Calendar

May
20
Mon
2019
ICS Security Training and SCADA Systems Security Training Bootcamp @ Denver - Instructor-led/Online CST
May 20 @ 8:30 am – May 24 @ 5:00 pm

ICS Security Training and SCADA Systems Security Training Bootcamp

ICS Security Training and SCADA Systems Security Training Bootcamp Course with Intensive Hands-on Labs

This ICS Security Training and SCADA Systems Security Training bootcamp Course covers everything from field based attacks to automated vulnerability assessments for SCADA networks. Learn the best practices for security SCADA networks and systems inside and out. ENO shows you how to defend against both internal and external attackers to provide holistic security for critical industrial automation systems.

ICS Security Training and SCADA Systems Security Training - Objectives

Upon completing this ICS Security Training and SCADA Systems Security Training course, learners will be able to meet these objectives:

• Better understand various industrial control systems and their purpose, application, function, and dependencies on network IP and industrial communications
• Work with control network infrastructure design (network architecture concepts, including topology, protocols, and components) and their relation to IEC 62443 and the Perdue Model.
• Run Windows command line tools to analyze the system looking for high-risk items
• Run Linux command line tools (ps, ls, netstat, ect) and basic scripting to automate the running of programs to perform continuous monitoring of various tools
• Work with operating systems (system administration concepts for Unix/Linux and/or Windows operating systems)
• Better understand the systems’ security lifecycle
• Better understand information assurance principles and tenets (confidentiality, integrity, availability, authentication, non-repudiation)
• Use your skills in computer network defense (detecting host and network-based intrusions via intrusion detection technologies)
• Implement incident response and handling methodologies
• Map different ICS technologies, attacks, and defenses to various cybersecurity standards including NIST Cyber Security Framework, ISA/IEC 62443, ISO/IEC 27001, NIST SP 800-53, Center for Internet Security Critical Security Controls, and COBIT 5


 
SHARE

May
27
Mon
2019
Windows Exploitation and Analysis Training (WEA) Bootcamp @ Reston/Dulles - Instructor-led/Online EST
May 27 @ 8:30 am – May 31 @ 5:00 pm

Windows Exploitation and Analysis Training (WEA) Bootcamp - Introduction

Windows Exploitation and Analysis Training (WEA) Course with hands-on labs

This five-days Windows Exploitation and Analysis Training (WEA) Bootcamp teaches the essentials of remote network exploitation to help students develop strategies to protect and defend their networks and critical information. Students learn how to analyze remote Windows networks, locate user credentials, and expand their access across a network.

Windows Exploitation and Analysis Training (WEA) Bootcamp provides an in-depth look at the essentials of remote network exploitation, from scanning and enumeration of a network space to performing client-side attacks. This Windows Exploitation and Analysis Training (WEA) Bootcamp course is for computer network professionals, software developers, and security professionals who are responsible for protecting Windows networks and data from threats.

Windows Exploitation and Analysis Training (WEA) Bootcamp - Objectives

After completing this Windows Exploitation and Analysis Training (WEA) Bootcamp Course, attendees will be able to:

• Apply open source tools (Metasploit and Armitage) to identify key target information
• Documenting data in a target template
• Analyze and interpret research data to determine an operational strategy
• Craft and deploy phishing emails to obtain target browser data
• Explore techniques associated with collecting data and expanding access


 
SHARE

Jun
3
Mon
2019
Certified Information Privacy Professional and Technologist Training Bootcamp (CIPP/US, CIPT) @ Reston/Dulles - Instructor-led/Online EST
Jun 3 @ 8:30 am – Jun 5 @ 5:00 pm

Certified Information Privacy Professional and Technologist Training Bootcamp (CIPP/US, CIPT)

Certified Information Privacy Professional and Technologist Training (CIPP/US, CIPT) Course with Intensive Hands-on Labs

Learn the principles of information privacy and privacy in technology while preparing for the CIPP/US and CIPT examinations.

In this Certified Information Privacy Professional and Technologist Training (CIPP/US, CIPT) course, you will gain foundational knowledge on concepts of privacy and data protection laws and practice. You will learn common principles and approaches to privacy as well as understand the major privacy models employed around the globe. An introduction to information security concepts and information security management and governance will be covered including frameworks, controls, and identity and access management. You will also learn about online privacy as it relates to using personal information on websites and other Internet-related technologies.

The structure of US law, the enforcement of US privacy and security laws, and information management from a US perspective will be discussed as well as the limitations on private-sector collection and usage of data. This Certified Information Privacy Professional and Technologist Training (CIPP/US, CIPT) course will also provide an introduction to workplace privacy considerations and US state laws related to marketing, financial data, data security and breach notification.

This three-day Certified Information Privacy Professional and Technologist Training (CIPP/US, CIPT) program covering the principals of information privacy and privacy technology in the US private-sector includes:

• Official IAPP CIPP and CIPT participant guides
• Official IAPP CIPP textbook and CIPT textbooks ("Introduction to IT Privacy" and "Privacy in Technology")
• Official IAPP CIPP and CIPT practice tests
• IAPP CIPP/US and CIPT certification exam vouchers
• IAPP membership for one year

Certified Information Privacy Professional and Technologist Training (CIPP/US, CIPT) - Objectives

After completing this Certified Information Privacy Professional and Technologist Training (CIPP/US, CIPT) course, attendees will be able to:

• Common principles and approaches to privacy
• Jurisdictions and industries
• Safeguarding personal information
• Online privacy
• US privacy environment
• Private-sector collection and data usage limitations
• Workplace privacy
• State privacy laws
• Regulations and standards impacting privacy in IT
• Privacy in systems and applications
• Online privacy issues
• De-identifying and anonymizing personally identifiable information
• Cloud computing


 
SHARE.

