...and destructive viruses function and how to implement counter response and preventative measures when it comes to a network hack. NamePriceCPEH: Certified Professional Ethical Hacker - Exam Combo $500.00 CPEH:......
...controls appropriate to the business needs in order to reduce business risk. Once you have completed this course, you will have learned everything you need know know to move forward......
...overflow against programs running on Windows and Linux while subverting features such as DEP and ASLR. Related Training NamePriceCPTC: Certified Penetration Testing Consultant - Exam Combo $500.00 CPTC: Certified Penetration......
The Certified Powershell Hacker, C)PSH, course is an intense few days covering the keys to being a Powershell hacker. Most companies have an Active Directory infrastructure that manages authentication and......
...and Global Compliance Standards II * Everyone * End Users * Employees with access to computers * Managers Upon completion, the Certified Security Awareness 2 candidate will not only be......
This fast paced, deep dive, hands-on course provides not only the foundation needed for highly secure deployment of VMware vSphere, it also provides a complete understanding of the CIA triad......
...will be able to competently take the C)OST & C)HT exams well as the CompTIA A+ 220-1002 exam. All Mile2 certifications will be awarded a 3-year expiration date. There are......
...against all attacks through designing and building systems that are resistant to failure. With this course you will learn how to develop web applications that aren’t subject to common vulnerabilities,......
...ISO’s Upon completion, the Certified Security Leadership Officer candidate be able to competently take the C)SLO exam. You will be versed in implementing strong security controls and managing an organization......
...we offer the C)ISRM course as both a live class and a self-study combo. First, you will learn to assess a system, then implement risk controls. Finally, you will be......