Course Description

A compilation of our courses: Information Security Essentials, Security Architecture and Design, Introduction to Hacking, Defense and Response, Information Security, Incident Response and Computer Forensics, Application Security and Certified Ethical Hacker (CEH).

Course Outline

SEC100 Information Security Essentials

This 2-day or 4-night course is a comprehensive overview of Information Security covering the most relevant practices in information security today. In this class, students explore the techniques and methodologies used to configure, build, deliver, and troubleshoot network security.  Topics include the role of information security in the enterprise, formal data classification, enterprise identity management, the components of comprehensive and layered security architecture, and the threat of viruses, worms, Trojans and improper configurations.

SEC200 Security Architecture and Design

This course provides a comprehensive overview of cyber-security control technologies. The course starts with a discussion of security policies and perimeter security fundamentals and then moves to a discussion on how to design network borders for maximum security and how to monitor them for unauthorized activity. Then after an introduction to firewalls, packet filtering, and access lists, the course discusses how to set up routers, special-purpose firewalls, and general-purpose hosts with security in mind. Much of the class centers on security-conscious design, both for green field projects and existing networks that need expansion or improvement.

SEC300 Introduction to Hacking, Defense and Response

This course provides a comprehensive overview of hacking and cyber security defense and response tools and techniques. It incorporates several hands-on exercises utilizing the same attack methods used by hackers and cyber security professionals. The course starts with a discussion of why people hack and how they hack. It then focuses on the methods used, including the initial foot printing of the target, scanning the network and finally enumerating target host machines. The second day focuses on the measures necessary to protect your network from the threat. Topics include understanding your network traffic, firewalls, host hardening, intrusion detection systems and network design. Tools used for this class include: Nessus, Nmap, SuperScan, Snort, Fport, John the Ripper, and many others. 

SEC400 Information Security, Incident Response and Computer Forensics

This course provides a comprehensive overview of incident response & computer forensics. Topics include everything from establishing policies and procedures to collecting data from live Windows and Unix machines. Several hands-on exercises utilizing the HELIX Forensics CD will be incorporated into the course to allow you to perform live forensic analysis on the operating system. Tools Include: Windows Forensics Toolchest (WFT), Incident Response Collection Report (IRCR2), First Responder’s Evidence Disk (FRED), First Responder Utility (FRU), Md5 Generator, File Recovery, Rootkit Revealer and many others.

SEC500 Application Security

This course provides a comprehensive overview of application security for information security specialists and developers. The course focuses on web application development and the prevention of hacking through vulnerable web applications. Topics include Application Security Fundamentals, Application Security Threats, and Application Security Assessment. 

SEC900 Certified Ethical Hacker (CEH)

This course provides a review of topics and exam preparation for the Certified Ethical Hacker (CEH) exam. The Certified Ethical Hacker (CEH) certification is a vendor neutral certification in the network security discipline of Ethical Hacking. It covers the standards and language involved in attempting to penetrate a network or computer system. The Ethical Hacker is a technical professional who uses the same knowledge and tools as a hacker to look for the weaknesses in target systems and to help prevent unauthorized penetration. This knowledge or certification applies to security officers, auditors, security professionals, site administrators, and really anyone who is concerned about the integrity of the network infrastructure. In this course students prepare for the CEH exam by studying security risks through lectures and hands-on lab exercises. Students discuss and learn how to look for the weaknesses and vulnerabilities in a target. In addition, the application and testing process for the CEH as well as key topics on the exam are covered. 


90 Hours | 15 Days or 30 Nights

Thank you for your interest in this course. Unfortunately, the course you have selected is currently not open for enrollment. Please complete a Course Inquiry or call 314-977-3226 so that we may promptly notify you when enrollment opens.

Required fields are indicated by .
*Academic Unit eligibility to be determined by college/university in which you are enrolled in a degree seeking program.