Hands on Security Training Courses

Hands on Security Training

Hands on Security courses

Hands on Security Course Outlines

Code Name Duration Overview
webap WEBAP - Web Application Security 28 hours Description: This course will give the participants thorough understanding about security concepts, web application concepts and frameworks used by developers in order to be able to exploit and protect targeted application. In today’s world, that is changing rapidly and thus all the technologies used are also changed at a fast pace, web applications are exposed to hackers attacks 24/7. In order to protect the applications from external attackers one has to know all the bits and pieces that makes the web application, like frameworks, languages and technologies used in web application development, and much more than that. The problem is that attacker has to know only one way to break into the application and developer (or systems administrator) has to know all of the possible exploits in order to prevent this from happening. Because of that it is really difficult to have a bullet proof secured web application, and in most of the cases web application is vulnerable to something. This is regularly exploited by cyber criminals and casual hackers, and it can be minimized by correct planning, development, web application testing and configuration. Objectives: To give you the skill and knowledge needed to understand and identify possible exploits in live web applications, and to exploit identified vulnerabilities. Because of the knowledge gained through the identification and exploitation phase, you should be able to protect the web application against similar attacks. After this course the participant will be able to understand and identify OWASP top 10 vulnerabilities and to incorporate that knowledge in web application protection scheme. Audience: Developers, Police and other law enforcement personnel, Defense and Military personnel, e-Business Security professionals, Systems administrators, Banking, Insurance and other professionals, Government agencies, IT managers, CISO’s, CTO’s. Module 1: Security concepts Module 2: Risk management Module 3: Hackers attack phases Module 4: Penetration testing Module 5: Networking MitM attacks Module 6: Overview of web technologies and frameworks Module 7: Tools of the trade Module 8: Bypassing client side controls Module 9: Authentication attacks Module 10: Design/implementation flaws Module 11: Web application attacks: Injection (A1) Module 12: Web application attacks: XSS/CSRF (A3/A8) Module 13: Web application attacks: Broken authentication and session management (A2) Module 14: Web application attacks: Insecure direct object references/Missing function level access control (A4/A7) Module 15: Web application attacks: Security mis-configuration/Sensitive data exposure (A5/A6) Module 16: Web application attacks: Unvalidated redirect and forwards (A10) Module 17: Logical flaws
chfi CHFI - Certified Digital Forensics Examiner 35 hours The Certified Digital Forensics Examiner vendor neutral certification is designed to train Cyber Crime and Fraud Investigators whereby students are taught electronic discovery and advanced investigation techniques. This course is essential to anyone encountering digital evidence while conducting an investigation. The Certified Digital Forensics Examiner training teaches the methodology for conducting a computer forensic examination.  Students will learn to use forensically sound investigative techniques in order to evaluate the scene, collect and document all relevant information, interview appropriate personnel, maintain chain-of-custody, and write a findings report. The Certified Digital Forensics Examiner course will benefit organizations, individuals, government offices, and law enforcement agencies interested in pursuing litigation, proof of guilt, or corrective action based on digital evidence. Computer forensics enables the systematic and careful identification of evidence in computer related crime and abuse cases. This may range from tracing the tracks of a hacker through a client’s systems, to tracing the originator of defamatory emails, to recovering signs of fraud. Module 1:                  Introduction Module 2:                  Computer Forensic Incidents Module 3:                  Investigation Process Module 4:                  Disk Storage Concepts Module 5:                  Digital Acquisition & Analysis Module 6:                  Forensic Examination Protocols Module 7:                  Digital Evidence Protocols Module 8:                  CFI Theory Module 9:                  Digital Evidence Presentation Module 10:                Computer Forensic Laboratory Protocols Module 11:                Computer Forensic Processing Techniques Module 12:                Digital Forensics Reporting Module 13:                Specialized Artifact Recovery Module 14:                e-Discovery and ESI Module 