Skip to main content

Security Training: All Listings 

Results 101 - 120 of 250 This Category
All Listings
Kingston University

4 years Full Time

This training course offers a collection of live demonstrations featuring a variety of hacking and defensive techniques used by hackers. Tranchulas online labs are available 24×7 for practising the techniques and tools demonstrated by our instructor durin ...

Category Ethical Hacking
Hands-On Penetration Testing and Ethical Hacking Training

What Will You Learn? Understand the key security features of the J2EE platform, the common web security pitfalls developers make and how to build secure and reliable web applications using Java. Students are lead through hands on code examples that highli ...

Foundstone now McAfee

What Will You Learn? Foundstone consultants/instructors bring real-world experience to the classroom to empower you with the skills to assess your security posture and implement effective countermeasures. As always Foundstone brings its consulting experie ...

What Will You Learn? This course will give you an in-depth study of the computer forensics process. Starting from creating evidentiary disk images to recognizing the often-faint trail of unauthorized activity, Foundstone updates this class continuously by ...

IBM Corporation

Learn how to set up and administer a Linux(TM)-based firewall.

The Certified Penetration Testing Consultant course is designed for IT Security Professionals and IT Network Administrators who are interested in taking an in-depth look into specific penetration testing techniques used against operating systems. This cou ...

Category Ethical Hacking
Penetration Testing Consultant
Kingston University

3 years Full Time

Bournemouth University

4 years Sandwich Course

James Madison University

The Five-Year Combined BS/MS Program provides an opportunity for JMU undergraduate students to complete an MS degree in only one additional year of study. Students in this program will complete all requirements of the regular BS degree in Computer Science ...

Security University

Earn your CWSP™ certification and master the fundamentals of wireless and how to secure your wireless infrastructures. This course targets experienced networking professionals who wish to gain critical skills in wireless networking security, incl ...

3 day practical computer forensics training course - Learn about forensic principles, evidence continuity and methodology to employ when conducting a forensic investigation. Using practical case scenarios, you will be guided through the process ...

CFIP Certified Forensic Investigation Practitioner
Middlesex University

4 years Full Time

Edinburgh Napier University

4 years Full Time / 3 years Full Time

University of Derby

4 years Sandwich Course

In this course you will learn the core skills to build a solid security foundation. You will examine in detail the traffic that traverses the network at the packet and binary level. You will build a solid knowledge of the lowest layers of the network. In ...

Category Ethical Hacking
EC-Council Ethical Hacking Core Skills
Offensive Security

Penetration Testing with Kali (PWK) is a self-paced online pen testing course designed for network administrators and security professionals who want to take a serious and meaningful step into the world of professional penetration testing. This unique pen ...

Category Ethical Hacking
Penetration Testing with Kali Linux

This certification option is centered on Snort, the industry leading open source intrusion prevention solution. Candidates are assessed on a wide range of criteria that encompasses all the necessary open source components and technical skills for successf ...

Snort Certified Professional (SnortCP)

Certified Penetration Testing Engineer graduates will obtain real world security knowledge enabling them to recognize vulnerabilities, exploit system weaknesses, and safeguard organizations against threats. Graduates will learn the art of Ethical Hacking ...

Category Ethical Hacking
Middlesex University

3 years Full Time