Security Training Courses and Workshops

Schools providing training courses, certificates, diplomas or degree programs of Computer System and Network Securing and Hardening




Total 800 training courses and degree programs available around the world.

United States - United Kingdom - Canada - Australia - India

Popular courses:
Security+
Network Security
Security+ Certification
Managing Messaging Security using Microsoft Exchange Server 2007
CompTIA Security+
Information Security


SANS Institute - Security Essentials Bootcamp

Course Format: Classroom
School/Trainer: ISInc
Training Center(s)/Venue(s): Sacramento, United States
  V

This six day instructor-led course is designed to give anyone interested in network security the skills required to be an effective player in this space. This in-depth, comprehensive course provides the essential, up-to-the minute knowledge and skills required for securing systems and organizations. This course equips you with the language and theory of computer security. Learn all of this and more from the best security instructors in the industry.

Daily bootcamps give you the opportunity to apply the knowledge gained throughout the course in an instructor-led environment. It helps fill your toolbox with valuable tools you can use to solve problems when you go back to work. Students will have the opportunity to install, configure and use the tools and techniques they have learned. CDs containing the software required will be provided for each student.

Security+

Course Format: Classroom
School/Trainer: ISInc
Training Center(s)/Venue(s): Sacramento, United States
  V

This is a five day instructor-led course. CompTIA Security+ (Exam SY0-401) is the primary course you will need to take if your job responsibilities include securing network services, devices, and traffic and your organization as a whole including the physical security elements and operational security measures. It is also the main course you will take to prepare for the CompTIA Security+ Certification examination. In this course, you will build on your knowledge and professional experience with security fundamentals, networks, and organizational security as you acquire the specific skills required to implement basic security services on any type of computer network.
This course can benefit you in two ways. If you intend to pass the CompTIA Security+ (Exam SY0-401) Certification examination, this course can be a significant part of your preparation. But certification is not the only key to professional success in the field of computer security. Today&,#146,s job market demands individuals with demonstrable skills, and the information and activities in this course can help you build your computer security skill set so that you can confidently perform your duties in... [Read More]

CISSP (Certificate)

Course Format: Classroom
School/Trainer: ISInc
Training Center(s)/Venue(s): Sacramento, United States
  V

This five day, instructor led course is thoroughly updated for the latest release of the Certified Information Systems Security Professional exam, as well as the new 2015 CISSP Common Body of Knowledge developed by the International Information Systems Security Certification Consortium (ISC)2. It covers all 8 CISSP domains: * Security and Risk Management * Asset Security * Security Engineering * Communication and Network Security * Identity and Access Management * Security Assessment and Testing * Security Operations * Software Development Security

The vendor-neutral CISSP certification is the ideal credential for those with proven deep technical and managerial competence, skills, experience, and credibility to design, engineer, implement, and manage their overall information security program to protect organizations from growing sophisticated attacks.

CISSP (Certificate)

Course Format: Online
School/Trainer: Intertech, Inc.
Training Center(s)/Venue(s): Eagan, United States
  V

You will control access to data and information systems using common access control best practices. You will discover how networks are designed for security, and the components, protocols, and services that allow telecommunications to occur in a secure manner. Next, you will learn about the principles of security management and how to manage risk as part of a comprehensive information security management program. You will explore applications and systems development security controls. Then, you will learn how to perform cryptography and how to secure system architecture. You will examine operations security and the appropriate controls and best practices to use to keep operations secure. You will learn how to perform business continuity planning and apply physical security to protect organizational assets and resources. Finally, you will explore law, investigations, and ethics with respect to information systems security and computer forensics.

Upon successful completion of this course, students will be able to:
Control access to information systems.
Network systems and telecommunications.
Define security management.
Create applications... [Read More]

F5 Networks Configuring BIG-IP ASM v12: Application Security Manager

Course Format: Online
School/Trainer: Intertech, Inc.
Training Center(s)/Venue(s): Eagan, United States
  V

Learn skills to manage Web-based and XML application attacks and use Application Security Manager to defend against these attacks, including building security policies, utilizing traffic learning, deploying Application Security Manager with various applications, and testing using realistic web site traffic.