15:                Mobile Device Forensics Module 16:                USB Forensics Module 17:                Incident Handling Mile2 - Lab 1:  Preparing Forensic Workstation AccessData FTK Imager Installation Autopsy Installation National Software Reference Library (NSRL) for autopsy 7z Installation Install Registry Viewer Install Password Recovery Tool Kit (PRTK – 5.21) Lab 2:  Chain of Custody Chain of Custody Search and Seizure Chain of Custody Forensic Imaging Lab 3:  Imaging Case Evidence / FTK Imager Lab 4:  Create a new case for Autopsy Creating a Case in Autopsy Lab 5:  Reviewing Evidence / Autopsy (Case #1) User MTBG attempting to hack his/her previous employer Reviewing Evidence in Autopsy Case Study scenario: The evidence you are required to discover (Challenge) Final Report for MTBG case           Lab 6:  Reviewing Evidence / Autopsy (Case #2) Greg Schardt case Case Study Scenario: The evidence you are required to discover (Challenge)
eccnetsecadm EC-Council - Network Security Administrator 35 hours Description: The EC-Council's NSA certification looks at network security from a defensive view. The NSA program is designed to provide fundamental skills needed to analyse the internal and external security threats against your network, and to help you develop the correct security posture that will protect your organisation. Students will learn how to evaluate network and Internet security issues. They will design and implement successful security policies relevant to you. In addition, they will learn how to expose systems and network vulnerabilities and defend against them. Why should you attend this course before Certified Ethical Hacker (C|EH)? Although attending this course and passing the exam is not a prerequisite of C|EH training or subsequently taking the C|EH exam, it is highly recommended. The C|EH program looks at security in offensive mode, while the NSA program looks at network security in defensive mode, therefore they compliment each other and help build a complete picture of today's Information Security landscape. Audience: System Administrators and Network Administrators as well as anyone who is interested in defensive network security technologies. Please note: Due to the required depth and breadth of knowledge needed to pass this ECNSA exam QA has taken the step of scheduling the exam separately to the course. This has been done in order to allow for a period of further self study to fully prepare for the exam. Delegates will sit the ECNSA exam at 10.30 am on the Friday two weeks after the course is concluded. Delegates will be required to book on to the ECNSAEX. The exam duration is maxiumum four hours. During this two week period delegates will be provided with further structured self study materials and will be assisted in their study via two scheduled Webinar sessions hosted by your delivering instructor. Full details of the self study resources and the Webinar sessions will be provided to the delegates during the course. Module 1: Introduction to Network Security Network topology; Network Types and the OSI Model Module 2: Network Protocols Network Protocols: SLIP; PPP; ARP; RARP; IGMP; ICMP; SNMP, HTTP IP: Attacks and Countermeasures TCP, UDP: Attacks and Countermeasures FTP, TFTP, TELNET, SMTP: Vulnerabilities Module 3: Security Policy What is Security Policy? What Defines a good security policy Security Policy Structure Developing and Implementing security policies Requirements of Effective Security Policy Module 4: Physical Security Physical Security Threats Locks and Keys TEMPEST Fire Safety: Fire Suppression, Gaseous Emission Systems Laptop Security: Physical Security Countermeasures Biometric Devices PC Security: Boot Access Module 5: Network Attacks Current Statistics Defining Terms: Threats, Attack and Exploit Classification of Hackers and Attacks Spoofing; Spamming; Eaves Dropping; Phishing; War Dialing; Password Cracking Web Page Defacement; SQL Injection; Wire Tapping; Buffer Overflow War Driving; War Chalking; War Flying Denial of Service (DOS) Attacks and Distributed DOS Module 6: Intrusion Detection System Characteristics of IDS Host based IDS Vs Network based IDS IDS Detection Methods; Types of Signatures Intrusion Prevention System IDS Vs IPS IPS Tool Module 7: Firewalls Handling threats and security tasks Protection against hacking Centralization and Documentation Multi-layer firewall protection Packet filtering and Stateful Packet Filtering Multi firewall DMZ Specialty firewalls and Reverse firewalls Module8: Packet Filtering and Proxy Servers Network Address Translation Application layer gateway and Proxying Virtual Private Network and the Authentication process Module 9: Bastion Host and Honeypots Bastion Host Honeypots and Honeynet Module 10: Hardening Routers Internet work Operating Systems (IOS) Troubleshooting a router Hardening a Router Components of router security Router security: testing tools Module 11: Hardening Operating