Social Engineering in IT Security: Tools, Tactics, and Techniques Author: Sharon Conheady ISBN-13:

Size: px
Start display at page:

Download "Social Engineering in IT Security: Tools, Tactics, and Techniques Author: Sharon Conheady ISBN-13: 9780071818469"

Transcription

1 Social Engineering in IT Security: Tools, Tactics, and Techniques Author: Sharon Conheady ISBN-13: Pub Date: AUGUST 2014 Price: $ AUD $ NZD Edition: 1 Previous ISBN: Subject: Computers - Security / General Trim Height: 24 cm Trim Width: 19 cm Pages: 352 Format : Softcover INTRODUCTION Filled with cutting-edge social engineering testing techniques that are legally and ethically sound Social Engineering in IT Security details the roots and rise of social engineering, key legal and ethical aspects to understand before contracting to perform a test, and how and why social engineering works. The book fully explains how to plan for a social engineering test, perform reconnaissance, create scenarios, implement the test, and accurately report the results. Specific measures security managers can take to defend against weaknesses a social engineer could exploit are discussed. Offers a front-row seat with Sharon Conheady, social engineering s rising star and exceedingly in-demand social engineering speaker Includes a legal reference covering both the U.S. and Europe

2 Walks though considerations that go into the social engineer s Client Agreement Letter DESCRIPTION Filled with cutting-edge social engineering testing techniques that are legally and ethically sound Social Engineering in IT Security details the roots and rise of social engineering, key legal and ethical aspects you need to understand before contracting to perform a test, and how and why social engineering works. The book fully explains how to plan for a social engineering test, perform reconnaissance, create scenarios, implement the test, and accurately report the results. Specific measures security managers can take to defend against weaknesses a social engineer could exploit are discussed. Offers a front-row seat with Sharon Conheady, a highly in-demand social engineering speaker and trainer Includes a legal reference covering both the U.S. and Europe Walks though considerations that go into the social engineer s client agreement letter Complete with examples of post-test reports to make your own report writing as solid as possible ABOUT THE AUTHOR Sharon Conheady (London, England) is Director of Social Engineering & Penetration Testing at First Defence Information Security in the UK. She leads social engineering training seminars and has spoken around the world on the topic.

3 Incident Response and Computer Forensics, Third Edition Author: Jason Luttgens, Matthew Pepe, Kevin Mandia ISBN-13: Pub Date: AUGUST 2014 Price: $ AUD $ NZD Edition: 3 Previous ISBN: Subject: Comput ers - Security / General Trim Height: 24 cm Trim Width: 19 cm Pages: 544 Format : Softcover INTRODUCTION The all-new edition of the market's top-selling incident response book covers the latest techniques, tools, and case scenarios to help incident responders react quickly and efficiently to data breaches. Incident Response and Computer Forensics, Third Edition is a fully updated edition of the bestselling technical guide that arms information security professionals with the right know-how to get their organizations out of trouble. This new edition is chock-full of updates about tools and techniques as well as new real-world scenarios reflecting today s most common types of incidents. Detailed advice covers all aspects of incident investigation and handling, with an emphasis on forensics--knowing where and how to look into computers for evidence of wrongdoing. New chapters on investigation techniques, indicators of compromise, and remediation

4 New advice on architecting networks from the ground-up to fight intrusions and on streamlining intrusion diagnoses for faster recovery Substantial updates on investigating Windows systems, malware analysis, memory analysis, application analysis, data collection, report writing, and incident management DESCRIPTION The all-new edition of this security bestseller covers the latest techniques, tools, and case scenarios to help incident responders react quickly and efficiently to data breaches. Incident Response and Computer Forensics, Third Edition is a fully updated edition of the bestselling technical guide that arms you with the right know-how to get your organization out of trouble when data breaches occur. This new edition is chock-full of updates about tools and techniques as well as new real-world scenarios reflecting today s most common types of incidents. Detailed advice covers all aspects of incident investigation and handling, with an emphasis on forensics--knowing where and how to look into computers for evidence of wrongdoing. New chapters on investigation techniques, indicators of compromise, and remediation New advice on architecting networks from the ground-up to fight intrusions and on streamlining intrusion diagnoses for faster recovery Substantial updates on investigating Windows systems, malware analysis, memory analysis, application analysis, data collection, report writing, and incident management The most relevant tips and tricks for a forensics-forward approach to handling and protecting sensitive data without compromising systems further New and updated information for managers and business leaders to prepare for and manage an incident ABOUT THE AUTHOR Jason Luttgens is technical director for security consulting firm Mandiant. He served in NASA s OIG Computer Crimes Division as a technical director and as a forensics investigator for the Department of Defense. Matt Pepe has served as technical director for security consulting firm Mandiant for seven years, following his role as principal consultant with Foundstone where he performed forensic analysis in more than 100 Federal investigations. Kevin Mandia is president of security consulting firm Mandiant, which specializes in incident response, computer forensics, and IT security, and provides services, products, and education to commercial and Federal clients.

5 CHFI Computer Hacking Forensic Investigator Certification All-in-One Exam Guide Author: Charles L. Brooks ISBN-13: Pub Date: AUGUST 2014 Price: $ AUD $ NZD Edition: 1 Previous ISBN: Subject: Comput ers - Certification Guides / General Trim Height: cm Trim Width: cm Pages: 656 Format : Hardcover with CDROM INTRODUCTION An all-new exam guide for version 8 of the Computer Hacking Forensic Investigator (CHFI) exam from EC-Council The CHFI exam validates the skills necessary to detect hacking attacks and to properly gather the evidence necessary to prosecute in a court of law. CHFI Computer Hacking Forensic Investigator All-in-One Exam Guide offers 100% coverage of all exam objectives. The book features learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Beyond exam prep, this definitive guide also serves as an on-the-job reference for forensic investigators. Electronic content includes two practice exams and a PDF ebook CHFI is an international, vendor-neutral certification offered in more than 87 countries

6 worldwide and is the next step after EC-Council's CEH certification DESCRIPTION An all-new exam guide for version 8 of the Computer Hacking Forensic Investigator (CHFI) exam from EC-Council CHFI Computer Hacking Forensic Investigator All-in-One Exam Guide offers 100% coverage of all exam objectives on the CHFI exam which validates the skills necessary to detect hacking attacks and to properly gather the evidence necessary to prosecute in a court of law. The book features learning objectives at the beginning of each chapter, exam tips, practice exam questions, and indepth explanations. Beyond exam prep, this definitive guide also serves as an on-the-job reference for forensic investigators. Electronic content includes two practice exams and a PDF ebook An authoritative, cost-effective way to prepare for this challenging exam Includes real-world examples of successful computer forensics investigations ABOUT THE AUTHOR Charles L. Brooks, CHFI, (Watertown, MA) provides network security consulting services to SOHO businesses. He also teaches graduate courses on network and software security at Brandeis University.

