- Get Your  Professional ICT Training and the right
  Certifications today

CareerEdge - The Professionsal ICT Training and Certification Center
- Get Your Profesional ICT Training
   and the right Certifications today





The Professional ICT Training and Certification Centre

Click here to edit subtitle

IT Security Certification Training Courses

Security +

A+

CISA

SSCP

CISSP

SCNP

CISM

Security 5

CEH

CHFI

ENSA

ECSA

Security+ Certification Training

The CompTIA Security+ certification establishes knowledgeable professionals in the field of corporate security, one of the fastest-growing fields in IT. Even in a troubled economy, most businesses plan to at least maintain or optimally increase their investment in IT security. CompTIA Security+ is an international, vendor-neutral certification that demonstrates competency in network infrastructure, system security, organizational security and access control. Major organizations that enlist CompTIA Security+ certified professionals include Hewlett-Packard, IBM, Motorola, Hilton Hotels Corp., General Mills, Symantec, Lockheed Martin, Unisys, Hitachi, Ricoh, the U.S. Navy, Army, Air Force and Marines.

Although not a prerequisite, it is recommended that CompTIA Security+ candidates have at least two years of technical networking experience, with an emphasis on security. The CompTIA Network+ certification is also recommended.

For IT professionals requiring re-certification:
The newest version of CompTIA Security+ certification exams was launched in late . IT professionals who would like to to remain current on their certifications have two options: They can take the new version, or they can take the CompTIA Security+ bridge exam, which covers the new objectives. Only professionals who are currently CompTIA Security+ certified under 2002 exam objectives are eligible to become CompTIA Security+ certified by taking
Certified Information Systems Auditor (CISA) Training

Since 1978, the Certified Information Systems Auditor (CISA) program, sponsored by the Information Systems Audit and Control Association® (ISACA®), has been the globally accepted standard among information systems (IS) audit, control, and security professionals.

Our CISA Certified Information Systems Auditor course provides the student with the knowledge and proficiency to prepare for the globally recognized CISA 2011 certification exam. The CISA certification has become very popular since it originated in 1978, and is a benchmark for IS audit, security, control, and assurance personnel to validate their skill set. This course will immerse the student into the subject, with in-depth coverage of the information covering the five domains that make up the "Body of Knowledge" for the CISA 2011 exam and will provide the student the tools to build their technical skills to develop, manage, and perform IT

Shon Harris Systems Security Certified Practitioner (SSCP®) Training

The 6-day SSCP course provides comprehensive training in all 10 domains of the Common Body of Knowledge (CBK). The curriculum has been designed to meet a strict set of criteria covering all critical elements necessary for security today. It is aimed at professionals with at least four years of experience in the information security field or three years of experience and a college degree (or equivalent life experience).The SSCP certification is seen as a requirement for many technical and management positions.

The Shon Harris SSCP course teaches security policy development, secure software development procedures, network vulnerabilities, attack types and corresponding countermeasures, cryptography concepts and their uses, disaster recovery plans and procedures, risk analysis, crucial laws and regulations, forensics, computer crime investigation procedures, physical security, and more. Further, students will explore the contents and concepts that make up the diverse domains and learn how they work together to provide true in-depth defense.

ENSA - Network Security Administrator CBT Training

This course looks at the network security in defensive view. The ENSA program is designed to provide fundamental skills needed to analyze the internal and external security threats against a network, and to develop security policies that will protect an organization's information. Students will learn how to evaluate network and Internet security issues and design, and how to implement successful security policies and firewall strategies. In addition, they will learn how to expose system and network vulnerabilities and defend against them. This course prepares you for EC-Council Network Security Administrator exam 312-38. This course is a prerequisite for the CEH program.

Certified Information Systems Security Professional (CISSP) Training

The Shon Harris CISSP Series brings together all the materials, tools, and study aids you need to pass the CISSP exam. Whether you are a security professional, a seasoned engineer, or are looking for a career change - this is the solution to bring your career to new heights! Our objective is to not just prepare you for CISSP Certification, but to also provide you with the practical, detailed understanding and knowledge of security topics that will be of valued use to you and your company. Our product focuses not only on the areas necessary for the CISSP examination, but also on a more detailed and practical perspective that will give you competitive skills in the real world as well.

Our superior technology based course curriculum, strictly adheres to all of (ISC)2 & CompTIA Security+ exam objectives and is presented to you by leading certification instructors who are concise and engaging in their delivery. You will learn both the theory and practical aspects of the technologies as well as gain insight into the industry with their expert instruction. Each class session is presented in full motion audio/video, with step by step demonstrations testing modules to insure that you fully understand the subject matter. You can review each subject as needed to reinforce your knowledge, and access to educational mentors.

Security Certified Network Professional (SCNP) Training

The Strategic Infrastructure Security course picks up right where Tactical Perimeter Defense leaves off. The second course in the SCP line-up leads to a certification of Security Certified Network Professional (SCNP). It will give a network administrator the additional hands on skills needed to protect their network from the inside out. This course teaches you about prevention techniques as well as giving the candidate an understanding of risk analysis and security policy creation in a blended technology environment. The up-to-date security lessons and intense, hands-on labs bring a real world network security to training candidates.

