We're offering 20% off September Live Online classes! See which courses are applicable.   |   Details

  
AccountIcon BigDataIcon BlogIcon default_resource_icon CartIcon checkmark_icon cloud_devops_icon computer_network_admin_icon cyber_security_icon gsa_schedule_icon human_resources_icon location_icon phone_icon plus_icon programming_software_icon project_management_icon redhat_linux_icon search_icon sonography_icon sql_database_icon webinar_icon

Search UMBC Training Centers

Filter By:

Metasploit Framework

The Metasploit Framework course was developed to provide students with an introduction to an exploitation framework or suite of penetration testing tools commonly used by penetration testers. This course provides students with an in-depth overview of the capabilities and contents of the Metasploit Framework and shows them how to install it, maneuver within it and […]

Cybersecurity

Malware Triage

Malware Triage was developed to provide students with a comprehensive hands-on exposure to the processes, tools and procedures used to identify common types of malware and to quickly determine their capabilities and threat level. This course teaches students concepts and methods involved in finding, analyzing and characterizing malware to determine how severe of a threat […]

Cybersecurity

Logical Reasoning & Structured Analytic Techniques

The overall objective of this class is to enable students to critically think about their analysis and what they are tasked to analyze.  A secondary objective is to provide students with a set of analytic tools to be used in future analytic scenarios.  At the end of the course, students will be equipped with a […]

Cybersecurity

Linux for Cyber Fundamentals

In this course, you will learn basic to intermediate end-user commands to help you navigate and use the Linux Operating System. Students will be prepared to: Log in and out of the system Perform tasks using terminal shells Navigate through the Linux file system Get help using the online manuals and documentation Understand Linux Bash […]

Cybersecurity

Linux for Cyber System Administration

In this course, you will build on Linux Fundamentals with more intermediate end-user and administrator command line operations focused on local system administration tasks. In this course, students will learn to: Run an Administrative Environment Manage and install system software Add and remove local storage, partitions, and filesystems Use Logical Volume Management Configure networking and […]

Cybersecurity

Intro to Malware Analysis

In this class students will learn the fundamentals of basic malware analysis through static and behavioral analysis of real and exemplar malware.  This hands-on course will walk students through setting up a proper sandboxed environment well equipped for malware analysis.  Students will be exposed to the compilation process that takes human readable code to compiled […]

Cybersecurity

Cybersecurity Fundamentals

The three-day cybersecurity fundamentals course will provide students with an overview of current networking, information assurance (IA), and cybersecurity theory and application.  The course will consist of lectures and hands-on labs for a multi-faceted learning experience.  This course will provide a good initial foundation for participants wanting to ultimately pursue industry certification like Security + […]

Cybersecurity

Computer Hacking Forensic Investigator (CHFI)

Computer hacking forensic investigation is the process of detecting hacking attacks and properly extracting evidence to report the crime and conduct audits to prevent future attacks. Computer forensics enables the systematic and careful identification of evidence in computer related crime and abuse cases. This may range from tracing the tracks of a hacker through a […]

Cybersecurity

CompTIA Security+

Standard 5-Day Training Course (Enter EARLY10 for 10% off!) In the Standard 5-Day CompTIA Security+ Certification Course, you will build on your knowledge and professional experience with CompTIA certification fundamentals, networks, and organizational CompTIA security training as you acquire the specific skills required to implement basic security services on any type of computer network. The […]

Cybersecurity

Contact Us