
If you're looking to learn the fundamentals of cybersecurity, advance tactics, or prepare for industry-recognized certifications, we've got you covered.
At an alarming rate, data breaches are occurring. We no longer have to wonder what will happen next, but rather when. It is now necessary for the C-suite to cooperate with IT experts to develop a resilient workforce and implement new security policies and procedures to address the fact that cybersecurity is no longer only an IT problem.
Prepare for system breaches with our wide choice of product-specific cybersecurity training and industry-recognized certification preparatory classes. Become an expert in critical infrastructure risk management, secure coding, web security, and security awareness. We can provide you with the security training you need to manage critical infrastructure threats and comply with Department of Defense security standards, no matter what level of position you hold.
Cybersecurity training is available as "online live training" or "onsite live training". Online live training (aka "remote live training") is carried out by way of an interactive, remote desktop. Onsite live Cyber Security trainings in the US can be carried out locally on customer premises or in NobleProg corporate training centers.
Testimonials
The real life examples Ron gave.
Bosch
Course: IoT Security Architecture
Ron was very mindful of his audience and addressed everyone's questions. He checked his audience for clarity and was willing to spend the time to review a topic until everyone understood the topic. He gauged the audience for energy levels and suggested a break when he saw that the energy from the group was waning. This was much appreciated.
Bosch
Course: IoT Security Architecture
Very knowledgeable trainer, was able to adjust to audience knowledge, excellent industry experience and ability to relate to audience needs Excellent content preparation , tailored to needs discussed beforehand. Good supplement reading materials prepared by trainer
Oliver Steinig - Bosch
Course: IoT Security Architecture
relevance of content to our I4.0 business environment
Bosch
Course: IoT Security Architecture
Ron's experience on how to successfully implement IoT projects and the deep technical subjects covered.
Bosch
Course: IoT Security Architecture
His deep knowledge of the IoT topic.
Bosch
Course: IoT Security Architecture
Level of expertize from the trainer Use case examples
Pierre Maillot - Bosch
Course: IoT Security Architecture
Zobaczenie na żywo faktycznej realizacji działań z użyciem przykładowych narzędzi do badania/łamania zabezpieczeń aplikacji.
Paweł - Aleksandra Pietrzak, Ośrodek Przetwarzania Informacji – Państwowy Instytut Badawczy
Course: Web Security with the OWASP Testing Framework
Najbardziej podobały mi się ćwiczenia/demonstracje praktyczne. Pozwalały głębiej zrozumieć naturę omawianego problemu i jak można do niego podejść.
Aleksandra Pietrzak, Ośrodek Przetwarzania Informacji – Państwowy Instytut Badawczy
Course: Web Security with the OWASP Testing Framework
I liked the most this that trainer was very well prepared, very kind to everyone and presented the topic in a very interesting way. I liked a lot this that trainer looked at the application we are working on in order to check its security.
Aleksandra Pietrzak, Ośrodek Przetwarzania Informacji – Państwowy Instytut Badawczy
Course: Web Security with the OWASP Testing Framework
Complex approach to the topic in connection to the practical examples, all this together with the trainer's energy and his huge experience.
Ihor - Aleksandra Pietrzak, Ośrodek Przetwarzania Informacji – Państwowy Instytut Badawczy
Course: Web Security with the OWASP Testing Framework
I found the entire OWASP course to be informative and well structured. If I had to pick one aspect that stood out the most, I'd say it was the coverage of web security vulnerabilities and the practical examples shown. The course helped me understand how to apply owasp concepts in various scenarios using different tools
Piotr - Aleksandra Pietrzak, Ośrodek Przetwarzania Informacji – Państwowy Instytut Badawczy
Course: Web Security with the OWASP Testing Framework
* great live-demos * good pacing * good intro to security testing
Robert McClure - Katalin Kovács, EUROPOL
Course: Web Security with the OWASP Testing Framework
Trainer was very good and knowledgeable
Katalin Kovács, EUROPOL
Course: Web Security with the OWASP Testing Framework
the content and the knowledge of the trainer
Bogdan Birou - Katalin Kovács, EUROPOL
Course: Web Security with the OWASP Testing Framework
Great and relevant examples, good speed, good excercises. Highly recommended!
Istvan Visegradi - Katalin Kovács, EUROPOL
Course: Web Security with the OWASP Testing Framework
commented examples walkthrough
Katalin Kovács, EUROPOL
Course: Web Security with the OWASP Testing Framework
Very skilled and likable trainer. Interesting topics and real life examples.