7 CompTIA Mobility+ Certification All-in-One Exam Guide (Exam MB0-001) Author: Bobby E. Rogers ISBN-13: Pub Date: AUGUST 2014 Price: $ AUD $ NZD Edition: 1 Previous ISBN: Subject: Comput ers - Certification Guides / General Trim Height: cm Trim Width: cm Pages: 512 Format : Hardcover with CDROM INTRODUCTION A new exam guide for the all-new certification on mobile computing technologies from CompTIA CompTIA Mobility+ All-in-One Exam Guide (Exam MB0-001) covers 100% of the exam objectives for this new certification that validates the knowledge and skills required to understand and research capabilities of mobile devices and features of over-the-air technologies. The book features learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Beyond exam prep, this definitive guide also serves as an on-the-job reference for IT practitioners working in mobile computing environments. Electronic content includes two practice exams and a PDF ebook CompTIA reviewed and approved: CompTIA Approved Quality Content (CAQC)

8 DESCRIPTION A new exam guide for the all-new certification on mobile computing technologies from CompTIA CompTIA Mobility+ All-in-One Exam Guide (Exam MB0-001) covers 100% of the exam objectives for this new certification that validates the knowledge and skills required to understand and research capabilities of mobile devices and features of over-the-air technologies. The book contains learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. This definitive guide also serves as an on-the-job reference for IT practitioners working in mobile computing environments. Electronic content includes two practice exams and a PDF ebook CompTIA reviewed and approved: CompTIA Approved Quality Content (CAQC) Authoritative coverage of enterprise-level mobile computing technologies ABOUT THE AUTHOR Bobby E. Rogers, CompTIA A+, CompTIA Security+, CCNA, CISSP, CHFI, CEH, (Huntsville, AL) is a principal information assurance analyst for Dynetics, Inc.

9 CEH Certified Ethical Hacker Practice Exams, Second Edition Author: Matt Walker ISBN-13: Pub Date: AUGUST 2014 Price: $ AUD $ NZD Edition: 2 Previous ISBN: Subject: Comput ers - Certification Guides / General Trim Height: cm Trim Width: cm Pages: 320 Format : Softcover INTRODUCTION More than 500 simulated CEH exam questions covering the latest exam release Fully revised for the new CEH v.8 exam objectives from the EC-Council, CEH Certified Ethical Hacker Practice Exams, Second Edition provides 500+ knowledge- and scenario-based practice exam questions that simulate the actual exam questions in content, style, tone, format, and difficulty. In-depth answer explanations for both the correct and incorrect answers are provided. This practical resource is the perfect companion to CEH Certified Ethical Hacker All-in-One Exam Guide, Second Edition. Electronic content includes two complete practice exam simulations and a PDF c opy of the book New coverage includes advanced hacking concepts, mobile platforms, tablet computer

10 hacking techniques, and real-time case studies DESCRIPTION Test yourself with 500+ simulated CEH exam questions covering the latest exam release--v.8 Fully revised for the new CEH v.8 exam objectives from the EC-Council, CEH Certified Ethical Hacker Practice Exams, Second Edition provides 500+ knowledge- and scenario-based practice exam questions that simulate the actual exam questions in content, style, tone, format, and difficulty. In-depth answer explanations for both the correct and incorrect answers are provided. This practical resource is the perfect companion to CEH Certified Ethical Hacker All-in-One Exam Guide, Second Edition. Electronic content includes two complete practice exam simulations and a PDF copy of the book New coverage includes advanced hacking concepts, mobile platforms, tablet computer hacking techniques, and real-time case studies Covers DOD 8570 requirements and US-CERT s EBK and Certified Computer Security Incident Handler (CSIH) standards ABOUT THE AUTHOR Matt Walker, CCNA, CCNP, MCSE, CEH, CNDA, CPTS (Satellite Beach, FL) is an IT Security Architect for HP at Kennedy Space Center. He has held a variety of networking and IT Security positions, most recently the IT Security Manager positions at Marshal Space Flight Center (SAIC contract).

11 OCM Java EE 6 Enterprise Architect Exam Guide (Exams 1Z0-807, 1Z0-865 & 1Z0-866) Author: Paul Allen, Joseph Bambara ISBN-13: Pub Date: AUGUST 2014 Price: $ AUD $ NZD Edition: 3 Previous ISBN: Subject: Comput ers - Certification Guides / General Trim Height: cm Trim Width: cm Pages: 672 Format : Softcover with CDROM INTRODUCTION The only exam guide for all three exams required to achieve the elite Oracle Certified Master Java Enterprise Edition 6 Enterprise Architect certification The Oracle Certified Master Java EE 6 Enterprise Architect examination track consists of three exams: a knowledge-based multiple-choice exam, a programming assignment, and an essay exam. OCM Java EE 6 Enterprise Architect Exam Guide (Exams 1Z0-807, 1Z0-865 & 1Z0-866) covers 100% of the exam objectives and addresses the three exams and their formats. The book's end of chapter multiple-choice questions are accompanied by in-depth answer explanations. A sample case study with essay questions helps readers prepare for both the programming assignment and the essay exam. Electronic content includes two multiple-choice practice exams and a PDF ebook Written by industry experts Joseph J. Bambara and Paul R. Allen and crafted from

12 hundreds of hours of experience teaching Java technologies to students DESCRIPTION From Oracle Press--the only exam guide for all three exams required to achieve the Oracle Certified Master Java Enterprise Edition 6 Enterprise Architect certification The Oracle Certified Master Java EE 6 Enterprise Architect examination track consists of three exams: a knowledge-based multiple-choice exam, a programming assignment, and an essay exam. OCM Java EE 6 Enterprise Architect Exam Guide (Exams 1Z0-807, 1Z0-865 & 1Z0-866) covers 100% of the exam objectives and addresses the three exams and their formats. The book's end-of-chapter multiple-choice questions are accompanied by in-depth answer explanations. A sample case study with essay questions helps you prepare for both the programming assignment and the essay exam. Electronic content includes two multiple-choice practice exams and a PDF ebook Authoritative exam prep from Oracle Press Written by industry experts Joseph J. Bambara and Paul R. Allen and crafted from hundreds of hours of experience teaching Java technologies to students ABOUT THE AUTHOR Paul R. Allen (New York, NY) is a principal of UCNY, Inc., an international consulting firm that helps Fortune 500 companies improve operations through the use of web, database, and object technology. Joseph J. Bambara (New York, NY) is a principal of UCNY, Inc. He has been developing application systems for more than 30 years and is also an attorney specializing in intellec tual property.

