Professional Software Testing and Project Management
Testing is a critical role in software development that requires special skills and knowledge that are not commonly taught to software developers, business analysts and project managers. This often results in insufficient time and resources being allocated for this important function, and quality suffers—as do the users of the software. Equally important is the need to measure quality quickly and efficiently because limitations in resources and schedules are realities that aren’t going away. We need to do the best we can with what we have and still deliver high, proven-quality software.
Certified Information Security Manager (CISM)
The CISM exam is a standalone certification from ISACA with the exam code CISM. The certification is targeted at professionals who manage designs, oversees and assesses an enterprise’s information security. The CISM program is developed particularly for experienced information security managers and those who have information security management responsibilities.
Designed for experienced information security professionals, the CISM designation is a ground breaking credential earned by nearly 21,400 professionals since it was established in 2002. The management-focused CISM is the globally accepted standard for individuals who develop, build and manage enterprise information security programs. The CISM certification promotes international practices and provides executive management with assurance that those earning the designation have the required experience and knowledge to provide effective security management and consulting services. The demand for skilled information security management professionals is on the rise, get the certification that distinguishes you as having knowledge and experience in the development and management of an information security program.
Certified Lead Penetration Testing Professional (CLPTP)
This five-day intensive course enables participants to develop the necessary expertise to lead a professional penetration test using a mix of practical technical techniques and management skills.
The course has been designed by Industry experts with in-depth experience in the Penetration Testing fields. Unlike other certifications, this course focuses specifically on the knowledge and skills needed by a professional looking to lead or take part in a penetration test. We drill down into the latest technical knowledge, tools and techniques in key areas including Infrastructure, Web Application and Mobile security as well as Social Engineering. In addition, the course focuses on how to practically apply what has been learned on current day-to-day penetration testing and does not expand on unrelated, dated or unnecessary theoretical concepts.
Certified Chief Information Security Officer (CCISO)
The CCISO Certification is an industry-leading program that recognizes the real-world experience necessary to succeed at the highest executive levels of information security. Bringing together all the components required for a C-Level positions, the CCISO program combines audit management, governance, IS controls, human capital management, strategic program development, and the financial expertise vital to leading a highly successful IS program.
The Certified CISO (CCISO) program is the first of its kind training and certification program aimed at producing top-level information security executives. The CCISO does not focus solely on technical knowledge but on the application of information security management principles from an executive management point of view. The program was developed by sitting CISOs for current and aspiring CISOs.
Certified Network Defender (CND)
Certified Network Defender (CND) is a vendor-neutral, hands-on, instructor-led comprehensive network security certification training program. It is a skills-based, lab intensive program based on a job-task analysis and cybersecurity education framework presented by the National Initiative of Cybersecurity Education (NICE). The course has also been mapped to global job roles and responsibilities and the Department of Defense (DoD) job roles for system/network administrators. The course is designed and developed after extensive market research and surveys.
The program prepares network administrators on network security technologies and operations to attain Defense-in-Depth network security preparedness. It covers the protect, detect and respond approach to network security. The course contains hands-on labs, based on major network security tools and techniques which will provide network administrators real world expertise on current network security technologies and operations. The study-kit provides you with over 10 GB of network security best practices, assessments and protection tools. The kit also contains templates for various network policies and a large number of white papers for additional learning.
ISO 27001 Lead Auditor (Information Security)
This five-day intensive course enables participants to develop the necessary expertise to audit an Information Security Management System (ISMS) and to manage a team of auditors by applying widely recognized audit principles, procedures and techniques. During this training, the participant will acquire the necessary knowledge and skills to proficiently plan and perform internal and external audits in compliance with ISO 19011 the certification process according to ISO 17021.Based on practical exercises, the participant will develop the skills (mastering audit techniques) and competencies (managing audit teams and audit program, communicating with customers, conflict resolution, etc.) necessary to efficiently conduct an audit.
EC Council Certified Security Analyst (ECSA)
This extensive hand-on course enhances the key skills of the penetration testers and equip them with comprehensive know-how of the practical implementation of penetration testing and its various techniques. The participants will conduct the penetration testing on a company having varied departments with multiple servers and subnetworks, operating systems and which are full proofed with both militarized and non-militarized defense architectures. The crux of all penetration testing concepts and writing reports will be covered in much detail.
Computer Hacking Forensic Investigator (CHFI)
Computer Hacking Forensic Investigation is the process of detecting cyber-attacks and systematically extracting evidence to support the cyber-crime investigation report, and conducting periodic audits to prevent similar attacks in future. CHFI certification training validates an individual’s knowledge of computer forensics for reporting hacking attempts and attacks in the courts of law.
Computer forensics training covers analysis tools and techniques that can be employed for a computer investigation for determining potential legal evidence against the perpetrator. Evidence might be related to a wide range of cyber-crimes, including but not limited to misuse of confidential data, theft of trade secrets, misuse or destruction of intellectual property, and online fraud. A computer forensics certification or CHFI certification v8 imparts core skills for data recovery that encompasses discovering hidden data residing in a system, and recovering lost, encrypted, deleted, or damaged data.
This CHFI v8 computer forensics course is ideal for e-business security professionals, IT managers, law enforcement personnel, defense and military personnel, system administrators, or professionals who wish to get into digital forensics and cyber-crime investigation.
Certified Ethical Hacker (CEH)
This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking. This course prepares you for EC-Council Certified Ethical Hacker exam 312-50
Certified Information Systems Security Professional (CISSP)
CISSP® certification is a globally recognized standard of achievement that confirms an individual’s knowledge in the field of information security. CISSPs are information assurance professionals who define the architecture, design, management and/or controls that assure the security of business environments. It was the first certification in the field of information security to meet the stringent requirements of ISO/IEC Standard 17024. Our prep course provides the most comprehensive survey of the CISSP information, test taking techniques, and preparation materials available in the industry.