COMPTIA Security+ Certification

The CompTIA® Security+® course is designed to help you prepare for the CompTIA Security+ certification examination (SY0-601). Students will implement and monitor security on networks, applications, and operating systems, and respond to security breaches.

Course Objectives:

Upon successful completion of this course, students will be able to:

  • Identify the fundamental concepts of computer security.
  • Identify security threats and vulnerabilities.
  • Examine network security.
  • Manage application, data and host security.
  • Identify access control and account management security measures.
  • Manage certificates.
  • Identify compliance and operational security measures.
  • Manage risk.
  • Manage security incidents.
  • Develop business continuity and disaster recovery plans.

Delivery Method: Virtual Instructor Led Training

Intended Audience: This course is targeted toward the information technology (IT) professional who has networking and administrative skills in Windows®-based Transmission Control Protocol/Internet Protocol (TCP/IP) networks; familiarity with other operating systems, such as Mac OS X®, Unix, or Linux; and who wants to further a career in IT by acquiring foundational knowledge of security topics; prepare for the CompTIA Security+ certification examination; or use Security+ as the foundation for advanced security certifications or career roles.

Register for this Course

COMPTIA Advanced Security Practitioner (CASP+)

In this course, students will examine advanced security concepts, principles, and implementations that pertain to enterprise level security.

ETPL# 10129

Course Objectives:

Upon successful completion of this course, students will be able to:

  • Identify enterprise security fundamentals.
  • Apply enterprise security technology solutions.
  • Implement security design and solutions.
  • Manage risk, policies and procedures within an enterprise.
  • Integrate security solutions within an enterprise.
  • Conduct security research and analysis.

Delivery Method:  Virtual Instructor Led Training

Intended Audience: This course is targeted toward an IT Professional that has the technical knowledge and skills required to conceptualize, design, and engineer secure solutions across complex enterprise environments. Students should have a minimum of 10 years experience including at least 5 years of hands-on technical security experience.

Register for this Course

Certified Information Systems Security Professional

This course will expand upon your knowledge by addressing the essential elements of the eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process, while providing a framework to prepare for CISSP certification. By defining eight security domains that comprise a CBK, industry standards for the information systems security professional have been established. The skills and knowledge you gain in this course will help you master the eight CISSP domains and ensure your credibility and success within the information systems security field.

ETPL# 8999

Course Objectives:

In this course, you will identify and reinforce the major security subjects from the eight domains of the (ISC)2 CISSP CBK. You will:

  • Analyze components of the Security and Risk Management domain.
  • Analyze components of the Asset Security domain.
  • Analyze components of the Security Engineering domain.
  • Analyze components of the Communications and Network Security domain.
  • Analyze components of the Identity and Access Management domain.
  • Analyze components of the Security Assessment and Testing domain.
  • Analyze components of the Security Operations domain.
  • Analyze components of the Software Development Security domain.

Delivery Method: Virtual Instructor Led Training

Intended Audience: This course is intended for experienced IT security-related practitioners, auditors, consultants, investigators, or instructors, including network or security analysts and engineers, network administrators, information security specialists, and risk management professionals, who are pursuing CISSP training and certification to acquire the credibility and mobility to advance within their current computer security careers or to migrate to a related career.

Through the study of all eight CISSP Common Body of Knowledge (CBK) domains, students will validate their knowledge by meeting the necessary preparation requirements to qualify to sit for the CISSP certification exam. Additional CISSP certification requirements include a minimum of five years of direct professional work experience in two or more fields related to the eight CBK security domains, or a college degree and four years of experience.

Register for this Course

EC-Council Certified Ethical Hacker (CEH) v11

The Certified Ethical Hacker (CEH v11) program is a trusted and respected ethical hacking training Program that any information security professional will need. Since its inception in 2003, the Certified Ethical Hacker has been the absolute choice of the industry globally. It is a respected certification in the industry and is listed as a baseline certification on the United States Department of Defense Directive 8570. The CEH exam is ANSI 17024 compliant adding credibility and value to credential members.

The Certified Ethical Hacking v11 course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.

ETPL#: 9000

Delivery Method: Virtual Instructor Led Training

Register for this Course

NIST Cyber Security Professional (NCSP) Foundation

The NCSF Foundation training course outlines current cybersecurity challenges and explains how organizations who implement a NCSF program can mitigate these challenges.

Course Objectives:

This course introduces the NIST Cybersecurity Framework (NIST CSF). The Framework is a risk-based approach to managing cybersecurity risk, and is composed of three parts: the Framework Core, the Framework Implementation Tiers, and the Framework Profiles. Each Framework component reinforces the connection between business drivers and cybersecurity activities. This course discusses how an organization can use the Framework as a key part of its systematic process for identifying, assessing, and managing cybersecurity risk.

Delivery Method: Virtual Instructor Led Training - 1 day

Intended Audience: Targeted at IT and Cybersecurity professionals looking to become certified on how to operationalize the NIST Cybersecurity Framework (NCSF) across an enterprise and its supply chain.

Register for this Course

NIST Cyber Security Professional (NCSP) Practitioner

This course details the current cybersecurity challenges plus teaches in depth the UMass Lowell NCSF Control Factory Methodology on how to build, test, maintain and continually improve a cybersecurity program based on the NIST Cybersecurity Framework. This program is focused on candidates who need a detailed understanding of the NCSF to perform their daily roles as cybersecurity engineers, testers or operations professionals. This course looks at cybersecurity risks and instructs students on the best approach to design and build a comprehensive technology focused cybersecurity program and business focused cyber-risk management program that will minimize risks, and at the same time, protect critical assets. Executives are keenly aware of the risks, but have limited knowledge on the best way to mitigate these risks. We will want to enable executives to answer the key question – Are we secure?

Course Objectives:

The NCSF Practitioner program teaches the knowledge to prepare for the NSCF Practitioner exam plus the skills and abilities to design, build, test, manage and improve a cybersecurity program based on the NCSF.

Delivery Method: Virtual Instructor Led Training

Intended Audience: Targeted at IT and Cybersecurity professionals looking to become certified on how to operationalize the NIST Cybersecurity Framework (NCSF) across an enterprise and its supply chain.

Register for this Course

CyberSec First Responder (CFR): Threat Detection and Response

The CyberSec First Responder: Threat Detection and Response course, or CFR, will prepare security professionals to become the first line of response against cyber-attacks by teaching students to analyze threats, design secure computing and network environments, proactively defend networks, and respond/investigate cybersecurity incidents.

Delivery Method: Virtual Instructor Led Training

Intended Audience: 

This course is designed for information assurance professionals who perform job functions related to the development, operation, management, and enforcement of security capabilities for systems and networks.

Register for this Course

Certified Information Security Manager (CISM)

In this course, students will establish processes to ensure that information security measures align with established business needs.

ETPL# 10130

Course Objectives:

  • Establish and maintain a framework to provide assurance that information security strategies are aligned with business objectives and consistent with applicable laws and regulations.
  • Identify and manage information security risks to achieve business objectives.
  • Create a program to implement the information security strategy.
  • Implement an information security program.
  • Oversee and direct information security activities to execute the information security program.
  • Plan, develop, and manage capabilities to detect, respond to, and recover from information security incidents.

Delivery Method:  Virtual Instructor Led Training

Intended Audience:  The intended audience for this course is information security and IT professionals, such as network administrators and engineers, IT managers, and IT auditors, and other individuals who want to learn more about information security, who are interested in learning in-depth information about information security management, who are looking for career advancement in IT security, or who are interested in earning the CISM certification.

Register for this Course