Lesson 1: Setting Up the BIG-IP System
Introducing the BIG-IP System
Initially Setting Up the BIG-IP System
Archiving the BIG-IP System Configuration
Leveraging F5 Support Resources and Tools
Chapter Resources
BIG-IP System Setup Labs

Lesson 2: Traffic Processing with BIG-IP
Identifying BIG-IP Traffic Processing Objects
Understanding Network Packet Flow
Understanding Profiles
Overview of Local Traffic Policies and ASM

Lesson 3: Web Application Concepts
Anatomy of a Web Application
An Overview of Common Security Methods
Examining HTTP and Web Application Components
Examining HTTP Headers
Examining HTTP Responses
Examining HTML Components
How ASM Parses File Types, URLs, and Parameters
Using the Fiddler HTTP Proxy Tool

L... [Read More]

WebSphere Security Administration and Programming

Course Format: Online
School/Trainer: Intertech, Inc.
Training Center(s)/Venue(s): Eagan, United States
  V

This course delves deep into the security administration of WebSphere Application Server v6. It also teaches the security programming model of J2EE. Creating secure applications and web sites requires close cooperation between the developers and the administrators. Keeping that in mind, this course is targeted towards the developer and the administrator community.

Enterprise Linux Security Administration

Course Format: Online
School/Trainer: Intertech, Inc.
Training Center(s)/Venue(s): Eagan, United States
  V

This highly technical course focuses on properly securing machines running the Linux operating systems. A broad range of general security techniques such as packet filtering, password policies, and file integrity checking are covered. Advanced security technologies such as Kerberos and SELinux are taught. Special attention is given to securing commonly deployed network services. At the end of the course, students have an excellent understanding of the potential security vulnerabilities -- know how to audit existing machines, and how to securely deploy new network services.

Prerequisites

This class covers advanced security topics and is intended for experienced systems administrators. Candidates should have current Linux or UNIX systems administration experience equivalent to the Linux Fundamentals, Enterprise Linux Systems Administration, and Enterprise Linux Network Services.

Oracle Database 11g R2: Encryption & Advanced Data Security

Course Format: Online
School/Trainer: Intertech, Inc.
Training Center(s)/Venue(s): Eagan, United States
  V

Threats to data security abound and are increasing in sophistication and frequency. Organizations have both an ethical and oftentimes a legal responsibility to understand the countermeasures available, to compare these against those threats to which they are exposed, and to properly apply such countermeasures.

This training course module considers how encryption technology should, and should not, be employed within an Oracle database environment in response to known threats and risks. It will also discuss other best security practices which pertain to application security, host system configuration and the database installation.

Within this training course we will discuss these topics:
Consider examples of common security threats and sensitive data which might exist within an organization.
Review the essentials of a sound and secure database installation.
Consider known database security weaknesses and how these may be addressed.
Consider examples of specific attacks which could be launched against individual components within a data center or within the public networks.
Review the theory and concepts which underl... [Read More]

Different Types of Security Investments

Course Format: Online
School/Trainer: Online Institute of America
Training Center(s)/Venue(s): Lakeway, United States
  V

This course is the perfect sampler plate for anyone seeking a broad overview of security investments. Understanding Different Types of Security Investments identifies seven types of investment products and reviews their variations, how they work, who they work best for, and other considerations that are important to both the financial professionals who sell them, and the investor using them as investment tools.

LEARNING OBJECTIVES:

�Identify cash and cash equivalent products, and their use and purpose to investors.
•Recognize the function of fixed income securities, and how each product acts as an investment.
•Understand the characteristics of equity securities, and their valuation.
•Distinguish the different methods of investment company management.
•Understand the structure and operation of mutual funds.
•Identify what derivative securities are and how they work.
•Recognize the risks and payoffs of international investing.
•Understand the purpose and function of Real Estate Investment Trusts (REITs), and their tax considerations.
•Recognize the function of variable annuities in an investment portf... [Read More]

Information Security

Course Format: Online
School/Trainer: Online Institute of America
Training Center(s)/Venue(s): Lakeway, United States
  V

•Along with music and movies, information is increasingly digital, making it easy to transmit and copy �and easy to misuse. While the entertainment industry scrambles to find ways to protect its copyrights, corporations are likewise struggling to protect their confidential information and to keep pace with the increasingly stringent laws that protect consumer and employee privacy.
•Although teenage hackers from Singapore to Helsinki make the headlines, ordinary breaches of information security often start with things such as an intruder in the workspace, an unscrupulous co �worker or a laptop swiped at an airport. A password scrawled on a post �it note under an employee’s desk or an un �shredded, discarded memo may be the keys to security breaches that cause grave damage to a company’s financial status and reputation.
•Laws such as HIPAA and the Gramm �Leach �Bliley Act demand that employees take specific precautions with certain types of personal information they handle. But even companies that are not subject to these laws must be sure their employees understand and follow company policies for protecting data in all forms.
•Program Summary
... [Read More]

