Security Training Classes
Learn Security wherever you are located. All of our classes either are offered on an onsite, online or public instructor led basis.
Security Training Catalog
cost: $ 970length: 2 day(s)
This live virtual training course is designed to help you understand Amazon Web Services and acts as an introduction to cloud computing concepts and key AWS services. It will also help prepare you for the AWS Certified Cloud Practitioner exam. If you are looking for credibility as an AWS professional, there is no better place to start than with Amazon AWS Certified Cloud Practitioner exam. ------- ...
cost: $ 2690length: 5 day(s)
Digital Forensics is the investigation and recovery of data contained in
digital devices. This data is often the subject of investigations in
litigation, proof of guilt, and corrective action in an organization.
When the time comes that you need to investigate your organization, will
you have the skill set necessary to gather the digital data that you
need? The Certified Digital Forensics ...
cost: $ 2290length: 4 day(s)
When a business is hit by a natural disaster, cyber crime or any other
disruptive tragedy, how should it react? What if the office IT
infrastructure is taken down? Will the business be able to continue
operations? How much will it cost if the business is down during
repairs? The answer lies in the training of the Certified Disaster
Recovery Engineer course. Disaster recovery and business ...
cost: $ 970length: 2 day(s)
This live and interactive training is designed to help you prepare for the EC-Council Certified Ethical Hacker (CEH) version 10 certification exam. In this training we will review
Key topics and methodologies that you need to master the CEHv10 exam objectives
Step by step examples of security penetration testing methodologies and concepts
Sample questions for each of the topics covered in the ...
cost: $ 2800length: 3 day(s)
Validate your skills on the GAiA operating system. Check Point Security
Administration R77 provides an understanding of the basic concepts and
skills necessary to configure Check Point Security Gateway and
Management Software Blades. During this course you will configure a
Security Policy and learn about managing and monitoring a secure
network, upgrading and configuring a Security Gateway and ...
cost: $ 2800length: 3 day(s)
Learn to troubleshoot Check Point security systems. Check Point Security
Engineering (R77 GAiA) is an advanced course that provides you training
on how to effectively build, modify, deploy, and troubleshoot Check
Point Security systems on the GAiA OS. You will learn about firewall
processes, user and kernel processing, and Stateful Inspection. Labs
include configuring security gateways, ...
cost: $ 3290length: 5 day(s)
In this in depth training, students will learn step-by-step approaches
used by hackers globally, the latest attack vectors and how to safeguard
against them, Incident Handling procedures (including developing the
process from start to finish and establishing your Incident Handling
team), strategies for each type of attack, recovering from attacks and
much more. ...
cost: $ 2270length: 5 day(s)
The Certified Information Systems Security Manager certification Cyber Security Training Course is designed to teach towards and certify a information systems professionals high standard of excellence in following areas:
Information Security Governance
Information Risk Management and Compliance
Information Security Program ...
cost: $ 2800length: 5 day(s)
The CISSO covers all of the CISSP (10 Domain) exam objectives but allows
the student to get certified with much more ease than the ISC2 exam
process. Kevin Henry is the well-known security guru who created both
these courses. The CISSO is the updated version with the latest and
greatest content, which will also prepare the student for the CISSP
exam. The CISSO course is designed for a forward-thin ...
cost: $ 3290length: 5 day(s)
The Certified Network Forensics Examiner was originally developed for a
U.S. classified government agency. The C)NFE takes a digital and network
forensic skill set to the next level by navigating through over twenty
modules of network forensic topics. The CNFE provides practical
experience through our lab exercises that simulate real-world scenarios
which cover investigation and recovery of data ...
cost: $ 2800length: 5 day(s)
The Certified Professional Ethical Hacker course is the foundational
training for the line of penetration testing courses. The CPEH
certification training enables students to understand the importance of
vulnerability assessments by providing industry knowledge and skills in
Vulnerability Assessment. In doing so, the CPEH student is able to
understand how malware and destructive viruses function. ...
