Events Search and Views Navigation
Past Events › Training
Events List Navigation
A robust "boot camp" style learning experience, t11.pnghe PSP certification classroom review provides a high-level review of security concepts tested on the exam. You will identify areas of strength and weakness to confidently know where to focus your study, as well as build relationships with peers and board certified instructors.
Find out more »Advancing your career in security demands your fundamental knowledge of the profession?s universal principles be rock-solid. Reinforce your foundation with Asset Protection Course I (APC), a program designed for both new and seasoned practitioners. The course will simultaneously provide a broad strategic overview of key security principles as well as best practices for thriving in the security profession. Discuss strategies with your peers, learn today?s innovative techniques, and identify methods to enable your career path to stay on the rise.
Find out more »SEC401 course will provide the information security training you need in a bootcamp-style format that is reinforced with hands-on labs.
Find out more »SEC560 is designed to get you ready to conduct a full-scale, high-value penetration test - and on the last day of the course you'll do just that. After building your skills in comprehensive and challenging labs over five days, the course culminates with a final full-day, real-world penetration test scenario. You'll conduct an end-to-end pen test, applying knowledge, tools, and principles from throughout the course as you discover and exploit vulnerabilities in a realistic sample target organization, demonstrating the knowledge…
Find out more »MGT414 focuses solely on the 8 domains of knowledge as determined by (ISC)2 that form a critical part of CISSP? exam. Each domain of knowledge is dissected into its critical components, and those components are then discussed in terms of their relationship with one another and with other areas of information security.
Find out more »In this course students will learn the practical skills necessary to perform regular risk assessments for their organizations. The ability to perform risk management is crucial for organizations hoping to defend their systems. There are simply too many threats, too many potential vulnerabilities that could exist, and simply not enough resources to create an impregnable security infrastructure. Therefore every organization, whether they do so in an organized manner or not, will make priority decision on how best to defend their…
Find out more »The Expos offer training seminars where you can obtain certifications, and view the newest products and latest technologies. We offer one-day-only show specials, and chances to win exclusive prizes throughout the day. Attend an Expo near you and spend the day networking with industry professionals!
Find out more »The Expos offer training seminars where you can obtain certifications, and view the newest products and latest technologies. We offer one-day-only show specials, and chances to win exclusive prizes throughout the day. Attend an Expo near you and spend the day networking with industry professionals!
Find out more »The Internet is full of powerful hacking tools and bad guys using them extensively. If your organization has an Internet connection or one or two disgruntled employees (and whose doesn't!), your computer systems will get attacked. From the five, ten, or even one hundred daily probes against your Internet infrastructure to the malicious insider slowly creeping through your most vital information assets, attackers are targeting your systems with increasing viciousness and stealth. As defenders, it is essential we understand these…
Find out more »The Internet is full of powerful hacking tools and bad guys using them extensively. If your organization has an Internet connection or one or two disgruntled employees (and whose doesn't!), your computer systems will get attacked. From the five, ten, or even one hundred daily probes against your Internet infrastructure to the malicious insider slowly creeping through your most vital information assets, attackers are targeting your systems with increasing viciousness and stealth. As defenders, it is essential we understand these…
Find out more »The Internet is full of powerful hacking tools and bad guys using them extensively. If your organization has an Internet connection or one or two disgruntled employees (and whose doesn't!), your computer systems will get attacked. From the five, ten, or even one hundred daily probes against your Internet infrastructure to the malicious insider slowly creeping through your most vital information assets, attackers are targeting your systems with increasing viciousness and stealth. As defenders, it is essential we understand these…
Find out more »