Security Training Courses

Security Training Courses

Security Training Courses Onsite

We offers a full line of security training courses, from foundational, multi-vendor training to technology-specific and vendor-specific training!

ENO offers a full line of security training courses, from foundational, multi-vendor training to technology-specific and vendor-specific training. Our courses will help you understand the basic principles behind protecting and securing your information, applications, and networks. Our security instructors are seasoned veterans who have spent considerable time in the industry. When they aren’t teaching, our instructors spend considerable time on consulting projects, ensuring a thorough understanding of their subject matter and applicable real-world experience.

Classroom Live
More Info

Classroom Live
More Info
Virtual Classroom Live
More Info

Virtual Classroom Live
More Info
Boot Camp Training
More Info

Boot Camp Training
More Info
Online Self-Paced
More Info

Online Self-Paced
More Info

Customize It!

With onsite Training, courses can be scheduled on a date that is convenient for you, and because they can be scheduled at your location, you don’t incur travel costs and students won’t be away from home. Onsite classes can also be tailored to meet your needs. You might shorten a 5-day class into a 3-day class, or combine portions of several related courses into a single course, or have the instructor vary the emphasis of topics depending on your staff’s and site’s requirements.

Wireless training courses

7Safe/Barracuda/Blue Coat/CheckPoint Courses

7Safe Certified Malware Investigator Training (CMI)
7Safe Certified Security Testing Associate (CSTA) – Ethical Hacking Training
7Safe Certified Security Testing Professional (CSTP) – Ethical Hacking II Training
Blue Coat Certified Proxy Administrator (BCCPA) Training
Blue Coat Certified Proxy Professional (BCCPP) Training
Barracuda NextGen Firewall F Certified Engineer Training (BTN300)
Barracuda NextGen Firewall F Public Cloud Engineer Training (BTN320)
Barracuda NextGen Firewall F Certified Expert Training (BTN350)
Barracuda Web Application Firewall Certified Engineer Training (BTW300)
Barracuda Web Application Firewall Public Cloud Engineer Training – Microsoft Azure (BTW320)
Barracuda Web Application Firewall Public Cloud Engineer Training – Amazon Web Services (BTW330)
Check Point Security Administration (CCSA R77.30)
Check Point Security Administration and Security Engineering Bundle (R77.30 GAiA) (CCSA+CCSE R77.30)
Check Point Cyber Security Engineering (CCSE R80.10)
Check Point Security Master (CCSM)
Check Point Certified Security Administrator (CCSA) R80 (CCSA R80.10)
Check Point Cyber Security Administrator and Engineering Bundle (CCSA+CCSE R80.10)
Check Point Security Engineering (CCSE R77.30)

Cisco Security Training Courses

Cisco FIREWALL 2.0 – Deploying Cisco ASA Firewall Solutions Training
IINS Training – Implementing Cisco IOS Network Security Training 3.0
IPS Training – Implementing Cisco Intrusion Prevention System Training v7.0
Cisco SAEXS Training – Cisco ASA Express Security Training v1.5
Cisco SASAC Training – Implementing Core Cisco ASA Security Training v1.0
Cisco SCYBER Training- Securing Cisco Networks with Threat Detection and Analysis Training
Cisco SENSS Training – Implementing Cisco Edge Network Security Solutions Training
Cisco SESA Training- Securing Email with Cisco Email Security Appliance Parts 1 and 2 2.1 Training
Cisco SIMOS Training – Implementing Cisco Secure Mobility Solutions Training
Cisco SISAS Training – Implementing Cisco Secure Access Solutions Training
Implementing and Configuring Cisco Identity Services Engine v2.3 Training (SISE)
Implementing Cisco Cybersecurity Operations v1.0 Training (SECOPS)
Cisco SITCS Training- Implementing Cisco Threat Control Solutions Training
SSFAMP – Protecting Against Malware Threats with Cisco AMP for Endpoints Training v4.0
Securing Cisco Networks with Sourcefire FireSIGHT Intrusion Prevention System v3.0 Training(SSFIPS)
Understanding Cisco Cybersecurity Fundamentals v1.0 Training (SECFND)
Securing Cisco Wireless Enterprise Networks v1.1 Training(WISECURE)
Next Generation Firewall Technical Workshop Training (NGFW)
Securing Networks with Cisco Firepower Threat Defense Training (NGFW-FIREPOWER200)
Securing Industrial IoT Networks with Cisco Technologies (ISECIN)
Cisco SSFSNORT Training- Securing Cisco Networks with Open Source Snort Training
Cisco SWSA Training – Securing the Web with Cisco Web Security Appliance Training 2.1
Cisco VPN 2.0 – Deploying Cisco ASA VPN Solutions Training

