A compilation of our courses: Information Security Essentials, Security Architecture and Design, Introduction to Hacking, Defense and Response, Information Security, Incident Response and Computer Forensics, and Application Security. Conveniently offered in a single-enrollment format for Boeing employees.
This 2-day or 4-night course is a comprehensive overview of Information Security covering the most relevant practices in information security today. In this class, students explore the techniques and methodologies used to configure, build, deliver, and troubleshoot network security. Topics include the role of information security in the enterprise, formal data classification, enterprise identity management, the components of comprehensive and layered security architecture, and the threat of viruses, worms, Trojans and improper configurations.
This course provides a comprehensive overview of cyber-security control technologies. The course starts with a discussion of security policies and perimeter security fundamentals and then moves to a discussion on how to design network borders for maximum security and how to monitor them for unauthorized activity. Then after an introduction to firewalls, packet filtering, and access lists, the course discusses how to set up routers, special-purpose firewalls, and general-purpose hosts with security in mind. Much of the class centers on security-conscious design, both for green field projects and existing networks that need expansion or improvement.
This course provides a comprehensive overview of hacking and cyber security defense and response tools and techniques. It incorporates several hands-on exercises utilizing the same attack methods used by hackers and cyber security professionals. The course starts with a discussion of why people hack and how they hack. It then focuses on the methods used, including the initial foot printing of the target, scanning the network and finally enumerating target host machines. The second day focuses on the measures necessary to protect your network from the threat. Topics include understanding your network traffic, firewalls, host hardening, intrusion detection systems and network design. Tools used for this class include: Nessus, Nmap, SuperScan, Snort, Fport, John the Ripper, and many others.
This course provides a comprehensive overview of incident response & computer forensics. Topics include everything from establishing policies and procedures to collecting data from live Windows and Unix machines. Several hands-on exercises utilizing the HELIX Forensics CD will be incorporated into the course to allow you to perform live forensic analysis on the operating system. Tools Include: Windows Forensics Toolchest (WFT), Incident Response Collection Report (IRCR2), First Responder’s Evidence Disk (FRED), First Responder Utility (FRU), Md5 Generator, File Recovery, Rootkit Revealer and many others.
This course provides a comprehensive overview of application security for information security specialists and developers. The course focuses on web application development and the prevention of hacking through vulnerable web applications. Topics include Application Security Fundamentals, Application Security Threats, and Application Security Assessment.
SOME SESSIONS OF THIS CERTIFICATE INCLUDE ONE OF THE FOLLOWING CLASSES - REFER TO THE SECTION NOTES FOR CLASS DETAILS
This course provides a comprehensive review of security topics and exam preparation for the Certified Information Systems Security Professional (CISSP) certification. The CISSP is globally recognized as an objective measure of competence and achievement for information security professionals. In this course, students review the 8 domains of the information security practice or common body of knowledge (CBK). Some of the topics include security models, distributed access control methods, DBMS architectures, key cryptography algorithms, intrusion detection systems, and data network components and technologies.
This course provides a review of topics and exam preparation for the CompTIA Security+ Exam. The Security+ exam validates knowledge and understanding of foundation level security standards. It is an international vendor-neutral security certification widely used to demonstrate both compliance and competence in the security industry. The course reviews all areas of the Security+ exam including systems security, network infrastructure, access control, assessments and audits, cryptography and organizational security In addition, the application and testing process as well as key test topics and practice questions.
90 Hours | 15 Days or 30 Nights
(Students will need to enroll and complete Security+ or CISSP Test Prep/Review in order to complete this certificate program.)
Applies Towards the Following Certificates
- Boeing Cyber Security : Required