We're offering 20% off September Live Online classes! See which courses are applicable.   |   Details

  
AccountIcon BigDataIcon BlogIcon default_resource_icon CartIcon checkmark_icon cloud_devops_icon computer_network_admin_icon cyber_security_icon gsa_schedule_icon human_resources_icon location_icon phone_icon plus_icon programming_software_icon project_management_icon redhat_linux_icon search_icon sonography_icon sql_database_icon webinar_icon

Search UMBC Training Centers

Filter By:

Metasploit Framework, Pen Testing Methodology & Malware Triage

Penetration Testing Methodology was developed to provide students with a comprehensive hands-on exposure to the processes, tools and procedures used by penetration testers. This course teaches students concepts and methods involved in targeting, infiltrating and expanding access within networks. The course allows students to understand the attacker mindset and learn how to simulate a real-world […]

Cybersecurity

Network & Packet Analysis

This course teaches the student the fundamental concepts, methodologies, and tools necessary to analyze network traffic for the purposes of intrusion and threat detection, network defense, and low profile offensive operations. The hands-on course begins with discussing the role of network packet analysis in computer network operations (CNO). After a detailed discussion of the TCP/IP […]

Cybersecurity

NICE Framework Role-Specific Training Courses

Below are UMBC Training Centers’ recommendations for NICE Framework Role Specific Training. Courses in Bold are strongly recommended for everyone in that role to complete, even if they have some prior knowledge and experience (to ensure currency with the latest technologies and standards). The other courses listed for each role address important skills for the […]

Cybersecurity

Operational Cybersecurity

This course presents a real-world view of Enterprise Cybersecurity Operations for Security Professionals. Topics covered include Network Traffic Analysis, Threat Detection, Penetration Testing, Incident Response, High Availability & Disaster Recovery, and Data Analytics for Cyber. Students will see demonstrations and get some hands-on exposure to each of these topics.

Cybersecurity

Penetration Testing Methodology

Penetration Testing Methodology was developed to provide students with a comprehensive hands-on exposure to the processes, tools and procedures used by penetration testers. This course teaches students concepts and methods involved in targeting, infiltrating and expanding access within networks. The course allows students to understand the attacker mindset and learn how to simulate a real-world […]

Cybersecurity

Post-Quantum Cryptography (PQC)

This course covers the essentials of Quantum Computing and Post-Quantum Cryptography (PQC). The course enables organizational leaders, security officers, and IT professionals to plan for the fast approaching quantum computing reality. At present, adversaries of organizations and nation states are harvesting data at rest and in transit that may be secure by present cryptography standards […]

Cybersecurity

Reverse Engineering Malware

Reverse Engineering Malware is an intermediate course that exposes students to the theoretical knowledge and hands-on techniques to analyze malware of greater complexity. Students will learn to analyze malicious Windows programs, debug user-mode and kernel-mode malware with WinDbg, identify common malware functionality, in addition to reversing covert and encoded malware. Objectives This course will provide […]

Cybersecurity

Securing The Software Supply Chain: Software Bills Of Materials

This seminar provides a high-level overview of Software Bills of Materials (SBOMs). It focuses on how using SBOMs in software development can provide traceability, insight, and security. Any system that consumes or produces software can benefit from using SBOMs, either as fuel or output. A Software Bill of Materials is an enumeration of a product’s […]

Cybersecurity

Systems Security Certified Practitioner (SSCP)

Earning a globally recognized advanced security administration and operations certification like the SSCP is a great way to grow your career and better secure your organization’s critical assets. SSCP certification demonstrates you have the advanced technical skills and knowledge to implement, monitor and administer IT infrastructure using security best practices, policies and procedures established by […]

Cybersecurity

Windows Internals and Command Line Operations

Windows Internals and Command Line prepares students to use the Windows Operating System using the Command Line Interface (CLI).  By emphasizing the CLI, the course prepares students to automate tasks through scripting or using a remote administration tool without a Graphical User Interface (GUI). Windows Internals and Command Line introduces students to the CLI, file […]

Cybersecurity

Wireless Analysis & Exploitation (WAX)

The Wireless Analysis and Exploitation (WAX) course maps to the objectives of the Ultimate Hacking-Wireless course. WAX is a specialized course that focuses on 802.11 wireless technologies. This course introduces students to radio frequency fundamentals, standards-based protocols and network deployments as it applies to IEEE 802.11 wireless networks (WLAN). Students will develop an understanding of […]

Cybersecurity

Advanced Data Analytics with PySpark

This class introduces participants to the Apache Spark platform, the Spark Shell and Spark SQL for big data processing applications. In addition to the Spark platform, participants will learn fundamental tools in the pandas library and gain experience with data visualization using seaborn.

Data Science

Contact Us