Calendar

Jan
14
Mon
2019
VoIP Security Training Bootcamp @ Reston/Dulles - Instructor-led/Online EST
Jan 14 @ 8:30 am – Jan 16 @ 5:00 pm

Introduction

VoIP Security Training Bootcamp In-Depth Course with Intensive Hands-on Labs

VoIP Security training Bootcamp course is planned and designed to provide the participants with a detailed technical perspective on VoIP security and its underlying technology and protocol enablers. The VoIP Security Training bootcamp course covers specifics on how to properly assess, audit and mitigate your security risks.

Objectives

After completing this VoIP Security Training Bootcamp course, attendees will be able to:

• Understand VoIP
• Learn VoIP security issues
• Identify VoIP security features
• Understand the threats and security holes with VoIP call control protocols H.323, SIP, and MGCP
• Identify SIP Security Features and learn how to configure and administer those features
• Learn H.323 security issues including Port usage risk, firewall inspection, and NAT configurations
• Examine VoIP best practices to support risk mitigation
• Examine VoIP management tools and best practices to support risk mitigation
• Learn how NAT and Firewalls impact call setup, media streams, latency, and application level gateway
• Understand SIP NAT Traversal
• Examine how to overcome NAT issues using STUN, TURN, and ICE
• Examine cryptographic protocols, Datagram Transport Layer Security (DTLS) protocol, Secure Real-time Transport Protocol (SRTP) protocol and Session Description Protocol Security Descriptions (SDES) protocol


 
SHARE.

Feb
11
Mon
2019
VoIP Security Training Bootcamp @ Reston/Dulles - Instructor-led/Online EST
Feb 11 @ 8:30 am – Feb 13 @ 5:00 pm

Introduction

VoIP Security Training Bootcamp In-Depth Course with Intensive Hands-on Labs

VoIP Security training Bootcamp course is planned and designed to provide the participants with a detailed technical perspective on VoIP security and its underlying technology and protocol enablers. The VoIP Security Training bootcamp course covers specifics on how to properly assess, audit and mitigate your security risks.

Objectives

After completing this VoIP Security Training Bootcamp course, attendees will be able to:

• Understand VoIP
• Learn VoIP security issues
• Identify VoIP security features
• Understand the threats and security holes with VoIP call control protocols H.323, SIP, and MGCP
• Identify SIP Security Features and learn how to configure and administer those features
• Learn H.323 security issues including Port usage risk, firewall inspection, and NAT configurations
• Examine VoIP best practices to support risk mitigation
• Examine VoIP management tools and best practices to support risk mitigation
• Learn how NAT and Firewalls impact call setup, media streams, latency, and application level gateway
• Understand SIP NAT Traversal
• Examine how to overcome NAT issues using STUN, TURN, and ICE
• Examine cryptographic protocols, Datagram Transport Layer Security (DTLS) protocol, Secure Real-time Transport Protocol (SRTP) protocol and Session Description Protocol Security Descriptions (SDES) protocol


 
SHARE.

Feb
18
Mon
2019
Introduction to Cyber Security Training Bootcamp @ Reston/Dulles - Instructor-led/Online EST
Feb 18 @ 8:30 am – Feb 22 @ 5:00 pm

Introduction

Introduction to Cyber Security Training Bootcamp course with hands-on labs

Our lives depend on online services. Gain essential cyber security knowledge and skills, to help protect your digital life!

Introduction to Cyber Security Training Bootcamp Course, With billions of devices now online, new threats pop-up every second. Today’s interconnected world makes everyone more susceptible to cyber-attacks. Whether you’re attracted to the relativity new world of cybersecurity as a professional, or just interested in protecting yourself online and in social media, this Introduction to Cyber Security Training Bootcamp course is the answer.