13 Predictive Analytics Using Oracle Data Miner: Develop & Use Data Mining Models in ODM, SQL & PL/SQL Author: Brendan Tierney ISBN-13: Pub Date: AUGUST 2014 Price: $ AUD $ NZD Edition: 1 Previous ISBN: Subject: Comput ers - Databases / Data Mining Trim Height: 24 cm Trim Width: 19 cm Pages: 448 Format : Softcover INTRODUCTION The only Oracle Press guide to developing next-generation predictive analytics applications with Oracle Data Miner Predictive analytics is the most technically sophisticated approach to staying ahead of competitors using advanced techniques to find patterns in enterprise data. Written by an Oracle ACE Director, Predictive Analytics Using Oracle Data Miner shows how to use this powerful tool to build and apply advanced data mining models and perform data mining tasks in SQL and PL/SQL. Guidance on how to migrate the data mining models from a test environment to a production environment is included. Best practices for creating predictive models that help target key customers, develop detailed customer profiles, find and prevent fraud, stay ahead of the competition, and realize greater profits

14 Reveals how to unlock the power of native SQL functions within the Oracle Database DESCRIPTION The only Oracle Press guide to developing next-generation predictive analytics applications with Oracle Data Miner Predictive analytics is the most technically sophisticated approach to staying ahead of competitors using advanced techniques to find patterns in enterprise data. This is an essential how-to guide for data scientists, data miners, data analysts, Oracle developers, and DBAs. Written by an Oracle ACE Director, Predictive Analytics Using Oracle Data Miner shows you how to use this powerful tool to build and apply advanced data mining models and perform data mining tasks in SQL and PL/SQL. Guidance on how to migrate the data mining models from a test environment to a production environment is included. Best practices for creating predictive models that help target key customers, develop detailed customer profiles, find and prevent fraud, stay ahead of the competition, and realize greater profits Reveals how to unlock the power of native SQL functions within the Oracle Database ABOUT THE AUTHOR Brendan Tierney, Oracle ACE Director (Dublin, Ireland), an independent consultant, lectures on data mining and advanced databases at the Dublin Institute of Technology.

15 Oracle PL/SQL Performance Tuning Tips & Techniques Author: Michael Rosenblum, Paul Dorsey ISBN-13: Pub Date: AUGUST 2014 Price: $ AUD $ NZD Edition: 1 Previous ISBN: Subject: Computers - Programming Languages / SQL Trim Height: 24 cm Trim Width: 19 cm Pages: 320 Format : Softcover INTRODUCTION Best practices for improving overall speed, reliability, and security An intermediate guide for developers and programmers wanting to become problemsolving experts Includes all changes and updates for Oracle Database 12c Filled with real-world examples, scenarios, and solutions, plus code samples online DESCRIPTION Proven PL/SQL optimization solutions from Oracle Press Oracle PL/SQL Performance Tuning Tips & Techniques presents a hands-on approach to enabling better, faster, and safer results from PL/SQL. This is an intermediate guide for developers and programmers wanting to achieve profound results by deploying the latest and best methods for improving overall speed, reliability, and security. You will learn expert performance tuning

16 methods that draw on decades of professional experience. A wide array of real-world examples are included. Coverage includes: The role of PL/SQL in contemporary development; The concept of performance tuning; DBA/developer borderline: tools/features/setup; Performance measuring techniques; Tuner's toolkit; Thinking in SETs; Pulling a trigger; Doing more; Do more with LESS; Keeping the cache; Shooting moving target; Effective utilization of PL/SQL in the web environment; Version control and editions; Tips, tricks and ideas ABOUT THE AUTHOR Michael Rosenblum is a Software Architect/Senior DBA at Dulcian, Inc., where he is responsible for system tuning and application architecture. Michael supports Dulcian developers by writing complex PL/SQL routines and researching new features. He is an Oracle ACE, a frequent presenter at various Oracle user group conferences (Oracle OpenWorld, ODTUG, IOUG Collaborate, RMOUG, NYOUG), and winner of the ODTUG Kaleidoscope 2009 Best Speaker Award. In his native Ukraine, Michael received the scholarship of the president of Ukraine, a master of science degree in information systems, and a diploma with honors from the Kiev National University of Economics. Dr. Paul Dorsey is the founder and president of Dulcian, Inc., an Oracle consulting firm specializing in business rules and web-based application development. He is the chief architect of Dulcian's Business Rules Information Manager (BRIM ) tool. Dr. Dorsey is the co-author of seven Oracle Press books on Designer, Database Design, Developer, and JDeveloper, which have been translated into nine languages. He is an Oracle Fusion Middleware Regional Director. Paul is President Emeritus of NYOUG and the Associate Editor of the International Oracle User Group's SELECT Journal. In 2003, Dr. Dorsey was honored by ODTUG as volunteer of the year, in 2001 by IOUG as volunteer of the year, and by Oracle as one of the six initial honorary Oracle 9i Certified Masters. Dr. Dorsey is also the founder and Chairperson of the ODTUG Symposium, currently in its eighth year. His submission of a Survey Generator built to collect data for The Preeclampsia Foundation was the winner of the 2007 Oracle Fusion Middleware Developer Challenge.