Systems Security Windows Security Objects And Permissions NTFS File System Permissions Active Directory Kerberos Authentication And Security IP Security Linux Module 12: Patch Management Red Hat Up2date Patch Management Utility Installation Steps Microsoft Patch Management Process and Windows Update Services Patch Management Tools: Qchain Patch Management Tool: Microsoft Baseline Security Analyzer Other Patch Management Tools Module 13: Application Security Securing Web Applications IPSec And SSL Security Writing Secure Code; Best Practices Remote Administration Security Module 14: Web Security Network Devices and Design Altering the Network Addresses Client Authorization and Secure Client Transmissions Portable Applications Malicious Code Detection Browser Security Settings Common Gateway Interface (CGI) Web Application Input Data Validation and Buffer Overflows Module 15: E-Mail Security Components Of An Email E-mail protocols E-Mail Security Risks How to defend against E-Mail security risks Module 16: Encryption Firewalls Implementing Encryption Maintaining confidentiality Digital certificates Public and Private Keys (including PGP) Choosing the size of keys Analyzing popular encryption schemes including IPSEC Module 17: Virtual Private Networks VPN Tunneling Protocols PPTP and L2TP VPN Security Module 18: WLAN Wireless Network Types Antenna WLAN Standards BlueTooth And Ultra Wideband WEP Description Tool (Air Snort and WEPCrack) WLAN Security;WPA; TKIP; WTLS EAP Methods Advanced Encryption Standards (AES); DES; RSA Encryption RADIUS; Multifactor Authentication Mobile Security Through Certificates Certificate Management Through PKI Module 19: Creating Fault Tolerance Network Security: Fault Tolerance Why Create Fault Tolerance Planning For Fault Tolerance Reasons For System Failure Preventive Measures Module 20: Incident Response What Is an Incident Step by Step Procedure Managing Incidents What Is an Incident Response Six Step Approach for Incident Handling (PICERF Methodology) Incident Response Team Module 21: Disaster Recovery and Planning What is a Disaster Recovery Disaster Recovery Planning Business Continuity Planning Process Disaster Prevention Module 22: Network Vulnerability Assessment Vulnerability Assessment Goals of vulnerability assessment Network vulnerability Assessment methodology: Selecting vulnerability assessment tools
secitp Security for IT Practitioners 35 hours Description: A 5-day course that will take anyone in a current IT job role into the world of Information Security. This is a fantastic start point for those wanting to go into the major growth area of IT which is Security. Many practical labs are used throughout the course to improve student understanding of theoretical concepts and give them experience of real-world products. This course is aimed at individuals who want to move into the Information Security arena or simply want to gain a broader working knowledge of the topic. Objectives: To give students of all levels a good appreciation of security issues when dealing with computers and networks. Audience: People who work in IT 1 Introduction to security a) What is security b) White hats v black hats c) Threats to resources d) A simple security model e) Industry security standards f) Security policies g) Authentication h) Encryption i) Access control j) Audit and administer 2 TCP/IP for Security a) TCP/IP Architecture b) LANs and WANs c) IP and ICMP services d) ARP and routing e) Transport services 3 Applied Cryptography a) Encryption and trust relationships b) Symmetric encryption c) Asymmetric encryption d) Message digests e) Digital certificates f) Certificate authorities g) IPSec and VPNs 4 Virtual Private Networks a) VPN Benefits b) PPP with PAP and CHAP c) Tunnelling Protocols d) Virtual Private Dialup Networks e) IPSec a) Internet Key Exchange (IKE) 5 Types of Attack a) Spoofing b) Man-in-the-middle c) Denial of service d) Insider attacks e) Bug-based attacks f) Key logging g) Brute force attacks h) Trojans, viruses and worms i) Root kits 6 Firewall Roles and Types a) Packet filters b) Stateful inspection c) Circuit level gateways d) Application proxies e) Demilitarised zones f) Network address translation 7 Firewall Design Topology and Management a) Design principles b) Common topologies c) ICMP and firewalls d) Firewall management 8 World Wide Web Security a) Web technologies b) Browser privacy c) Cookies d) Mobile code threats e) Web server security f) Web traffic security 9 Intrusion Detection Systems a) IDS methodologies b) IDS concerns 10 Operating System Security a) Key OS vulnerabilities b) Windows security components c) Linux security components 11 The Auditing Process a) Introduction b) Risk analysis c) Ethical hacking d) Auditing and log analysis e) Windows & Linux logging f) Making recommendations and producing reports 12 Wireless Networking a) Protocols and security standards