Objectives

After completing this Introduction to Cyber Security Training Bootcamp course, attendees will be able to:

Upon completing this Introduction to Cyber Security Training Bootcamp course, learners will be able to meet these objectives:

• Communicate with confidence regarding information security topics, terms, and concepts
• Understand and apply the Principles of Least Privilege
• Understand and apply the Confidentiality, Integrity, and Availability (CIA) Triad
• Build better passwords that are more secure while also being easier to remember and type
• Grasp basic cryptographic principles, processes, procedures, and applications
• Understand computer network basics
• Have a fundamental grasp of any number of critical technical networking acronyms, including TCP/IP, IP, TCP, UDP, MAC, ARP, NAT, ICMP, and DNS
• Utilize built-in Windows tools to see your network settings
• Recognize and be able to discuss various security technologies, including anti-malware, firewalls, and intrusion detection systems, content filters, sniffers, etc.
• Build a simple, but fully functional firewall configuration
• Secure your browser using a variety of security plug-ins
• Secure a wireless access point (also known as a wireless router)
• Scan for malware, clean malware from a system, and whitelist legitimate software identified by an anti-malware scanner as "potentially unwanted".
• Access a number of websites to better understand password security, encryption, phishing, browser security, etc.


 
SHARE.

Feb
25
Mon
2019
Security Essentials Training @ Reston/Dulles - Instructor-led/Online EST
Feb 25 @ 8:30 am – Mar 1 @ 5:00 pm

Introduction

"Prevention is Ideal but Detection is a Must." Security Essentials Training Course Hands-on

Security Essentials Training is focused on teaching you the essential information security skills and techniques you need to protect and secure your organization's critical information assets and business systems. Our Security Essentials Training course will show you how to prevent your organization's security problems from being headline news in the Wall Street Journal!

Objectives

After completing this Security Essentials Training course, attendees will be able to:

• Apply what you learned directly to your job when you go back to work
• Design and build a network architecture using VLANs, NAC, and 802.1x based on advanced persistent threat indicators of compromise
• Run Windows command line tools to analyze the system looking for high-risk items
• Run Linux command line tools (ps, ls, netstat, etc.) and basic scripting to automate the running of programs to perform continuous monitoring of various tools
• Install VMWare and create virtual machines to create a virtual lab to test and evaluate tools/security of systems
• Create an effective policy that can be enforced within an organization and design a checklist to validate security and create metrics to tie into training and awareness
• Identify visible weaknesses of a system using various tools and, once vulnerabilities are discovered, cover ways to configure the system to be more secure
• Build a network visibility map that can be used for hardening of a network - validating the attack surface and covering ways to reduce that surface by hardening and patching
• Sniff open protocols like telnet and ftp and determine the content, passwords, and vulnerabilities using WireShark.


 
SHARE.

Apr
1
Mon
2019
VoIP Security Training Bootcamp @ Reston/Dulles - Instructor-led/Online EST
Apr 1 @ 8:30 am – Apr 3 @ 5:00 pm

Introduction

VoIP Security Training Bootcamp In-Depth Course with Intensive Hands-on Labs

VoIP Security training Bootcamp course is planned and designed to provide the participants with a detailed technical perspective on VoIP security and its underlying technology and protocol enablers. The VoIP Security Training bootcamp course covers specifics on how to properly assess, audit and mitigate your security risks.

Objectives

After completing this VoIP Security Training Bootcamp course, attendees will be able to:

• Understand VoIP
• Learn VoIP security issues
• Identify VoIP security features
• Understand the threats and security holes with VoIP call control protocols H.323, SIP, and MGCP
• Identify SIP Security Features and learn how to configure and administer those features
• Learn H.323 security issues including Port usage risk, firewall inspection, and NAT configurations
• Examine VoIP best practices to support risk mitigation
• Examine VoIP management tools and best practices to support risk mitigation
• Learn how NAT and Firewalls impact call setup, media streams, latency, and application level gateway
• Understand SIP NAT Traversal
• Examine how to overcome NAT issues using STUN, TURN, and ICE
• Examine cryptographic protocols, Datagram Transport Layer Security (DTLS) protocol, Secure Real-time Transport Protocol (SRTP) protocol and Session Description Protocol Security Descriptions (SDES) protocol


 
SHARE.

Apr
8
Mon
2019
Introduction to Cyber Security Training Bootcamp @ Dallas - Instructor-led/Online CST
Apr 8 @ 8:30 am – Apr 12 @ 5:00 pm

Introduction

Introduction to Cyber Security Training Bootcamp course with hands-on labs

Our lives depend on online services. Gain essential cyber security knowledge and skills, to help protect your digital life!

