Network Traffic Analysis with Wireshark...
This packet analysis course focuses on capturing, filtering, and analyzing network traffic to identify security vulnerabilities, track down network intrusions, troubleshoot network issues, and perform network forensics. The course includes real-world, hands-on scenarios featuring packet captures from network attacks and forensics investigations. Attendees will learn how to reconstruct network intrusions and extract information, such as credent...
CISSP Certification Training - Includes Exam
This CISSP Certification Exam Prep course will expand upon your knowledge by addressing the essential elements of the eight domains that comprise a Common Body of Knowledge (CBK) for information systems security professionals. The course offers a job-related approach to the security process, while providing a framework to prepare for CISSP certification.
CompTIA Security+ Certification Training
This course meets Monday-Thursday from 5:30pm to 9:30 pm for 8 nights. This CompTIA Security+ Exam Preparation course includes a FREE Exam voucher. This Security+ training is recommended if your job responsibilities include securing network services, devices, or traffic in your organization. The primary focus of this course is to prepare for the CompTIA Security+ certification examination. In this training, you will build on your knowledge and...
October 29 - November 8, 2018
Organizer:
Alpine Security Location:
O'Fallon, IL
CAP (Certified Authorization Profession...
The CAP certification allows you to prove your cybersecurity expertise within the Risk Management Framework (RMF). Take your commitment to cybersecurity assessment and authorization to a new level with the CAP certification. This leading information security certification proves you’re an expert aligning information systems with the Risk Management Framework (RMF).
October 29 - November 1, 2018
Organizer:
Alpine Security Location:
O'Fallon, IL
Certified Ethical Hacker (CEHv10) Certi...
This is the world's most advanced ethical hacking course with 18 of the most current security domains any ethical hacker will ever want to know when they are planning to beef up the information security posture of their organization. In 18 comprehensive modules, the course covers over 270 attack technologies, commonly used by hackers. When you sign up for this course you have the option to also purchase the CEH Practical exam voucher.
EC-Council Certified Security Analyst (...
The course meets Monday- Thursday from 5:30 pm to 9:30 pm for 8 nights. The ECSA program takes the tools and techniques you learned in the Certified Ethical Hacker (CEH) course and elevates your ability into full exploitation by teaching you how to apply the skills learned in CEH by utilizing EC-Council’s published penetration testing methodologies. It is a highly interactive, comprehensive, standards-based and methodology intensive 5-da...
NASA SEWP at Imagine Nation - ELC 2018...
Deep Dive into NASA SEWP's Acquisition Tips, Tools and Innovations Get a Deep Dive into NASA SEWP - this session starts with a quick overview of the NASA Solutions for Enterprise-Wide Procurement (SEWP) contract vehicle and promptly moves to an interactive web-based demonstration with participant engagement activities. You will learn in-depth details on SEWP as an IT acquisition vehicle that provides simplified acquisitions using customer frie...
October 14, 2018
Organizer:
ACT-IAC Location:
Philadelphia, PA
Community SANS Training in New York - D...
Join us at Community SANS in New York to attend one of our most popular SANS classes. Benefit from small class settings with great instructors. An opportunity for networking and above all, content that delivers on the SANS promise that you will be able to use what you learn the first day you return to your office. New York, NYDEV522: Defending Web Applications Security Essentials September 17-22, 2018Certification: GIAC Certified Web Applica...
Writing Persuasive Federal Proposals -...
This one-of-a-kind course shows how to develop compliant and highly persuasive proposal sections in at least half the time that it would normally take. It covers detailed methods for outlining within the sections, developing section content, infusing proper structure and flow, and implementing correct writing processes and section planning techniques. But this course reaches beyond mere compliance. You will acquire techniques and tools that wi...
F5 Gov TechTalk - Charleston
Traditional firewalls (Layer 3-4) are purpose built to prevent external access to internal network resources, but these traditional firewalls offer little to no application layer protection. Threat vectors exist today at all layers of the network. Slowloris and HTTP flood attacks are examples of layer 7 attacks which would be undetected by most network firewalls. The impact of these undetected layer 7 attacks is the disruption of your mission...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.