Available Courses
Get Help
Help
Course Name
4 9 900.00
Business Continuity and Disaster Recovery

This course prepares IT professionals for worst-case scenarios through the creation of a business impact analysis, business continuity plan, and disaster recovery plan.

5 10 900.00
Computer Forensics Evidence Collection

This course teaches fundamental data collection and analysis techniques used in digital forensic investigations.

1 6 900.00
Ethical Hacking Tools and Techniques

Learn how to use common hacking tools and techniques in order to protect, rather than exploit, networks and confidential data.

3 8 900.00
Information Security and Risk Management Planning

Business managers and IT professionals alike depend on risk management to make appropriate decisions for their organizations. This course covers the essentials of risk management, examines the COBIT framework for risk management, and helps you learn how to create a risk management plan.

8 16 900.00
Locking Down Linux User Accounts, Filesystems, and Services

Learn how to secure Linux servers and clients using iptables, SELinux, password policy definitions, quotas, and more.

2 7 900.00
Managing Information Security Risks, Threats, and Vulnerabilities

Geared toward entry-level IT professionals, this course addresses mitigation techniques that reduce risk to IT environments. Topics include port scans, vulnerability assessments, and virus scans.

6 12 900.00
Network Security Essentials

Learn the basics of network documentation, protocol analysis, port scanning, and vulnerability assessments.

9 19 900.00
Protecting Networks with Firewalls and VPNs

This course explores firewall fundamentals, rules, filters, design strategies, and deployment best practices. Students also learn about virtual private networks (VPNs) for secure remote access.

10 20 900.00
Protecting Windows Systems with Access Controls, Encryption, and Group Policy

In this course, you'll get hands-on experience configuring and managing security on Windows servers and clients. Topics include access controls and authentication, encryption, application rules, and Group Policy objects.

7 14 900.00
Securing Web Applications

This course explores risk management in Web applications, identifying and classifying weaknesses, and strategies for developing secure Web applications.

Cart
Copyright 2013 Infosec Learning, LLC.