Introduction to Cyber Security Training Bootcamp Course, With billions of devices now online, new threats pop-up every second. Today’s interconnected world makes everyone more susceptible to cyber-attacks. Whether you’re attracted to the relativity new world of cybersecurity as a professional, or just interested in protecting yourself online and in social media, this Introduction to Cyber Security Training Bootcamp course is the answer.

Objectives

After completing this Introduction to Cyber Security Training Bootcamp course, attendees will be able to:

Upon completing this Introduction to Cyber Security Training Bootcamp course, learners will be able to meet these objectives:

• Communicate with confidence regarding information security topics, terms, and concepts
• Understand and apply the Principles of Least Privilege
• Understand and apply the Confidentiality, Integrity, and Availability (CIA) Triad
• Build better passwords that are more secure while also being easier to remember and type
• Grasp basic cryptographic principles, processes, procedures, and applications
• Understand computer network basics
• Have a fundamental grasp of any number of critical technical networking acronyms, including TCP/IP, IP, TCP, UDP, MAC, ARP, NAT, ICMP, and DNS
• Utilize built-in Windows tools to see your network settings
• Recognize and be able to discuss various security technologies, including anti-malware, firewalls, and intrusion detection systems, content filters, sniffers, etc.
• Build a simple, but fully functional firewall configuration
• Secure your browser using a variety of security plug-ins
• Secure a wireless access point (also known as a wireless router)
• Scan for malware, clean malware from a system, and whitelist legitimate software identified by an anti-malware scanner as "potentially unwanted".
• Access a number of websites to better understand password security, encryption, phishing, browser security, etc.


 
SHARE.

Security Essentials Training @ Atlanta - Instructor-led/Online EST
Apr 8 @ 8:30 am – Apr 12 @ 5:00 pm

Introduction

"Prevention is Ideal but Detection is a Must." Security Essentials Training Course Hands-on

Security Essentials Training is focused on teaching you the essential information security skills and techniques you need to protect and secure your organization's critical information assets and business systems. Our Security Essentials Training course will show you how to prevent your organization's security problems from being headline news in the Wall Street Journal!

Objectives

After completing this Security Essentials Training course, attendees will be able to:

• Apply what you learned directly to your job when you go back to work
• Design and build a network architecture using VLANs, NAC, and 802.1x based on advanced persistent threat indicators of compromise
• Run Windows command line tools to analyze the system looking for high-risk items
• Run Linux command line tools (ps, ls, netstat, etc.) and basic scripting to automate the running of programs to perform continuous monitoring of various tools
• Install VMWare and create virtual machines to create a virtual lab to test and evaluate tools/security of systems
• Create an effective policy that can be enforced within an organization and design a checklist to validate security and create metrics to tie into training and awareness
• Identify visible weaknesses of a system using various tools and, once vulnerabilities are discovered, cover ways to configure the system to be more secure
• Build a network visibility map that can be used for hardening of a network - validating the attack surface and covering ways to reduce that surface by hardening and patching
• Sniff open protocols like telnet and ftp and determine the content, passwords, and vulnerabilities using WireShark.


 
SHARE.

Jun
3
Mon
2019
Security Essentials Training @ Reston/Dulles - Instructor-led/Online EST
Jun 3 @ 8:30 am – Jun 7 @ 5:00 pm

Introduction

"Prevention is Ideal but Detection is a Must." Security Essentials Training Course Hands-on

Security Essentials Training is focused on teaching you the essential information security skills and techniques you need to protect and secure your organization's critical information assets and business systems. Our Security Essentials Training course will show you how to prevent your organization's security problems from being headline news in the Wall Street Journal!