Performance Considerations for Web Applications

Performance Considerations for Web Applications Performance Considerations for Web Applications By Dr. Paul Dorsey & Michael Rosenblum, Dulcian, Inc. Many of the performance tuning techniques applied to client/server applications that consisted of rewriting

More information

$ 39.95 AUD $ 46.00 NZD

$ 39.95 AUD $ 46.00 NZD QuickBooks 2015: The Guide for Small Business Success Author: Leslie Capachietti ISBN-13: 9780071850230 Pub Date: DECEMBER 2015 Price: $ 39.95 AUD $ 46.00 NZD Edition: 1 Previous ISBN: Subject: Computers

More information

Title: Hacking Exposed Malware & Rootkits: Security Secrets and Solutions, 2/e

Title: Hacking Exposed Malware & Rootkits: Security Secrets and Solutions, 2/e Title: Hacking Exposed Malware & Rootkits: Security Secrets and Solutions, 2/e Authors: Christopher Elisan, Michael Davis, Sean Bodmer, Aaron LeMasters APRIL 2015 9780071823074 Pre ISBN info: 9780071591188

More information

Social Media Security Training and Certifications. Stay Ahead. Get Certified. Ultimate Knowledge Institute. ultimateknowledge.com

Social Media Security Training and Certifications. Stay Ahead. Get Certified. Ultimate Knowledge Institute. ultimateknowledge.com Ultimate Knowledge Institute ultimateknowledge.com Social Media Security Training and Certifications Social Media Security Professional (SMSP) Social Media Engineering & Forensics Professional (SMEFP)

More information

CYBER SECURITY TRAINING SAFE AND SECURE

CYBER SECURITY TRAINING SAFE AND SECURE CYBER SECURITY TRAINING KEEPING YOU SAFE AND SECURE Experts in Cyber Security training. Hardly a day goes by without a cyber attack being reported. With this ever-increasing threat there is a growing need

More information

C# 5.0: A Beginner's Guide Author: Pat McGee ISBN-13: 9780071835831 Pub Date: JANUARY 2015 Price: $ 55.00 AUD $ 60.00 NZD

C# 5.0: A Beginner's Guide Author: Pat McGee ISBN-13: 9780071835831 Pub Date: JANUARY 2015 Price: $ 55.00 AUD $ 60.00 NZD C# 5.0: A Beginner's Guide Author: Pat McGee ISBN-13: 9780071835831 Pub Date: JANUARY 2015 Price: $ 55.00 AUD $ 60.00 NZD Edition: 1 Previous ISBN: Subject: Computers - Programming Languages / C# Trim

More information

Windows 8.1 for Seniors QuickSteps Author: Marty Matthews ISBN-13: 9780071832588 Pub Date: APRIL 2014 Price: $ 35.95 AUD $ 39.

Windows 8.1 for Seniors QuickSteps Author: Marty Matthews ISBN-13: 9780071832588 Pub Date: APRIL 2014 Price: $ 35.95 AUD $ 39. Windows 8.1 for Seniors QuickSteps Author: Marty Matthews ISBN-13: 9780071832588 Pub Date: APRIL 2014 Price: $ 35.95 AUD $ 39.00 NZD Edition: 1 Previous ISBN: Subject: Computers - Operating Systems / Windows

More information

Field of Study Area of Expertise Certification Vendor Course

Field of Study Area of Expertise Certification Vendor Course Field of Study Area of Expertise Certification Vendor Course Advanced Security Certified Information Systems Security Professional (CISSP) ISC2 CISSP Advanced Security CompTIA Advanced Security Practitioner

More information

IT Security Training. Why Security Certification? A Serious Business - Fear Drives the Demand High Demand Freedom to Make and Break Rules

IT Security Training. Why Security Certification? A Serious Business - Fear Drives the Demand High Demand Freedom to Make and Break Rules IT Security Training Why Security Certification? A Serious Business - Fear Drives the Demand High Demand Freedom to Make and Break Rules Benefits of Certification Provides Assurance to Employers Certification

More information

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE Solution Brief SUMMARY New security threats demand a new approach to security management. Security teams need a security analytics architecture that can handle

More information

CAST Center for Advanced Security Training

CAST Center for Advanced Security Training CAST Center for Advanced Security Training Advanced Security Training (CAST) EC-Council s Center for Advanced Security Training (CAST) was created to address the need for highly technical and Advanced

More information

Compliance. Review. Our Compliance Review is based on an in-depth analysis and evaluation of your organization's:

Compliance. Review. Our Compliance Review is based on an in-depth analysis and evaluation of your organization's: Security.01 Penetration Testing.02 Compliance Review.03 Application Security Audit.04 Social Engineering.05 Security Outsourcing.06 Security Consulting.07 Security Policy and Program.08 Training Services

More information

Cyber threats are growing.

Cyber threats are growing. Cyber threats are growing. So are your career opportunities. Put the future of your cybersecurity career in the hands of a respected online education leader. Everything you need to succeed. Excelsior College

More information

EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 619 Advanced SQLi Attacks and Countermeasures. Make The Difference CAST.

EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 619 Advanced SQLi Attacks and Countermeasures. Make The Difference CAST. CENTER FOR ADVANCED SECURITY TRAINING 619 Advanced SQLi Attacks and Countermeasures Make The Difference About Center of Advanced Security Training () The rapidly evolving information security landscape

More information

Information Security solutions that protect your business

Information Security solutions that protect your business Information Security solutions that protect your business We deliver Information Security solutions that stabilize your organization helping you build a strong foundation to prevent potential security

More information

Hackers are here. Where are you?

Hackers are here. Where are you? 1 2 What is EC-Council Certified Security Analyst Licensed Penetration Tester Program You are an ethical hacker. Your last name is Pwned. You dream about enumeration and you can scan networks in your sleep.

More information

Expert Reference Series of White Papers. Planning a Career Path in Cybersecurity

Expert Reference Series of White Papers. Planning a Career Path in Cybersecurity Expert Reference Series of White Papers Planning a Career Path in Cybersecurity 1-800-COURSES www.globalknowledge.com Planning a Career Path in Cybersecurity James Michael Stewart, CISSP, ISSAP, SSCP,

More information

FedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

FedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov FedVTE Training Catalog SUMMER 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please

More information

EC-Council C E. Hacking Technology. v8 Certified Ethical Hacker

EC-Council C E. Hacking Technology. v8 Certified Ethical Hacker EC-Council Hacking Technology C Certified E Ethical Hacker Certified Ethical Hacker v8 Certified Ethical Hacker Course Description CEHv8 is a comprehensive Ethical Hacking and Information Systems Security

More information

ITU-IMPACT Training and Skills Development Course Catalogue

ITU-IMPACT Training and Skills Development Course Catalogue ITU-IMPACT Training and Skills Development Course Catalogue Management Track Technical Track Course Area Management Incident Response Digital Forensics Network Application Law Enforcement Foundation Management

