Available Courses
Get Help
Help
Course Name
4 44 900.00
Business Continuity and Disaster Recovery

This is an instructor led, online, web-based course that prepares IT leadership to plan for the worst-case scenario. Every organization is at risk of some type of interruption or disaster and must plan accordingly. This course, aimed at both business and IT professionals, steps through three important protection plans: a business impact analysis (BIA), a business continuity plan (BCP), and a disaster recovery plan (DRP). The course offers access to online resources including texts, case studies, lectures, and virtual labs that duplicate real-life scenarios.

Prerequisites: To maximize the effectiveness of this course, students should be familiar with information security risk management concepts.

5 45 900.00
Computer Forensics Evidence Collection

This is an instructor led, online, web-based course for the IT professional who needs to understand the latest techniques and strategies for forensic evidence collection. Business computers and the data they contain are targets of an increasing number of attacks, which has brought electronic evidence and information gathering to the forefront of incident response. This course focuses on computer forensics and evidence collection techniques. Students learn tips for controlling a digital forensic investigation and techniques for seizing, collecting, and protecting evidence. The course offers access to online resources including texts, case studies, lectures, and virtual labs that duplicate real-life scenarios.

Prerequisites: To maximize the effectiveness in this course, students should have at least intermediate knowledge of: (1) how computer hardware functions, and (2) the Windows and Linux operating systems.

1 41 900.00
Ethical Hacking Tools and Techniques

This is an instructor led, online, web-based course that is designed for IT professionals who require in-depth knowledge of ethical hacking techniques to test the security of their networks. Areas of instruction include the fundamentals of hacking, the latest information and strategies in penetration testing, foot printing, vulnerability scanning and exploits, and network traffic analysis. The course offers access to online resources including texts, case studies, lectures, and virtual labs that duplicate real-life scenarios.

Prerequisites: To maximize the effectiveness of the course, students should have general knowledge of server/client networking, network border protection such as firewalls, and common types of malware.

3 43 900.00
Information Security and Risk Management Planning

This is an instructor led, online, web-based course that prepares business managers and IT professionals who depend on risk management to make appropriate decisions for their organizations. This course covers the essentials of risk management, compliance laws that affect risk management, and how to create a risk management plan. The course offers access to online resources including texts, case studies, lectures, and virtual labs that duplicate real-life scenarios.

Prerequisites: To maximize the effectiveness in this course, students should be familiar with information security principles and their impact on business objectives.

8 48 900.00
Locking Down Linux User Accounts, Filesystems, and Services

In this course, you'll get hands-on experience configuring and managing security on Linux servers and clients. You'll first review basic security controls, and then dive deep into user management and security the Linux filesystem and services. The course focuses on Red Hat Enterprise Linux (RHEL), Ubuntu, Fedora, and CentOS, but many of the concepts apply to Linux in general.

2 42 900.00
Managing Information Security Risks, Threats, and Vulnerabilities

This is an entry-level, instructor led, online, web-based course that covers the fundamentals of information systems security and hands-on practice with countermeasures against malicious code and network attacks. Students also learn on-going mitigation techniques that reduce risk to IT environments. The course offers access to online resources including texts, case studies, lectures, and virtual labs that duplicate real-life scenarios.

Prerequisites: To maximize the effectiveness in this course, students should be familiar with networking and common forms of malware.

6 46 900.00
Network Security Essentials

Need a refresher on the basics of network security? This short course explores TCP/IP network protocols and applications, network threats and vulnerable points of access, and different tools and techniques that strengthen network security.

9 49 900.00
Protecting Networks with Firewalls and VPNs

Two key technologies for protecting a network are firewalls and virtual private networking. This course explores firewall fundamentals, rules, filters, design strategies, and deployment best practices. Students also learn about virtual private networks (VPNs) for secure remote access.

10 50 900.00
Protecting Windows Systems with Access Controls, Encryption, and Group Policy

In this course, you'll get hands-on experience configuring and managing security on Windows servers and clients. Topics include access controls and authentication, encryption, application rules, and Group Policy objects. The course addresses security in Windows XP, Vista, and 7 on the desktop, and Windows Server 2003 and 2008.

7 47 900.00
Securing Web Applications

The Internet is an integral part of most organizations today, but this widely used public network is also the source of data theft, cyberstalking, and many other threats. Organizations with a significant Web presence, such as e-commerce sites, must ensure their Web applications are as secure as possible. This course explores managing risk in Web applications, identifying and classifying weaknesses, and strategies for developing secure Web applications.

Cart
Copyright 2013 Infosec Learning, LLC.