IT Security Certifications Training Online

IT Security Certifications Training Online

IT Security Certifications Training Online 

$1,660

Regularly $2,490

 Course Delivery  Online
 Number of Courses  17 Courses, 105 Units
 Certificate/Diploma  Yes with Final Score
 Availability  Now Available

Knowing how to use corporate computers and devices in a secure way helps ensure you don’t jeopardize your work, your organization, or your personal security. The advancement in corporate communications and social networking has opened countless opportunities and new ways for people to perform their jobs. But just as our IT communications options have advanced, so have the security threats posed by these advancements. Our IT Security Certifications Training Program teaches about the common threats to corporate computers and devices that exploit vulnerabilities in our communications and networking methods such as e-mail, Internet, and social networking platforms. This program also covers best practices and techniques to mitigate security risks while conducting communications as part of your job.

The IT Security Certifications online training program is designed for network and information security professionals.

Course Listing – IT Security Certifications Training Online

Certified Ethical Hacker (CEH)
Hacking and Penetration Testing
Footprinting and Reconnaissance
Network Scanning
Enumeration and Cryptography
System Hacking
Malware
Sniffing
Social Engineering
Denial of Service and Session Hijacking
Hacking Web Servers
Hacking Web Applications
SQL Injection
Hacking Wireless Networks
Hacking Mobile Platforms
Evading IDS, Firewalls, and Honeypots
Buffer Overflow

Certified Information Systems Auditor (CISA)               
The Process of Auditing Information Systems – Part 1
The Process of Auditing Information Systems – Part 2
Governance and Management of IT – Part 1
Governance and Management of IT – Part 2
IS Acquisition, Development, and Implementation – Part 1
IS Acquisition, Development and Implementation – Part 2
IS Acquisition, Development and Implementation – Part 3
IS Operations, Maintenance and Support – Part 1
IS Operations, Maintenance, and Support – Part 2
Protection of Information Assets – Part 1
Protection of Information Assets – Part 2

Systems Security Certified Practitioner (SSCP)               
Access Controls
Cryptography
Malicious Code
Monitoring and Analysis Part 1
Monitoring and Analysis Part 2
Networks and Telecommunications Part 1
Networks and Telecommunications Part 2
Security Operations and Administration Part 1
Security Operations and Administration Part 2
Security Operations and Administration Part 3
Risk, Response, and Recovery

Certified Information Systems Security Professional (CISSP) 2013               
Access Control
Telecommunications and Network Security
Information Security Governance and Risk Management
Software Development Security
Cryptography
Security Architecture and Design
Operations Security
Business Continuity and Disaster Recovery Planning
Legal, Regulations, Investigations, and Compliance
Physical (Environment) Security

Certified Information Security Manager (CISM) 2012               
Information Security (IS) Governance (Part 1)
IS Governance (Part 2)
IS Governance (Part 3)
Information Risk Management and Compliance (Part 1)
Information Risk Management and Compliance (Part 2)
IS Program Development and Management (Part 1)
IS Program Development and Management (Part 2)
IS Program Development and Management (Part 3)
IS Program Development and Management (Part 4)
IS Program Development and Management (Part 5)
IS Incident Management (Part 1)
IS Incident Management (Part 2)

CompTIA Advanced Security Practitioner CAS-002               
Cryptography and Enterprise Storage Concerns
Advanced Network Design, Management, and Controls
Controls for Hosts
Application Vulnerabilities and Security Controls
Industry Influences, Risk Planning, Strategy, and Control
Privacy Policies & Procedures and Incident Recovery
Research, Analysis and Assessment
Integration of Computing, Communications, and Disciplines
Technical Integration of Enterprise Components

Microsoft Security Fundamentals               
Security Layers
Operating System Security
Network Security
Security Software

Certified Secure Software Lifecycle Professional (CSSLP)               
Secure Software Concepts
Secure Software Requirements
Secure Software Design
Secure Software Implementation and Coding
Secure Software Testing
Software Acceptance, Deployment, Operations, Maintenance, and Disposal
Supply Chain and Software Acquisition

OWASP Top 10               
Introduction to OWASP and the Top 10
OWASP Mitigations for .NET

Foundations of Android Security               
Android Architecture, Protection, and Development Best Practices
Android Vulnerabilities, Testing, and Enterprise Considerations

Foundations of iOS Security                
iOS Security Architecture and Application Data Protection
Securing Against Threats, Securing for Enterprise, and Jailbreaking Devices

Cryptography Fundamentals               
Defining Cryptography
Applying Cryptography

Securing User Accounts               
Fundamental Concepts
Authorization, Registration, and Passwords
Logon, Logoff, Account Changes, and Attack Mitigation

What’s New in CISSP 2015               
Changes to CISSP 2015

Securing Mobile Devices in the Enterprise               
Mobile Threats
Mobile Technologies
Mobile Threat Mitigation
Configuring Enterprise-level Security

CompTIA Cybersecurity Analyst+ CS0-001               
Network Architecture and Reconnaissance
Threat Identification
Threat Mitigation
Reducing Vulnerabilities
Investigate Incidents
Monitoring for Security Issues

IT Security for End Users               
Fundamentals
Using Corporate Devices Securely
Secure Corporate Communications and Networking