cost: $ 2690length: 5 day(s)
The Certified Security Leadership Officer was designed for mid to C
level managers as well as any engineers who seek to increase their
knowledge in the security arena. The C)SLO course was designed to give
management an essential understanding of current security issues, best
practices, and technology. Because a security officer or manager
understands the value of security, he or she is prepared ...
cost: $ 2290length: 3 day(s)
The Certified Vulnerability Assessor training help students understand
the importance of vulnerability assessments by providing intricate
knowledge and skills in the Vulnerability Assessment arena. The CVA
course provides foundational knowledge of general VA tools as well as
popular exploits an IT engineer should be familiar with. ...
cost: $ 490length: 1 day(s)
This one-day course is designed to provide IT professionals with a fundamental understanding of cybersecurity, with a particular focus on ransomware. The course covers topics such as cybersecurity threats, encryption, authentication, authorization, and ransomware attacks, along with strategies for ransomware protection.
The course is suitable for both ...
cost: $ 690length: 1 day(s)
Kali Linux is a Linux-based distribution used mainly for penetration testing and digital forensics. It has a wide range of tools to help in forensics investigations and incident response mechanisms.
You will start by understanding the fundamentals of digital forensics and setting up your Kali Linux environment to perform different investigation practices. The book will delve into the realm ...
cost: $ 490length: 1 day(s)
This course introduces the fundamentals of cybersecurity and the principles of a Zero Trust strategy. In the first module, students are introduced to the basics of cybersecurity, gaining an understanding of the overall landscape, the role of encryption, the importance of user verification and access control, and the necessity of network and data protection. The module also emphasizes that ...
cost: $ 2290length: 3 day(s)
Mile2â??s IS 20 Controls course covers proven general controls and
methodologies that are used to execute and analyze the Top Twenty Most
Critical Security Controls. This course allows the security professional
to see how to implement controls in their existing network(s) though
highly effective and economical automation. For management, this
training is the best way to distinguish how you&a ...
cost: $ 2290length: 5 day(s)
The Information Systems Certification and Accreditation Professional
training quantifies the process of certifying, reviewing and accrediting
an information system by IT professionals. This certification is
designed to provide, through its contents and referenced resources, a
complete guide to establishing a certified and accredited information
system in any organization. ...
cost: $ 1290length: 3 day(s)
The three-day NIST Cybersecurity Bootcamp course is a combination of the NIST Cybersecurity Framework (NCSF) Foundation and Practitioner Training courses. The bootcamp provides a deep dive into the components of the NIST CSF and NIST Risk Management Framework (RMF) and how they align to risk management. The course will follow the principles of the NIST Cybersecurity Framework to design and ...
cost: $ 290length: 1 day(s)
The one-day LRS NIST Cybersecurity Foundation course is designed for anyone in an organization who needs to understand the basics of cybersecurity, the components of the NIST CSF, and how the NIST CSF aligns to risk management. Security, IT, risk management, policy makers, and other business professionals who have responsibility for aspects of business or technical security can benefit ...
cost: $ 890length: 2 day(s)
The NIST Cybersecurity Framework (NCSF) Practitioner Training course is suited for individuals working with and overseeing the technology, including CIOs, CISOs, IT Directors and Managers, IT Security personnel, and IT staff.
Two-day deep dive into NIST CSF Foundation concepts.
Focus on designing and implementing (or improving) a ...
cost: $ 2090length: 3 day(s)
This course is for software engineers/developers in need of developing applications that are hacker secure. It covers all relevant and some not so relevant pentest topics.
...
AWS Classes
cost: $ 970length: 2 day(s)
This live virtual training course covers the essentials of machine learning on AWS and prepares a candidate to sit for and clear the AWS Machine Learning-Specialty (ML-S) certification exam. Instructor Noah Gift covers the four core areas of the certification: Data Engineering, EDA (Exploratory Data Analysis), Machine Learning Modeling, and ML Operations. The final portion of the course covers ...