Jon Lunde - Jørn Raastad, Buypass AS
Course: Web Security with the OWASP Testing Framework
Ann is very knowledgeable on the subject. She is constantly varying pace according to the feedback. There is a lot of room for discussing attendee's own experiences. It was a great joy !.
Sjoerd Hulzinga - KPN p/a Bloomville
Course: IoT Security Architecture
I found the training too in depth for IT beginners. There was too many high level subjects that I felt were too advanced for a beginner level.
Capita Business Services Ltd
Course: Understanding Modern Information Communication Technology
He took his time to make sure everyone understood and were on the same wave length
Tina Hopkins - Capita Business Services Ltd
Course: Understanding Modern Information Communication Technology
It was pitched at the right level - challenging but understandable & informative.
Louise Voisey - Capita Business Services Ltd
Course: Understanding Modern Information Communication Technology
Richard was very knowledgeable in his field.
Knowledge Pool/ DVLA
Course: Understanding Modern Information Communication Technology
I found it very interesting to learn all about what happens behind the scenes when it comes to IT systems. I also enjoyed learning about security and what hackers do as ethical hacking is an avenue I'm very keen in pursuing.
Knowledge Pool/ DVLA
Course: Understanding Modern Information Communication Technology
Trainer covered a lot of ground over a relatively short period.
Capita Business Services Ltd
Course: Understanding Modern Information Communication Technology
It was quite informal.
Capita Business Services Ltd
Course: Understanding Modern Information Communication Technology
Ahmed has a lot of experience in business continuity and it was good that he used his prior experience to bring some reality to the subject matter.
Capita Business Services Ltd
Course: Business Continuity Practitioner
Trainer had depth and breadth of knowledge.
Capita Business Services Ltd
Course: Business Continuity Practitioner
David's in depth knowledge. His relationship building skills with the audience. I really enjoyed the way he managed to make us (as a collective audience) enjoy the quite dry and uninteresing subject matter. He had anecdotes and knowledge of specific examples of security failings - hacker attacks - BCP 'breakdowns' etc which put flesh on the bones to the piece of legislation or 'best practice' for BCP that he was trying to teach us about. A really engaging, down to earth and personable man: A very good listener and a fabulous, charismatic trainer.
Cris Bollin - KnowledgePool
Course: Business Continuity Practitioner
I liked the trainer's introduction and anecdotes to make the learning more real
KnowledgePool
Course: Business Continuity Practitioner
The second day, scenarios exercises.
Christina Hutchings - KnowledgePool
Course: Business Continuity Practitioner
The environment was really relaxed and open so everyone could ask questions or put across points of view or experience. David the trainer was a SME on the subject and his style was very good.
KnowledgePool
Course: Business Continuity Practitioner
The trainer was very knowledgeable and was happy to go at the pace of the attendees. He was polite and respectful to all those in attendance. I felt I learnt a lot from the course as the trainer was very succinct in his delivery when going through the PP slides. A really good, worthwhile course from my personal point of view.
Julie Price - KnowledgePool
Course: Business Continuity Practitioner
The exercises and group discussions.
KnowledgePool
Course: Business Continuity Practitioner
The pace of training delivery.
Ian McInally - KnowledgePool
Course: Business Continuity Practitioner
Overview of automotive cyber security
NIPPON SEIKI (Europe) BV
Course: Automotive Cyber Security Fundamentals
I enjoyed refreshing my knowledge on the various subjects on cyber security. I was increasingly interested around cyber attacks, how they happen and what we (as an organization) could potentially do to try and mitigate any risks. I did raise a question around AI in cyber attacks, and the answer was very in depth and interesting with a live example given on the spot.
Siobhan - Khadija Ukadia, KPMG LLP
Course: Executive Cyber Security Awareness
Concise course, good as an introduction to Cyber.
Gerry - Khadija Ukadia, KPMG LLP
Course: Executive Cyber Security Awareness
Interesting subject
Khadija Ukadia, KPMG LLP
Course: Executive Cyber Security Awareness
great real world examples and a very knowledgeable trainer
khadijah ukadia, KPMG
Course: Executive Cyber Security Awareness
Overall objective met
Tay Thiam Chek Andy , SPF
Course: The Dark Web
- Understanding that ATT&CK creates a map that makes it easy to see, where an organization is protected and where the vulnerable areas are. Then to identify the security gaps that are most significant from a risk perspective. - Learn that each technique comes with a list of mitigations and detections that incident response teams can employ to detect and defend. - Learn about the various sources and communities for deriving Defensive Recommendations.
CHU YAN LEE - PacificLight Power Pte Ltd
Course: MITRE ATT&CK
All is excellent
Manar Abu Talib - Dubai Electronic Security Center
Course: MITRE ATT&CK
Cyber Security Course Outlines
- Understand the CipherTrust Solution and its basic functions.