More information

WHITE PAPER. Managed Security. Five Reasons to Adopt a Managed Security Service

WHITE PAPER. Managed Security. Five Reasons to Adopt a Managed Security Service WHITE PAPER Managed Security Five Reasons to Adopt a Managed Security Service Introduction Cyber security presents many organizations with a painful dilemma. On the one hand, they re increasingly vulnerable

More information

BT Assure Threat Intelligence

BT Assure Threat Intelligence BT Assure Threat Intelligence Providing you with the intelligence to help keep your organisation safe BT Assure. Security that matters At all times, organisations are vulnerable to all kinds of cyber attacks

More information

Brandman University. School of CCNA

Brandman University. School of CCNA Information Technology Certifications CCNA The Cisco CCNA Training Package (ICND: Parts 1 and 2) includes expert instructor-led training modules with customized presentations, practice exam simulators

More information

Academic Programs INFORMATION TECHNOLOGY

Academic Programs INFORMATION TECHNOLOGY Academic Programs INFORMATION TECHNOLOGY INFORMATION TECHNOLOGY The Information Systems programs at Tidewater Community College cover the essential areas of study in information systems technology. The

More information

Computer Security and Investigations

Computer Security and Investigations Computer Security and Investigations Program Locations: Program Code: Coordinator: Credential: Peterborough CSI Blair Brown Ontario College Advanced Diploma Start Dates: September 06, 2016 January 09,

More information

e-discovery Forensics Incident Response

e-discovery Forensics Incident Response e-discovery Forensics Incident Response NetSecurity Corporation 21351 Gentry Drive Suite 230 Dulles, VA 20166 VA DCJS # 11-5605 Phone: 703.444.9009 Toll Free: 1.866.664.6986 Web: www.netsecurity.com Email:

More information

MEETING THE NATION S INFORMATION SECURITY CHALLENGES

MEETING THE NATION S INFORMATION SECURITY CHALLENGES MEETING THE NATION S INFORMATION SECURITY CHALLENGES TO ADDRESS SKILLS AND WORKFORCE SHORTAGES IN THE INFORMATION SECURITY INDUSTRY, THE NATIONAL SECURITY AGENCY AND THE DEPARTMENT OF HOMELAND SECURITY

More information

Cyber Security Operations Associate

Cyber Security Operations Associate ST Electronics (Info-Security) Pte Ltd ST Electronics (Info-Security) Page 1 Cyber Security Operations Essentials: Live cyber security training to build Detection, Response & Recovery capability In today

More information

TERMS OF REFERENCE (TORs) OF CONSULTANTS - (EAG) 1. Reporting Function. The Applications Consultant reports directly to the CIO

TERMS OF REFERENCE (TORs) OF CONSULTANTS - (EAG) 1. Reporting Function. The Applications Consultant reports directly to the CIO TERMS OF REFERENCE (TORs) OF CONSULTANTS - (EAG) Consultant - Enterprise Systems & Applications 1. Reporting Function. The Applications Consultant reports directly to the CIO 2. Qualification and Experience

More information

FedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

FedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov FedVTE Training Catalog SPRING 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk here or email the

More information

The SIEM Evaluator s Guide

The SIEM Evaluator s Guide Using SIEM for Compliance, Threat Management, & Incident Response Security information and event management (SIEM) tools are designed to collect, store, analyze, and report on log data for threat detection,

More information

Computer Hacking Forensic Investigator v8

Computer Hacking Forensic Investigator v8 CÔNG TY CỔ PHẦN TRƯỜNG CNTT TÂN ĐỨC TAN DUC INFORMATION TECHNOLOGY SCHOOL JSC LEARN MORE WITH LESS! Computer Hacking Forensic Investigator v8 Course Description: EC-Council releases the most advanced Computer

More information

InfoSec Academy Application & Secure Code Track

InfoSec Academy Application & Secure Code Track Fundamental Courses Foundational Courses InfoSec Academy Specialized Courses Advanced Courses Certification Preparation Courses Certified Information Systems Security Professional (CISSP) Texas Security

More information

Oracle Education @ USF

Oracle Education @ USF Oracle Education @ USF Oracle Education @ USF helps increase your employability and also trains and prepares you for the competitive job market at a much lower cost compared to Oracle University. Oracle

More information

Company Background EMAGINED SECURITY. 2014 All rights reserved. www.emagined.com

Company Background EMAGINED SECURITY. 2014 All rights reserved. www.emagined.com Company Background Emagined Security, a privately owned and operated company, has been helping organizations with their security needs with an excellent track record of success since 2002. The company

More information

Information Security Engineering

Information Security Engineering Master of Science In Information Security Engineering Course Descriptions November 2014 Master of Science in Information Security Engineering The program of study for the Master of Science in Information

More information

DoD Directive (DoDD) 8570 & GIAC Certification

DoD Directive (DoDD) 8570 & GIAC Certification DoD Directive (DoDD) 8570 & GIAC Certification Date Updated: January 2014 National Account Manager 678-714-5712 Director 703-968-0103 What is DoDD 8570? Department of Defense Directive 8570 provides guidance

More information

Track 2: Introductory Track PREREQUISITE: BASIC COMPUTER EXPERIENCE

Track 2: Introductory Track PREREQUISITE: BASIC COMPUTER EXPERIENCE Anne Arundel Community College Tracks Anne Arundel Community College s computer technologies courses have been organized into 10 suggested tracks. The tracks are arranged to ensure that students have the

More information

Information Security Services

Information Security Services Information Security Services Information Security In 2013, Symantec reported a 62% increase in data breaches over 2012. These data breaches had tremendous impacts on many companies, resulting in intellectual

More information

How To Get A Computer Hacking Program

How To Get A Computer Hacking Program CHFI v8(computer Hacking Forensics Investigator) Course Description & Overview Overview CHFIv8 Course Description EC-Council releases the brand new Version 8 of the Computer Hacking Forensics Investigator

More information

EC-Council. Certified Ethical Hacker. Program Brochure

EC-Council. Certified Ethical Hacker. Program Brochure EC-Council C Certified E Ethical Hacker Program Brochure Course Description The (CEH) program is the core of the most desired information security training system any information security professional

More information

Hackers are here. Where are you?

Hackers are here. Where are you? 1 2 What is EC-Council Certified Security Analyst Licensed Penetration Tester Program You are an ethical hacker. Your last name is Pwned. You dream about enumeration and you can scan networks in your sleep.