Objectives

After completing this Security Essentials Training course, attendees will be able to:

• Apply what you learned directly to your job when you go back to work
• Design and build a network architecture using VLANs, NAC, and 802.1x based on advanced persistent threat indicators of compromise
• Run Windows command line tools to analyze the system looking for high-risk items
• Run Linux command line tools (ps, ls, netstat, etc.) and basic scripting to automate the running of programs to perform continuous monitoring of various tools
• Install VMWare and create virtual machines to create a virtual lab to test and evaluate tools/security of systems
• Create an effective policy that can be enforced within an organization and design a checklist to validate security and create metrics to tie into training and awareness
• Identify visible weaknesses of a system using various tools and, once vulnerabilities are discovered, cover ways to configure the system to be more secure
• Build a network visibility map that can be used for hardening of a network - validating the attack surface and covering ways to reduce that surface by hardening and patching
• Sniff open protocols like telnet and ftp and determine the content, passwords, and vulnerabilities using WireShark.


 
SHARE.

Jun
10
Mon
2019
Introduction to Cyber Security Training Bootcamp @ San Diego - Instructor-led/Online PST
Jun 10 @ 8:30 am – Jun 14 @ 5:00 pm

Introduction

Introduction to Cyber Security Training Bootcamp course with hands-on labs

Our lives depend on online services. Gain essential cyber security knowledge and skills, to help protect your digital life!

Introduction to Cyber Security Training Bootcamp Course, With billions of devices now online, new threats pop-up every second. Today’s interconnected world makes everyone more susceptible to cyber-attacks. Whether you’re attracted to the relativity new world of cybersecurity as a professional, or just interested in protecting yourself online and in social media, this Introduction to Cyber Security Training Bootcamp course is the answer.

Objectives

After completing this Introduction to Cyber Security Training Bootcamp course, attendees will be able to:

Upon completing this Introduction to Cyber Security Training Bootcamp course, learners will be able to meet these objectives:

• Communicate with confidence regarding information security topics, terms, and concepts
• Understand and apply the Principles of Least Privilege
• Understand and apply the Confidentiality, Integrity, and Availability (CIA) Triad
• Build better passwords that are more secure while also being easier to remember and type
• Grasp basic cryptographic principles, processes, procedures, and applications
• Understand computer network basics
• Have a fundamental grasp of any number of critical technical networking acronyms, including TCP/IP, IP, TCP, UDP, MAC, ARP, NAT, ICMP, and DNS
• Utilize built-in Windows tools to see your network settings
• Recognize and be able to discuss various security technologies, including anti-malware, firewalls, and intrusion detection systems, content filters, sniffers, etc.
• Build a simple, but fully functional firewall configuration
• Secure your browser using a variety of security plug-ins
• Secure a wireless access point (also known as a wireless router)
• Scan for malware, clean malware from a system, and whitelist legitimate software identified by an anti-malware scanner as "potentially unwanted".
• Access a number of websites to better understand password security, encryption, phishing, browser security, etc.


 
SHARE.

Jun
17
Mon
2019
VoIP Security Training Bootcamp @ Reston/Dulles - Instructor-led/Online EST
Jun 17 @ 8:30 am – Jun 19 @ 5:00 pm

Introduction

VoIP Security Training Bootcamp In-Depth Course with Intensive Hands-on Labs

VoIP Security training Bootcamp course is planned and designed to provide the participants with a detailed technical perspective on VoIP security and its underlying technology and protocol enablers. The VoIP Security Training bootcamp course covers specifics on how to properly assess, audit and mitigate your security risks.

Objectives

After completing this VoIP Security Training Bootcamp course, attendees will be able to:

• Understand VoIP
• Learn VoIP security issues
• Identify VoIP security features
• Understand the threats and security holes with VoIP call control protocols H.323, SIP, and MGCP
• Identify SIP Security Features and learn how to configure and administer those features
• Learn H.323 security issues including Port usage risk, firewall inspection, and NAT configurations
• Examine VoIP best practices to support risk mitigation
• Examine VoIP management tools and best practices to support risk mitigation
• Learn how NAT and Firewalls impact call setup, media streams, latency, and application level gateway
• Understand SIP NAT Traversal
• Examine how to overcome NAT issues using STUN, TURN, and ICE
• Examine cryptographic protocols, Datagram Transport Layer Security (DTLS) protocol, Secure Real-time Transport Protocol (SRTP) protocol and Session Description Protocol Security Descriptions (SDES) protocol


 
SHARE.

0