The is the official training for the SCNP exam and is designed to validate the foundational skills required by security professionals. These skills include, but are not limited to: Cryptography, Hardening Linux Computers, Hardening Windows Computers, Ethical Hacking Techniques, Security on the Internet and World Wide Web, Performing a Risk Analysis, Creating a Security Policy and Analyzing Packet Signatures. Strategic Infrastructure Security replaces Network Defense and Countermeasures with updated technology and intense, hands- on labs.

Certified Information Systems Auditor (CISM) Training

The CISM certification program is developed specifically for experienced information security managers and those who have information security management responsibilities. CISM is globally recognized as the leading credential for information security managers.

Our CISM Certified Information Security Manager course provides the student with the knowledge and proficiency to prepare for the globally recognized CISM 2011 certification exam. The CISM certification combines the achievement of passing a comprehensive exam with recognition of work, management and educational experience, providing you with greater credibility in the marketplace. This course will immerse the student into the subject, with in-depth coverage of the information covering the five domains that make up the "Body of Knowledge" for the CISM 2011 exam and will provide the student the tools to build their technical skills to manage, design, oversee and assess an enterprise's information security.

EC-Council Security5 CBT Training

The Security 5 is an entry level professional certification for individuals interested in learning computer networking and security basics. This certification program insures an individuals competency in basic security matters, such as the definitions and the safe implementation of Firewall's, ports, and Anti-virus software.

ECSA/LPT Training CBT Boot Camp: EC-Council Certified Security Analyst / Licensed Penetration Tester

The ECSA/LPT training program is a highly interactive security course designed to teach Security Professionals the advanced uses of the available methodologies, tools and techniques required to perform comprehensive information security tests. Students will learn how to design, secure and test networks to protect your organization from the threats hackers and crackers pose. By teaching the LPT methodology and ground breaking techniques for security and penetration testing, this course will help you perform the intensive assessments required to effectively identify and mitigate risks to the security of your infrastructure. As students learn to identify security problems, they also learn how to avoid and eliminate them, with the course providing complete coverage of analysis and network security-testing topics. This course will prepare you to pass exam 412-79 to achieve EC-Council Certified Security Analyst (ECSA) certification.

CHFI Training CBT Boot Camp: EC-Council Computer Hacking Forensic Investigator  

Computer hacking forensic investigation is the process of detecting hacking attacks and properly extracting evidence to report the crime and conduct audits to prevent future attacks. Computer forensics is simply the application of computer investigation and analysis techniques in the interests of determining potential legal evidence. Evidence might be sought in a wide range of computer crime or misuse, including but not limited to theft of trade secrets, theft of or destruction of intellectual property, and fraud. CHFI investigators can draw on an array of methods for discovering data that resides in a computer system, or recovering deleted, encrypted, or damaged file information. This course will prepare you to pass the EC0 312-49 exam and achieve Computer Hacking Forensics Investigator (CHFI) certification.

Certified Ethical Hacker v7 (CEH) Training

 

The Certified Ethical Hacker requirement falls under the auspices of DoD Directive 8570 Information Assurance Workforce Improvement Program. The current version (incorporating Change 2) was signed by Assistant Secretary of Defense, John G. Grimes and was officially instated on February 25, 2010. Directive 8570 provides clear guidance to information assurance training, certification and workforce management across all components of the DoD.

The CND groups protect, monitor, analyze, detect, and respond to unauthorized activity within DoD information systems and computer networks. With this directive, military service, contractors, and foreign employees across all job descriptions must show 100-percent compliance with the new Certified Ethical Hacker training requirement by 2011.

This class will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking. This course prepares you for EC-Council Certified Ethical Hacker exam 312-50.

A+ Certification Training


A+ Certification is the computer industry recognized credential that certifies the competency of PC Service Specialists. It is sponsored by CompTIA - the Computing Technology Industry Association, and tests are administered by Prometric. This certification program is backed by over 50 Major computer hardware and software manufacturers, vendors, distributors, resellers, and publications. Certification provides a wealth of benefits to any person seeking a job in the computer industry! Your successful computer career can start with this one course, or it can serve as proof of your computer hardware and operating system knowledge as a professional already in your field.

The latest version of CompTIA A+ Certification is the CompTIA A+ 2009 Edition. Two exams are necessary to be certified: CompTIA A+ Essentials, exam code 220-701; and CompTIA A+ Practical Application, exam code 220-702. The international, vendor-neutral certification proves competence in areas such as installation, preventative maintenance, networking, security and troubleshooting. CompTIA A+ certified technicians also have excellent customer service and communication skills to work with clients.

CompTIA A+ Certification 2009 CBT Training
CompTIA A+ Essentials 2009 CBT Training
CompTIA A+ Practical Application 2009 CBT Training
CompTIA A+ Certification 2007 CBT Training