The degree is design ...

ModifiedNever
Sheffield Hallam University.
Commercial
Pricing Model

The MSc in Information Systems Security has been developed in association with the British Standards Institution (BSI), growing out of successful and popular undergraduate provision, research and developing expertise within the Communications and Networks ...

Modified
Harrow School of Computer Science, University of Westminster

This innovative and flexible course aims to equip those responsible for the development and implementation of IT security policy to:

ModifiedNever
Net-Security Training
Commercial
Pricing Model

Certified Information Systems Security Professional (CISSP) is a highly sought after course by those who are looking to make a career in Information Security. Our CISSP training course - 'CISSP Fast Track' is an intensive, in-depth training program that h ...

Category CISSP Training
Modified
Foundstone/McAfee
Commercial
Pricing Model

The Foundstone CISSP Prep Course is designed for the security professional that is preparing to take the Certified Information System Professional exam provided by ISC2™. Developed to help those studying for the test gain an understanding of the test, thi ...

Category CISSP Training
Modified
Intense School
Commercial
Pricing Model

Intense School offers this top-notch Boot Camp to train and prepare for the Certified Information Systems Security Professional (CISSP®), the premier security certification created and administered by the International Systems Security Certification Conso ...

Category CISSP Training
Modified