0
  • An empty cart

    You have no item in your shopping cart

0
  • An empty cart

    You have no item in your shopping cart

Enter your keyword

Cyber Security Training Courses

Cyber Security Training

CYBER SECURITY TRAINING COURSES

As more and more confidential information is stored and processed electronically, the risk of unauthorized access is on the rise. Data breaches and attacks make protection critical.

At National Business Training, our cyber security training courses are designed to ensure your organization is at a significantly reduced risk of an information breach and also minimizes negative impacts should a breach occur.

Available via live online classes, at our facility in Raleigh-Durham, NC, and on-site training throughout North Carolina including Fayetteville, Wilmington, Charlotte, Greenville/New Bern, Greensboro, Jacksonville, and Winston-Salem.

Cyber Security training courses and certification are primarily created by vendor-neutral vendors such as CompTIA, (ISC)² and EC-Council. These organizations are committed to setting strict cyber security standards that any organization can implement. Earning cyber security certifications from these vendor-neutral organizations is an ideal way to prove your skill and knowledge to your employer. We offer cyber security courses and certification from the following vendors:

Cyber Security Certifications

CompTIA Security+

CompTIA Security+ training from National Business Training provides an excellent introduction to the security field and is typically a better entry point than jumping right into an advanced security program. With Security+, you’ll build a solid foundation of knowledge that you can build upon—helping you advance your career in the months and years to come.

Whether your goal is to become Security+ certified for your job, to prove your basic knowledge of security concepts or to gain more knowledge to secure your network, expert training from National Business Training is the perfect solution.

Security+ certification candidates must pass one exam. Although not required, it is strongly recommended that candidates possess their A+ and Network+ Certifications.

Course: CompTIA Security+ Certification (2011 Objectives)
Exam: SY0-401: CompTIA Security+

Target Audience

This course is intended for students wishing to prepare for the CompTIA Security+ Certification Exam. The qualification is aimed primarily at networking professionals, but because security is vital to all levels and job roles within an organization, it will also benefit PC support analysts, application developers and senior managers in accounting, sales, product development and marketing.

At Course Completion

Upon successful completion of this course, students will learn:

  • Identify network attack strategies and defenses
  • Understand the principles of organizational security and the elements of effective security policies
  • Know the technologies and uses of encryption standards and products
  • Identify network- and host-based security technologies and practices
  • Describe how remote access security is enforced
  • Identify strategies for ensuring business continuity, fault tolerance and disaster recovery

 

About (ISC)2

(ISC)2 is a global non-profit organization whose primary goal is to help educate and certify Information Security professionals world-wide. Earning your (ISC)2 certifications is an excellent way to establish your knowledge and credibility.

Read descriptions of each of the (ISC)2 certifications and associated training below:

Certified Information Systems Security Professional (CISSP)

National Business Training is proud to be able to provide training to assist you in preparation for the CISSP Information Security Certification exam. The CISSP certification is a globally recognized information security certification governed and bestowed by the International Information Systems Security Certification Consortium, also known as (ISC)2. It was the first information security credential accredited by the international ANSI ISO/IEC Standard 17024:2003.

Course: Certified Information Systems Security Professional (CISSP)
Exam: Certified Information Systems Security Professional (CISSP)

About EC-Council

The International Council of Electronic Commerce Consultants (EC-Council) is a long-standing professional certification organization for IT Professionals. The EC-Council’s goal is to provide support for individuals who create and maintain security and IT systems.

Read descriptions of each of the EC-Council certifications and associated training below:

Certified Ethical Hacker (CEH)

Certified Ethical Hacker training and certification at National Business Training will help you learn to stop hackers by thinking and acting like one. The CEH training immerses students in an interactive environment where they will learn how to scan, test, hack, and secure their own systems. Students then learn how intruders escalate privileges and what steps can be taken to secure a system.

Course: EC-Council Computer Hacking Forensics Investigator (CHFI) v9.0
Exam: Certified Ethical Hacker (CEH)

The CEH certification will fortify the application knowledge of security officers, auditors, security professionals, site administrators and anyone who is concerned about the integrity of the network infrastructure.

Computer Hacking Forensic Investigator (CHFI)

The CHFI certification from EC-Council is an advanced certification for forensic network security investigators. As cybercrime has increased, the need for computer forensic investigators has grown dramatically. CHFI certified candidates may investigate invasion or theft of intellectual property, misuse of IT systems and violations of corporate IT usage policies.

Course: Computer Hacking Forensic Investigator (CHFI)
Exam: Computer Hacking Forensic Investigator (CHFI)

The CHFI course will give participants the necessary skills to identify an intruder’s footprints and to properly gather the necessary evidence to prosecute. Many of today’s top tools of the forensic trade will be taught during this course, including software, hardware and specialized techniques. The need for businesses to become more efficient and integrated with one another, as well as the home user, has given way to a new type of criminal, the “cyber-criminal.”

 Certified Security Analyst (ECSA)

In this course, students will learn EC-Council’s Licensed Penetrations Tester (LPT), a natural evolution and extended value addition to its series of security related professional certifications.

Course: Certified Security Analyst ECSA v9.0
Exam: EC-Council Certified Security Analyst ECSA v9.0

 

About ISACA

ISACA is an independent, non-profit global association founded in 1969 to provide guidance and benchmarks for information systems and risk management.

Certified Information Security Manager (CISM)

Demonstrate your information security management expertise. The uniquely management-focused CISM certification promotes international security practices and recognizes the individual who manages designs, and oversees and assesses an enterprise’s information security.

Course: Certified Information Security Manager (CISM)
Exam: Certified Information Security Manager Exam (CISM)

This course is aligned with objectives established by the Information Systems Audit and Control Association (ISACA) for the CISM exam.

