courses

Unlike the other, we know you can study without putting your life on
hold. We provide flexible learning that's highly affordable to all.
Gain knowledge and skills that you can apply immediately to your career.
Invest in your future with a valuable education that will have a
lasting impact on your life and career.
The following list is just a brief sample of the courses we have experience teaching.
Please contact us for more details
Security Training
A brief introduction to course outline
- Windows and Linux Commands
- Network device, Topology and Design
- Coding Language
- Web Application and OWASP ToP 10
- Database (SQL and No SQL)
- Active Directory
- Network and Application Scanning
A brief introduction to course outline
- Asset Discovery
- Network and Host Scanning
- Web Application Scanning
- Identiying False Positive
- Mapping vulnerbility to NIST/ISO/HITRUST Controls
A brief introduction to course outline
- Preparing and Conducting Kick Off Meeting
- Security Assessment Plan
- Preparing Evidence Request List (ERL)
- Conducting Security Assessment
- Analyzing Evidence Collected
- Document Assessment Result in Workbook
- Developing Security Assessment Report (SAR)
- Preparing ATO Package
A brief introduction to course outline
- Gain Knowledge of SOC processes, procedures, technologies, and workflows
- Gain in-depth knowledge of security threats, attacks, vulnerabilities, attacker’s behaviors, cyber killchain, etc.
- Able to recognize attacker tools, tactics, and procedures to identify indicators of compromise (IOCs)
- Able to monitor and analyze logs and alerts from a variety of different technologies across multiple platforms
- Gain knowledge of administering SIEM solutions (Splunk/AlienVault/OSSIM/ELK)
- Plan, organize, and perform threat monitoring and analysis in the enterprise
- Gain hands-on experience in the alert triaging process
- Able to escalate incidents to appropriate teams for additional assistance
- Able to use a Service Desk ticketing system
- Gain knowledge of integrating threat intelligence into SIEM for enhanced incident detection and response
- Gain understating of SOC and IRT collaboration for better incident response
A brief introduction to course outline
- Information Gathering
- Spidering
- Fuctionality Mapping
- Scanning
- OWASP Testing Guide
- API Testing/SOAP/REST
- Report
A brief introduction to course outline
- Comprehensive Pen Test Planning, Scoping and Recon
- In-Depth Scanning
- Exploitation and Post Exploitation
- Password Attacks and Merciless Pivoting
- Wireless and Web Apps Penetration Testing
Delivery Method
All of our courses have been taught as instructor-led classroom sessions with a heavy emphasis on hands-on training where appropriate. We have also offered several courses through interactive video or online platforms. It is critical to the success of a course that we choose the optimum delivery method considering the location of the attendees and the material. The table below lists the different delivery methods we offer.
Method | Ideal Audiences | Ideal Subjects | Benefits |
---|---|---|---|
Instructor-led | General staff and management | Awareness courses, topical security training, certification and higher-level education courses | A subject matter expert leads the discussions and can immediately respond to questions |
Hands-on laboratory | Technical staff (network managers and engineers, system/security administrators) | Technology hardware, software, and tool training | Attendees work directly with the products in real time |
Offline computer-based training | Multiple levels of organizational staff | Static training and awareness material, general or topical information | Wide target audience reach, cost savings, and consistency in message delivery |
Online interactive training using Adobe Connect | Multiple levels of organizational staff, staff in remote locations | Interactive subjects, technical or general awareness training, certification and higher-level education courses | A subject matter expert is immediately available via chat and other communication tools |