Product Training


The following list is just a brief sample of the courses we have experience teaching. Please contact us for more details.


Brief Description

Cloud Computing Security

Security issues facing cloud computing and how to deal with them

Hacking and Countermeasures

Demonstration of the five stages of a cyber attack with specific emphasis on the tools and tricks a hacker uses to carry out the attack, and best practices for preventing such attacks

IPv6 Security

Security challenges and best practices for migrating to IPv6

Advanced Intrusion Detection & Analysis

Detection and analysis of security events using intrusion detection techniques, tools, and processes

Hardware Analysis/Reverse Engineering of Malware

A detailed discussion of how to break down the bytes of an attack signature, software infection, or residual program in order to gather whatever information is available to assist in the mitigation of the attack and protection against similar future attacks

Secure Software Development Lifecycle (S-SDLC)

How and where security should be integrated into a system or application development effort

Secure Coding/Web Application Security

Programming methods for ensuring the security of the implemented system

Windows 7 Security

Security functions and features of Windows 7 and best practices for securing it

Windows Server Security

Security functions and features of Windows Server 2003 and Windows Server 2008 and best practices for securing them

Incident Response & Forensics

Investigating a cyber incident, analyzing the key components and data gathered during the investigation, and reporting and remediation

CISSP Prep Class

Prepares students for the CISSP exam, including test preparation and test taking techniques

Security Awareness Training

The components of cyber security, common threats and vulnerabilities, and how users play an important role in maintaining a secure computing and networking environment

Business Resumption Planning

The key components of a business resumption plan and when/how to execute it


Delivery Methods

All of our courses have been taught as instructor-led classroom sessions with a heavy emphasis on hands-on training where appropriate. We have also offered several courses through interactive video or online platforms. It is critical to the success of a course that we choose the optimum delivery method considering the location of the attendees and the material. The table below lists the different delivery methods we offer.


Ideal Audiences

Ideal Subjects



General staff and management

Awareness courses, topical security training, certification and higher-level education courses

A subject matter expert leads the discussions and can immediately respond to questions

Hands-on laboratory

Technical staff (network managers and engineers, system/security administrators)

Technology hardware, software, and tool training

Attendees work directly with the products in real time

Offline computer-based training

Multiple levels of organizational staff

Static training and awareness material, general or topical information

Wide target audience reach, cost savings, and consistency in message delivery

Online interactive training using WebEx

Multiple levels of organizational staff, staff in remote locations

Interactive subjects, technical or general awareness training, certification and higher-level education courses

A subject matter expert is immediately available via chat and other communication tools