This Mac forensics training course (3 days) gives delegates a practical understanding of:
This course will immerse the student into an interactive environment where they will be shown how to scan, test, hack & secure
...The role of Product Owner is key to the success of any Scrum project: The Product Owner provides the vision & guidance to the
...In this two-day course, you will apply the Scrum framework to build a new product. You will learn what it feels like to be on
...This accelerated CSSLP certification course provides IT professionals with a fully-immersed, zero-distraction CSSLP training
...The course introduces delegates to commercial penetration testing software & exploitation frameworks commonly used by professionals
...On this 3 day practical training course, extend your knowledge beyond conventional static computer forensics analysis. You will
...On this 3 day practical computer forensics training course, gain an understanding of static computer forensics analysis by learning
...Do your meetings regularly overrun or go off-topic? Do you wish you were better at controlling the outcomes of your meetings?
...This is the ideal package for senior staff in residential care / nursing homes & those providing care in the community who may
...The CSTA training course provides a comprehensive grounding in the methodology, techniques and culture of ethical hacking.
It takes delegates on a practical journey through the various stages and elements of a penetration test, from initial
The CSTA training course provides a comprehensive grounding in the methodology, techniques & culture of ethical hacking.
It takes delegates on a practical journey through the various stages & elements of a penetration test, from initial information discovery & target scanning through to exploitation, privilege escalation, & retaining access.
The course also explores the usage of Trojans & Root kits, which have become increasingly important elements of the ethical hacking arena.
The course is a hands-on journey into the hacking mindset, examining & practically applying the tools & techniques that hackers use. Delivery is in an interactive format with the use of multimedia & practical hands-on workshops. Open group discussion is strongly encouraged. The course is designed to educate for the purpose of properly defending systems from hacking attacks.
This training may be available onsite; please contact us if you are interested.