More information

Learning Course Curriculum

Learning Course Curriculum Learning Course Curriculum Security Compass Training Learning Curriculum. Copyright 2012. Security Compass. 1 It has long been discussed that identifying and resolving software vulnerabilities at an early

More information

I. PREREQUISITE For information regarding prerequisites for this course, please refer to the Academic Course Catalog.

I. PREREQUISITE For information regarding prerequisites for this course, please refer to the Academic Course Catalog. Note: Course content may be changed, term to term, without notice. The information below is provided as a guide for course selection and is not binding in any form, and should not be used to purchase course

More information

Software/Applications Programmer Technical Writer E-Commerce Manager. Computer and Electronics Repair Interactive Media Developer

Software/Applications Programmer Technical Writer E-Commerce Manager. Computer and Electronics Repair Interactive Media Developer Information Technology Career Majors Description: Information Technology (IT) is the study, design, development, implementation, support or management of computer-based information systems, particularly

More information

capabilities statement

capabilities statement capabilities statement GSA Schedule 70 Contract Holder: Contract #: GS-35F-0649Y Duns#: 824940121 Cage Code#: 6B5K3 SIN Codes: 132-34 Maintenance of Software 132-51 Information Technology Professional

More information

Course Descriptions November 2014

Course Descriptions November 2014 Master of Science In Information Security Management Course Descriptions November 2014 Master of Science in Information Security Management The Master of Science in Information Security Management (MSISM)

More information

CyberNEXS Global Services

CyberNEXS Global Services CyberNEXS Global Services CYBERSECURITY A cyber training, exercising, competition and certification product for maximizing the cyber skills of your workforce The Cyber Network EXercise System CyberNEXS

More information

Course overview. CompTIA A+ Certification (Exam 220 902) Official Study Guide (G188eng verdraft)

Course overview. CompTIA A+ Certification (Exam 220 902) Official Study Guide (G188eng verdraft) Overview This 5-day course is intended for those wishing to qualify with. A+ is a foundation-level certification designed for IT professionals with around 1 year's experience whose job role is focused

More information

Training Course ECSA/LPT

Training Course ECSA/LPT Brochure More information from http://www.researchandmarkets.com/reports/2226534/ Training Course ECSA/LPT Description: The EC-Council ECSA/LPT EC-Council Certified Security Analyst/ Licensed Penetration

More information

CREST EXAMINATIONS. CREST (GB) Ltd 2016 All Rights Reserved

CREST EXAMINATIONS. CREST (GB) Ltd 2016 All Rights Reserved CREST EXAMINATIONS This document and any information therein are the property of CREST and without infringement neither the whole nor any extract may be disclosed, loaned, copied or used for manufacturing,

More information

Wyoming Community College Commission Request for New, Pilot or Revised Degree or Certificate Program

Wyoming Community College Commission Request for New, Pilot or Revised Degree or Certificate Program Community Commission Request for New, Pilot or Revised Degree or Certificate Program A. : Laramie County Community B. Date submitted to WCCC: C. Program 1. Request for: X New Program Pilot Program Revised

More information

Forensic Certifications

Forensic Certifications Forensic Certifications Mayuri Shakamuri CS 489-02 Digital Forensics October 31, 2006 New Mexico Tech Executive Summary Digital Forensics is rapidly growing and evolving to become a scientific practice

More information

Developing a Mature Security Operations Center

Developing a Mature Security Operations Center Developing a Mature Security Operations Center Introduction Cybersecurity in the federal government is at a crossroads. Each month, there are more than 1.8 billion attacks on federal agency networks, and

More information

Demand Availability!

Demand Availability! Demand Availability! NIEFERT History Founded in 1997 NIEFERT Certified Solutions LLC established a reputation for Mission Critical Solutions. Services ranging from short term SAP R/3 Assignments to HP

More information

WILLIAM OETTINGER PHONE (702) 292-4645 WOETTINGER@GMAIL.COM

WILLIAM OETTINGER PHONE (702) 292-4645 WOETTINGER@GMAIL.COM WILLIAM OETTINGER PHONE (702) 292-4645 WOETTINGER@GMAIL.COM SUMMARY OF QUALIFICATIONS Veteran investigator in a traditional and computer-related environment. A leader experienced in organizing, directing,

More information

Anthony J. Keane, MSc, PhD and Jason Flood, MSc Information Security & Digital Forensics Research Group Institute of Technology Blanchardstown

Anthony J. Keane, MSc, PhD and Jason Flood, MSc Information Security & Digital Forensics Research Group Institute of Technology Blanchardstown Anthony J. Keane, MSc, PhD and Jason Flood, MSc Information Security & Digital Forensics Research Group Institute of Technology Blanchardstown 1 Protected networks are continuously being successfully attacked

More information

SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles

SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles PNNL-24138 SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles March 2015 LR O Neil TJ Conway DH Tobey FL Greitzer AC Dalton PK Pusey Prepared for the

More information

e-discovery Forensics Incident Response

e-discovery Forensics Incident Response e-discovery Forensics Incident Response NetSecurity Corporation Inno Eroraha, President 22375 Broderick Drive Suite 235 Dulles, VA 20166 SBA 8(a) Certified SDB GSA Contract # GS-35F-0288Y VA DCJS # 11-5605

More information

Top 5 Reasons to Outsource MORE!

Top 5 Reasons to Outsource MORE! Top 5 Reasons to Outsource MORE! This report is available for download on Teleperformance s website. For more information about articles and white papers, go to: www.teleperformance.com Why Companies Are

More information

Penetration Testing: Advanced Oracle Exploitation Page 1

Penetration Testing: Advanced Oracle Exploitation Page 1 Penetration Testing: Advanced Oracle Exploitation Page 1 Course Index:: Day 1 Oracle RDBMS and the Oracle Network Architecture... 3» Introduction and Oracle Review...3» Service Information Enumeration:...3»

More information

Wyoming Community College Commission Request for New, Pilot or Revised Degree or Certificate Program

Wyoming Community College Commission Request for New, Pilot or Revised Degree or Certificate Program Wyoming Community College Commission Request for New, Pilot or Revised Degree or Certificate Program A. College: Laramie County Community College B. Date submitted to WCCC: C. Program 1. Request for: X

More information

Master of Business Administration - Information Systems Management Concentration - Program Outline Program Info Program Outcomes Program Title:

Master of Business Administration - Information Systems Management Concentration - Program Outline Program Info Program Outcomes Program Title: Master of Business Administration - Information Systems Management Concentration - Program Outline Program Info Program Title: Master of Business Administration Information Systems Management Concentration

More information

Security solutions White paper. Acquire a global view of your organization s security state: the importance of security assessments.