HIPAA Privacy & Security Compliance

Course Format: Online
School/Trainer: Online Institute of America
Training Center(s)/Venue(s): Lakeway, United States
  V

The privacy and security of personal information is something everyone should be concerned about. This is especially true in the area of healthcare, where individuals share details of their health, personal lives and finances when they are at their most vulnerable. The Health Insurance Portability and Accountability Act (“HIPAA� addresses these issues by imposing stringent record �keeping and security requirements on healthcare providers and related entities. The regulations require uniform coding for the electronic transmission of patient data.
In addition, the regulations require “covered entities��healthcare providers, health insurance plans, healthcare clearinghouses, and those who contract with these entities �to create and implement privacy and security policies covering all patient data that is electronically transmitted or maintained (along with all paper counterparts). The work needed to comply with these regulations presents a tremendous challenge for all organizations that handle healthcare information.
Program Summary
This program explains the HIPAA regulations pertaining to the privacy and security of healthcare information. The topics ... [Read More]

HIPAA Privacy and Security

Course Format: Online
School/Trainer: Online Institute of America
Training Center(s)/Venue(s): Lakeway, United States
  V

The privacy and security of personal information is something everyone should be concerned about. This is especially true in the area of healthcare, where individuals share details of their health, personal lives and finances when they are at their most vulnerable. The Health Insurance Portability and Accountability Act (“HIPAA� addresses these issues by imposing stringent record �keeping and security requirements on healthcare providers and related entities. The regulations require uniform coding for the electronic transmission of patient data.
In addition, the regulations require “covered entities��healthcare providers, health insurance plans, healthcare clearinghouses, and those who contract with these entities �to create and implement privacy and security policies covering all patient data that is electronically transmitted or maintained (along with all paper counterparts). The work needed to comply with these regulations presents a tremendous challenge for all organizations that handle healthcare information.
Program Summary
This program explains the HIPAA regulations pertaining to the privacy and security of healthcare information. The topics ... [Read More]

Computer Security Awareness

Course Format: Classroom
School/Trainer: GTC Economic Development and Corporate Training
Training Center(s)/Venue(s): Greenville, Simpsonville, Taylors, United States
  V

provides employees with the critical knowledge and tools to prevent the destructive impact that hackers, viruses, and improper PC maintenance can have on your organization`s productivity, as well as protecting your organization`s critical assets and valuable intellectual property.

More than ever before with today`s &,quot,wireless&,quot, and &,quot,anywhere&,quot, offices, proper cyber security protocol has become &,quot,must have&,quot, training for organizations large and small, government and commercial. Managers everywhere are recognizing that this training is not an expense - - it is a cost savings.

Introduction to Information Security

•Change your perception: security is a necessity - not a burden.
•Be a learner: Understand security threats and vulnerabilities.
•Be proactive: Adopt good security habits.
•Seek help and advice: Advanced technologies require educated users.
•Computer Security is YOUR responsibility.

Module 2: Information Security Program

•Identify the goals of IT security.
•Learn about your responsibilities and where to get help when you need compu... [Read More]

CIW Web Security Professional (Certificate)

Course Format: Classroom
School/Trainer: GTC Economic Development and Corporate Training
Training Center(s)/Venue(s): Greenville, Simpsonville, Taylors, United States
  V

The CIW Web Security Associate course teaches you how to secure your network from unauthorized activity. This course teaches you about security principles, such as establishing an effective security policy, and about the different types of hacker activities that you are most likely to encounter. Individuals with these security skills can pursue or advance careers in many aspects of online and network security.

CIW Web Security Specialist (Certificate)

Course Format: Classroom
School/Trainer: GTC Economic Development and Corporate Training
Training Center(s)/Venue(s): Greenville, Simpsonville, Taylors, United States
  V

The CIW Web Security Associate course teaches you how to secure your network from unauthorized activity. This course teaches you about security principles, such as establishing an effective security policy, and about the different types of hacker activities that you are most likely to encounter. Individuals with these security skills can pursue or advance careers in many aspects of online and network security.

The CIW Web Security Associate course prepares candidates to take the CIW Web Security Associate exam.

CIW Web Security Associate (Certificate)

Course Format: Classroom
School/Trainer: GTC Economic Development and Corporate Training
Training Center(s)/Venue(s): Greenville, Simpsonville, Taylors, United States
  V

Web Security Associate teaches you how to secure your network from unauthorized activity. This course teaches you about security principles, such as establishing an effective security policy, and about the different types of hacker activities that you are most likely to encounter.

