Michele M Jordan

The Anti-Virus Workshop gives delegates a hands-on opportunity to experiment with viruses under supervision and in a controlled environment. The first day provides a comprehensive introduction to viruses and anti-virus warfare, while the second day provid ...

Category Virus Training
ModifiedNever
University of Calgary
Commercial
Pricing Model

This course will focus on malicious software, or malware, such as computer viruses, worms, and Trojan horses. Malware techniques will be studied, along with countermeasures and so-called ``benevolent'' forms of malware. Legal and ethical issues will be co ...

Category Virus Training
Modified
Net-Security Training
Commercial
Pricing Model

This 5-day course is designed for IT professionals who want to learn the fundamentals of network security. The course offers practical training in areas such as TCP/IP for computer communications, types of attack, applied cryptography, multi-firewalls ...

Modified
SP Hailey Enterprises

Packet Analysis and Intrusion Detection 5 Day You'll learn how to properly read and interpret packets and packet headers including IP, TCP, ICMP, and UDP. You will learn how to distinguish between normal, abnormal, and malicious traffic. You will also c ...

ModifiedNever
InfoSec Institute

The Intrusion Prevention training offered by InfoSec Institute covers all areas of intrusion prevention. Host Intrusion Prevention and Network Intrusion Prevention are covered in great detail. You will learn the technical details that make Intrusion Preve ...

ModifiedNever
ROMAN - Consulting & Engineering AG

In order to protect computer systems against hacker attacks, various firewalls are used today. Doubtlessly, firewalls increase IT security. However, firewalls cannot ward off all attacks. They are useless against attacks initiated from within the network ...

ModifiedNever
Net-Security Training

This course is for those IT professionals who want to master network security. In our course they will learn the best practices to safe-guard their network perimeter. We offer training on using Multi-Vendor firewall products such as Zone Alarm, Smoothwall ...

ModifiedNever
Learning Tree International

In this course, you gain extensive hands-on experience installing and configuring a firewall. You learn how to allow access to key services while maintaining your organization's security, as well as how to implement firewall-to-firewall virtual private ne ...

ModifiedNever
IBM Corporation
Commercial
Pricing Model

After a detailed discussion of the TCP/IP suite component protocols and Ethernet operation, practice using various tools to capture, analyze, and generate Internet Protocol (IP) traffic. Then explore the tools and techniques used to exploit protocol we ...

Modified
PTR Associates, Ltd.

This 5-day course is aimed at IT professionals who want to further their knowledge of establishing and maintaining secure networks. Students will learn the theory and best practices of protecting the network perimeter and put their knowledge into practice ...

ModifiedNever
PTR Associates, Ltd.

This 3 day instructor led course is task orientated and teaches the skills needed to describe, configure, verify and manage the PIX Firewalls.

ModifiedNever
VPN Dynamics, Inc.

The CSSA Instructor-led Training is designed to reinforce the foundational knowledge in the SonicWALL Technical e*Training courses. These courses provide the hands-on experiential training that will enhance problem solving and provide dynamic feedback in ...

ModifiedNever
Access 2 Networks, Inc.

The Check Point Secure Platform Boot Camp is an intensive 5-day instructor-led course, which introduces the security administrator to Check Point's Secure Platform and Check Point NG. The course provides the information and experience necessary to deploy ...

ModifiedNever
WatchGuard Training Partners

Firewall Basics with WFS A three-day course that focuses on the design and implementation of a corporate security policy using the WatchGuard System Manager management software and the award-winning WFS appliance software. This course prepares you for th ...

ModifiedNever

The VPN Specialist is a combination of the Cisco Secure Virtual Private Networks (CSVPN) course and the Securing Cisco Network Devices (SND) course, both delivered together in one 5-day class. Because of the accelerated nature of the course, be prepared f ...

ModifiedNever
Learning Tree, International

VPNs can provide significant business benefits by allowing remote users and multiple sites to communicate securely across shared networks, including the Internet. IPsec provides the technology to implement secure VPNs. You learn to apply the standards an ...

ModifiedNever
Commercial
Pricing Model

In this instructor-led, lab-intensive course, get the knowledge and skills needed to describe, configure, verify, and manage the Cisco Virtual Private Network (VPN) 3000 Concentrator, Cisco VPN Software Client, and Cisco VPN 3002 Hardware Client feature s ...

Modified
Red Hat, Inc
Commercial
Pricing Model

For Linux- and/or UNIX- systems administrators who want to build skills at configuring common network services and security administration using Red Hat Linux

Modified
Red Hat, Inc
Commercial
Pricing Model

Red Hat Enterprise Linux has gained considerable momentum as the operating system of choice for deploying network services such as web, ftp, email, and file sharing. RHS333 Red Hat Enterprise Security: Network Services is an intensive course that provides ...

Modified
Commercial
Pricing Model

This intermediate course is intended for administrators and support personnel who wish to learn the key skills required to implement security on Linux installations. As more servers on the network move to the Linux operating system, security becomes an in ...

Modified