Internet Security Training Courses

Internet Security Training

Internet Security is a branch of computer security related to browser and network security, especially as it relates to transactions, authentication and protection of data sent over the Internet.

NobleProg onsite live Internet Security training courses demonstrate through interactive discussion and hands-on practice how to understand, plan and implement an Internet Security strategy within their organization. Special focus is given to setting up the proper systems and procedures needed to detect and mitigate threats. Internet Security courses are available as interactive trainings and a number of them include a testing and certification component.

Internet Security training is available in various formats, including onsite live training and live instructor-led training using an interactive, remote desktop setup. Local Internet Security training can be carried out live on customer premises or in NobleProg local training centers.

Internet Security Course Outlines

Code Name Duration Overview
netsecadm Network Security Administrator 35 hours Audience: System Administrators and Network Administrators as well as anyone who is interested in defensive network security technologies.  
nbiotfordev NB-IoT for Developers 7 hours Most of today's IoT connections are industrial. Industrial IoT (IIoT) connections require Low Power Wide Area (LPWA) technologies to provide connectivity, coverage and subscription capabilities for low bandwidth applications. Although these requirements could be served by existing cellular networks, such networks may not be ideal. NB-IoT (Narrow Band IoT) technology offers a promising solution. NB-IoT (also known as LTE Cat NB1) allows IoT devices to operate over carrier networks such as GSM and “guard bands” between LTE channels. NB-IoT needs only 200kHz of bandwidth and can efficiently connect large numbers of endpoint devices (up to 50,000 per NB-IoT network cell). Its low power requirements makes it ideal for use in small, uncomplicated IoT gadgets such as smart parking, utilities and wearables. In this instructor-led, live training, participants will learn about the various aspects of NB-IoT as they develop and deploy a sample NB-IoT based application. By the end of this training, participants will be able to: Identify the different components of NB-IoT and how to fit together to form an ecosystem Understand and explain the security features built into NB-IoT devices Develop a simple application to track NB-IoT devices Audience Developers Technical Managers Format of the course Part lecture, part discussion, exercises and heavy hands-on practice
netnorad NetNORAD 7 hours NetNORAD is a system built by Facebook to troubleshoot network problems via end-to-end probing, independent of device polling. In this instructor-led, live training, participants will learn how NetNORAD and active path testing can help them improve their network troubleshooting methods. By the end of this training, participants will be able to: Understand how NetNORAD works Learn the design principles behind NetNORAD Use open-source NetNORAD tools with their own code to implement a fault detection system Audience Network engineers Developers System engineers Format of the course Part lecture, part discussion, exercises and heavy hands-on practice
cisa CISA - Certified Information Systems Auditor 28 hours Description: CISA® is the world-renowned and most popular certification for professionals working in the field of IS audit and IT risk consulting. Our CISA course is an intense, very competitive and exam focused training course. With experience of delivering more than 150+ CISA trainings in Europe and around the world and training more than 1200+ CISA delegates, the Net Security CISA training material has been developed in house with the top priority of ensuring CISA delegates pass the ISACA CISA® Exam. The training methodology focuses on understanding the CISA IS auditing concepts and practicing large number of ISACA released question banks from the last three years. Over a period, CISA holders have been in huge demand with renowned accountings firms, global banks, advisory, assurance, and internal audit departments. Delegates may have years of experience in IT auditing but perspective towards solving CISA questionnaires will solely depend on their understanding to globally accepted IT assurance practices. CISA exam is very challenging because the possibility of a very tight clash between two possible answers exists and that is where ISACA tests you on your understanding in global IT auditing practices. To address these exam challenges, we always provide the best trainers who have extensive experience in delivering CISA training around the world. The Net Security CISA manual covers all exam-relevant concepts, case studies, Q&A's across CISA five domains. Further, the Trainer shares the key CISA supporting material like relevant CISA notes, question banks, CISA glossary, videos, revision documents, exam tips, and CISA mind maps during the course. Goal: The ultimate goal is to pass your CISA examination first time. Objectives: Use the knowledge gained in a practical manner beneficial to your organisation Provide audit services in accordance with IT audit standards Provide assurance on leadership and organizational structure and processes Provide assurance on acquisition/ development, testing and implementation of IT assets Provide assurance on IT operations including service operations and third party Provide assurance on organization’s security policies, standards, procedures, and controls to ensure confidentiality, integrity, and availability of information assets. Target Audience: Finance/CPA professionals, I.T. professionals, Internal & External auditors, Information security, and risk consulting professionals.