ccsk CCSK - Certificate of Cloud Security Knowledge - Plus 14 hours Description: This 2-day CCSK Plus course includes all content from the CCSK Foundation course, and expands on it with extensive hands-on labs in a second day of training. Students will learn to apply their knowledge by performing a series of exercises involving a scenario that brings a fictional organization securely into the cloud. After completing this training, students will be well prepared for the CCSK certification exam, sponsored by Cloud Security Alliance. This second day of training includes additional lecture, although students will spend most of their time assessing, building, and securing a cloud infrastructure during the exercises. Objectives: This is a two day class that begins with the CCSK- Basic training, followed by a second day of additional content and hands-on activities Target Audience: This class is geared towards security professionals, but is also useful for anyone looking to expand their knowledge of cloud security. DAY 1 Introduction and Cloud Architecture Define cloud computing Cloud computing stack components Cloud reference model and security Infrastructure Security for Cloud Computing Understand the components of cloud infrastructure Assess security implications of deployment models Advantages and disadvantages of virtual Cloud management plane Different service models security basics Managing cloud computing security and risk Risk and governance Legal and compliance Audit Portability and interoperability Incident response Data security for cloud Different cloud storage models Security issues for data in cloud Address cloud security and governance Apply lifecycle to use cases Discuss data encryption Securing applications and users Application architecture design and operations lifecycle Discuss impact on SDLC Examine application security tools Discuss role of compliance in Cloud Cloud Risk assessment Adopt cloud computing Migrate existing apps and systems Create and secure a public cloud Understand public IaaS architectures Review EC2 components Launch and connect to your first instance Learn how to secure your instance DAY 2 Encrypting an EBS volume Why encrypt Select a method Create and attach Amazon EBS Encrypt and format Understand key management options Understand effects of rebooting Attach encrypted volume to another instance Identity and access management Learn how to secure your EC2 with AWS IAM Understand federated identity architectures Implement federated identity for application using OpenID How to apply same principles in an enterprise production environment Deploy and secure a Private Cloud Understand private cloud architecture Review OpenStack components Create and connect a compute node Manage OpenStack tenants and IAM Secure OpenStack management plane Investigate hypervisor security Understand security automation Selecting Cloud services Enabling security strategy Selecting a cloud provider Security as a service Summary and review
eccehcm EC-Council – Ethical Hacking and Countermeasures 35 hours Description: This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defences work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how Intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking. This course prepares you for EC-Council Certified Ethical Hacker exam 312-50. Objectives: To prepare the student for the Ethical Hacking and Countermeasures examination. On passing this examination you will be awarded the Certified Ethical Hacker certification awarded by the EC-Council (The International Council of Electronic Commerce Consultants). Target Audience: This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Overview: The Ethical Hacking and Countermeasures curriculum consists of instructor-led training and self-study. The Instructor will provide the details of self-study modules to the students at the beginning of the class. Module 1: Introduction to Ethical Hacking Module 2: Footprinting and Reconnaissance Module 3: Scanning Networks Module 4: Enumeration Module 5: System Hacking Module 6: Trojans and Backdoors Module 7: Viruses and Worms Module 8: Sniffers Module 9: Social Engineering Module 10: Denial of Service Module 11: Session Hijacking Module 12: Hacking Webservers Module 13: Hacking Web applications Module 14: SQL Injection Module 15: Hacking Wireless Networks Module 16: Hacking Mobile Platforms Module 17: Evading IDS, Firewalls and Honeypots Module 18: Buffer Overflow Module 19: Cryptography Module 20: Penetration Testing
