ID
7212

Securing Web Applications

This course teaches techniques used by attackers to breach Web applications and how to prevent security attacks. Topics include how to secure and manage assets such as authentication systems, access controls, databases, and back-end components, and how to protect users from attackers, including identifying common vulnerabilities in compiled code and source code.

Info Sec Professional (CISSP)

In-depth course in information security, including access control, application security, enterprise continuity, cryptography, technical risk management, physical security, and telecommunications and network security. This course supports preparation for the Certified Information Systems Security Professional (CISSP) credential, which is essential for high-level information security professionals.

Network Security

Knowledge and skills - to recognize security vulnerabilities, implement security measures, analyze network environments for known security threats or risks, defend against attacks or viruses, ensure data privacy and integrity. Terminology and procedures for implementation and configuration of security: access control, authorization, encryption, packet filters, firewalls and Virtual Private Networks (VPNs).

Internet Basics & Begin HTML

Methods of using the Internet. History, design and protocol methods used on Internet including: electronic mail, connection to remote computers, file transfer, World Wide Web, basic web page creation and publishing using HTML and CSS. Additional topics include: computer security, copyright and electronic commerce, and basic Unix shell commands requisite to shell account use.

Internet Basics & Begin HTML

Methods of using the Internet. History, design and protocol methods used on Internet including: electronic mail, connection to remote computers, file transfer, World Wide Web, basic web page creation and publishing using HTML and CSS. Additional topics include: computer security, copyright and electronic commerce, and basic Unix shell commands requisite to shell account use.

Advanced Ethical Hacking

Advanced techniques in ethical hacking of Windows and Linux systems. Hands-on labs include Google hacking, automated footprinting, sophisticated ping and port scans, privilege escalation, attacks against telephone and Voice over Internet Protocol (VoIP) systems, routers, firewalls, wireless devices, web servers, and Denial of Service attacks.

Wireless Networks, Advanced

Students will design, install, configure, manage, and maintain wireless networks with advanced fundamentals of WLANs, current and developing standards and protocols, boosting, detecting and extending signal, troubleshooting and monitoring the network, security issues, research of proposed security solutions. The course follows objectives for the Certified Wireless Network Administrator Exam (CWNA).