NPen Network Penetration Testing 35 hours This class will help the attendees to scan, test, hack and secure their own systems. To gain an in-depth knowledge and practical experience with the current essential security systems. The attendees will get to know how perimeter defences work and then be led into scanning and attacking their own networks, no real network is harmed. The attendees then will learn how intruders escalate privileges and what steps can be taken to secure a system, Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation.
pkiimpman PKI: Implement and Manage 21 hours Overview This Public Key Infrastructure – Implement and Manage course helps any individual to gain knowledge in managing robust PKI and having better understanding of topics surrounding public key infrastructure. Moreover, the PKI course is a preparation for the increasingly critical component – which ensures confidentiality, integrity, and authentication in an enterprise. Our PKI course provides the knowledge and skills necessary to select, design and deploy PKI, to secure existing and future applications within your organization. It also gives a deeper look into the foundations of cryptography and the working principles of the algorithms being used. Throughout the whole course, participants will gain in-depth knowledge on the following topics: Legal aspects of a PKI Elements of a PKI PKI management Trust in a digital world Digital signature implementation Trust models After completing the PKI course, each individual will be able to successfully design, setup, deploy, and manage a public key infrastructure (PKI). This is a 3-day course is considered essential for anyone who needs to understand Public Key Infrastructure (PKI) and the issues surrounding its implementation. It covers the issues and technologies involved in PKI in-depth and gives hands-on practical experience of setting up and maintaining a variety of PKI solutions. Detailed knowledge of issues surrounding PKI helps to put recent attacks which have appeared in the news headlines into context and enable valid decisions to be made about their relevance to your organisation. Objectives To introduce the student to the theoretical aspects of the foundations and benefits of Public Key Infrastructure (PKI), including different types of encryption, digital signatures, digital certificates and Certificate Authorities. To give students hands on experience of implementing and using PKI solutions with a variety of applications. To give students an understanding of the concepts of evaluating and selecting PKI technologies Audience Anyone involved in Public Key Infrastructure | PKI decision-making, implementing and securing e-commerce and other Internet applications, including CIOs, Chief Security Officers, MIS Directors, Security Managers and Internal Auditors.
cyberwarfare Fundamentals of corporate cyberwarfare 14 hours Audience Cyber security specialists System administrators Cyber security managers Cyber security auditors CIOs Format of the course Heavy emphasis on hands-on practice. Most of the concepts are learned through samples, exercises and hands-on development.
cissp CISSP - Certified Information Systems Security Professional 35 hours Overview: Certified Information Systems Security Professional certification is recognised as a key qualification for developing a senior career in information security, audit and IT governance management. Held by over 30,000 qualified professionals worldwide, the Certified Information Systems Security Professional qualification shows proven knowledge and is the key to a higher earning potential in roles that include CISO, CSO and senior security manager. You will learn to: Use the knowledge gained in a practical manner beneficial to your organisation Protect your organisational assets using access control techniques and strengthen confidentiality and integrity controls from the world of cryptography Secure your network architecture and design (implement Cyber security) Achieve your organisational objectives such as legal & compliance, Information assurance, security and data governance Enhance IT services secure delivery via Security operations, architecture and design principles Implement business resiliency via Business Continuity Plan You will gain a thorough understanding of the 8 domains as prescribed by (ISC)2® The Main Goal: To pass your CISSP examination first time. Target Audience: This training is intended for individuals preparing for the CISSP certification exam.
cas CAS: Setting up an single-sign-on authentication server 7 hours CAS, or Central Authentication Service, is an open-source, enterprise-level, single-sign on protocol for the web. CAS gives users access to multiple applications using a single sign-on and allows web applications to authenticate users without giving them access to user passwords. CAS has a Java server component and various client libraries written in PHP, PL/SQL, Java, and more. In this course, we discuss CAS's architecture and features and practice installing and configuring a CAS server. By the end of the course, participants will have an understanding of CAS's implementation of SOS (Single-Sign-On-Authentication) as well as the necessary practice to deploy and manage their own authentication server. Audience     System administrators Format of the course     Part lecture, part discussion, heavy hands-on practice
devopssecurity DevOps Security: Creating a DevOps security strategy 7 hours DevOps is a software development approach that aligns application development with IT operations. Some of the tools that have emerged to support DevOps include: automation tools, containerization and orchestration platforms. Security has not kept up with these developments. In this course, participants will learn how to formulate the proper security strategy to face the DevOps security challenge. Audience     Devops engineers     Security engineers Format of the course     Part lecture, part discussion, some hands-on practice
embeddedsecurity Embedded systems security 21 hours This training introduces the system architectures, operating systems, networking, storage, and cryptographic issues that should be considered when designing secure embedded systems. By the end of this course, participants will have a solid understanding of security principles, concerns, and technologies. More importantly, participants will be equipped with the techniques needed for developing safe and secure embedded software. Audience     Embedded systems professionals     Security professionals Format of the course     Part lecture, part discussion, hands-on practice
iast Interactive Application Security Testing (IAST) 14 hours Interactive Application Security Testing (IAST) is a form of application security testing that combines Static Application Security Testing (SAST) and Dynamic Application Security Testing (DAST) or Runtime Application Self-protection (RASP) techniques. IAST is able to report the specific lines of code responsible for a security exploit and replay the behaviors leading to and following such an exploit. In this instructor-led, live training, participants will learn how to secure an application by instrumenting runtime agents and attack inducers to simulate application behavior during an attack.   By the end of this training, participants will be able to: Simulate attacks against applications and validate their detection and protection capabilities Use RASP and DAST to gain code-level visibility into the data path taken by an application under different runtime scenarios Quickly and accurately fix the application code responsible for detected vulnerabilities Prioritize the vulnerability findings from dynamic scans Use RASP real-time alerts to protect applications in production against attacks. Reduce application vulnerability risks while maintaining production schedule targets Devise an integrated strategy for overall vulnerability detection and protection Audience DevOps engineers Security engineers Developers Format of the course Part lecture, part discussion, exercises and heavy hands-on practice
shadowsocks Shadowsocks: Set up a proxy server 7 hours Shadowsocks is an open-source, secure socks5 proxy. In this instructor-led, live training, participants will learn how to secure an internet connection through a Shadowsocks proxy. By the end of this training, participants will be able to: Install and configure Shadowsocks on any of a number of supported platforms, including Windows, Linux, Mac, Android, iOS, and OpenWRT. Deploy Shadosocks with package manager systems, such as pip, aur, freshports and others. Run Shadowsocks on mobile devices and wireless networks. Understand how Shadowsocks encrypts messages and ensures integrity and authenticity. Optimize a Shadowsocks server Audience Network engineers System Administrators Computer technicians Format of the course Part lecture, part discussion, exercises and heavy hands-on practice
shiro Apache Shiro: Securing your Java application 7 hours Apache Shiro is a powerful Java security framework that performs authentication, authorization, cryptography, and session management. In this instructor-led, live training, participants will learn how to secure a web application with Apache Shiro. By the end of this training, participants will be able to: Use Shiro's API to secure various types of applications, including mobile, web and enterprise Enable logins from various data sources, including LDAP, JDBC, Active Directory, etc. Audience Developers Security engineers Format of the course Part lecture, part discussion, exercises and heavy hands-on practice
GDPR1 GDPR Workshop 7 hours This one-day course is for people looking for a brief outline of the GDPR – General Data Protection Regulations coming out May 25, 2018. This is ideal for managers, department heads, and employees who need to understand the basics of the GDPR.
GDRPAd GDPR Advanced 21 hours This is more in-depth and would be for those working a great deal with the GDPR and who may be appointed to the GDPR team. This would be ideal for IT, human resources and marketing employees and they will deal extensively with the GDPR.
secana Security Analyst 35 hours   Target Audience would be - Network server administrators, firewall administrators, information security analysts, system administrators, and risk assessment professionals 

Upcoming Courses

Other regions

Weekend Internet Security courses, Evening Internet Security training, Internet Security boot camp, Internet Security instructor-led , Internet Security training courses, Internet Security instructor, Internet Security on-site, Internet Security one on one training , Internet Security trainer , Internet Security private courses, Internet Security coaching, Evening Internet Security courses,Weekend Internet Security training

Course Discounts

Course Venue Course Date Course Price [Remote / Classroom]
Excel VBA Introduction New York (NYC) - Midtown Manhattan - Park Avenue & E48-49th (Grand Central) Mon, Mar 26 2018, 9:30 am $2430 / $4130
Introduction to R New York (NYC) - Midtown Manhattan - Madison & E38-39th Wed, Mar 28 2018, 9:30 am N/A / $5800
JMeter Fundamentals and JMeter Advanced New York (NYC) - Midtown Manhattan - Park Avenue & E48-49th (Grand Central) Wed, Mar 28 2018, 9:30 am N/A / $3850
Drupal 8 for Developers New York (NYC) - Midtown Manhattan - Madison & E38-39th Thu, Mar 29 2018, 9:30 am N/A / $3900
Introduction to IoT Using Arduino WI, Milwaukee - Downtown Milwaukee Mon, Apr 2 2018, 9:30 am $2970 / $4330
Administering MediaWiki New York (NYC) - Midtown Manhattan - Park Avenue & E48-49th (Grand Central) Mon, Apr 2 2018, 9:30 am N/A / $2250
IT Automation with Saltstack Remote Course - Eastern Time (UTC-05:00) US & Canada Wed, Apr 4 2018, 9:30 am $2370 / N/A
Administering a Drupal 7 Website OR, Portland - World Trade Center Thu, Apr 12 2018, 9:30 am $1485 / $2485
SQL Fundamentals New York (NYC) - Midtown Manhattan - Park Avenue & E48-49th (Grand Central) Mon, Apr 16 2018, 9:30 am N/A / $3700
Introduction to Selenium New York (NYC) - Midtown Manhattan - Madison & E38-39th Tue, Apr 17 2018, 9:30 am N/A / $2300
IT Automation with Saltstack MD, Baltimore - Legg Mason Tower Tue, Apr 17 2018, 9:30 am $2970 / $4170
Apache Tomcat Administration IL, Chicago - CBD - West Loop Riverside Plaza Center Wed, May 2 2018, 9:30 am $4833 / $6233
Excel VBA Introduction New York (NYC) - Midtown Manhattan - Park Avenue & E48-49th (Grand Central) Thu, May 10 2018, 9:30 am N/A / $3200
Blockchain for Developers CA, Sunnyvale - Downtown Sunnyvale Mon, Jun 4 2018, 9:30 am $3465 / $4565
Neural Network in R MA, Boston - Federal Street Mon, Jul 2 2018, 9:30 am $3150 / $4390

Course Discounts Newsletter

We respect the privacy of your email address. We will not pass on or sell your address to others.
You can always change your preferences or unsubscribe completely.

Outline Tag Cloud

Proper SystemsBrowserInternet Security TrainingComputer Security RelatedHands-on PracticeRemote Desktop SetupBranchPlanSettingTransactionsInteractive TrainingsIncludeProcedures NeededRelatesFormatsOrganizationCarriedSpecial FocusCertification ComponentInternet SecurityAuthenticationMitigate ThreatsCustomer PremisesInteractiveInteractive DiscussionNumberDetectTestingUnderstandProtectionImplementDataInternet Security CoursesInternet Security StrategyInternetNetwork SecurityLiveLive Instructor-led Training