WHAT IS PENETRATION TESTING?

A penetration test subjects a system or a range of systems to real life security tests. The benefit of a complete penetration suite compared to a normal vulnerability scan system is to reach beyond a vulnerability scan test and discover different weaknesses and perform a much more detailed analysis. The user can perform specified attacks in high detail depending on his specific choices and needs. This is normally done via the many advanced techniques and utilities of a security consultant.

Penetration Testing Compared to Vulnerability Scanning

The advantage of a penetration test compared with an automated vulnerability scan is the involvement of the human element versus automated systems. A human can do several attacks based on skills, creativity. and information about the target system that an automated scanning can not do.

Several techniques like social engineering can usually be done by humans alone since it requires physical techniques that have to be performed by a human and is not covered by an automated system.

Advance your Information Security knowledge and become a specialist in Penetration Testing with training from New Horizons Albany.

Foundations and Prerequisites

The following courses are recommended or relevant experience:

Core Classes

  • Certified Ethical Hacking (CEH)
  • Advanced Ethical Hacking
  • Reverse Engineering

Specialization – select one

  • Expert Penetration Testing
  • Advanced Reverse Engineering

The Penetration Test Process

Discovery: The Penetrator performs information discovery via a wide range of techniques—that is, whois databases, scan utilities, Google data, and more—in order to gain as much information about the target system as possible. These discoveries often reveal sensitive information that can be used to perform specific attacks on a given machine.

Enumeration: Once the specific networks and systems are identified through discovery, it is important to gain as much information possible about each system. The difference between enumeration and discovery depends on the state of intrusion. Enumeration is all about actively trying to obtain usernames as well as software and hardware device version information.

Vulnerability Identification: The vulnerability identification step is a very important phase in penetration testing. This allows the user to determine the weaknesses of the target system and where to launch the attacks.

Exploitation and Launching of Attacks: After the vulnerabilities are identified on the target system, it is then possible to launch the right exploits. The goal of launching exploits is to gain full access of the target system.

Denial of Service: A DOS (Denial of Service) test can be performed to test the stability of production systems in order to show if they can be crashed or not. When performing a penetration test of a preproduction system, it is important to test its stability and how easily can it be crashed. By doing this, its stability will be ensured once it is deployed into a real environment.

It is important to perform DOS testing to ensure the safeness of certain systems. If an attacker takes down your system during busy or peak hours, both you and your customer can incur a significant financial loss.

Reporting: After the completion of the penetration test, it is important to get user-customized reporting suites for a technical and/or management overview. This includes the executive summary, detailed recommendations to solve the identified vulnerabilities, and official security ID numbers for the vulnerabilities. The reports come in different formats such as html, pdf, and xml. Furthermore, all the reports are open to be modified as of the user’s choice.

Information Security Courses

National Business Training - Computer Training
3

Certified Information Security Manager (CISM)

$1,725.00

In this course, students will establish processes to ensure that information security measures align with established business needs.

National Business Training - Computer Training
3

Certified Information System Security Professional (CISSP)

$3,295.00

In this course, students will analyze a wide range of information systems security subjects that are organized into 8 domains for CISSP exam certification.

National Business Training - Computer Training
3

Cisco Implementing Cisco Network Security v3.0 (IINS)

$3,495.00

Implementing Cisco Network Security (IINS) v3.0 is a 5-day instructor-led course focusing on security principles and technologies, using Cisco security products to provide hands-on examples. Using instructor-led discussions, extensive hands-on lab exercises, and supplemental materials, this course allows learners to understand common security concepts, and deploy basic security techniques utilizing a variety of popular security appliances within a real-life network infrastructure.

National Business Training - Computer Training
3

Cisco Implementing Core Cisco ASA Security v1.0 (SASAC)

$3,495.00

This course provides update training on the key features of the post-8.4.1 release of the Cisco ASA adaptive security appliance, including 9.x features.

National Business Training - Computer Training
3

CompTIA Advanced Security Practitioner (CASP)

$2,995.00

In this course, you will expand on your knowledge of information security to apply more advanced principles that will keep your organization safe from the many ways it can be threatened. This course prepares students for the CAS-002 exam.

National Business Training - Computer Training
3

CompTIA Security+ Certification

$2,875.00

In this course, students learn in detail the different standard & advanced availability check capabilities of the integrated SAP APO Global-Available to Promise component, embedded in corresponding business scenarios & along with the relevant settings.

National Business Training - Computer Training
3

CyberSAFE (Securing Assets for the End User)

This course will help you to understand security compliance considerations, social engineering, malware, and various other data security-related concepts. In this course, you will explore the hazards and pitfalls and learn how to use technology safely.

National Business Training - Computer Training
3

CyberSec First Responder: Threat Detection and Response

$2,875.00

This course is designed for information assurance professionals who perform job functions related to the development, operation, management, and enforcement of security capabilities for systems and networks.

National Business Training - Computer Training
3

EC-Council Certified Ethical Hacker (CEH)

$3,495.00

In 18 comprehensive modules, the course covers 270 attack technologies, commonly used by hackers. Throughout the CEH course, you will be immersed in a hacker’s mindset, evaluating not just logical, but physical security.

National Business Training - Computer Training
3

EC-Council Certified Security Analyst ECSA v9.0

$3,495.00

In this course, students will learn EC-Council’s Licensed Penetrations Tester (LPT), a natural evolution and extended value addition to its series of security related professional certifications.

National Business Training - Computer Training
3

EC-Council Computer Hacking Forensics Investigator (CHFI) v9.0

$3,495.00

This course provides update training on the key features of the post-8.4.1 release of the Cisco ASA adaptive security appliance, including 9.x features.