SEC-CCSP – Certified Cloud Security Professional

(ISC)² and the Cloud Security Alliance (CSA) developed the Certified Cloud Security Professional (CCSP) credential to ensure that cloud security professionals have the required knowledge, skills, and abilities in cloud security design, implementation, architecture, operations, controls, and compliance with regulatory frameworks. A CCSP applies information security expertise to a cloud computing environment and demonstrates competence in cloud security architecture, design, operations, and service orchestration. This professional competence is measured against a globally recognized body of knowledge. The CCSP is a stand-alone credential that complements and builds upon existing credentials and educational programs, including (ISC)²’s Certified Information Systems Security Professional (CISSP) and CSA’s Certificate of Cloud Security Knowledge (CCSK). The topics included in the CCSP Common Body of Knowledge (CBK) ensure its relevancy across all disciplines in the field of cloud security. Successful candidates are competent in the following 6 domains:
• Architectural Concepts & Design Requirements
• Cloud Data Security
• Cloud Platform & Infrastructure Security
• Cloud Application Security
• Operations
• Legal & Compliance

JUNIPER – SRX Boot Camp with Junos Enhanced Services

Unitek Training’s Juniper SRX Boot Camp is a 5-day leader-led event that covers all aspects of the SRX product, including a JUNOS Primer, Security and Routing principles and configuration methods using JUNOS release 9.5.

The course provides the foundational knowledge required to configure Juniper SRX devices running JUNOS Software. Key topics include user interface options with a heavy focus on the command-line interface (CLI), configuration tasks typically associated with the initial setup of devices, interface configuration basics with configuration examples, secondary system configuration, and the basics of operational monitoring and maintenance of devices running JUNOS Software.

Students will learn Juniper routing principles and routing concepts, routing policy and firewall filters, and class of service (CoS). The Boot Camp course also provides students with the skills for configuration, operation, and implementation of JUNOS security platforms in a typical network environment.

SEC-CAP – Certified Authorization Professional (CAP) Boot Camp

This course, offered by Unitek Training, is designed for the information security practitioner who champions system security commensurate with an organization’s mission and risk tolerance, while meeting legal and regulatory requirements. It conceptually mirrors the NIST system authorization process in compliance with the Office of Management and Budget (OMB) Circular A-130, Appendix III. Led by an (ISC)2 authorized instructor, the CAP training seminar provides a comprehensive review of information systems security concepts and industry best practices, covering the 7 domains of the CAP CBK:
Risk Management Framework (RMF)
Categorization of Information Systems
Selection of Security Controls
Security Control Implementation
Security Control Assessment
Information System Authorization
Monitoring of Security Controls

SEC-CISSP – 5-Day CISSP Boot Camp

Unitek Training’s 5-Day CISSP Boot Camp is designed to teach you the essential skills and knowledge to achieve your CISSP® certification. CISSP® certification is a globally recognized standard of achievement that confirms an individual’s knowledge in the field of information security. Unitek Training’s 5-Day CISSP Boot Camp prepares students to define the architecture, design, management and/or controls that assure the security of business environments.

The CISSP certification is part of the DOD 8570 directive.

SEC-SSCP – Systems Security Certified Practitioner

The SSCP certification is the ideal credential for those with proven technical skills and practical security knowledge in hands-on operational IT roles. It provides industry-leading confirmation of a practitioner’s ability to implement, monitor and administer IT infrastructure in accordance with information security policies and procedures that ensure data confidentiality, integrity and availability.

The SSCP indicates a practitioner’s technical ability to tackle the operational demands and responsibilities of security practitioners, including authentication, security testing, intrusion detection/prevention, incident response and recovery, attacks and countermeasures, cryptography, malicious code countermeasures, and more.

The SSCP is ideal for those working in or towards positions such as, but not limited to:
Network Security Engineer
Systems/Network Administrator
Security Analyst
Systems Engineer
Security Consultant/Specialist
Security Administrator
Systems/Network Analyst
Database Administrator

SEC-RMF – Risk Management Framework (RMF)

The Department of Defense Risk Management Framework (RMF) program is offered on a regularly-scheduled basis at our training sites in Fremont, CA (San Francisco Bay Area). Each session is also available to distance learners via Live Online (Instructor-led). We are also able to bring this training on-site to your facility.

Risk Management Framework (RMF) is the unified information security framework for the entire federal government that is replacing the legacy Certification and Accreditation (C&A) processes within federal government departments and agencies, the Department of Defense (DOD) and the Intelligence Community (IC).

Risk Management Framework (RMF) is an integral part of the implementation of FISMA, the Federal Information Security Management Act, and is based on publications of the National Institute of Standards and Technology (NIST) and the Committee on National Security Systems (CNSS).

Risk Management Framework (RMF) training is suitable for DoD employees and contractors. This training program emphasizes the transition now taking place at DoD from DIACAP to RMF.

SEC-CEH – Certified Ethical Hacker (CEH) Boot Camp v9

This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking. This course prepares you for EC-Council ANSI accredited Certified Ethical Hacker exam 312-50.

The Certified Ethical Hacker (CEH) certification is part of the DOD 8570 directive.

SEC-CHFI – Computer Hacking Forensic Investigator (CHFI) Boot Camp v8

Unitek Training teaches the most advanced Computer Forensic Investigation course in the world. CHFIv8 presents a detailed methodological approach to computer forensics and evidence analysis. It is a comprehensive course covering major forensic investigation scenarios that enable students to acquire hands-on experience on various forensic investigation techniques and standard tools necessary to successfully carry-out a computer forensic investigation.

Battles between corporations, governments, and countries are no longer fought using physical force. Cyber war has begun and the consequences can be seen in every day life. With the onset of sophisticated cyber-attacks, the need for advanced cyber security and investigation training is a mandate in the present day. If you or your organization requires the knowledge or skills to identify, track, and prosecute the cybercriminals, then this is the course for you. This course helps students to excel in digital evidence acquisition, handling and analysis in a forensically sound manner. Acceptable in a court of law, these skills will lead to successful prosecutions in various types of security incidents such as data breaches, corporate espionage, insider threats and other intricate cases involving computer systems.

SEC-CyberSAFE-AM – Securing Assets For End-users (Morning Session)

Welcome to CyberSAFE (Securing Assets For End-users). Regardless of your computer experience, this class will help you become more aware of technology-related risks and what you can do to protect yourself and your organization from them. This course will help you to understand security compliance considerations, social engineering, malware, and various other data security-related concepts. In this course, you will explore the hazards and pitfalls and learn how to use technology safely and securely.

SEC-CyberSAFE-PM – Securing Assets For End-users (Afternoon Session)

Welcome to CyberSAFE (Securing Assets For End-users). Regardless of your computer experience, this class will help you become more aware of technology-related risks and what you can do to protect yourself and your organization from them. This course will help you to understand security compliance considerations, social engineering, malware, and various other data security-related concepts. In this course, you will explore the hazards and pitfalls and learn how to use technology safely and securely.