Our CAP Boot Camp training program is consistently recognized as the most reputable course to and prepare you for the Certification and Accreditation (CAP) certification exam. The CAP exam is grown in popularity in the Information Assurance community in the previous few years. InfoSec Institute has responded to the need in the industry for a high quality CAP preparatory exam course with the 3-Day CAP Boot Camp Training course. CAP holders have the necessary skills and best practices to effectively perform tasks throughout the Certification and Accreditation (C&A) process.
This course will benefit companies, organizations, individuals and government security agencies intent on pursuing any corrective action, litigation or proof of guilt based on digital evidence.
This class will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. The content has been revised for the latest release of the Certified Ethical Hacker (CEH) v8 certification exam 312-50.
The 5 day instructor-led Certified Information Systems Security Manager certification course was designed to teach towards and certify a information systems professional’s high standard of excellence in following areas: -Information Security Governance -Information Risk Management and Compliance -Information Security Program Development and Management -Information Security Incident Management While we provide thorough training in these 4 critical areas of information systems security management, most who take the C)ISSM have professional experience in all four of these areas. A gap of experience in some of these fields can be bridged by achieving our C)ISSO: Certified Information Systems Security Officer Certification.
A CISSP is an information assurance professional who defines the architecture, design, management and/or controls that assure the security of business environments. The vast breadth of knowledge and the experience it takes to pass the exam is what sets a CISSP apart. The credential demonstrates a globally recognized level of competence provided by the (ISC)2® CBK®, which covers critical topics in security today, including cloud computing, mobile security, application development security, risk management and more.
This is a 5 day instructor-led Certified Information Systems Risk Manager course.
The CISSO covers all of the CISSP (10 Domain) exam objectives but allows the student to get certified with much more ease than the ISC2 exam process. Kevin Henry is the well-known security guru who created both these courses. The CISSO is the updated version with the latest and greatest content, which will also prepare the student for the CISSP exam. The CISSO course is designed for a forward-thinking security professional or consultant that manages or plays a key role in an organization’s information security department.
This training seminar provides a comprehensive review of information security concepts and industry best practices, covering the 8 domains of the CISSP CBK: •Security and Risk Management •Asset Security •Security Engineering •Communications and Network Security •Identity and Access Management •Security Assessment and Testing •Security Operations •Software Development Security
The Certified Network Forensics Examiner was originally developed for a U.S. classified government agency. The C)NFE takes a digital and network forensic skill set to the next level by navigating through over twenty modules of network forensic topics.
The Certified Penetration Testing Consultant course is our advanced course in our penetration testing track. The C)PTC is designed for cyber security professionals and IT network administrators who are interested in conducting Penetration tests against large network infrastructures, such as large corporate networks.
Certified Penetration Testing Engineer graduates will obtain real world security knowledge enabling them to recognize vulnerabilities, exploit system weaknesses, and safeguard organizations against threats. Graduates will learn the art of Ethical Hacking with a professional edge (Penetration Testing).
The Certified Professional Ethical Hacker course is the foundational training for the line of penetration testing courses.
The Certified Vulnerability Assessor training help students understand the importance of vulnerability assessments by providing intricate knowledge and skills in the Vulnerability Assessment arena. The CVA course provides foundational knowledge of general VA tools as well as popular exploits an IT engineer should be familiar with.
In this 2-day instructor-led classroom or online class, you will learn basic configuration and administration of the most commonly used features of FortiGate appliances. In interactive labs, you will explore firewall policies, user authentication, basic VPNs, explicit proxy, virus detection, web filtering, application control and more. These administrative fundamentals will provide you with a solid understanding of how to integrate and maintain basic network security.
In this 3-day instructor-led classroom or online class, which follows FortiGate I, you will learn a selection of advanced FortiGate networking and security features. Topics include features commonly used in complex or larger enterprise/MSSP networks, such as advanced routing, transparent mode, redundant infrastructure, security-as-a-service (SaaS), advanced IPsec VPN, IPS, SSO, certificates, data leak prevention, diagnostics, and fine-tuning performance.
The Fortinet NSE 4 Bundle class is a 5-day program including basic configuration and administration of the most commonly used features of FortiGate appliances and a selection of advanced FortiGate networking and security features.
This 5 day instructor-led class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems.
Learn the most effective steps to prevent attacks and detect adversaries with actionable techniques that you can directly apply when you get back to work. Learn tips and tricks from the experts so that you can win the battle against the wide range of cyber adversaries that want to harm your environment.
The best way to combat an attack on an organization's information assets is to have qualified information security professionals with the appropriate practices and controls to implement, monitor and administer IT infrastructure to ensure data confidentiality, integrity and availability. This official SSCP course validates student's ability to identify, evaluate, and prioritize potential threats, manage and mitigate threats through risk management concepts, assessment activities, and monitoring terminology, techniques and systems.