Security solutions White paper. Acquire a global view of your organization s security state: the importance of security assessments. Security solutions White paper Acquire a global view of your organization s security state: the importance of security assessments. April 2007 2 Contents 2 Overview 3 Why conduct security assessments?

More information

Certification Programs

Certification Programs Registration Questions? Please contact us directly. 507 S. Grand Ave., Lansing, MI 48933 sfisher@mibankers.com (517) 342-9057 Certification Programs 2015 Following the lecture on day 2, students have the

More information

Enterprise Security Tactical Plan

Enterprise Security Tactical Plan Enterprise Security Tactical Plan Fiscal Years 2011 2012 (July 1, 2010 to June 30, 2012) Prepared By: State Chief Information Security Officer The Information Security Council State of Minnesota Enterprise

More information

Enterprise Network Security Classes

Enterprise Network Security Classes 2012 Enterprise Network Security Classes By Overview About the Training Table of Contents 1.0 Overview... 3 2.0 Enterprise Network Security Training: Threats and Investigations 4 2.1 About the Training...

More information

CONTENTS AT A GMi#p. Chapter I Ethical Hacking Basics I Chapter 2 Cryptography. Chapter 3 Reconnaissance: Information Gathering for the Ethical Hacker

CONTENTS AT A GMi#p. Chapter I Ethical Hacking Basics I Chapter 2 Cryptography. Chapter 3 Reconnaissance: Information Gathering for the Ethical Hacker ALL ElNis ONE CEH Certified Ethical Hacker EXAM GUIDE Matt Walker Mc Grain/ New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul Singapore Sydney Toronto McGraw-Hill

More information

Advanced Threat Protection with Dell SecureWorks Security Services

Advanced Threat Protection with Dell SecureWorks Security Services Advanced Threat Protection with Dell SecureWorks Security Services Table of Contents Summary... 2 What are Advanced Threats?... 3 How do advanced threat actors operate?... 3 Addressing the Threat... 5

More information

Penetration Testing Services. Demonstrate Real-World Risk

Penetration Testing Services. Demonstrate Real-World Risk Penetration Testing Services Demonstrate Real-World Risk Penetration Testing Services The best way to know how intruders will actually approach your network is to simulate a real-world attack under controlled

More information

Information Systems Technology & Cybersecurity Programs

Information Systems Technology & Cybersecurity Programs Information Systems Technology & Cybersecurity Programs Stay close. Go far. Computer Studies Faculty Trudy Gift Professor, Information Systems Technology 240-500-2214 tgift@hagestowncc.edu Carrie Pifer

More information

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center Combating a new generation of cybercriminal with in-depth security monitoring 1 st Advanced Data Analysis Security Operation Center The Challenge Don t leave your systems unmonitored. It takes an average

More information

DoD IA Training Products, Tools Integration, and Operationalization

DoD IA Training Products, Tools Integration, and Operationalization Defense Information Systems Agency A Combat Support Agency DoD IA Training Products, Tools Integration, and Operationalization Roger S. Greenwell, CISSP, CISA, CISM Technical Director / Capabilities Implementation

More information

Technology Approved Certifications

Technology Approved Certifications Date Approved Designation Certificate Name Points Microsoft Systems Engineering 04/16/2002 MCSE Microsoft Certified Systems Engineer 280 06/14/2007 MCSE: WIN 2003 Microsoft Certified Systems Engineer:

More information

Logical Operations CyberSec First Responder: Threat Detection and Response (CFR) Exam CFR-110

Logical Operations CyberSec First Responder: Threat Detection and Response (CFR) Exam CFR-110 Logical Operations CyberSec First Responder: Threat Detection and Response (CFR) Exam CFR-110 Exam Information Candidate Eligibility: The CyberSec First Responder: Threat Detection and Response (CFR) exam

More information

Information Systems Security Certificate Program

Information Systems Security Certificate Program Information Technologies Programs Information Systems Security Certificate Program Accelerate Your Career extension.uci.edu/infosec University of California, Irvine Extension s professional certificate

More information

EC-Council. Certified. Internet Marketing Practitioner. Unravel the Mystery of. Internet Marketing C IMP

EC-Council. Certified. Internet Marketing Practitioner. Unravel the Mystery of. Internet Marketing C IMP Certified Internet Marketing Practitioner Unravel the Mystery of Internet Marketing TM C IMP Certified Internet Marketing Practitioner Are You a? Our online lives are fast becoming as important and real

More information

CSIS Academy Be Better

CSIS Academy Be Better CSIS Academy Be Better CSIS Security Officer March 2014 Copyright 2014 - CSIS Security Group A/S. All rights reserved Page 2 / 7 Content 1 About CSIS... 3 2 The Course: CSIS Security Officer... 3 2.1.1

More information

EMA Services for IT Professionals

EMA Services for IT Professionals Get (and Keep) Your Business-Critical IT Initiatives on Track with EMA Today s IT leaders are under pressure to improve IT service quality and align IT with the business all while containing or even reducing

More information

SIEM Optimization 101. ReliaQuest E-Book Fully Integrated and Optimized IT Security

SIEM Optimization 101. ReliaQuest E-Book Fully Integrated and Optimized IT Security SIEM Optimization 101 ReliaQuest E-Book Fully Integrated and Optimized IT Security Introduction SIEM solutions are effective security measures that mitigate security breaches and increase the awareness

More information

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

If you know the enemy and know yourself, you need not fear the result of a hundred battles. Rui Pereira,B.Sc.(Hons),CIPS ISP/ITCP,CISSP,CISA,CWNA/CWSP,CPTE/CPTC Principal Consultant, WaveFront Consulting Group ruiper@wavefrontcg.com 1 (604) 961-0701 If you know the enemy and know yourself, you

More information

Application Backdoor Assessment. Complete securing of your applications

Application Backdoor Assessment. Complete securing of your applications Application Backdoor Assessment Complete securing of your applications Company brief BMS Consulting is established as IT system integrator since 1997 Leading positons in Eastern Europe country Product

