We're offering 20% off September Live Online classes! See which courses are applicable.   |   Details

  
AccountIcon BigDataIcon BlogIcon default_resource_icon CartIcon checkmark_icon cloud_devops_icon computer_network_admin_icon cyber_security_icon gsa_schedule_icon human_resources_icon location_icon phone_icon plus_icon programming_software_icon project_management_icon redhat_linux_icon search_icon sonography_icon sql_database_icon webinar_icon

Search UMBC Training Centers

Filter By:

100a: General Introduction to Post-Quantum Cybersecurity: Securing Today and Tomorrow

Section 100a of the Post-Quantum Cybersecurity Training Program is intended for non-technical executives, focusing on strategic implications and risk management.

Cybersecurity

Post-Quantum Cybersecurity Training Program

The emergence of quantum computing presents a significant threat to traditional cybersecurity measures. As quantum capabilities advance, organizations must proactively adopt post-quantum solutions to safeguard their assets and ensure business continuity. However, effective post-quantum security goes beyond mere algorithm replacement – it necessitates a fundamental evolution in enterprise security architecture. By providing targeted training for […]

Cybersecurity

Wireless Analysis & Exploitation (WAX) Copy

The Wireless Analysis and Exploitation (WAX) course maps to the objectives of the Ultimate Hacking-Wireless course. WAX is a specialized course that focuses on 802.11 wireless technologies. This course introduces students to radio frequency fundamentals, standards-based protocols and network deployments as it applies to IEEE 802.11 wireless networks (WLAN). Students will develop an understanding of […]

Cybersecurity

Securing The Software Supply Chain: Software Bills Of Materials

This seminar provides a high-level overview of Software Bills of Materials (SBOMs). It focuses on how using SBOMs in software development can provide traceability, insight, and security. Any system that consumes or produces software can benefit from using SBOMs, either as fuel or output. A Software Bill of Materials is an enumeration of a product’s […]

Cybersecurity

Reverse Engineering Malware

Reverse Engineering Malware is an intermediate course that exposes students to the theoretical knowledge and hands-on techniques to analyze malware of greater complexity. Students will learn to analyze malicious Windows programs, debug user-mode and kernel-mode malware with WinDbg, identify common malware functionality, in addition to reversing covert and encoded malware. Objectives This course will provide […]

Cybersecurity

NICE Framework Role-Specific Training Courses

Below are UMBC Training Centers’ recommendations for NICE Framework Role Specific Training. Courses in Bold are strongly recommended for everyone in that role to complete, even if they have some prior knowledge and experience (to ensure currency with the latest technologies and standards). The other courses listed for each role address important skills for the […]

Cybersecurity

Cybersecurity Risk Management and Compliance

Cybersecurity Risk Management is an informed approach to planning, implementing, and operating in a connected environment through a risk-based approach, informed by business/mission objectives.  This approach recognizes that cybersecurity is not an isolated function within any organization, but rather requires coordination with other organizational and executive functions – human resources, legal, finance, operations, technology.  Identifying […]

Cybersecurity

Cybersecurity Risk Management and Compliance Primer/Review

The Cybersecurity Risk Management and Compliance Primer/Review course provides a high-level overview of Federal Information Security and Compliance Standards, Requirements, and Processes. The course is primarily aimed at IT and Business professionals who do not have primary responsibility for Information Security, but who work in IT environments where they need to have a good understanding […]

Cybersecurity

Operational Cybersecurity

This course presents a real-world view of Enterprise Cybersecurity Operations for Security Professionals. Topics covered include Network Traffic Analysis, Threat Detection, Penetration Testing, Incident Response, High Availability & Disaster Recovery, and Data Analytics for Cyber. Students will see demonstrations and get some hands-on exposure to each of these topics.

Cybersecurity

Contact Us