Cybersecurity Training Courses

Advanced Network Traffic Analysis Training
Access Control, Authentication, and Public Key Infrastructure Training
Advanced Reverse Engineering Malware Training
Advanced Computer Forensics Training
Advanced Ethical Hacking Training
Advanced Security Essentials – Enterprise Defender Training
Advanced Penetration Testing, Exploit Writing, and Ethical Hacking Training
Advanced Digital Forensics, Incident Response, and Threat Hunting Training
Advanced Smartphone Forensics Training
Application Security Training
Automating Information Security with Python Training
Behavioral Malware Analysis Training
Cloud Security Fundamentals Training
Computer Forensics Training
Introduction to Cyber Warfare and Operations Design Training
CyberSAFE (Securing Assets for End-Users) Training
CyberSec First Responder: Threat Detection and Response Training
Cybersecurity Foundations Training
Cyber Threats Detection and Mitigation Training
Cybersecurity Investigations and Network Forensics Analysis
Ethical Hacking Training | CEH Certification Training
Defending Mobile Applications Security Essentials Training
Hacker Tools, Techniques, Exploits, and Incident Handling Training
Intrusion Prevention Training
Intrusion Detection In-Depth Training
Fundamentals of Information Systems Security Training
ISACA CSX Practitioner I: Identification and Protection Training
ISACA CSX Practitioner II: Detection Training
ISACA CSX Practitioner III: Respond and Recover Training
Malicious Network Traffic Analysis Training
Mac Forensic Analysis Training
Memory Forensics In-Depth Training
Mobile Device Security and Ethical Hacking Training
Network Penetration Testing and Ethical Hacking Training
Systems Forensics, Investigation, and Response Training
Reverse Engineering Malware Training
Scada Security Training In Depth
Scada Security Challenges and Solutions Training
Wireless Industrial and Scada Networks Training
Scada and Industrial Computing Applications Training
Security Essentials Training
Securing Linux and Unix Training
Securing Windows and PowerShell Automation Training
Virtualization and Private Cloud Security Training
Wireless Ethical Hacking, Penetration Testing, and Defenses Training
Windows Forensic Analysis Training

DoDD Directive 8140/8570 Compliance

CompTIA A+ Certification Training
CompTIA Network+ Certification Training
CompTIA Security+ Certification Training
Advanced Digital Forensics, Incident Response, and Threat Hunting Training
CAP Certification Training | Certified Authorization Professional Training
CASP Training | CompTIA Advanced Security Practitioner Training
CEH Certification Training | Certified Ethical Hacker Training
CISA Training | Certified Information Systems Auditor Training
CISM Training | Certified Information Security Manager Training
Fundamentals of Information Security Training
CISSP Training | Certified Information Systems Security Professional Training
ISSEP Training | Information System Security Engineering Professional Training
ISSAP Training | Information System Security Architecture Professional Training
ISSMP Training | Information System Security Management Professional
SSCP Training | System Security Certified Practitioner
Securing Cisco Networks with Threat Detection and Analysis Training v1.2 (SCYBER)
RMF Procedures Overview DoDI 8510.01
RMF Training | Introduction to Risk Management Framework
RMF Training, Risk Management Framework Implementation
Risk Management Framework for Federal Systems Training
Risk Management Framework (RMF) for Federal Security Controls Assessors Training (SCA)
Risk Management Framework for DoD & Intelligence Communities Information Technology Training In-depth
Risk Management Framework for DoD Security Controls Assessors Training (SCA)

Industrial Control Systems

Assessing and Exploiting Control Systems Training
Active Defense and Incident Response Training
Critical Infrastructure and Control System Cybersecurity Training
Essentials for NERC Critical Infrastructure Protection Training
Introduction to Industrial Control Systems Cybersecurity Training
Industrial Control Systems – Scada Security Training In Depth
Scada Security Challenges and Solutions Training
Scada and Industrial Computing Applications: Fundamentals and Principles Training
Smart Grid Cybersecurity Training
Wireless Industrial and Scada Networks Training

Security Certification Courses

CompTIA A+ Certification Training
CompTIA Network+ Certification Training
CompTIA Security+ Certification Training
Advanced Digital Forensics, Incident Response, and Threat Hunting Training
CAP Certification Training | Certified Authorization Professional Training
CASP Training | CompTIA Advanced Security Practitioner Training
Cisco CCNAX Certification Training
CEH Certification Training | Certified Ethical Hacker Training
CHFI Training | Certified Computer Hacking Forensic Investigator Training
CISA Training | Certified Information Systems Auditor Training
CISM Training | Certified Information Security Manager Training
CISSP Training | Certified Information Systems Security Professional Training
CSSLP Training | Certified Secure Software Lifecycle Professional Training
CSFI-CSCOE | Certified SCADA Cyberspace Operations Engineer Training
CIPP Training| Certified Information Privacy Professional Training US Private-Sector
CIPP Training | Certified Information Privacy Professional Training US Government
CIPM Training | Certified Information Privacy Manager Training
CIPT Training | Certified Information Privacy Technologist Training
DCOE Training | Defensive Cyber Operations Engineer Training
ECSA Certification Training | EC-Council Certified Security Analyst Training
HCISPP Certification Training | Healtcare Information Security and Privacy Practitioner Training
HIT Certification Training | CompTIA Healthcare IT Technician Certification Training
ISSEP Training | Information System Security Engineering Professional Training
ISSAP Training | Information System Security Architecture Professional Training
ISSMP Training | Information System Security Management Professional
Linux+ Training Certification Training
SSCP Training | System Security Certified Practitioner Training
SMSP Certification Training | Social Media Security Professional Training