More information

PLATFORM-AS-A-SERVICE, DEVOPS, AND APPLICATION INTEGRATION. An introduction to delivering applications faster

PLATFORM-AS-A-SERVICE, DEVOPS, AND APPLICATION INTEGRATION. An introduction to delivering applications faster PLATFORM-AS-A-SERVICE, DEVOPS, AND APPLICATION INTEGRATION An introduction to delivering applications faster CONTENTS 2 Introduction to PaaS 4 Private, public, and hybrid PaaS 6 Who uses PaaS? 8 DevOps

More information

Val-EdTM. Valiant Technologies Education & Training Services. 2-day Workshop on Business Continuity & Disaster Recovery Planning

Val-EdTM. Valiant Technologies Education & Training Services. 2-day Workshop on Business Continuity & Disaster Recovery Planning Val-EdTM Valiant Technologies Education & Training Services 2-day Workshop on Business Continuity & Disaster Recovery Planning All Trademarks and Copyrights recognized Page 1 of 8 Welcome to Valiant Technologies.

More information

Boost elearning IT Training INSTRUCTIONAL DESIGN, LEARNING PATHS, AND COURSE CATALOGUE

Boost elearning IT Training INSTRUCTIONAL DESIGN, LEARNING PATHS, AND COURSE CATALOGUE 2016 Boost elearning IT Training INSTRUCTIONAL DESIGN, LEARNING PATHS, AND COURSE CATALOGUE Instructional Design Boost elearning Interactive IT Training Boost elearning's Interactive IT Training provides

More information

Contents The College of Information Science and Technology 2011-2012 Undergraduate Course Descriptions

Contents The College of Information Science and Technology 2011-2012 Undergraduate Course Descriptions Contents The College of Information Science and Technology 2011-2012 Undergraduate Course Descriptions Information Science & Systems Courses INFO 101 - Introduction to Information Technology Introduces

More information

GIAC Certification. Enterprise Solution

GIAC Certification. Enterprise Solution E- Business & Web Solutions IT Solutions (Hardware, Software, Services) Business Process & Technology Outsourcing Enterprise Solution Professionals on Information and Network Global Information Assurance

More information

New Features in Oracle Application Express 4.1. Oracle Application Express Websheets. Oracle Database Cloud Service

New Features in Oracle Application Express 4.1. Oracle Application Express Websheets. Oracle Database Cloud Service Date and Time- Europe/Middle East/Africa Tuesday June 12, 2012 09:00 13:00 BST 10:00 14:00 CEST 12:00 16:00 GST Corresponding UTC (GMT) 08:00:00 Agenda Time Track and Keynote/Session Title 9:00 AM Keynote

More information

Cyber Security Evolved

Cyber Security Evolved Cyber Security Evolved Aware Cyber threats are many, varied and always evolving Being aware is knowing what is going on so you can figure out what to do. The challenge is to know which cyber threats are

More information

WHITE PAPER SPLUNK SOFTWARE AS A SIEM

WHITE PAPER SPLUNK SOFTWARE AS A SIEM SPLUNK SOFTWARE AS A SIEM Improve your security posture by using Splunk as your SIEM HIGHLIGHTS Splunk software can be used to operate security operations centers (SOC) of any size (large, med, small)

More information

BCS & ISTQB portfolio BCS A very practical guide to testing against WCAG1.0 and 2.0 Advanced ISQTB Certified Tester BCS A very practical guide to

BCS & ISTQB portfolio BCS A very practical guide to testing against WCAG1.0 and 2.0 Advanced ISQTB Certified Tester BCS A very practical guide to BCS & ISTQB portfolio BCS A very practical guide to testing against WCAG1.0 and 2.0 Advanced ISQTB Certified Tester BCS A very practical guide to testing against WCAG1.0 and 2.0 Exam BCS Advanced Level

More information

C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR

C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR 1 TM C HFI Computer C HFI Computer Hacking Forensic INVESTIGATOR Hacking Forensic INVESTIGATOR TM v8 v8 2 Be the leader. Deserve a place in the CHFI certified elite class. Earn cutting edge skills in computer

More information

Analyze. Secure. Defend. Do you hold ECSA credential?

Analyze. Secure. Defend. Do you hold ECSA credential? 1 Analyze. Secure. Defend. Do you hold ECSA credential? TM E C S A EC-Council Certified Security Analyst 1 EC-Council Cyber Security Professional Path Threat Agent Application of Methodology So You Can

More information

C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR

C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR Page: 1 TM C HFI Computer C HFI Computer Hacking Forensic INVESTIGATOR Hacking Forensic INVESTIGATOR TM v8 v8 Page: 2 Be the leader. Deserve a place in the CHFI certified elite class. Earn cutting edge

More information

Information Security Specialist Training on the Basis of ISO/IEC 27002

Information Security Specialist Training on the Basis of ISO/IEC 27002 Information Security Specialist Training on the Basis of ISO/IEC 27002 Natalia Miloslavskaya, Alexander Tolstoy Moscow Engineering Physics Institute (State University), Russia, {milmur, ait}@mephi.edu

More information

of Highly Effective Security Professionals By Sondra Schneider CEO Security University s0ndra@securityuniversity.net 203.357.7744

of Highly Effective Security Professionals By Sondra Schneider CEO Security University s0ndra@securityuniversity.net 203.357.7744 6 Skills of Highly Effective Security Professionals By Sondra Schneider CEO Security University s0ndra@securityuniversity.net 203.357.7744 Basic Principles The Basic Principles of InfoSecurity are Universal

More information

Why The Security You Bought Yesterday, Won t Save You Today

Why The Security You Bought Yesterday, Won t Save You Today 9th Annual Courts and Local Government Technology Conference Why The Security You Bought Yesterday, Won t Save You Today Ian Robertson Director of Information Security Michael Gough Sr. Risk Analyst About

More information

Security Forensics Training

Security Forensics Training Security Forensics Training Vision, Mission, and Values 3 Vision: To be the brand of choice for computer forensics, cyber security, and training solutions Mission: To provide digital forensics, cyber

More information

InfoSec Academy Pen Testing & Hacking Track

InfoSec Academy Pen Testing & Hacking Track Fundamental Courses Foundational Courses InfoSec Academy Specialized Courses Advanced Courses Certification Preparation Courses Certified Information Systems Security Professional (CISSP) Texas Security

More information