Cyber Security

This track provides foundational knowledge of the key areas typically encountered in the field of cyber security through courses in security essentials.  We then build upon that foundational knowledge by covering some of the top skills required for practical hands-on cyber security.  

Essential concepts, such as risk management, access control, and principles of cyber security are covered.  These principles are then expanded upon and applied to various security architectures and associated controls.  Despite best efforts for a secure environment, incidents are bound to occur. Incident response and forensics is included in this certificate as every organization had either had an incident or has one that is ongoing and simply hasn’t detected it. Application security is specifically addressed as well, because most attacks are against applications and, in particular, web applications.  In short, these essential courses arm you with the knowledge and skills to begin a career in cyber security or take your existing career to the next level.

Techniques that cyber criminals use are discussed, demonstrated, and practiced.  Knowing how the enemy thinks and operates helps with defense. You will learn to capture and analyze network traffic in this certificate as well.  Network traffic doesn’t lie and the ability to analyze network traffic is one of the top skills needed in cyber security. To round out this series, we include a basic course on malware analysis. Fundamental understanding of how malware operates improves your ability to detect and contain infections.  Not only does this track build upon foundational knowledge and concepts with a practical view of cyber security, we focus on hands-on practical labs and exercises. You will gain tangible skills to operate securely and mindfully on a network.

IT Security Fundamentals

This course is for anyone needing a broader perspective of security tools and processes, especially the business unit/application manager who must understand the vulnerabilities that can compromise…

Security Architecture and Controls

This course provides a comprehensive overview of cyber security control technologies. The course starts with a discussion of security policies and perimeter security fundamentals. We discuss how to…

Introduction to Hacking, Defense and Response

This course is for anyone needing an introduction to vulnerability mitigation using the tools and techniques of both the white hat and black hat hackers.

Incident Response and Computer Forensics

This course is for system administrators, incident responders, cyber security professionals and anyone interested in both the technical and non-technical aspects of computer incident response and…

Web Application Security

This course is for developers, technical managers, incident responders, security professionals and anyone interested in the technical aspects of application security training.

Introduction to Reverse Engineering Malware

This course focuses on tools and techniques to analyze and reverse engineer malicious software. This course includes steps on how to set up and configure an environment for safe malware analysis. An…

Network Traffic Analysis Using WireShark

This course focuses on capturing, filtering, and analyzing network traffic to identify security vulnerabilities, track down network intrusions, troubleshoot network problems, and perform network…

CISSP Exam Prep

This exam Preparation course expands upon your knowledge by addressing the essential elements of the eight domains that comprise a Common Body of Knowledge (CBK) for information systems security…

Certified Ethical Hacker

Our CEH Boot Camp provides you with tools and techniques used by hackers and information security professionals alike to break into an organization. As we put it, “To beat a hacker, you need to think…
WebSanity Top Secret