- Evaluate device architecture and usage schemes.
- Manage CipherTrust product suite.
- Use Python programming for defensive cybersecurity.
- Understand and use Python for ethical offensive techniques and digital forensics tasks.
- Recognize legal and ethical considerations surrounding offensive cybersecurity and vulnerability disclosure.
- Familiarize the types of CCTV systems and know their benefits and features.
- Understand cabling and CCTV systems setup requirements.
- Install, configure, and manage CCTV systems.
- Manage security systems and handle any hostile environment.
- Manage any security risks or threats.
- Learn how to conduct security risk assessments.
- Configure Cloudflare for their websites.
- Set up DNS records and SSL certificates.
- Implement Cloudflare for content delivery and caching.
- Protect their websites from DDoS attacks.
- Implement firewall rules to restrict traffic to their websites.
- Learn the concepts of the Honeywell security systems and components.
- Properly install and maintain a Honeywell security system.
- Utilize the Honeywell maintenance tools and management suite to control a security system.
- Understand the concept of Cyber Security.
- Learn and understand the different Cyber Security threats.
- Learn processes and best practices to protect internet-connected systems from cyber attacks.
- Interactive lecture and discussion.
- Lots of exercises and practice.
- Hands-on implementation in a live-lab environment.
- To request a customized training for this course, please contact us to arrange.
- Learn the fundamentals of OAuth.
- Understand the native applications and their unique security issues when using OAuth.
- Learn and understand the common extensions to the OAuth protocols.
- Integrate with any OAuth authorization server.
- Understand the features and structure of Snyk.
- Use Snyk to find and fix code security issues.
- Integrate Snyk in a software development lifecycle.
The training can be contracted to 2 days, focusing on core aspects relevant for the customer. The training can be also extended regarding administrative, design, networking and/or troubleshooting topics concerning OpenStack deployments
- Establish and govern minimum standards for credentialing professional information security specialists in ethical hacking measures.
- Inform the public that credentialed individuals meet or exceed the minimum standards.
- Reinforce ethical hacking as a unique and self-regulating profession.
- Security Engineers
- Security Consultants
- Security Managers
- IT Director/Managers
- Security Auditors
- IT Systems Administrators
- IT Network Administrators
- Network Architects
- Developers
- Have an understanding of CAS's implementation of SSO (Single-Sign-On Authentication).
- Have the necessary practice to deploy and manage their own authentication server.
- Install and configure Shadowsocks on any of a number of supported platforms, including Windows, Linux, Mac, Android, iOS, and OpenWrt.
- Deploy Shadosocks with package manager systems, such as pip, aur, freshports and others.
- Run Shadowsocks on mobile devices and wireless networks.
- Understand how Shadowsocks encrypts messages and ensures integrity and authenticity.
- Optimize a Shadowsocks server
- Network engineers
- System Administrators
- Computer technicians
- Part lecture, part discussion, exercises and heavy hands-on practice
- Understand how NetNORAD works
- Learn the design principles behind NetNORAD
- Use open-source NetNORAD tools with their own code to implement a fault detection system
- Network engineers
- Developers
- System engineers
- Part lecture, part discussion, exercises and heavy hands-on practice
- Understand IoT architectures.
- Understand emerging IoT security threats and solutions.
- Implement technologies for IoT security in their organization.
- Assess their organization's existing security model.
- Shift access controls from the perimeter to individual devices and users.
- Deploy applications using a user and device-centric authentication and authorization workflow.
- Understand, plan and implement a Zero Trust network within their organization.
- Network engineers
- Cyber security professionals
- System architects
- IT managers
- Part lecture, part discussion, exercises and heavy hands-on practice
- To request a customized training for this course, please contact us to arrange.
- Implement cybersecurity in automotive systems.
- Choose the most suitable technologies, tools, and approaches.
- Interactive lecture and discussion.
- Lots of exercises and practice.
- Hands-on implementation in a live-lab environment.
- To request a customized training for this course, please contact us to arrange
- After this one day seminar the attendee will be able to demonstrate knowledge and understanding of Cloud Computing.
By the end of this training, participants will be able to:
- Understand the Internet, social network Privacy
- Know PII and why it is important
- Know how to secure the Online Activates
- Know how to maintain the Privacy of business users
- Know more of the Cyber laws that protect the Privacy
- Interactive lecture and discussion.
- Lots of exercises and practice.
- Hands-on implementation in a live-lab environment.
- To request a customized training for this course, please contact us to arrange.
Last Updated: