Advanced Cybersecurity Training
Make It Your Own
We’ve created training courses that use a student’s base skills and allows them to work at their pace to become an expert in the field. The training environment is set up in a way that the student can balance their business workload with the time needed to accomplish goals of the class. All courses are hands on and mostly self-guided sessions. Most importantly each training course is fully customizable to the client’s needs and experience.
It is learning through experiences!
Industry experts with over two decades of experience and a variety of skills lay out a plan at the start of the course. These experts are available throughout the course to help students find the answers to their questions.
After the first two days of the course, the experts are available up to 4 hours a week for one on one student questions. Weekly status and progress reviews will be scheduled around the student’s work priorities.
Every student gets full access 24/7 to all hardware resources and support personnel.
At the start of the course students are given an overall view and plan for the course along with any and all resources and documentation needed to complete the course. Following this the student is then sent on a journey of discovery and learning through hands on experiences.
Each student is expected to come up with creative solutions to solve problems and be resourceful to accomplish the tasks they face. True learning happens not when told how to do something but when you have to determine the steps you have to take to solve a problem and then perform them.
There are no text books or scripts to follow just creating experiences. Upon completion of one of the training courses a student will have learned what they need to know but will also know how to find what they don’t.
- Technical Consultants
- Technical Administrators
- Security Administrators
- Up to 15 virtual machines
- Links to an internal knowledgebase and documentations
- Access to a dedicated expert, 4 hours per week
- 24/7 access to hardware resources
- 24/7 access to consultants and support personnel
|NetIQ Identity & Access Management||Understand and implement event and standards based provisioning and SSO solutions.||5-10 weeks||Customized based off client’s need.|
|Oracle Identity Management||Tackle the complexity of an OIM system by leaning to build it from scratch.||5-10 weeks||Customized based off client’s need.|
|IT Security||Learn the full breadth of IT security. Covering everything from security models, networks, operating systems, cryptography through domain applications.||3 hours a week for 3 weeks||Customized based off client’s need.|