- Course Schedules
- Knowledge Center
- About Us
- Contact Us
Toll Free: (888) 838-5498
Local: (407) 612-6999
In today’s cyber world the number of threats to security are growing daily at an exponential pace. How can you defend your home and business from the many dangers in the IT world such as viruses and information theft? Each of our classes is custom designed to inform the student of the ideal behaviors and precaution to adopt in regards to IT security.
This class includes the following areas: IS Audit process, IT Governance, Systems and Infrastructure Lifecycle Management, IT Service and Support, Protection of Information Assets, and Business Continuity and Disaster Recovery.
Students will learn how to look for the weaknesses and vulnerabilities in target systems and use the same knowledge and tools as a hacker. How to perform penetration testing to determine the stability and reliability of corporate security measures.
This class is for the small business or home computer enthusiast who needs to secure private or proprietary information. It includes Understanding Information Security, Desktop and Network Security, File Security, How to guard against, identify and deal with attacks.
This class often follows the CEH class. Learn how to follow the technological footprints of hackers and penetrators of a network, and provide evidence to lead to prosecution.
This class promotes international practices and executive management techniques and practices to provide effective security management and consulting services. It identifies how to manage, design, oversee and/or assess an enterprise's information security (IS).
If a student is not fully satisfied with the classroom experience they may re-attend an open enrollment class at no cost. See details*