eccsecana EC-Council Security Analyst 35 hours Description: The EC–Council Security Analyst (ECSA) programme is a comprehensive, standards-based, methodology intensive training program which teaches information security professionals to conduct real life penetration tests by utilizing EC-Council’s published penetration testing methodology. The ECSA Programme is a 5-day complete hands-on training programme. This Penetration Testing training course uses real-time scenarios to train students in penetration testing methodologies. EC-Council’s Certified Security Analyst (ECSA) course will help you master a documented penetration testing methodology that is repeatable and that can be used in a penetration testing engagement, globally ECSA Lab Environment: The ECSA course is a fully hands-on program. The exercises cover real world scenario. By practicing the skills that are provided to you in the ECSA class, we are able to bring candidates up to speed with the latest threats that organizations may be vulnerable to. This can be achieved with the EC-Council iLabs cyber range. It allows students to dynamically access a host of Virtual Machines preconfigured with vulnerabilities, exploits, tools, and scripts from anywhere with an internet connection. With iLabs, lab exercises can be accessed 24x7 allowing the student to practice skills in a safe, fully functional network anytime it’s convenient. Target Audience: Network server administrators, firewall administrators, information security analysts, system administrators, and risk assessment professionals all benefit from the ECSA programme Core modules: 1. Need for Security Analysis 2. TCP IP Packet Analysis 3. Penetration Testing Methodologies 4. Customers and legal Agreements 5. Rules of Engagement 6. Penetration Testing Planning and Scheduling 7. Pre- Penetration Testing Steps 8. Information gathering 9. Vulnerability Analysis 10. External penetration Testing 11. Internal Network Pen Testing 12. Firewall Penetration Testing 13. IDS Penetration Testing 14. Password Cracking Penetration Testing 15. Social Engineering Penetration testing 16. Web Application Penetration Testing 17. SQL Penetration Testing 18. Penetration Testing Reports and Post Testing Actions Self Study Modules: 1. Router and Switches Penetration Testing 2. Wireless Network Penetration Testing 3. Denial-of-Service Penetration Testing 4. Stolen Laptop, PDAs and Cell Phones Penetration Testing 5. Source Code Penetration Testing 6. Physical Security Penetration Testing 7. Surveillance Camera Penetration Testing 8. Database Penetration Testing 9. VoIP Penetration Testing 10. VPN Penetration Testing 11. Cloud Penetration Testing 12. Virtual Machine Penetration Testing 13. War Dialling 14. Virus and Trojan Detection 15. Log Management Penetration Testing 16. File Integrity Checking 17. Mobile Devices Penetration Testing 18. Telecommunication and Broadband Communication Penetration Testing 19. Email Security Penetration Testing 20. Security Patches Penetration Testing 21. Data Leakage Penetration Testing 22. SAP Penetration Testing 23. Standards and Compliance 24. Information System Security Principles 25. Information System Incident and Response 26. Information System Auditing and Certification
pkiimpman PKI: Implement and Manage 21 hours Overview This Public Key Infrastructure – Implement and Manage course helps any individual to gain knowledge in managing robust PKI and having better understanding of topics surrounding public key infrastructure. Moreover, the PKI course is a preparation for the increasingly critical component – which ensures confidentiality, integrity, and authentication in an enterprise. Our PKI course provides the knowledge and skills necessary to select, design and deploy PKI, to secure existing and future applications within your organization. It also gives a deeper look into the foundations of cryptography and the working principles of the algorithms being used. Throughout the whole course, participants will gain in-depth knowledge on the following topics: Legal aspects of a PKI Elements of a PKI PKI management Trust in a digital world Digital signature implementation Trust models After completing the PKI course, each individual will be able to successfully design, setup, deploy, and manage a public key infrastructure (PKI). This is a 3-day course is considered essential for anyone who needs to understand Public Key Infrastructure (PKI) and the issues surrounding its implementation. It covers the issues and technologies involved in PKI in-depth and gives hands-on practical experience of setting up and maintaining a variety of PKI solutions. Detailed knowledge of issues surrounding PKI helps to put recent attacks which have appeared in the news headlines into context and enable valid decisions to be made about their relevance to your organisation. Objectives To introduce the student to the theoretical aspects of the foundations and benefits of Public Key Infrastructure (PKI), including different types of encryption, digital signatures, digital certificates and Certificate Authorities. To give students hands on experience of implementing and using PKI solutions with a variety of applications. To give students an understanding of the concepts of evaluating and selecting PKI technologies Audience Anyone involved in Public Key Infrastructure | PKI decision-making, implementing and securing e-commerce and other Internet applications, including