Security Essentials Training Bootcamp @ Reston/Dulles - Instructor-led/Online EST
Jun 3 @ 8:30 am – Jun 7 @ 5:00 pm

Security Essentials Training Bootcamp

"Prevention is Ideal but Detection is a Must." Security Essentials Training Course Hands-on

Security Essentials Training is focused on teaching you the essential information security skills and techniques you need to protect and secure your organization's critical information assets and business systems. Our Security Essentials Training course will show you how to prevent your organization's security problems from being headline news in the Wall Street Journal!

Security Essentials Training Bootcamp - Objectives

After completing this Security Essentials Training course, attendees will be able to:

• Apply what you learned directly to your job when you go back to work
• Design and build a network architecture using VLANs, NAC, and 802.1x based on advanced persistent threat indicators of compromise
• Run Windows command line tools to analyze the system looking for high-risk items
• Run Linux command line tools (ps, ls, netstat, etc.) and basic scripting to automate the running of programs to perform continuous monitoring of various tools
• Install VMWare and create virtual machines to create a virtual lab to test and evaluate tools/security of systems
• Create an effective policy that can be enforced within an organization and design a checklist to validate security and create metrics to tie into training and awareness
• Identify visible weaknesses of a system using various tools and, once vulnerabilities are discovered, cover ways to configure the system to be more secure
• Build a network visibility map that can be used for hardening of a network - validating the attack surface and covering ways to reduce that surface by hardening and patching
• Sniff open protocols like telnet and ftp and determine the content, passwords, and vulnerabilities using WireShark.


 
SHARE.

Jun
10
Mon
2019
CISA Certification Training Bootcamp @ Reston/Dulles - Instructor-led/Online EST
Jun 10 @ 8:30 am – Jun 13 @ 5:00 pm

CISA Certification Training Bootcamp

CISA Certification Training Bootcamp or Certified Information Systems Auditor Training Course Hands-on

In this CISA Certification Training Bootcamp or Certified Information Systems Auditor Training course, you'll cover all five domains of the Certified Information Systems Auditor (CISA) exam and gain the knowledge and technical concepts required to obtain CISA certification. Since its inception in 1978, the CISA exam has become the gold standard of excellence in IS auditing, control, and security. Our experts have created a study guide of relevant, up-to-date information, including summary charts, insightful data, and practice exams. Along with our custom course material, you will receive a free copy of the CISA Review Manual 2013.

This CISA Certification Training Bootcamp or Certified Information Systems Auditor Training course can be a component of our 8570.1 Training Solution that can also include assessments, certification preparation and program management, post training and testing, 8570 compliancy tracking and reporting, and continuing education. Learn more about our 8570 Training Solution by contacting us at 1-888-DOD-8570.

CISA Certification Training Bootcamp - Objectives

This official CISA Certification Training Bootcamp seminar has a total of seven primary sections. All seven sections will collectively help you prepare for the CISA certification exam while also enhancing your overall competencies in auditing, controlling, monitoring and assessing information technology and business systems. The seven primary sections you will cover are the following:

• General Information Regarding the Exam
• CISA Domain 1: The Process of Auditing Information Systems
• CISA Domain 2: Governance and Management of IT
• CISA Domain 3: Information Systems Acquisition, Development, and Implementation
• CISA Domain 4: Information Systems Operations, Maintenance and Service Management
• CISA Domain 5: Protection of Information Assets
• Exam Practice / Preparation (Sample Exam)

Participants in the CISA Certification Training Bootcamp program will be provided instruction designed to provide the following:

• An understanding of the format and structure of the CISA certification exam.
• A knowledge of the various topics and technical areas covered by the exam.
• Practice with specific strategies, tips, and techniques for taking and passing the exam.
• Opportunities to execute practice questions with debriefs of answers.


 
SHARE

CISM Certification Training Bootcamp @ Atlanta - Instructor-led/Online EST
Jun 10 @ 8:30 am – Jun 13 @ 5:00 pm

CISM Certification Training Bootcamp

The CISM Certification Training Bootcamp program is an intensive four-day review program to prepare individuals who are planning to sit for the Certified Information Security Manager (CISM) exam issued by ISACA. CISM students will focus on the key exam topics covered in the CISM Review Manual 15th Edition and participate in class lectures, group discussions/activities, exam practice and answer debriefs. The CISM Certification Training Bootcamp course is intended for individuals with familiarity with and experience in information security management.

This CISM Certification Training Bootcamp course is packed with study tips and practical information, making it a great resource for the student who is planning to sit for the CISM certification exam. Aside from helping students prepare for the CISM exam, this CISM Certification Training Bootcamp or Certified Information Security Manager course will directly help those aspiring to become managers or key figures in the information security industry. For instance, students who attend this course can expect to develop a core fundamental understanding of information security as a whole, along with the relationship between information security programs and broader business goals or objectives.

CISM Certification Training Bootcamp - Objectives

This official CISM Certification Training Bootcamp seminar has a total of six primary sections. All six sections will collectively help you prepare for the CISM certification exam while also enhance your overall competencies in information security management. The six primary sections you will cover are the following:

• CISM Domain 1: Information Security Governance
• CISM Domain 2: Information Risk Management
• CISM Domain 3: Information Security Program Development and Management
• CISM Domain 4: Information Security Incident Management

Participants in the CISM training program will be provided instruction designed to provide the following:

• An understanding of the format and structure of the CISM certification exam.
• A knowledge of the various topics and technical areas covered by the exam.
• Practice with specific strategies, tips, and techniques for taking and passing the exam.
• Opportunities to execute practice questions with debriefs of answers.


 
SHARE

Introduction to Cyber Security Training Bootcamp @ San Diego - Instructor-led/Online PST
Jun 10 @ 8:30 am – Jun 14 @ 5:00 pm

Introduction to Cyber Security Training Bootcamp

Introduction to Cyber Security Training Bootcamp course with hands-on labs

Our lives depend on online services. Gain essential cyber security knowledge and skills, to help protect your digital life!

