Certified Training Courses

Integrated Cyber gives you access to training content from over 200,000 certified security professionals. Individuals who have achieved certifications that include those from some of the finest organizations around the world such as the US Army, the FBI, Microsoft, IBM, and the United Nations.

Many of these certifications are recognized worldwide and have received endorsements from various government agencies including the US Federal Government via the Montgomery GI Bill, National Security Agency (NSA) and the Committee on National Security Systems (CNSS). Moreover, the United States Department of Defense has included the CEH program into its Directive 8570 making it one of the mandatory standards to be achieved by Computer Network Defenders Service Providers (CND-SP).

Ethical Hacking Core Skills (EHCS)

C|EH Practical Credential holders can:

  • Demonstrate the understanding of attack vectors

  • Perform network scanning to identify live and vulnerable machines in a network.

  • Perform OS banner grabbing, service, and user enumeration.

  • Perform system hacking, steganography, steganalysis attacks, and cover tracks.

  • Identify and use viruses, computer worms, and malware to exploit systems.

  • Perform packet sniffing.

  • Conduct a variety of web server and web application attacks including directory traversal, parameter tampering, XSS, etc.

  • Perform SQL injection attacks.

  • Perform different types of cryptography attacks.

  • Perform vulnerability analysis to identify security loopholes in the target organization’s network, communication infrastructure, and end systems etc.

The Ethical Hacking Core Skills course you will teach you the core skills to build a solid security foundation. You will examine in detail the traffic that traverses the network at the packet and binary level. You will build a solid knowledge of the lowest layers of the network. In the course, you will conduct extensive hands-on exercises. You will learn to master the TCP/IP protocol. You will learn essential UNIX and Linux survival skills that separate you from the many security professionals who are Windows-centric.

 

Additionally, you will be introduced to vulnerability assessment and the hacking methodology. When you finish this course you will have a solid security foundation to pursue more advanced security training. For many, when you take a class like the Certified Ethical Hacker (CEH) you have not established the foundation that is needed to get the most from the course, this is where ethical hacking core skills come in, it is the bridge between a beginning level security course and CEH; furthermore, it focuses on the main concepts required to build a foundation in security.

Application Security Training C|ASE

The Purpose of CASE Is

  • To ensure that application security is no longer an afterthought but a foremost one.

  • To lay the foundation required by all application developers and development organizations, to produce secure applications with greater stability and fewer security risks to the consumer, therefore, making security a foremost thought.

  • To ensure that the organizations mitigate the risk of losing millions due to security compromises that may arise with every step of application development process.

  • To help individuals develop the habit of giving importance to security sacrosanct of their job role in the SDLC, therefore opening security as the main domain for testers, developers, network administrator etc. 

The Certified Application Security Engineer (CASE) credential is developed in partnership with large application and software development experts globally.

 

The CASE credential tests the critical security skills and knowledge required throughout a typical software development life cycle (SDLC), focusing on the importance of the implementation of secure methodologies and practices in today’s insecure operating environment.

The CASE certified training program is developed concurrently to prepare software professionals with the necessary capabilities that are expected by employers and academia globally. It is designed to be a hands-on, comprehensive application security course that will help software professionals create secure applications.

Certified Secure Computer User (CSCU)

Course Outline

  • Introduction to Security

  • Securing Operating Systems

  • Malware and Antivirus

  • Internet Security

  • Security on Social Networking Sites

  • Securing Email Communications

  • Securing Mobile Devices

  • Securing Cloud

  • Securing Network Connections

  • Data Backup and Disaster Recovery

The purpose of the CSCU training program is to provide individuals with the necessary knowledge and skills to protect their information assets. This class will immerse students into an interactive environment where they will acquire a fundamental understanding of various computer and network security threats such as identity theft, credit card fraud, online banking phishing scams, virus and backdoors, emails hoaxes, sex offenders lurking online, loss of confidential information, hacking attacks and social engineering. More importantly, the skills learned from the class helps students take the necessary steps to mitigate their security exposure.