CIOs, Chief Security Officers, MIS Directors, Security Managers and Internal Auditors. Introduction to PKI Basic Security Concepts Public Key Infrastructure Defined Digital Certificates and Signatures Smart Cards PKI Standards Basic cryptography Uses of Cryptography History of Cryptography including early methods Symmetric and Asymmetric Encryption plus Algorithms Diffie-Hellman Key Generation Hashing for Integrity plus Algorithms Practical uses for encryption and associated issues Signed and Encrypted Email using S/MIME and PGP Secure connections to websites Digitally signing PDFs Encrypting files Encrypting hard drives Encrypting “containers” SSL, VPN and Wireless PKI and Cloud Computing Attacks on Encryption Certificate Authorities Public v Private CAs Regulations governing CAs CA Certificate Policies Types of Certificates Provided CA Hierarchies Certificate Authority Operations Certificate expiration Certificate revocation Certificate Revocation Lists (CRL) Online Certificate Status Protocol (OCSP) Key recovery Installing a CA and issuing certificates Certificate Templates Summary Top 5 Deployment Issues Top 10 Risks Advanced PKI Topics and Futures Summary of Public Key Infrastructure
cl-njs Node.JS and Web Application Security 21 hours As a developer, your duty is to write bulletproof code.  What if we told you that despite all of your efforts, the code you have been writing your entire career is full of weaknesses you never knew existed? What if, as you are reading this, hackers were trying to break into your code? How likely would they be to succeed? What if they could steal away your database and sell it on the black market? This Web application security course will change the way you look at code. A hands-on training during which we will teach you all of the attackers’ tricks and how to mitigate them, leaving you with no other feeling than the desire to know more. It is your choice to be ahead of the pack, and be seen as a game changer in the fight against cybercrime. Delegates attending will: Understand basic concepts of security, IT security and secure coding Learn Web vulnerabilities beyond OWASP Top Ten and know how to avoid them Learn client-side vulnerabilities and secure coding practices Learn about Node.js security Learn about MongoDB security Have a practical understanding of cryptography Understand essential security protocols Understand security concepts of Web services Learn about JSON security Get practical knowledge in using security testing techniques and tools Learn how to handle vulnerabilities in the used platforms, frameworks and libraries Get sources and further readings on secure coding practices IT security and secure coding Web application security Client-side security Node.js security Practical cryptography Security protocols Denial of service Security of Web services JSON security Other typical programming mistakes Security testing Deployment environment Knowledge sources
ethhack Ethical Hacker 35 hours This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking. The purpose of the Ethical Hacking Training is to: Establish and govern minimum standards for credentialing professional information security specialists in ethical hacking measures. Inform the public that credentialed individuals meet or exceed the minimum standards. Reinforce ethical hacking as a unique and self-regulating profession. Audience: The Course is ideal for those working in positions such as, but not limited to: Security Engineers Security Consultants Security Managers IT Director/Managers Security Auditors IT Systems Administrators IT Network Administrators Network Architects Developers 01. Introduction to Ethical Hacking 02. Footprinting and Reconnaissance 03. Scanning Networks & Systems 04. Windows Hacking 05. Linux Hacking 06. Viruses, Worms, Trojans and Malware 07. Sniffing and MITM 08. Social Engineering 09. Denial-of-Service and DDOS 10. Web Hacking 11. Hacking Web Applications 12. SQL Injection and Cross Site Scripts 13. Hacking Wireless Networks 14. Android Hacking 15. Cryptography

Upcoming Courses

CourseCourse DateCourse Price [Remote / Classroom]
Node.JS and Web Application Security - London, Hatton GardenTue, 2017-05-09 09:30£3900 / £4750
Ethical Hacker - Birmingham Mon, 2017-05-15 09:30£5000 / £6450

Other regions

Weekend Hands on Security courses, Evening Hands on Security training, Hands on Security boot camp, Hands on Security instructor-led , Hands on Security private courses, Hands on Security training courses, Hands on Security instructor, Evening Hands on Security courses, Hands on Security classes, Hands on Security on-site,Weekend Hands on Security training, Hands on Security coaching, Hands on Security one on one training

Course Discounts

Course Discounts Newsletter

We respect the privacy of your email address. We will not pass on or sell your address to others.
You can always change your preferences or unsubscribe completely.

Some of our clients