Introduction to Cyber Security Training Bootcamp Course, With billions of devices now online, new threats pop-up every second. Today’s interconnected world makes everyone more susceptible to cyber-attacks. Whether you’re attracted to the relativity new world of cybersecurity as a professional, or just interested in protecting yourself online and in social media, this Introduction to Cyber Security Training Bootcamp course is the answer.

Introduction to Cyber Security Training Bootcamp - Objectives

After completing this Introduction to Cyber Security Training Bootcamp course, attendees will be able to:

Upon completing this Introduction to Cyber Security Training Bootcamp course, learners will be able to meet these objectives:

• Communicate with confidence regarding information security topics, terms, and concepts
• Understand and apply the Principles of Least Privilege
• Understand and apply the Confidentiality, Integrity, and Availability (CIA) Triad
• Build better passwords that are more secure while also being easier to remember and type
• Grasp basic cryptographic principles, processes, procedures, and applications
• Understand computer network basics
• Have a fundamental grasp of any number of critical technical networking acronyms, including TCP/IP, IP, TCP, UDP, MAC, ARP, NAT, ICMP, and DNS
• Utilize built-in Windows tools to see your network settings
• Recognize and be able to discuss various security technologies, including anti-malware, firewalls, and intrusion detection systems, content filters, sniffers, etc.
• Build a simple, but fully functional firewall configuration
• Secure your browser using a variety of security plug-ins
• Secure a wireless access point (also known as a wireless router)
• Scan for malware, clean malware from a system, and whitelist legitimate software identified by an anti-malware scanner as "potentially unwanted".
• Access a number of websites to better understand password security, encryption, phishing, browser security, etc.


 
SHARE.

Jun
17
Mon
2019
CAP Certification Training Bootcamp @ Reston/Dulles - Instructor-led/Online EST
Jun 17 @ 8:30 am – Jun 19 @ 5:00 pm

CAP Certification Training Bootcamp

CAP Certification Training Bootcamp or Certified Authorization Professional Training Course Hands-on

Gain the knowledge and skills needed to accurately and effectively apply cost-effective and appropriate security controls based on risk and best practices with this CAP Certification Training Bootcamp or Certified Authorization Professional Training.

CAP Certification Training Bootcamp; Achieving Certified Authorization Professional (CAP) certification validates your qualifications, skills, and experience in applying, assessing, and maintaining information system security using the new National Institute of Standards and Technology (NIST) Risk Management Framework (RMF). On the path to CAP certification, you will gain the knowledge and skills needed to accurately and effectively apply cost-effective and appropriate security controls based on risk and best practices. The CAP certification is accepted by private and government sectors, and in some organizations, it is required for specific jobs (i.e., DoD Directive 8570).

In this CAP Certification Training Bootcamp or Certified Authorization Professional Training course, you will gain an understanding of the new authorization process and prepare for the CAP certification exam, based on the new SP 800-37 process and the new (ISC)2 Common Body of Knowledge (CBK).

CAP Certification Training Bootcamp - Objectives

The goal of the CAP Certification Training Bootcamp or Certified Authorization Professional Training course is to prepare professionals for the challenging CAP exam by covering the objectives of the exam as defined in the (ISC2) common body of knowledge. CAP certification candidates are expected to have a broad range of skills across certification and accreditation concepts and functions. Our CAP Certification Training Bootcamp program will provide you with a quick and proven method for mastering this huge range of knowledge.

After completing this CAP Certification Training Bootcamp course, attendees will be able to:

• New processes and concepts, including:
• Authorization process (NIST SP 800-37, revision 1)
• Risk assessment process (NIST SP 800-30)
• Risk Management Framework (NIST SP 800-39)
• Incident response and contingency planning (NIST SP 800-65 and SP 800-34)
• Information System Continuous Monitoring(NIST SP 800-53A SP 800-137)
• Individual and organization (Office of Management and Budget, Department of Homeland Security, NIST, and National Security Agency) roles, responsibilities, requirements, and reports
• CAP certification exam preparation
• Common, system-specific, hybrid, and compensating controls
• CyberScope and CyberStat
• Security Content Automation Protocol (SCAP) and methods for media sanitization
• Effective strategies for process implementation and test-taking


 
SHARE

CASP+ Certification Training Bootcamp @ Denver - Instructor-led/Online CST
Jun 17 @ 8:30 am – Jun 21 @ 5:00 pm

CASP+ Certification Training Bootcamp

CASP+ Certification Training Bootcamp | CompTIA Advanced Security Practitioner Training Course Hands-on

Learn advanced security administration tools and techniques while preparing for the CASP+ exam (CAS-003) in this hands-on CASP+ Certification Training Bootcamp course

You have experience in the increasingly crucial field of information security, and now you're ready to take that experience to the next level. CASP+ - CompTIA Advanced Security Practitioner (exam CAS-003) is the course you will need to take if your job responsibilities include securing complex enterprise environments. In this CASP+ Certification Training Bootcamp course, you will expand on your knowledge of information security to apply more advanced principles that will keep your organization safe from the many ways it can be threatened.

Today's IT climate demands individuals with demonstrable skills, and the information and activities in this CASP+ Certification Training Bootcamp course can help you develop the skill set you need to confidently perform your duties as an advanced security professional. This CASP+ Certification Training Bootcamp course is designed for IT professionals who want to acquire the technical knowledge and skills needed to conceptualize, engineer, integrate, and implement secure solutions across complex enterprise environments.

CASP+ Certification Training Bootcamp - Objectives

After completing this CASP+ Certification Training Bootcamp course, attendees will be able to:

• Support IT governance in the enterprise with an emphasis on managing risk.
• Leverage collaboration tools and technology to support enterprise security.
• Use research and analysis to secure the enterprise.
• Integrate advanced authentication and authorization techniques.
• Implement cryptographic techniques.
• Implement security controls for hosts.
• Implement security controls for mobile devices.
• Implement network security.
• Implement security in the systems and software development lifecycle.
• Integrate hosts, storage, networks, applications, virtual environments, and cloud technologies in a secure enterprise architecture.
• Conduct security assessments.
• Respond to and recover from security incidents.


