Gain the essential skills to build a solid security foundation. You will examine in detail the traffic that traverses the network at the packet and binary level. You will build solid knowledge on the lowest layers of the network. You will learn to master the TCP/IP protocol. You will learn essential UNIX and Linux survival skills that separate you from the many security professionals who are Windows-centric. Additionally, you will be introduced to vulnerability assessment and the hacking methodology. When you finish this course you will have a solid security foundation to pursue more advanced security training.

This course is taught by renowned cyber security expert Kevin Cardwell and includes extensive hands-on exercises, in order to learn by doing, as well as video teaching material.

Who Should Attend

This course is for anyone who wants to start out with the foundation and core concept skills for becoming a security professional.

Why Should You Attend

To gain the skills needed to move on to more advanced security topics. The majority of professionals entering the field will lack the foundation that this course will bring.

  1. Learn how to execute a set of techniques that are critical to the protection of your entire
  2. Learn the foundation components of the network
  3. Explore the concepts of attacks at the packet level
  4. Establish solid skills in Unix/Linux
  5. Develop virtualization knowledge
  6. Gain an understanding the hacking methodology

What You Will Learn

By taking this course you will learn the foundations of security, including in-depth knowledge of the TCP/IP network protocol.

  • You will learn how to analyze packets for irregularities
  • You will learn how to detect signs of crafted packets
  • You will learn advanced protocol analysis techniques
  • You will perform low-level protocol analysis
  • You will learn functional skills in Unix and Linux
  • You will learn the fundamentals of vulnerability assessment and the hacking methodology

On completion of this course, you will receive a printable certificate of completion, as well as a badge that can be exported to badgr for use on LinkedIn and other sites.

Expected Duration

40 hours, self-paced. Pause and continue at any time.
40 CPEs awarded on successful completion.

Cost

$1275 for 6 months of access.

Included if you are a subscriber to any of the following training packages:

  • All Full Courses
Full Course

Learn the foundations of security and defending architectures from attack. You will look at the concept of "thinking like a hacker" to learn techniques to defend from the types of attacks that are commonly conducted against IT/corporate networks as well as industrial control networks. You will learn powerful methods to analyze the risks inherent in your networks. Once your foundation has been set, you will look at the best practices and recommendations for reducing attack surface. You will also learn a systematic process for intrusion and malware analysis.

This course is taught by renowned cyber security expert Kevin Cardwell and includes extensive hands-on exercises, in order to learn by doing, as well as video teaching material.

Who Should Attend

This course is designed for anyone who wants to learn how hackers attack, and then use that information to make their own networks and computers harder to attack. The course is designed for anyone who is working in IT, from executives down to the help desk. Some of the specific job roles are as follows:

  • System administrators
  • Network engineers
  • Firewall administrators
  • SOC analysts, engineers, and managers
  • Application designers and developers
  • Security directors
  • Help desk personnel
  • Support engineers and technicians

Why Should You Attend

This intensive course will introduce the types of attacks that can completely compromise systems and networks; from there, you will design defensive mechanisms to either prevent the attacks or isolate them if prevention is not possible.

  1. Conduct hacking like the experts
  2. Learn defense from the attacker mindset
  3. Deploy proven defensive measures that block 90% of attacks
  4. Examine enterprise defense strategies
  5. Perform security configuration and baselining
  6. Secure an enterprise environment step by step

What You Will Learn

In this intensive hands-on course, you will

  1. Identify the potential weaknesses on a system and network
  2. Explore requirements for vulnerability management
  3. Deploy ingress and egress filters to reduce the risk to a network
  4. Perform basic memory analysis to identify potential malware intrusions
  5. Install decoys and triggers to identify sophisticated intrusions
  6. Analyze and reduce a network's attack surface

...and much more!

On completion of this course, you will receive a printable certificate of completion, as well as a badge that can be exported to badgr for use on LinkedIn and other sites.

Expected Duration

40 hours, self-paced. Pause and continue at any time.
40 CPEs awarded on successful completion.

Cost

$1700 for 6 months of access.

Included if you are a subscriber to any of the following training packages:

  • All Full Courses
Full Course

With this course, you can be among the few who transcend the old idea of the hacker having all the fun. Take pride being the defender, form an offensive mindset to skillfully orchestrate robust and solid defenses, and reinvent popular belief by beating the hacker at his own game. You will be evaluating advanced methods of defense fortification bringing you closer to establishing perfect security best practices and methodologies you can apply to your environments. This course teaches segmentation and isolation to reduce the effectiveness of advanced persistent threats.

This course is taught by renowned cyber security expert Kevin Cardwell and includes extensive hands-on exercises, in order to learn by doing, as well as video teaching material.

Who Should Attend

  • Firewall administrators
  • System architects
  • SOC analysts
  • CERT team members
  • Forensic analysts
  • Network administrators

Why Should You Attend

This course will cover fundamental areas of fortifying your defenses, including methods of developing a secure baseline and how to harden your enterprise architecture from the most advanced attacks. Once a strategy for a fortified perimeter is defined, the course moves on to defending against the sophisticated malware that is on the rise today, plus the importance of live memory analysis and real time monitoring.

In this intensive, hands-on course, you will:

  1. Attack an enterprise equivalent network at each layer
  2. Design defense mitigation mechanisms to reduce the attack surface
  3. Deploy the latest best practices for secure network design
  4. Learn how to analyze processes running on a machine for infection
  5. Learn a process and methodology for analysis of RAM for infections from sophisticated malware
  6. Explore hardware decoys and deception techniques

What You Will Learn

Upon completion, you will be able to:

  1. Identify the potential weaknesses on a system and network
  2. Mitigate the risk of attack success with segmentation and isolation
  3. Deploy ingress and egress filters to reduce the risk to a network
  4. Perform advanced memory analysis to identify potential malware intrusions
  5. Install decoys and triggers to identify sophisticated intrusions
  6. Analyze and reduce a network's attack surface

On completion of this course, you will receive a printable certificate of completion, as well as a badge that can be exported to badgr for use on LinkedIn and other sites.

Expected Duration

40 hours, self-paced. Pause and continue at any time.
40 CPEs awarded on successful completion.

Cost

$2200 for 6 months of access.

Included if you are a subscriber to any of the following training packages:

  • All Full Courses
Full Course