A Certificate of Completion is offered for each class.
Are you in the trenches, working with the nuts and bolts of an infrastructure? These courses are meant to give you an understanding of what’s happing across the wire from layers 2 – 4 of the OSI model.
Learn how to implement effective network intrusion prevention.
Learn leading network security practices from experts who develop these techniques and put them to practical use.
Extremely popular and intense hands-on course.
This one-of-a-kind training course will arm attendees with the skills needed to design, deploy, maintain and secure even the most sophisticated Microsoft infrastructures. This "special edition" course will also include the development and design of ISA Server DMZ configurations and deployments to further secure your Microsoft installations
This course dives into the newest features of the Metasploit Framework and demonstrates how to use these features in every aspect of a penetration test.
Using a combination of new tools and lesser-known techniques, attendees will learn how hackers compromise systems without depending on standard exploits.
Learn how networks can be abused and subverted, while analyzing the attacks, methods, and traffic that make it happen.
In depth coverage of current security topics. Not for Beginners.
This one-of-a-kind training course will arm attendees with the skills needed to design, deploy, maintain and secure even the most sophisticated Microsoft infrastructures. This "special edition" course will also include the development and design of ISA Server DMZ configurations and deployments to further secure your Microsoft installations