2100 E. Fairview Ave. Ste. 12, Meridian, ID 83642 Call our office today (208) 898-9036

Information Security and Certified Ethical Hacker (CEH) Courses

Information is an essential resource for the growth and success of every business. In today's information-driven economy, keeping your company's vital data secure is the responsibility of every employee in your company. From guarding against Social Engineering Attacks to creating an effective Incident Response Plan, everyone in your organization has to take part in keeping your information secure.

“My instructor was great! They were comprehensive and answered all my questions.”

Clint A., Boise

CEH

Overview
This 5-day CEH course teaches how to defend networks & systems against hacking by studying in depth how hackers work. Rather than focusing on security audits the course gives plenty of hands-on experience of attacking systems. By immersing the delegates in the tools and tricks of the "hacking" trade, they learn how to secure their systems & networks against them. The course places you in an interactive environment where you will be shown how to scan, test, hack and secure your own systems. The lab intensive environment gives in-depth knowledge and practical experience with current key security systems. You will develop an understanding of how perimeter defenses work, practice scanning and attacking your own networks, learn how intruders escalate privileges and what steps can be taken to secure your system against them.
You will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows, SQL injection and Virus Creation.

Audience
This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.
The CEH certification is for an individual who is usually employed with the organization and who can be trusted to undertake an attempt to penetrate networks and/or computer systems using the same methods as a hacker. Illegal hacking (ie; cracking computer systems) is a felony in the United States and most other countries. But when this type of hacking is done by request and under a contract between an Ethical Hacker and an organization, it is legal. The most important point is that an Ethical Hacker has authorization to probe the target.

Exams
To achieve the Certified Ethical Hacker Certification, you must pass one exam:
CEH exam 312-50
 

CISSP

Overview
In this course, students will analyze a wide range of information systems security subjects that are organized into 8 domains for CISSP exam certification.
 

Who Should Attend
This course is intended for experienced IT security-related practitioners, auditors, consultants, investigators, or instructors, including network or security analysts and engineers, network administrators, information security specialists, and risk management professionals, who are pursuing CISSP training and certification to acquire the credibility and mobility to advance within their current computer security careers or to migrate to a related career. Through the study of all 8 CISSP CBK domains, students will validate their knowledge by meeting the necessary preparation requirements to qualify to sit for the CISSP certification exam. The CISSP exam is intentionally difficult and should not be taken lightly. Even students with years of security experience should assume that they will have additional study time after class. Because the domains are so varied, it is unlikely that any one student will have experience in all 8 domains.


8 Security Domains

1. Security & Risk Management

2. Asset Security

3. Security Engineering

4. Communications & Network Security

5. Identify & Access Management

6. Security Assessment & Testing

7. Security Operations

8. Security in the Software Development Life Cycle

 


Who Should Attend
This course is intended for experienced IT security-related practitioners, auditors, consultants, investigators, or instructors, including network or security analysts and engineers, network administrators, information security specialists, and risk management professionals, who are pursuing CISSP training and certification to acquire the credibility and mobility to advance within their current computer security careers or to migrate to a related career. Through the study of all 8 CISSP CBK domains, students will validate their knowledge by meeting the necessary preparation requirements to qualify to sit for the CISSP certification exam. The CISSP exam is intentionally difficult and should not be taken lightly. Even students with years of security experience should assume that they will have additional study time after class. Because the domains are so varied, it is unlikely that any one student will have experience in all 10 domains.


Prerequisites:
CompTIA Net+
CompTIA Sec +
Or equivilent experience