DEV522: Defending Web Applications Security Essentials is intended for anyone tasked with implementing, managing, or protecting Web applications. It is particularly well suited to application security analysts, developers, application architects, pen test ...
Earn your CWSP™ certification and master the fundamentals of wireless and how to secure your wireless infrastructures. This course targets experienced networking professionals who wish to gain critical skills in wireless networking security, incl ...
3 years Full Time
This intermediate course is intended for administrators and support personnel who wish to learn the key skills required to implement security on Linux installations. As more servers on the network move to the Linux operating system, security becomes an in ...
This training is appropriate for system security officers, system administrators, applications integrators, and other users of the Argus security systems. The course assumes familiarity with UNIX. * Learn how to operate your system in the Argus secure en ...
4 years Full Time
What Will You Learn? This course will give you an in-depth study of the computer forensics process. Starting from creating evidentiary disk images to recognizing the often-faint trail of unauthorized activity, Foundstone updates this class continuously by ...
3 years Full Time / 4 years Sandwich Course
UMUC was named a National Center of Academic Excellence in Information Assurance and Cyber Defense Education by the National Security Agency and Department of Homeland Security.About the Cybersecurity Technology Master's Degree: Coursework in the cybersec ...
4 years Sandwich Course
The UNIX family of operating systems, including the increasingly used Linux versions, is prized by IT professionals for its flexibility and openness. Vulnerabilities in standard configurations, however, can make UNIX systems susceptible to security threat ...
Linux and other operating systems face a number of threats in a networked environment. It is possible to secure Linux against these threats. The Leading Edge Linux Security course provides an understanding of the security threats as well as the techniques ...
UMUC was named a National Center of Academic Excellence in Information Assurance and Cyber Defense Education by the National Security Agency and Department of Homeland Security. About the Software Development and Security Bachelor's Degree Your software d ...
This popular course explores malware analysis tools and techniques in depth. FOR610 training has helped forensic investigators, incident responders, security engineers, and IT administrators acquire the practical skills to examine malicious programs that ...
The Five-Year Combined BS/MS Program provides an opportunity for JMU undergraduate students to complete an MS degree in only one additional year of study. Students in this program will complete all requirements of the regular BS degree in Computer Science ...
Firewall Basics with WFS A three-day course that focuses on the design and implementation of a corporate security policy using the WatchGuard System Manager management software and the award-winning WFS appliance software. This course prepares you for th ...
The Check Point Secure Platform Boot Camp is an intensive 5-day instructor-led course, which introduces the security administrator to Check Point's Secure Platform and Check Point NG. The course provides the information and experience necessary to deploy ...
We use cookies and similar technologies to improve your experience on our website. Read our Privacy Policy.
This website uses cookies and similar technologies. They are grouped into categories, which you can review and manage below. If you have accepted any non-essential cookies, you can change your preferences at any time in the settings. Learn more in our Privacy Policy.
These technologies are required to activate the core functionality of our website.
These technologies enable us to analyse the use of our website in order to measure and improve performance.
These technologies are used by our marketing partners to show you personalized advertisements relevant to your interests.