Enrollment options

Learn the foundations of security and defending architectures from attack. You will look at the concept of "thinking like a hacker" to learn techniques to defend from the types of attacks that are commonly conducted against IT/corporate networks as well as industrial control networks. You will learn powerful methods to analyze the risks inherent in your networks. Once your foundation has been set, you will look at the best practices and recommendations for reducing attack surface. You will also learn a systematic process for intrusion and malware analysis.

This course is taught by renowned cyber security expert Kevin Cardwell and includes extensive hands-on exercises, in order to learn by doing, as well as video teaching material.

Who Should Attend

This course is designed for anyone who wants to learn how hackers attack, and then use that information to make their own networks and computers harder to attack. The course is designed for anyone who is working in IT, from executives down to the help desk. Some of the specific job roles are as follows:

  • System administrators
  • Network engineers
  • Firewall administrators
  • SOC analysts, engineers, and managers
  • Application designers and developers
  • Security directors
  • Help desk personnel
  • Support engineers and technicians

Why Should You Attend

This intensive course will introduce the types of attacks that can completely compromise systems and networks; from there, you will design defensive mechanisms to either prevent the attacks or isolate them if prevention is not possible.

  1. Conduct hacking like the experts
  2. Learn defense from the attacker mindset
  3. Deploy proven defensive measures that block 90% of attacks
  4. Examine enterprise defense strategies
  5. Perform security configuration and baselining
  6. Secure an enterprise environment step by step

What You Will Learn

In this intensive hands-on course, you will

  1. Identify the potential weaknesses on a system and network
  2. Explore requirements for vulnerability management
  3. Deploy ingress and egress filters to reduce the risk to a network
  4. Perform basic memory analysis to identify potential malware intrusions
  5. Install decoys and triggers to identify sophisticated intrusions
  6. Analyze and reduce a network's attack surface

...and much more!

Expected Duration

40 hours, self-paced. Pause and continue at any time.
40 CPEs awarded on successful completion.

Cost

$2100 for 6 months of access.

Full Course

This course requires a payment for entry.

USD2,100.00

Log in to the site