This course identifies security principles and techniques that enable you to stop a hacker by understanding how to implement access control lists, operating system hardening and firewall technology. It also teaches you how to personalize your network security system so you can create a solution that adheres to universal principles, but also conforms to your business needs in responding to specific hacker attacks.

You will learn about authentication procedures, encryption standards and implementations that help ensure proper user authentication. You will also learn about the specific ports and protocols that hackers manipulate, and about direct and indirect ways to protect your network operating systems. Finally, you will learn how to respond to and report hacker activity, engage in proactive detection, and always keep your company&,#146,s needs in mind.

CISM Certified Information Security Manager

Course Format: Classroom
School/Trainer: GTC Economic Development and Corporate Training
Training Center(s)/Venue(s): Greenville, Simpsonville, Taylors, United States
  V

The Certified Information Security Manager (CISM) certification program was developed by ISACA to start or develop individuals careers as security managers. Once certified the CISM qualifies students to design, manage, asses and oversee an enterprise’s information security infrastructure. IT Security is without question one of the hottest and most lucrative areas of Information Technology today and the CISM is one of the most valued credentials in the marketplace. This Technology Institute course promotes international practices and provides management with assurance that those earning this designation have the necessary knowledge and experience to provide effective security management. This course trains students for a position in Risk Management, Security Auditor, Compliance Officer or an executive management position as a CSO, CTO or CIO.

CISSP (Certificate)

Course Format: Classroom
School/Trainer: GTC Economic Development and Corporate Training
Training Center(s)/Venue(s): Greenville, Simpsonville, Taylors, United States
  V

Topics Covered: 1.Program Introduction
2.Domain Overview
3.Physical Security
4.Physical Security Concerns
5.Fire Control and Personnel Control
6.Perimeter Security
7.Access Control
8.Authorization
9.Management
10.Intrusion Detection
11.Cryptography
12.Symmetrics Encryption
13.Asymmetric Encryption
14.Hashing and Cryptosystems
15.Cryptanalysis
16.Security Models and Architecture
17.Computer Architecture
18.Memory Management
19.Operating System Architecture
20.Security Models
21.System Evaluation Methods
22.Threats
23.Telecom and Net Security
24.The OSI Model
25.TCP/IP Model
26.Ethernet
27.Networking Technologies
28.Network Infrastructure Communication
29.Law, Investigation, and Ethics
30.Legal System
31.Ethics
32.Computer Crimes
33.Evidence and Forensics
34.Business Continuity and Disaster Recovery
35.Planning Process
36.Recovery
37.Application and System Development
38.Applications and Security
39.Database Management
40.The Systems Developmen... [Read More]

Security+ (Certificate)

Course Format: Classroom
School/Trainer: GTC Economic Development and Corporate Training
Training Center(s)/Venue(s): Greenville, Simpsonville, Taylors, United States
  V

CompTIA&,#146,s Security+ is a vendor-neutral certification that validates the competency of security professionals working in the IT industry. The Security+ Certification confirms a technician&,#146,s critical knowledge of communication security, infrastructure security, cryptography, operational security, and general security concepts. Because human error is the number one cause for a network security breach, CompTIA Security+ is recognized by the technology community as a valuable credential that proves competency with information security.

The CompTIA Security+ Certification Training Course measures the necessary competencies for an IT professional with approximately two years networking experience. Students will learn the knowledge and skills needed to protect your business from the theft or destruction of information or disruption of communication.

This training course follows the CompTIA authorized curriculum, ensuring you receive the training and knowledge needed to succeed.

This course includes FREE access for 12 months to a cloud based lab platform to assist students develop the practical information technology (IT) skills ... [Read More]

Internet and Firewall Security

Course Format: Classroom
School/Trainer: Greenville Technical College
Training Center(s)/Venue(s): Greenville, Simpsonville, Taylors, United States

This course is an introduction to firewalls and other network security components that can work together to create an in-depth defensive perimeter around a local area network (LAN).

Pages: 1 2 3 4 5 6 ...


Find Security training courses, certificates, diplomas and degrees in Countries:



Australia - Canada - India - Indonesia - Ireland - Malaysia - New Zealand
Pakistan - Philippines - Singapore - South Africa - United Arab Emirates
United Kingdom - United States



Tips:
Try the search form on top of each page to find the latest course information, using course topic and location as keywords. Keep the course topic keyword short to get more results.



- Other Topics -
- Online/E-learning -
Security
Ask for Training
Add Courses