Cybersecurity Training Curriculum
Cybersecurity Training Curriculum
Our vast cybersecurity training portfolio can help you and your team build fundamental to advanced cybersecurity techniques, prepare for top industry-recognized certifications or master product-specific skills. You and your team will learn to approach cybersecurity offensively and defensively through real-world examples and exercises, hands-on labs and expert instruction. You will gain knowledge to close skill set gaps, meet and maintain mandates and sustain and retain a highly-qualified workforce to secure your critical systems and assets.
- 5G Wireless Security Training
- Mobile Security Training (A Systematic View)
- Advanced Reverse Engineering Malware Training
- Advanced Computer Forensics Training
- Advanced Smartphone Forensic Analysis Training
- Bluetooth Security Training
- Certified Authorization Professional Training (CAP)
- Certified Ethical Hacker (CEH) Certification Training
- Computer Hacking Forensics Investigator Training (CHFI)
- Certified Information Systems Auditor Training (CISA)
- Certified Information Security Manager Training (CISM)
- Certified Secure Software Lifecycle Professional Training (CSSLP)
- Certified Information Systems Security Professional Training (CISSP)
- Certified Network Defender Training (CND)
- Certified in Risk and Information Systems Control Training (CRISC)
- Certified Penetration Testing Engineer Training (CPTE)
- Certified Digital Forensics Examiner Training (CDFE)
- Certified Disaster Recovery Engineer Training (CDRE)
- Certified Incident Handling Engineer Training (CIHE)
- Certified Information Systems Security Officer Training (CISSO)
- Certified Network Forensics Examiner Training (CNFE)
- Certified Penetration Testing Consultant Training (CPTC)
- Certified Secure Web Application Engineer Training (CSWAE)
- Certified Professional Ethical Hacker Training (CPEH)
- Certified PowerShell Hacker (CPSH) Training
- Certified Cloud Security Officer Training (CCSO)
- Certified Vulnerability Assessor Training (CVA)
- Certified Security Principles Training (CSP)
- CompTIA Cybersecurity Analyst+ (CySA+) Training
- CompTIA Advanced Security Practitioner (CASP+) Training
- Certified Cloud Security Professional (CCSP) Training
- Cloud Security Fundamentals Training
- Computer and Mobile Forensics Training
- Critical Information Infrastructure Protection (CIIP) Training
- CyberSec First Responder: Threat Detection and Response Training
- Cybersecurity Foundations Training
- Cyber Threats Detection and Mitigation Training
- Cyber Threats Hunting (CCTHP) Training
- Cybersecurity Investigations and Network Forensics Analysis
- Fundamentals of Information Systems Security Training
- GIAC Certified Incident Handler (GCIH) Training
- GIAC Certified Intrusion Analyst (GCIA) Training
- GIAC Security Essentials Certification (GSEC) Training
- GIAC Security Leadership Certificate (GSLC) Training
- ICS/SCADA Cybersecurity Training
- ICS/SCADA Systems Security Training
- ICS Cybersecurity Training
- Information System Security Engineering Professional Training (CISSP-ISSEP)
- Information System Security Architecture Professional Training (CISSP-ISSAP)
- Information System Security Management Professional Training (CISSP-ISSMP)
- Information Systems Certification and Accreditation Professional Training (ISCAP)
- Introduction to Cyber Warfare and Operations Design (CSFI) Training
- Introduction to Cyber Security Training
- Intrusion Prevention Training
- Intrusion Detection In-Depth Training
- Incident Response and Network Forensics Training
- Introduction to Digital Forensics Training
- IPv6 Security Training Analysis
- ISACA CSX Practitioner I: Identification and Protection Training
- ISACA CSX Practitioner II: Detection Training
- ISACA CSX Practitioner III: Respond and Recover Training
- Malicious Network Traffic Analysis Training
- Mobile Security Training
- Mobile Security and Technical Overview of the 5G System Training
- Network Traffic Analysis Training
- NERC Critical Infrastructure Protection (CIP) Training
- NIST Cybersecurity Framework Training
- PowerShell Automation and Windows Security Training
- Python for Network Defenders Training
- Reverse Engineering Malware Training
- Scada Security Training In Depth
- Systems Security Certified Practitioner (SSCP) Training
- Web Applications Attack and Defence Training
- Windows System Analysis Training
- Windows Exploitation and Analysis (WEA) Training
Whether you are looking for general information or have a specific question, we want to help!