 
SHARE

Certified Information Privacy Professional and Manager Training Bundle (CIPP/US, CIPM) @ Reston/Dulles - Instructor-led/Online EST
Jun 17 @ 8:30 am – Jun 19 @ 5:00 pm

Certified Information Privacy Professional and Manager Training Bundle (CIPP/US, CIPM)

Certified Information Privacy Professional and Manager Training Bundle (CIPP/US, CIPM) course with hands-on labs

Learn the principles of information privacy and information privacy management while preparing for the CIPP/US and CIPM examinations.

In this Certified Information Privacy Professional and Manager Training Bundle (CIPP/US, CIPM) course, you will gain foundational knowledge on concepts of privacy and data protection laws and practice. You will learn common principles and approaches to privacy as well as understand the major privacy models employed around the globe. An introduction to information security concepts and information security management and governance will be covered including frameworks, controls, and identity and access management. With Certified Information Privacy Professional and Manager Training Bundle (CIPP/US, CIPM), you will also learn about online privacy as it relates to using personal information on websites and other Internet-related technologies.

The structure of US law, the enforcement of US privacy and security laws, and information management from a US perspective will be discussed as well as the limitations on private-sector collection and usage of data. This Certified Information Privacy Professional and Manager Training Bundle (CIPP/US, CIPM) course will also provide an introduction to workplace privacy considerations and US state laws related to marketing, financial data, data security and breach notification.

This three-day Certified Information Privacy Professional and Manager Training Bundle (CIPP/US, CIPM) program covering the principals of information privacy and privacy management in the US private-sector includes:

• Official IAPP CIPP and CIPM participant guides
• Official IAPP CIPP and CIPM textbooks
• Official IAPP CIPP and CIPM practice tests
• IAPP CIPP/US and CIPM certification exam vouchers
• IAPP membership for one year

Certified Information Privacy Professional and Manager Training Bundle (CIPP/US, CIPM) - Objectives

After completing this Certified Information Privacy Professional and Manager Training Bundle (CIPP/US, CIPM) course, attendees will be able to:

• Common principles and approaches to privacy
• Jurisdictions and industries
• Safeguarding personal information
• Online privacy
• US privacy environment
• Private-sector collection and data usage limitations
• Workplace privacy
• State privacy laws
• Privacy program governance
• Privacy operational life cycle


 
SHARE.

Securing Windows and PowerShell Automation Training Bootcamp @ Reston/Dulles - Instructor-led/Online EST
Jun 17 @ 8:30 am – Jun 21 @ 5:00 pm

Securing Windows and PowerShell Automation Training Bootcamp Course Hands-on

Securing Windows and PowerShell Automation Training Bootcamp; Hackers know how to use PowerShell for evil, do you know how to use it for good? In Securing Windows and PowerShell Automation Training you will learn PowerShell and Windows security hardening at the same time. SecOps requires automation, and Windows automation means PowerShell. You've run a vulnerability scanner and applied patches - now what?

This Securing Windows and PowerShell Automation Training Bootcamp course is designed for systems engineers, security architects, and the Security Operations (SecOps) team. The focus of the Securing Windows and PowerShell Automation Training course is on how to automate the NSA Top 10 Mitigations and the CIS Critical Security Controls related to Windows, especially the ones that are difficult to implement in large environments.

Securing Windows and PowerShell Automation Training Bootcamp - Objectives

After completing this Securing Windows and PowerShell Automation Training Bootcamp Course, attendees will be able to:

• Configure mitigations against attacks such as pass-the-hash, Kerberos golden tickets, Remote Desktop Protocol (RDP) man-in-the-middle, Security Access Token abuse, and other attacks discussed in SEC504 and other SANS hacking courses.
• Execute PowerShell commands on remote systems and begin to write your own PowerShell scripts.
• Harden PowerShell itself against abuse, and enable transcription logging for your SIEM.
• Use Group Policy and PowerShell to grant administrative privileges in a way that reduces the harm if an attack succeeds (assume breach).
• Block hacker lateral movement and malware Command & Control channels using Windows Defender Firewall, IPsec, DNS sinkholes, admin credential protections, and more.
• Prevent exploitation using AppLocker and other Windows OS hardening techniques in a scalable way with PowerShell.
• Configure PowerShell remoting to use Just Enough Admin (JEA) policies to create a Windows version of Linux sudo and setuid root.
• Install and manage a full Windows Public Key Infrastructure (PKI), including smart cards, certificate auto-enrollment, Online Certificate Status Protocol (OCSP) web responders, and detection of spoofed root Certification Authorities (CAs).
• Harden must-have protocols against exploitation, such as SSL/TLS, RDP, DNS, DNSSEC, PowerShell Remoting, and SMB.
• Use PowerShell to access the WMI service for remote command execution, searching event logs, reconnaissance, and more.


 
SHARE

VoIP Security Training Bootcamp @ Reston/Dulles - Instructor-led/Online EST
Jun 17 @ 8:30 am – Jun 19 @ 5:00 pm

VoIP Security Training Bootcamp

VoIP Security Training Bootcamp In-Depth Course with Intensive Hands-on Labs

VoIP Security training Bootcamp course is planned and designed to provide the participants with a detailed technical perspective on VoIP security and its underlying technology and protocol enablers. The VoIP Security Training bootcamp course covers specifics on how to properly assess, audit and mitigate your security risks.

VoIP Security Training Bootcamp - Objectives

After completing this VoIP Security Training Bootcamp course, attendees will be able to:

• Understand VoIP
• Learn VoIP security issues
• Identify VoIP security features
• Understand the threats and security holes with VoIP call control protocols H.323, SIP, and MGCP
• Identify SIP Security Features and learn how to configure and administer those features
• Learn H.323 security issues including Port usage risk, firewall inspection, and NAT configurations
• Examine VoIP best practices to support risk mitigation
• Examine VoIP management tools and best practices to support risk mitigation
• Learn how NAT and Firewalls impact call setup, media streams, latency, and application level gateway
• Understand SIP NAT Traversal
• Examine how to overcome NAT issues using STUN, TURN, and ICE
• Examine cryptographic protocols, Datagram Transport Layer Security (DTLS) protocol, Secure Real-time Transport Protocol (SRTP) protocol and Session Description Protocol Security Descriptions (SDES) protocol


 
SHARE.