F5 and Fortinet Security Courses

F5 Configuring BIG-IP LTM v13: Local Traffic Manager (LTM13)
F5 Configuring BIG-IP ASM v13: Application Security Manager (ASM13)
F5 Administering BIG-IP v13 (ADM13)
F5 Configuring BIG-IP APM v13: Access Policy Manager (APM13)
F5 Networks Developing iRules for BIG-IP v13 (4686)
F5 Troubleshooting BIG-IP v13 (TS13)
F5 Configuring BIG-IP DNS v13: Domain Name System (formerly GTM) (DNS13)
F5 Configuring BIG-IP AFM v13: Advanced Firewall Manager (AFM13)
FortiGate Security Systems I Training
FortiGate Security Systems II Training
Network Security Reporting – FortiAnalyzer Training
Email Security Training – FortiMail Training
Web Application Firewall Training – FortiWeb Training
Wireless LAN – FortiAP Training

Juniper/Palo Alto Networks/McAfee Security Courses

McAfee Endpoint Protection: Data Loss Prevention Endpoint Administration Training
McAfee Endpoint Protection: Host Intrusion Prevention Administration Training
JUNOS Routing Essentials Training (JRE)
JUNOS Security Training (JSEC)
JUNOS Intermediate Routing Training(JIR)
JUNOS Enterprise Switching Training(JEX)
Juniper Advanced Junos Security Training (AJSEC)
Juniper Junos Intrusion Prevention System Functionality Training (JIPS)
Palo Alto Networks Firewall 8.0 Essentials: Configuration Management Training (EDU-210)
Palo Alto Networks Panorama 8.0 : Manage Multiple Firewalls (EDU- 221)
Palo Alto Networks Firewall 8.0 : Debug and Troubleshoot (EDU-311)
Palo Alto Networks: TRAPS 3.4: Install, Configure, and Manage
Symantec Data Center Security: Server Advanced 6.0 Training
Symantec Endpoint Protection 12.1: Administration Training
Symantec Endpoint Protection 12.x: Maintain and Troubleshoot Training
Symantec Data Loss Prevention 14.0: Administration Training (DLP14)
Symantec NetBackup 7.6 Bare Metal Restore: Administration Training (NBBMRA)
Symantec Ghost Solution Suite 3.0 Administration Training

Software Security Training Courses

Application Security Training
Defending Web Applications Security Essentials Training
Secure Coding in C/C++ Training
Secure Coding in .NET – C#/ASP.NET Training
Secure Coding for Android Platform Training
Secure Coding for iOS Platform Training
Secure Coding for PHP Training
Secure Coding in Java/JEE: Developing Defensible Applications Training
Secure Coding in .NET: Developing Defensible Applications Training

Other Security Training Courses

Cisco Unified Contact Center Enterprise Administration v11.5 Training (UCCE-A)
Cisco Unified Contact Center Enterprise Advanced Administration v11.5 Training (UCCE-AA)
Cisco Unified Contact Center Enterprise Deployment D v11.5 Training (UCCE)
Designing and Implementing Cisco Network Programmability v1.0 Training (NPDESI)
Developing with Cisco Network Programmability v4.0 Training (NPDEV )
Using DevOps Tools with Cisco ACI Training
Cisco Video Infrastructure Implementation Training (CVII)
Managing Industrial Networks for Manufacturing with Cisco Technologies v1.3 Training (IMINS2)
Analyst Notebook Basic Training
Analyst Notebook Advanced Training
Analyst Notebook Complete Training
Analyst Notebook Premium Complete Training
Analyst Notebook Charting + iBase Training
iBase User Training
iBase Designer Training
DIACAP Training In Depth Training
Incident Response and Network Forensics Training
IPv6 Security Training | IP Version 6 Security Training
Network Traffic Analysis Training
Managing Risk in Information Systems Training
VoIP Security Training | Voice over IP Security Training
Wireless LAN Security Training

For organizational purchases, please send us a message at Cyber defense training[email protected] or complete and submit this form

Print Friendly, PDF & Email