Search Website

Validating credentials, please wait...
  • General Inquiries 1-571-481-9307

  • Fax 1-202-315-3003

Home

Courses – Cyber Professionals

Courses – Cyber Professionals
Courses – Cyber Professionals

The 4-day instructor led course exposes students to exploits and and teaches them how to run vulnerability scans to better secure networks, servers and workstations.

Duration: 4 Days

This 2 day hands on course will focus on counterintelligence activities identified by The Comprehensive National Cybersecurity Initiative as it relates to DoD systems. Students will gain a working knowledge of detecting, deterring, neutralizing, and exploiting threats that could be introduced into a computing environment.

Duration: 2 Days

This 5 day course concentrates on providing cyber security specialists from various disciplines a baseline understanding across the major areas of cyber operations (network operations, defense, exploitation and attack) and planning.

Duration: 5 Days

This course provides executive leadership with a high-level overview of various aspects of Cybersecurity in the context of a modern and Internet-connected environment. Through lecture, demonstrations, and group discussion, you will gain a foundational perspective on the challenges of designing a cybersecurity program, implementing secure systems, and other factors needed for a comprehensive cybersecurity solution.

Duration: 4 Days
Price: Contact Training for pricing.

This hands-on 4-day course provides participants with a high-level overview of various aspects of Cybersecurity in the context of a modern and Internet-connected environment. Through lecture, hands-on exercises, and group discussion, you will gain a foundational perspective of various cyber security challenges.

Duration: 4 Days

Our hands-on course is designed to give students hands on experience with cyber tool deployments across multiple operating system platforms. Students will learn network defense and analysis techniques as well as methods to prevent network attacks.

Duration: 4 Days

The 4-day Ethical Hacking & Penetration Testing course provides students with intermediate level training in hacking and penetration testing techniques. The training immerses each student into a hand-on interactive environment where they will learn how to scan and attack with the purpose of securing networks and information systems.

Duration: 4 Days

This 3-day courseprovides participants with a high-level overview of various aspects of Software Assurance in the context of a modern and Internet-connected environment. Through lecture, hands-on exercises, and group discussion, you will gain a foundational perspective of various software assurancechallenges.

Duration: 3 Days

In this course, students will learn how to implement practical solutions for identifying, assessing, and preventing external and internal threats to networks.

Duration: 4 Days

This course is focused on a series of hands-on activities that will provide active learning in the security and securing of virtual machines and hosts. Upon completion, students will be able to apply the concepts and ensure that their organization can implement a new, secure virtual environment or apply appropriate security controls to an existing virtual environment.

Duration: 4 Days

This self-paced course will cover how to respond to a network security incident, The Incident Response Life Cycle, Legal and ethical considerations in terms of accessing data during a breach, and How an organization can use data from past incidents to strengthen their defenses This course does not cover Penetration Testing or Hacking Back.

Duration: Self-Paced

This course will assists organizations in establishing computer security incident response capabilities and handling incidents efficiently and effectively.

Duration: 4 Days

This course will provide an overview of the updated information security and information technology audit requirements based on the Federal Information Security Management Act (FISMA) inspector general reporting requirements; NIST Special Publication 800-53A, Guide for Assessing the Security Controls in Federal Information Systems; and Federal Information System controls Audit Manual (FISCAM).

Duration: 4 Days

In this 3-day workshop, students will focus on how developing and implementing a Risk Assessment process can increase the effectiveness of an organization’s IS program. This class is specifically designed around the NIST SP 800-30 Rev. 1, Guide for Conducting Risk Assessments.

Duration: 3 Days

The Malware Analysis course is a 100 level course. While intermediate topics and course material will be discussed, it is wholly designed for students interested in Basic Malware Analysis Techniques. Lunarline’s 3 day hands on course will provide students demos and lessons on basic/static analysis methodologies, conducting open source research online and real-life examples of malware capabilities and characteristics.

Duration: 3 Days

This course provides the student the concepts, methodologies, and hands-on tools to analyze network traffic for the purposes of focused operations, cyber operations, pen testing, intrusion detection, and incident response. Each student will be provided an overview on how packet analysis applies to their cyber security position.

Duration: 4 Days

This hands-on 3 day Python programming course provides students with the knowledge and training to develop and maintain effective Python programs/scripts. Students will learn to create Python scripts using functions, modules, classes, and much more as part of Python’s object-orientated paradigm.

Duration: 3 Days

This course is designed to provide an operational basis for all facets of recovery planning through information delivery and practical exercises. As a result of this course, students will be able to conduct risk analysis, business impact analysis, recovery strategy analysis and develop viable emergency response plans and recovery plans through the information obtained as a result of these assessments.

Duration: 5 Days

Upon completion of this course, you should have a basic understanding of the FISMA requirements, the risk management framework process, the assessment methods related to information system owners, and the assessment procedures for NIST security controls related to information system owners.

Duration: Self-Paced

The training is segmented into six modules. Each module will cover specifics you need to be aware of as a System Administrator. We’ll cover the many Laws, Policies, and Guidance that are available. At this point in your career, you should have a good understanding of the Cybersecurity Awareness and Essentials as we provide a brief overview.

Duration: Self-Paced

In order to secure develop web applications and websites, it is necessary to understand the underlying technologies. In order to assess risk posture, it is crucial to see these systems from the same perspective as the attackers. Attackers leverage deep knowledge of complex technology to achieve their goals; the defenders need to be similarly equipped.

Duration: Self-Paced

This course is designed as a system hardening overview with enough details and hands on learning to add new tools to even the most seasoned administrator’s tool belt.

Duration: 4 Days

Lunarline’s 4 day hands on course will focus on understanding exploits and vulnerabilities in a Wireless network. Students will gain knowledge to design and implement a secured wireless infrastructure while ensuring confidentiality, integrity, and availability.

Duration: 4 Days

The System Admin/Developer course gives an introduction into the Federal Information System Management Act methodology. The course will help identify the assessment procedures and methods related to the roles of System Administrator and Developer. Course participants will also come away with knowledge of the security controls related to the System Admin and Developer roles.

Duration: TBD

This 4 day hands-on course will assists organizations in establishing computer security incident response capabilities and handling incidents efficiently and effectively. Students will learn incident handling, particularly for analyzing incident-related data and determining the appropriate response.

Duration: 4 Days

This course will assist organizations in establishing log management and auditing policies and procedures to discover and handle incidents efficiently and effectively. Students will learn log management, particularly skills for analyzing system related log data.

Duration: 3 Days