Jun
24
Mon
2019
CISSP Certification Training Bootcamp @ Reston/Dulles - Instructor-led/Online EST
Jun 24 @ 8:30 am – Jun 28 @ 5:00 pm

CISSP Certification Training Bootcamp

CISSP Certification Training Bootcamp or Certified Information Systems Security Professional Training Course Hands-on

Gain core knowledge and experience to successfully implement and manage security programs in this official (ISC)2 CISSP Certification Training Bootcamp or Certified Information Systems Security Professional Training course

This CISSP Certification Training Bootcamp course is the most comprehensive review of information security concepts and industry best practices, and covers the eight domains of the official CISSP CBK (Common Body of Knowledge). With CISSP Certification Training Bootcamp, you will gain knowledge in information security that will increase your ability to successfully implement and manage security programs in any organization or government entity.

With CISSP Certification Training Bootcamp, you will learn how to determine who or what may have altered data or system information, potentially affecting the integrity of those asset and match an entity, such as a person or a computer system, with the actions that entity takes against valuable assets, allowing organizations to have a better understanding of the state of their security posture. Policies, concepts, principles, structures, and standards used to establish criteria for the protection of information assets are also covered in this CISSP Certification Training Bootcamp or Certified Information Systems Security Professional Training course.

CISSP Certification Training Bootcamp - Objectives

Our official CISSP Certification Training Bootcamp course reviews the eight CISSP certification domains featured in the (ISC)² Common Body of Knowledge (CBK). Reviewing the CBK will help students successfully prepare for the CISSP exam while also develop their overall competencies in information security.

Additional information on what you can expect to learn while reviewing each domain is found below.

• Domain 1: Security and Risk Management
• Domain 2: Asset Security
• Domain 3: Security Engineering
• Domain 4: Communications and Network Security
• Domain 5: Identity and Access Management
• Domain 6: Security Assessment and Testing
• Domain 7: Security Operations
• Domain 8: Software Development Security


 
SHARE

SSCP Certification Training Bootcamp @ Edison - Instructor-led/Online EST
Jun 24 @ 8:30 am – Jun 28 @ 5:00 pm

SSCP Certification Training Bootcamp

SSCP Training and Certification Training Course with Hands-on Exercises

Learn to implement, monitor and administer IT infrastructure in accordance with information security policies in this official (ISC)2 SSCP Certification Training Bootcamp course

The SSCP Certification Training Bootcamp or Systems Security Certified Practitioner (SSCP) credential and training seminar is ideal for those who require proven technical skills and practical security knowledge in hands-on operational IT roles. More specifically, SSCP will teach you to implement, monitor and administer IT infrastructure in accordance with information security policies and procedures that ensure data confidentiality, integrity and availability.

Led by an (ISC)² authorized instructor, the training and included course material for this official SSCP Certification Training Bootcamp seminar provides students with a comprehensive review of the information security knowledge and skills needed to be successful in IT operational roles. Additionally, this course will also help students successfully prepare for the SSCP exam as it covers all seven domains in the CCSP Common Body of Knowledge (CBK).

SSCP Certification Training Bootcamp - Objectives

This (ISC)² authorized SSCP Certification Training Bootcamp seminar is based on the seven SSCP domains of the (ISC)² Common Body of Knowledge (CBK), ensuring students successfully prepare for the SSCP exam and enhance their overall competencies in cyber security.

• Domain 1: Access Controls
• Domain 2: Security Operations and Administration
• Domain 3: Risk Identification, Monitoring, and Analysis
• Domain 4: Incident Response and Recovery
• Domain 5: Cryptography
• Domain 6: Networks and Communications Security
• Domain 7: Systems and Application Security


 
SHARE

Aug
12
Mon
2019
CSSLP Certification Training Bootcamp @ Denver - Instructor-led/Online EST
Aug 12 @ 8:30 am – Aug 16 @ 5:00 pm

CSSLP Certification Training Bootcamp

CSSLP Certification Training Bootcamp | Certified Secure Software Lifecycle Professional Training Course – Hands-on

Learn the best practices, policies, and procedures to ensure a security initiative across all phases of application development in this official (ISC)2 CSSLP Certification Training Bootcamp or Certified Secure Software Lifecycle Professional Training course.

This CSSLP Certification Training Bootcamp or Certified Secure Software Lifecycle Professional Training course is designed to take you through all aspects of the secure software lifecycle incorporating planning, designing, developing, acquiring, testing, deploying, maintaining, and managing software. With CSSLP Certification Training Bootcamp, you will also learn a series of software methodologies to develop software that is secure and resilient to attacks while meeting software requirements for compliance, quality, functionality and assurance through design principles and processes.

With CSSLP Certification Training Bootcamp or Certified Secure Software Lifecycle Professional Training, participants will gain programming concepts that can effectively protect software from vulnerabilities. You will gain skills to manage risk through the adoption of standards and best practices for the proper development, testing, and learning to employ tools and resources necessary to mitigate risk across the entire lifecycle of products all while preparing for the official (ISC)2 CSSLP exams.

CSSLP Certification Training Bootcamp - Objectives

This (ISC)² authorized CSSLP Certification Training Bootcamp seminar is based on the eight CSSLP domains of the (ISC)² Common Body of Knowledge (CBK), ensuring students successfully prepare for the CSSLP exam and enhancing their overall competencies in secure software development.

• Domain 1: Secure Software Concepts
• Domain 2: Secure Software Requirements
• Domain 3: Secure Software Design
• Domain 4: Secure Software Implementation/Programming
• Domain 5: Secure Software Testing
• Domain 6: Secure Software Lifecycle Management
• Domain 7: Software Deployment, Operations, and Maintenance
• Domain 8: Supply Chain and Software Acquisition


 
SHARE

Aug
19
Mon
2019
CAP Certification Training Bootcamp @ Los Angeles - Instructor-led/Online PST
Aug 19 @ 8:30 am – Aug 21 @ 5:00 pm

CAP Certification Training Bootcamp

CAP Certification Training Bootcamp or Certified Authorization Professional Training Course Hands-on

Gain the knowledge and skills needed to accurately and effectively apply cost-effective and appropriate security controls based on risk and best practices with this CAP Certification Training Bootcamp or Certified Authorization Professional Training.

CAP Certification Training Bootcamp; Achieving Certified Authorization Professional (CAP) certification validates your qualifications, skills, and experience in applying, assessing, and maintaining information system security using the new National Institute of Standards and Technology (NIST) Risk Management Framework (RMF). On the path to CAP certification, you will gain the knowledge and skills needed to accurately and effectively apply cost-effective and appropriate security controls based on risk and best practices. The CAP certification is accepted by private and government sectors, and in some organizations, it is required for specific jobs (i.e., DoD Directive 8570).

In this CAP Certification Training Bootcamp or Certified Authorization Professional Training course, you will gain an understanding of the new authorization process and prepare for the CAP certification exam, based on the new SP 800-37 process and the new (ISC)2 Common Body of Knowledge (CBK).

CAP Certification Training Bootcamp - Objectives

The goal of the CAP Certification Training Bootcamp or Certified Authorization Professional Training course is to prepare professionals for the challenging CAP exam by covering the objectives of the exam as defined in the (ISC2) common body of knowledge. CAP certification candidates are expected to have a broad range of skills across certification and accreditation concepts and functions. Our CAP Certification Training Bootcamp program will provide you with a quick and proven method for mastering this huge range of knowledge.

After completing this CAP Certification Training Bootcamp course, attendees will be able to:

• New processes and concepts, including:
• Authorization process (NIST SP 800-37, revision 1)
• Risk assessment process (NIST SP 800-30)
• Risk Management Framework (NIST SP 800-39)
• Incident response and contingency planning (NIST SP 800-65 and SP 800-34)
• Information System Continuous Monitoring(NIST SP 800-53A SP 800-137)
• Individual and organization (Office of Management and Budget, Department of Homeland Security, NIST, and National Security Agency) roles, responsibilities, requirements, and reports
• CAP certification exam preparation
• Common, system-specific, hybrid, and compensating controls
• CyberScope and CyberStat
• Security Content Automation Protocol (SCAP) and methods for media sanitization
• Effective strategies for process implementation and test-taking


 
SHARE

CASP+ Certification Training Bootcamp @ Los Angeles - Instructor-led/Online PST
Aug 19 @ 8:30 am – Aug 23 @ 5:00 pm

CASP+ Certification Training Bootcamp

CASP+ Certification Training Bootcamp | CompTIA Advanced Security Practitioner Training Course Hands-on

Learn advanced security administration tools and techniques while preparing for the CASP+ exam (CAS-003) in this hands-on CASP+ Certification Training Bootcamp course

You have experience in the increasingly crucial field of information security, and now you're ready to take that experience to the next level. CASP+ - CompTIA Advanced Security Practitioner (exam CAS-003) is the course you will need to take if your job responsibilities include securing complex enterprise environments. In this CASP+ Certification Training Bootcamp course, you will expand on your knowledge of information security to apply more advanced principles that will keep your organization safe from the many ways it can be threatened.

Today's IT climate demands individuals with demonstrable skills, and the information and activities in this CASP+ Certification Training Bootcamp course can help you develop the skill set you need to confidently perform your duties as an advanced security professional. This CASP+ Certification Training Bootcamp course is designed for IT professionals who want to acquire the technical knowledge and skills needed to conceptualize, engineer, integrate, and implement secure solutions across complex enterprise environments.

CASP+ Certification Training Bootcamp - Objectives

After completing this CASP+ Certification Training Bootcamp course, attendees will be able to:

• Support IT governance in the enterprise with an emphasis on managing risk.
• Leverage collaboration tools and technology to support enterprise security.
• Use research and analysis to secure the enterprise.
• Integrate advanced authentication and authorization techniques.
• Implement cryptographic techniques.
• Implement security controls for hosts.
• Implement security controls for mobile devices.
• Implement network security.
• Implement security in the systems and software development lifecycle.
• Integrate hosts, storage, networks, applications, virtual environments, and cloud technologies in a secure enterprise architecture.
• Conduct security assessments.
• Respond to and recover from security incidents.


 
SHARE

CISSP Certification Training Bootcamp @ Reston/Dulles - Instructor-led/Online EST
Aug 19 @ 8:30 am – Aug 23 @ 5:00 pm

CISSP Certification Training Bootcamp

CISSP Certification Training Bootcamp or Certified Information Systems Security Professional Training Course Hands-on

Gain core knowledge and experience to successfully implement and manage security programs in this official (ISC)2 CISSP Certification Training Bootcamp or Certified Information Systems Security Professional Training course

This CISSP Certification Training Bootcamp course is the most comprehensive review of information security concepts and industry best practices, and covers the eight domains of the official CISSP CBK (Common Body of Knowledge). With CISSP Certification Training Bootcamp, you will gain knowledge in information security that will increase your ability to successfully implement and manage security programs in any organization or government entity.

With CISSP Certification Training Bootcamp, you will learn how to determine who or what may have altered data or system information, potentially affecting the integrity of those asset and match an entity, such as a person or a computer system, with the actions that entity takes against valuable assets, allowing organizations to have a better understanding of the state of their security posture. Policies, concepts, principles, structures, and standards used to establish criteria for the protection of information assets are also covered in this CISSP Certification Training Bootcamp or Certified Information Systems Security Professional Training course.

CISSP Certification Training Bootcamp - Objectives

Our official CISSP Certification Training Bootcamp course reviews the eight CISSP certification domains featured in the (ISC)² Common Body of Knowledge (CBK). Reviewing the CBK will help students successfully prepare for the CISSP exam while also develop their overall competencies in information security.

Additional information on what you can expect to learn while reviewing each domain is found below.

• Domain 1: Security and Risk Management
• Domain 2: Asset Security
• Domain 3: Security Engineering
• Domain 4: Communications and Network Security
• Domain 5: Identity and Access Management
• Domain 6: Security Assessment and Testing
• Domain 7: Security Operations
• Domain 8: Software Development Security


 
SHARE

SSCP Certification Training Bootcamp @ San Diego - Instructor-led/Online PST
Aug 19 @ 8:30 am – Aug 23 @ 5:00 pm

SSCP Certification Training Bootcamp

SSCP Training and Certification Training Course with Hands-on Exercises

Learn to implement, monitor and administer IT infrastructure in accordance with information security policies in this official (ISC)2 SSCP Certification Training Bootcamp course

The SSCP Certification Training Bootcamp or Systems Security Certified Practitioner (SSCP) credential and training seminar is ideal for those who require proven technical skills and practical security knowledge in hands-on operational IT roles. More specifically, SSCP will teach you to implement, monitor and administer IT infrastructure in accordance with information security policies and procedures that ensure data confidentiality, integrity and availability.

Led by an (ISC)² authorized instructor, the training and included course material for this official SSCP Certification Training Bootcamp seminar provides students with a comprehensive review of the information security knowledge and skills needed to be successful in IT operational roles. Additionally, this course will also help students successfully prepare for the SSCP exam as it covers all seven domains in the CCSP Common Body of Knowledge (CBK).

SSCP Certification Training Bootcamp - Objectives

This (ISC)² authorized SSCP Certification Training Bootcamp seminar is based on the seven SSCP domains of the (ISC)² Common Body of Knowledge (CBK), ensuring students successfully prepare for the SSCP exam and enhance their overall competencies in cyber security.

• Domain 1: Access Controls
• Domain 2: Security Operations and Administration
• Domain 3: Risk Identification, Monitoring, and Analysis
• Domain 4: Incident Response and Recovery
• Domain 5: Cryptography
• Domain 6: Networks and Communications Security
• Domain 7: Systems and Application Security


 
SHARE

Aug
26
Mon
2019
Cloud Security Training Fundamentals Bootcamp @ Reston/Dulles - Instructor-led/Online EST
Aug 26 @ 8:30 am – Aug 27 @ 5:00 pm

Cloud Security Training Fundamentals

Cloud Security Training Fundamentals Bootcamp Course with Intensive Hands-on Labs

Our goal with Cloud Security Training Fundamentals Bootcamp Course is to arm security teams with the knowledge they need to assess risks in moving to the cloud. Managers, auditors, and systems and network administrators will also benefit, as we will delve into the technologies available for securing cloud-based assets while covering all the policies, processes and compliance considerations that go along with this major technology shift.

Cloud Security Training Fundamentals - Objectives

After completing this Cloud Security Training Fundamentals Bootcamp Course, attendees will be able to:

• Build a risk-based assessment program for cloud providers' controls
• Understand the key areas to focus on in cloud contracts
• Evaluate the various layers of cloud infrastructure
• Develop a cloud disaster recovery and business continuity plan
• Perform vulnerability assessments in a cloud environment
• Integrate encryption and identity management services in a cloud environment
• Improve your incident response and monitoring capabilities in the cloud


 
SHARE

ICS Security Training and SCADA Systems Security Training Bootcamp @ Anaheim - Instructor-led/Online PST
Aug 26 @ 8:30 am – Aug 30 @ 5:00 pm

ICS Security Training and SCADA Systems Security Training Bootcamp

ICS Security Training and SCADA Systems Security Training Bootcamp Course with Intensive Hands-on Labs

This ICS Security Training and SCADA Systems Security Training bootcamp Course covers everything from field based attacks to automated vulnerability assessments for SCADA networks. Learn the best practices for security SCADA networks and systems inside and out. ENO shows you how to defend against both internal and external attackers to provide holistic security for critical industrial automation systems.

ICS Security Training and SCADA Systems Security Training - Objectives

Upon completing this ICS Security Training and SCADA Systems Security Training course, learners will be able to meet these objectives:

• Better understand various industrial control systems and their purpose, application, function, and dependencies on network IP and industrial communications
• Work with control network infrastructure design (network architecture concepts, including topology, protocols, and components) and their relation to IEC 62443 and the Perdue Model.
• Run Windows command line tools to analyze the system looking for high-risk items
• Run Linux command line tools (ps, ls, netstat, ect) and basic scripting to automate the running of programs to perform continuous monitoring of various tools
• Work with operating systems (system administration concepts for Unix/Linux and/or Windows operating systems)
• Better understand the systems’ security lifecycle
• Better understand information assurance principles and tenets (confidentiality, integrity, availability, authentication, non-repudiation)
• Use your skills in computer network defense (detecting host and network-based intrusions via intrusion detection technologies)
• Implement incident response and handling methodologies
• Map different ICS technologies, attacks, and defenses to various cybersecurity standards including NIST Cyber Security Framework, ISA/IEC 62443, ISO/IEC 27001, NIST SP 800-53, Center for Internet Security Critical Security Controls, and COBIT 5


 
SHARE

Introduction to Cyber Security Training Bootcamp @ Chicago - Instructor-led/Online CST
Aug 26 @ 8:30 am – Aug 30 @ 5:00 pm

Introduction to Cyber Security Training Bootcamp

Introduction to Cyber Security Training Bootcamp course with hands-on labs

Our lives depend on online services. Gain essential cyber security knowledge and skills, to help protect your digital life!

Introduction to Cyber Security Training Bootcamp Course, With billions of devices now online, new threats pop-up every second. Today’s interconnected world makes everyone more susceptible to cyber-attacks. Whether you’re attracted to the relativity new world of cybersecurity as a professional, or just interested in protecting yourself online and in social media, this Introduction to Cyber Security Training Bootcamp course is the answer.

Introduction to Cyber Security Training Bootcamp - Objectives

After completing this Introduction to Cyber Security Training Bootcamp course, attendees will be able to:

Upon completing this Introduction to Cyber Security Training Bootcamp course, learners will be able to meet these objectives:

• Communicate with confidence regarding information security topics, terms, and concepts
• Understand and apply the Principles of Least Privilege
• Understand and apply the Confidentiality, Integrity, and Availability (CIA) Triad
• Build better passwords that are more secure while also being easier to remember and type
• Grasp basic cryptographic principles, processes, procedures, and applications
• Understand computer network basics
• Have a fundamental grasp of any number of critical technical networking acronyms, including TCP/IP, IP, TCP, UDP, MAC, ARP, NAT, ICMP, and DNS
• Utilize built-in Windows tools to see your network settings
• Recognize and be able to discuss various security technologies, including anti-malware, firewalls, and intrusion detection systems, content filters, sniffers, etc.
• Build a simple, but fully functional firewall configuration
• Secure your browser using a variety of security plug-ins
• Secure a wireless access point (also known as a wireless router)
• Scan for malware, clean malware from a system, and whitelist legitimate software identified by an anti-malware scanner as "potentially unwanted".
• Access a number of websites to better understand password security, encryption, phishing, browser security, etc.


 
SHARE.

Security Essentials Training Bootcamp @ Reston/Dulles - Instructor-led/Online EST
Aug 26 @ 8:30 am – Aug 30 @ 5:00 pm

Security Essentials Training Bootcamp

"Prevention is Ideal but Detection is a Must." Security Essentials Training Course Hands-on

Security Essentials Training is focused on teaching you the essential information security skills and techniques you need to protect and secure your organization's critical information assets and business systems. Our Security Essentials Training course will show you how to prevent your organization's security problems from being headline news in the Wall Street Journal!

Security Essentials Training Bootcamp - Objectives

After completing this Security Essentials Training course, attendees will be able to:

• Apply what you learned directly to your job when you go back to work
• Design and build a network architecture using VLANs, NAC, and 802.1x based on advanced persistent threat indicators of compromise
• Run Windows command line tools to analyze the system looking for high-risk items
• Run Linux command line tools (ps, ls, netstat, etc.) and basic scripting to automate the running of programs to perform continuous monitoring of various tools
• Install VMWare and create virtual machines to create a virtual lab to test and evaluate tools/security of systems
• Create an effective policy that can be enforced within an organization and design a checklist to validate security and create metrics to tie into training and awareness
• Identify visible weaknesses of a system using various tools and, once vulnerabilities are discovered, cover ways to configure the system to be more secure
• Build a network visibility map that can be used for hardening of a network - validating the attack surface and covering ways to reduce that surface by hardening and patching
• Sniff open protocols like telnet and ftp and determine the content, passwords, and vulnerabilities using WireShark.


 
SHARE.

VoIP Security Training Bootcamp @ Reston/Dulles - Instructor-led/Online EST
Aug 26 @ 8:30 am – Aug 28 @ 5:00 pm

VoIP Security Training Bootcamp

VoIP Security Training Bootcamp In-Depth Course with Intensive Hands-on Labs

VoIP Security training Bootcamp course is planned and designed to provide the participants with a detailed technical perspective on VoIP security and its underlying technology and protocol enablers. The VoIP Security Training bootcamp course covers specifics on how to properly assess, audit and mitigate your security risks.

VoIP Security Training Bootcamp - Objectives

After completing this VoIP Security Training Bootcamp course, attendees will be able to:

• Understand VoIP
• Learn VoIP security issues
• Identify VoIP security features
• Understand the threats and security holes with VoIP call control protocols H.323, SIP, and MGCP
• Identify SIP Security Features and learn how to configure and administer those features
• Learn H.323 security issues including Port usage risk, firewall inspection, and NAT configurations
• Examine VoIP best practices to support risk mitigation
• Examine VoIP management tools and best practices to support risk mitigation
• Learn how NAT and Firewalls impact call setup, media streams, latency, and application level gateway
• Understand SIP NAT Traversal
• Examine how to overcome NAT issues using STUN, TURN, and ICE
• Examine cryptographic protocols, Datagram Transport Layer Security (DTLS) protocol, Secure Real-time Transport Protocol (SRTP) protocol and Session Description Protocol Security Descriptions (SDES) protocol


 
SHARE.

Windows Exploitation and Analysis Training (WEA) Bootcamp @ Reston/Dulles - Instructor-led/Online EST
Aug 26 @ 8:30 am – Aug 30 @ 5:00 pm

Windows Exploitation and Analysis Training (WEA) Bootcamp - Introduction

Windows Exploitation and Analysis Training (WEA) Course with hands-on labs

This five-days Windows Exploitation and Analysis Training (WEA) Bootcamp teaches the essentials of remote network exploitation to help students develop strategies to protect and defend their networks and critical information. Students learn how to analyze remote Windows networks, locate user credentials, and expand their access across a network.

Windows Exploitation and Analysis Training (WEA) Bootcamp provides an in-depth look at the essentials of remote network exploitation, from scanning and enumeration of a network space to performing client-side attacks. This Windows Exploitation and Analysis Training (WEA) Bootcamp course is for computer network professionals, software developers, and security professionals who are responsible for protecting Windows networks and data from threats.

Windows Exploitation and Analysis Training (WEA) Bootcamp - Objectives

After completing this Windows Exploitation and Analysis Training (WEA) Bootcamp Course, attendees will be able to:

• Apply open source tools (Metasploit and Armitage) to identify key target information
• Documenting data in a target template
• Analyze and interpret research data to determine an operational strategy
• Craft and deploy phishing emails to obtain target browser data
• Explore techniques associated with collecting data and expanding access


 
SHARE

0