SEC-CEH – Certified Ethical Hacker (CEH) Boot Camp v9

This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking. This course prepares you for EC-Council ANSI accredited Certified Ethical Hacker exam 312-50.

The Certified Ethical Hacker (CEH) certification is part of the DOD 8570 directive.

SEC-CHFI – Computer Hacking Forensic Investigator (CHFI) Boot Camp v8

Unitek Training teaches the most advanced Computer Forensic Investigation course in the world. CHFIv8 presents a detailed methodological approach to computer forensics and evidence analysis. It is a comprehensive course covering major forensic investigation scenarios that enable students to acquire hands-on experience on various forensic investigation techniques and standard tools necessary to successfully carry-out a computer forensic investigation.

Battles between corporations, governments, and countries are no longer fought using physical force. Cyber war has begun and the consequences can be seen in every day life. With the onset of sophisticated cyber-attacks, the need for advanced cyber security and investigation training is a mandate in the present day. If you or your organization requires the knowledge or skills to identify, track, and prosecute the cybercriminals, then this is the course for you. This course helps students to excel in digital evidence acquisition, handling and analysis in a forensically sound manner. Acceptable in a court of law, these skills will lead to successful prosecutions in various types of security incidents such as data breaches, corporate espionage, insider threats and other intricate cases involving computer systems.

SEC-CyberSAFE-AM – Securing Assets For End-users (Morning Session)

Welcome to CyberSAFE (Securing Assets For End-users). Regardless of your computer experience, this class will help you become more aware of technology-related risks and what you can do to protect yourself and your organization from them. This course will help you to understand security compliance considerations, social engineering, malware, and various other data security-related concepts. In this course, you will explore the hazards and pitfalls and learn how to use technology safely and securely.

SEC-CyberSAFE-PM – Securing Assets For End-users (Afternoon Session)

Welcome to CyberSAFE (Securing Assets For End-users). Regardless of your computer experience, this class will help you become more aware of technology-related risks and what you can do to protect yourself and your organization from them. This course will help you to understand security compliance considerations, social engineering, malware, and various other data security-related concepts. In this course, you will explore the hazards and pitfalls and learn how to use technology safely and securely.

SEC-LO-CFR – CyberSec First Responder: Threat Detection and Response

CyberSec First Responders are just that: the first line of response against cyber attacks that can cost your organization valuable time and money. The CyberSec First Responder: Threat Detection and Response course(CFR,) will prepare security professionals to become the first line of response against cyber attacks by teaching students to analyze threats, design secure computing and network environments, proactively defend networks, and respond/investigate cybersecurity incidents. CFR is also designed for students who are seeking to fulfill DoD directive 8570.01 for information assurance training.