Hands on Security Training Courses

Hands on Security Training Courses

Local, instructor-led live Hands on Security training courses demonstrate through interactive discussion and hands-on practice the fundamentals and advanced topics of Hands on Security. Hands on Security training is available as "onsite live training" or "remote live training". Onsite live training can be carried out locally on customer premises in the US or in NobleProg corporate training centers in the US. Remote live training is carried out by way of an interactive, remote desktop. NobleProg -- Your Local Training Provider

Testimonials

★★★★★
★★★★★

Hands on Security Course Outlines

CodeNameDurationOverview
pkiimpmanPKI: Implement and Manage21 hoursOverview

This Public Key Infrastructure – Implement and Manage course helps any individual to gain knowledge in managing robust PKI and having better understanding of topics surrounding public key infrastructure. Moreover, the PKI course is a preparation for the increasingly critical component – which ensures confidentiality, integrity, and authentication in an enterprise. Our PKI course provides the knowledge and skills necessary to select, design and deploy PKI, to secure existing and future applications within your organization. It also gives a deeper look into the foundations of cryptography and the working principles of the algorithms being used.

Throughout the whole course, participants will gain in-depth knowledge on the following topics:

- Legal aspects of a PKI
- Elements of a PKI
- PKI management
- Trust in a digital world
- Digital signature implementation
- Trust models

After completing the PKI course, each individual will be able to successfully design, setup, deploy, and manage a public key infrastructure (PKI).

This is a 3-day course is considered essential for anyone who needs to understand Public Key Infrastructure (PKI) and the issues surrounding its implementation. It covers the issues and technologies involved in PKI in-depth and gives hands-on practical experience of setting up and maintaining a variety of PKI solutions. Detailed knowledge of issues surrounding PKI helps to put recent attacks which have appeared in the news headlines into context and enable valid decisions to be made about their relevance to your organisation.

Objectives

To introduce the student to the theoretical aspects of the foundations and benefits of Public Key Infrastructure (PKI), including different types of encryption, digital signatures, digital certificates and Certificate Authorities.

To give students hands on experience of implementing and using PKI solutions with a variety of applications.

To give students an understanding of the concepts of evaluating and selecting PKI technologies

Audience

Anyone involved in Public Key Infrastructure | PKI decision-making, implementing and securing e-commerce and other Internet applications, including CIOs, Chief Security Officers, MIS Directors, Security Managers and Internal Auditors.
embeddedsecurityEmbedded systems security21 hoursThis training introduces the system architectures, operating systems, networking, storage, and cryptographic issues that should be considered when designing secure embedded systems.

By the end of this course, participants will have a solid understanding of security principles, concerns, and technologies. More importantly, participants will be equipped with the techniques needed for developing safe and secure embedded software.

Audience
Embedded systems professionals
Security professionals

Format of the course
Part lecture, part discussion, hands-on practice
iastInteractive Application Security Testing (IAST)14 hoursInteractive Application Security Testing (IAST) is a form of application security testing that combines Static Application Security Testing (SAST) and Dynamic Application Security Testing (DAST) or Runtime Application Self-protection (RASP) techniques. IAST is able to report the specific lines of code responsible for a security exploit and replay the behaviors leading to and following such an exploit.

In this instructor-led, live training, participants will learn how to secure an application by instrumenting runtime agents and attack inducers to simulate application behavior during an attack.

By the end of this training, participants will be able to:

- Simulate attacks against applications and validate their detection and protection capabilities
- Use RASP and DAST to gain code-level visibility into the data path taken by an application under different runtime scenarios
- Quickly and accurately fix the application code responsible for detected vulnerabilities
- Prioritize the vulnerability findings from dynamic scans
- Use RASP real-time alerts to protect applications in production against attacks.
- Reduce application vulnerability risks while maintaining production schedule targets
- Devise an integrated strategy for overall vulnerability detection and protection

Audience

- DevOps engineers
- Security engineers
- Developers

Format of the course

- Part lecture, part discussion, exercises and heavy hands-on practice
shiroApache Shiro: Securing your Java application7 hoursApache Shiro is a powerful Java security framework that performs authentication, authorization, cryptography, and session management.

In this instructor-led, live training, participants will learn how to secure a web application with Apache Shiro.

By the end of this training, participants will be able to:

- Use Shiro's API to secure various types of applications, including mobile, web and enterprise
- Enable logins from various data sources, including LDAP, JDBC, Active Directory, etc.

Audience

- Developers
- Security engineers

Format of the course

- Part lecture, part discussion, exercises and heavy hands-on practice
secanaSecurity Analyst35 hours

Target Audience would be - Network server administrators, firewall administrators, information security analysts, system administrators, and risk assessment professionals

Upcoming Hands on Security Courses

CourseCourse DateCourse Price [Remote / Classroom]
Embedded systems security - CA, Sacramento - Promenade CircleWed, Sep 5 2018, 9:30 am$5250 / $6800
Interactive Application Security Testing (IAST) - OH, Cleveland - Cleveland City CenterWed, Sep 5 2018, 9:30 am$3000 / $4320
PKI: Implement and Manage - Atlanta, GA - One HartsfieldWed, Sep 5 2018, 9:30 am$3300 / $4850
Apache Shiro: Securing your Java application - FL, West Palm Beach - Philips PointWed, Sep 5 2018, 9:30 am$1500 / $2500
Security Analyst - NJ, Totowa - Riverview DriveMon, Sep 10 2018, 9:30 am$8750 / $10550
Weekend Hands on Security courses, Evening Hands on Security training, Hands on Security boot camp, Hands on Security instructor-led, Weekend Hands on Security training, Evening Hands on Security courses, Hands on Security coaching, Hands on Security instructor, Hands on Security trainer, Hands on Security training courses, Hands on Security classes, Hands on Security on-site, Hands on Security private courses, Hands on Security one on one training

Course Discounts

Course Venue Course Date Course Price [Remote / Classroom]
MongoDB for Administrators MN, Eagan - Grand Oak I Tue, Aug 28 2018, 9:30 am $2970 / $4210
MongoDB for Administrators PA, Pittsburgh - Penn Center East Monroeville Thu, Aug 30 2018, 9:30 am $2970 / $4170
Excel VBA Introduction CT, East Berlin - East Berlin Wed, Oct 31 2018, 9:30 am $1500 / N/A
Haskell Fundamentals OH, Columbus - Galleria at PNC Plaza Tue, Dec 11 2018, 9:30 am $2700 / $4000
Advanced Haskell NC, Charlotte - Charlotte City Center Wed, Dec 12 2018, 9:30 am $2700 / $4000
MoDAF/NAF Introduction TX, Austin - Littlefield Congress Fri, Dec 28 2018, 9:30 am $1575 / $2575
OCEB2 OMG Certified Expert in BPM - Business Intermediate Exam Preparation NH, Portsmouth - Commerce Way Suite Mon, Dec 31 2018, 9:30 am $4725 / $6725

Course Discounts Newsletter

We respect the privacy of your email address. We will not pass on or sell your address to others.
You can always change your preferences or unsubscribe completely.

Some of our clients