JUnit, TDD, CPTC, Web Penetration Classes
cost: $ 3290length: 4 day(s)
The Certified Penetration Testing Consultant course is designed for IT
Security Professionals and IT Network Administrators who are interested
in conducting Penetration tests against large network infrastructures
similar to large corporate networks, Services Providers and
Telecommunication Companies. Instead of focusing on operating system
level penetration testing, this course covers techniques ...
cost: $ 690length: 2 day(s)
This course provides students with a solid foundation on penetration
testing as it applies to web applications. Those looking to identify
how to perform a Penetration Test against web applications and present
findings to a customer/employer in a professional manner. ...
Course Directory [training on all levels]
Technical Training Courses
Software engineer/architect, System Admin ... Welcome!
- .NET Classes
- Agile/Scrum Classes
- Ajax Classes
- Android and iPhone Programming Classes
- Blaze Advisor Classes
- C Programming Classes
- C# Programming Classes
- C++ Programming Classes
- Cisco Classes
- Cloud Classes
- CompTIA Classes
- Crystal Reports Classes
- Design Patterns Classes
- DevOps Classes
- Foundations of Web Design & Web Authoring Classes
- Git, Jira, Wicket, Gradle, Tableau Classes
- IBM Classes
- Java Programming Classes
- JBoss Administration Classes
- JUnit, TDD, CPTC, Web Penetration Classes
- Linux Unix Classes
- Machine Learning Classes
- Microsoft Classes
- Microsoft Development Classes
- Microsoft SQL Server Classes
- Microsoft Team Foundation Server Classes
- Microsoft Windows Server Classes
- Oracle, MySQL, Cassandra, Hadoop Database Classes
- Perl Programming Classes
- Python Programming Classes
- Ruby Programming Classes
- Security Classes
- SharePoint Classes
- SOA Classes
- Tcl, Awk, Bash, Shell Classes
- UML Classes
- VMWare Classes
- Web Development Classes
- Web Services Classes
- Weblogic Administration Classes
- XML Classes
Business Training Courses
Project Managers, Business Analysts, Paralegals ... Welcome!
Upcoming Classes
Gain insight and ideas from students with different perspectives and experiences.
- Introduction to C++ for Absolute Beginners
16 December, 2024 - 17 December, 2024 - Introduction to Spring 5 (2022)
16 December, 2024 - 18 December, 2024 - See our complete public course listing
training details locations, tags and why hsg
the hartmann software group advantage
A successful career as a software developer or other IT professional requires a solid
understanding of software development processes, design patterns, enterprise application architectures,
web services, security, networking and much more. The progression from novice to expert can be a
daunting endeavor; this is especially true when traversing the learning curve without expert guidance. A
common experience is that too much time and money is wasted on a career plan or application due to misinformation.
The Hartmann Software Group understands these issues and addresses them and others during any training engagement. Although no IT educational institution can guarantee career or application development success, HSG can get you closer to your goals at a far faster rate than self paced learning and, arguably, than the competition. Here are the reasons why we are so successful at teaching:
- Learn from the experts.
- We have provided software development and other IT related training to many major corporations since 2002.
- Our educators have years of consulting and training experience; moreover, we require each trainer to have cross-discipline expertise i.e. be Java and .NET experts so that you get a broad understanding of how industry wide experts work and think.
- Discover tips and tricks about Security programming
- Get your questions answered by easy to follow, organized Security experts
- Get up to speed with vital Security programming tools
- Save on travel expenses by learning right from your desk or home office. Enroll in an online instructor led class. Nearly all of our classes are offered in this way.
- Prepare to hit the ground running for a new job or a new position
- See the big picture and have the instructor fill in the gaps
- We teach with sophisticated learning tools and provide excellent supporting course material
- Books and course material are provided in advance
- Get a book of your choice from the HSG Store as a gift from us when you register for a class
- Gain a lot of practical skills in a short amount of time
- We teach what we know…software
- We care…
page tags
what brought you to visit us
Security Training ,
Security Training Classes,
Security Training Courses,
Security Training Course,
Security Training Seminar
training locations
cities where we offer Security Training Classes