List Categories and Listings by C
3 day hands-on journey into the hacking mindset, including the CSTA certification exam. Practically apply the tools and techniques that penetration testers use. The course is ideal for network administrators, security officers & crime prevention ...
CWSA Wireless Security: Hands-On Featured
2 day wireless security training course followed by CSWA certification exam (optional). The course follows the evolution of wireless security, teaching the underlying principles so that delegates leave not only with an understanding of the ...
CoursesOnline offers professionals the opportunity to hone their cyber security skills via a wide selection of online learning courses. There are options available for those new to the sector and likewise with those with more experience. The courses are p ...
4 day highly practical course designed to equip information security specialists with the knowledge and skills to deal effectively with incident response situations. It also gives investigators valuable insight into forensic acquisition under di ...
2-day practical penetration testing course - Build on the knowledge gained in CSTA Ethical Hacking: Hands-On, using the frameworks & tools used by professional penetration testers to: audit & compromise system security, assess weaknesses in w ...
3 day practical computer forensics training course - Learn about forensic principles, evidence continuity and methodology to employ when conducting a forensic investigation. Using practical case scenarios, you will be guided through the process ...
CanSecWest, the world's most advanced conference focusing on applied digital security, is about bringing the industry luminaries together in a relaxed environment which promotes collaboration and social networking. The conference lasts for three days and ...
Cisco Adaptive Security Appliance (ASA) Software is the core operating system that powers the Cisco ASA family. It delivers enterprise-class firewall capabilities for ASA devices in an array of form factors - standalone appliances, blades, and virtual. AS ...
Capsa Popular
Capsa is a portable network analyzer application for both LANs and WLANs which performs real-time packet capturing capability, 24x7 network monitoring, advanced protocol analysis, in-depth packet decoding, and automatic expert diagnosis. Capsa's comprehen ...
Core Impact is designed to enable security teams to conduct advanced penetration tests with ease. With guided automation and certified exploits, the powerful penetration testing software enables you to safely test your environment using the same technique ...
Internet Security Pro combines the power of COMODO's award-winning Firewall and AntiVirus software to protect your PC from malicious software and Hackers. Removes existing viruses instantly Blocks all unwanted Internet attacks ...
This course will give you a firm understanding of advanced incident response and computer forensics tools and techniques to investigate data breach intrusions, tech-savvy rogue employees, advanced persistent threats, and complex digital forensic cases. ...
CyberGatekeeper LAN and CyberGatekeeper Remote let systems access the network only after verifying they comply with security policies. If systems are not in compliance or do not participate in the audit, they are kept in a quarantine network. With network ...
Check Point endpoint security includes data security, network security, advanced threat prevention, forensics, endpoint detection and response (EDR), and remote access VPN solutions. To offer simple and flexible security administration, Check Point’s enti ...
The Certified Information Systems Security Professional (CISSP) is a very difficult certification to achieve and is considered a global standard that proves an individual?s proficiency in several different security disciplines. It attests to that person?s ...
Security in the industry for mobile operators, internet service providers, and hosting providers Cloudmark Authority utilizes a unique combination of proprietary technologies including Advanced Message Fingerprinting algorithms and real-time threat ...
3 years Full Time
3 years Full Time
5 years Sandwich Course
4 years Full Time