13 Courses:

  • Certified Wireless Security Engineer

    Wireless networks offer many conveniences that are not available on wired networks, but businesses need to understand security risks associated with those conveniences. The Certified Wireless Security Engineer is prepared to identify the risk that wireless networks expose businesses to and create...

    Delivery Method: In Person or Online

    Details

  • CISSM: Information Systems Security Manager

    The Certified Information Systems Security Manager certification Cyber Security Training Course is designed to teach towards and certify information systems professionals high standard of excellence in following areas: Information Security Governance Information Risk Management and Compliance...

    Delivery Method: In Person or Online

    Details

  • CISSO: Certified Information Systems Security Officer

    The CISSO covers all of the CISSP (10 Domain) exam objectives but allows the student to get certified with much more ease than the ISC2 exam process. Kevin Henry is the well-known security guru who created both these courses. The CISSO is the updated version with the latest and greatest content,...

    Delivery Method: In Person or Live Virtual or Online

    Details

  • Disaster Recovery Engineer

    Disaster recovery and business continuity planning is the process of having a professional work with a business to prepare processes, policies, and procedures to follow in the event of a disruption. The goal is to keep a businesses’ critical operations running, which today heavily relies on its...

    Delivery Method: In Person or Online

    Details

  • Information Systems Certification and Accreditation Professional

    The Information Systems Certification and Accreditation Professional training quantifies the process of certifying, reviewing and accrediting an information system by IT professionals. This certification is designed to provide, through its contents and referenced resources, a complete guide to...

    Delivery Method: In Person or Online

    Details

  • IS20 Security Controls3

    This IS 20 Controls course covers proven general controls and methodologies that are used to execute and analyze the Top Twenty Most Critical Security Controls. This course allows the security professional to see how to implement controls in their existing network(s) though highly effective and...

    Delivery Method: In Person or Online

    Details