Skip to main content

Michele M Jordan

In this course you will learn 5 Key Elements of Pen Testing; Information Gathering, Scanning, Enumeration, Exploitation and Reporting. Plus, discover the latest vulnerabilities and the techniques malicious hackers are using to acquire and destroy data. Ad ...

Category Ethical Hacking
Penetration Testing Engineer
ISECOM - Institute for Security and Open Methodologies

The premise of the training course is to support the necessary knowledge transfer for a person to be considered a capable, resourceful, and self-sufficient security tester. The training course focuses on the technical skills necessary for security testing ...

Category Ethical Hacking
Orange Cyberdefense

An introductory course for those starting the journey into penetration testing or those working in environments where understanding how hackers think and the tools, tactics and techniques they use. The course presents the background information, technical ...

Category Ethical Hacking
Hands-on Hacking Fundamentals
InfoSec Institute

Discover vulnerabilities before cybercriminals do! Our most popular information security and hacking training goes in-depth into the techniques used by malicious actors with attention-getting lectures and hands-on labs. Earn your CEH and PenTest+, guaran ...

Category Ethical Hacking
Ethical Hacking Dual Certification Boot Camp (CEH and PenTest+)
InfoSec Institute

In Advanced Ethical Hacking: Expert Penetration Testing, you will delve deep into the less well-known, less obvious, and consequently more difficult to master techniques that are available today to penetration testers. you will walk out the door with the ...

Category Ethical Hacking

SEC504 helps you develop the skills to conduct incident response investigations. You will learn how to apply a dynamic incident response process to evolving cyber threats, and how to develop threat intelligence to mount effective defense strategies for cl ...

Category Ethical Hacking
Hacker Tools, Techniques, and Incident Handling
Learning Tree International

In this CEH training course, you are provided with the foundational knowledge needed to pass the EC-Council Certified Ethical Hacker (CEH v11) exam. You will learn how to deploy tools and techniques to protect your network through hands-on labs that mimic ...

Category Ethical Hacking
Certified Ethical Hacker
Information Security Group, Royal Holloway, University of London

The ISG offers an advanced MSc degree as an interdisciplinary course which embraces a range of technologies such as cryptography, computer security, and fraud detection, and also includes the study of how security can best be managed. The degree is design ...

Sheffield Hallam University.

The MSc in Information Systems Security has been developed in association with the British Standards Institution (BSI), growing out of successful and popular undergraduate provision, research and developing expertise within the Communications and Networks ...

Harrow School of Computer Science, University of Westminster

This innovative and flexible course aims to equip those responsible for the development and implementation of IT security policy to:

Net-Security Training

Certified Information Systems Security Professional (CISSP) is a highly sought after course by those who are looking to make a career in Information Security. Our CISSP training course - 'CISSP Fast Track' is an intensive, in-depth training program that h ...

Category CISSP Training

CISSP Boot Camp Popular

Infosec Institute

 Earning your CISSP requires a broad range of cybersecurity skills, from developing security policies to managing risk to understanding technical security controls. Infosec’s industry-leading approach to CISSP training provides the tools you need to ...

Category CISSP Training
CISSP Boot Camp
Net-Security Training

This 5-day course is designed for IT professionals who want to learn the fundamentals of network security. The course offers practical training in areas such as TCP/IP for computer communications, types of attack, applied cryptography, multi-firewalls ...

SP Hailey Enterprises

Packet Analysis and Intrusion Detection 5 Day You'll learn how to properly read and interpret packets and packet headers including IP, TCP, ICMP, and UDP. You will learn how to distinguish between normal, abnormal, and malicious traffic. You will also c ...

InfoSec Institute

The Intrusion Prevention training offered by InfoSec Institute covers all areas of intrusion prevention. Host Intrusion Prevention and Network Intrusion Prevention are covered in great detail. You will learn the technical details that make Intrusion Preve ...

ROMAN - Consulting & Engineering AG

In order to protect computer systems against hacker attacks, various firewalls are used today. Doubtlessly, firewalls increase IT security. However, firewalls cannot ward off all attacks. They are useless against attacks initiated from within the network ...

Net-Security Training

This course is for those IT professionals who want to master network security. In our course they will learn the best practices to safe-guard their network perimeter. We offer training on using Multi-Vendor firewall products such as Zone Alarm, Smoothwall ...

Learning Tree International

In this course, you gain extensive hands-on experience installing and configuring a firewall. You learn how to allow access to key services while maintaining your organization's security, as well as how to implement firewall-to-firewall virtual private ne ...

IBM Corporation

After a detailed discussion of the TCP/IP suite component protocols and Ethernet operation, practice using various tools to capture, analyze, and generate Internet Protocol (IP) traffic. Then explore the tools and techniques used to exploit protocol we ...

PTR Associates, Ltd.

This 5-day course is aimed at IT professionals who want to further their knowledge of establishing and maintaining secure networks. Students will learn the theory and best practices of protecting the network perimeter and put their knowledge into practice ...