-
All
-
Online
-
Filters
Mile2 courses
- Course
- Online
- 5 Days
...around principles and behaviors used by malicious hackers. The course is taught with this in mind while keeping the focus on professional penetration testing...
- Course
- Online
- 5 Days
...for retrieving the information in a forensically sound manner. The digital acquisition process Procedures used in digital duplication Digital authentication...
- Course
- Online
- 5 Days
...the CISSP® and ISSO prep events as an information technology security event. The focus therefore is inevitably on the technology used in the processing of data into information...
- Course
- Online
- 5 Days
...theoretical and real world experience if the student is going to succeed in mastering the necessary skills to become a CPTEngineer.. The CPTEngineer presents...
- Training
- Distance Learning
...Example: termination of an employee for a computer policy violation and using a digital artifact to support the allegation. The investigator must furnish...
- Training
- Distance Learning
...standard for information security certifications. The CISSP series will provide certification candidates an understanding of crucial security issues...
- Training
- Distance Learning
...the latest vulnerabilities will be discovered using these tried and true techniques. This course also enhances the business skills needed to identify protection opportunities...
- Training
- Distance Learning
...OBJECTIVE OF LAB SCENARIOS This is an intensive lecture class that focuses on best practices of DR/BCP. Day 3 of the class will focus on getting...
Questions & Answers
Add your question
Our advisors and other users will be able to reply to you