The CASE credential tests the critical security skills and knowledge required throughout a typical software development life cycle (SDLC), focusing on the importance of the implementation of secure methodologies and practices in today’s insecure operating environment.
Certified Internet of Things (IoT) Security Practitioner
This course is designed for network security engineers and analysts who are tasked with designing secure network environments, implementing security policies and protocols related to IoT devices, and analyzing network systems for operational and security considerations, in addition to the security operations center (SOC) analysts who analyze and respond to security incidents, and develop organizational response processes. It is also beneficial to solutions architects, developers, and testers who design, develop, and test software solutions for their organizations. This certification is also relevant to operations engineers who deploy and maintain embedded and mission critical systems and perform organizational gap analysis.
Certified Network Defender (CND) is a vendor-neutral comprehensive network security certification training program. It is a skills-based, lab intensive program based on a job-task analysis and cybersecurity education framework presented by the National Initiative of Cybersecurity Education (NICE).
Certified Information Privacy Professional (CIPP/US)
Principles of Privacy in the U.S. Private Sector covers U.S. privacy laws and regulations at federal and state levels, including breach notification and limits on various private sectors. You’ll leave with an understanding of the legal requirements for the responsible handling and transfer of personal data within industry and workplaces, including government access to private-sector data. The training is based on the body of knowledge for the IAPP’s ANSI-accredited Certified Information Privacy Professional/ U.S. (CIPP/US) certification program.
In this course, students will learn general strategies for planning, designing, developing, implementing, and maintaining an IoT system through various case studies and by assembling and configuring an IoT device to work in a sensor network. Students will create an IoT device based on an ESP8266 microcontroller, implementing various common IoT features, such as analog and digital sensors, a web-based interface, MQTT messaging, and data encryption.
The course teaches developers how to identify security flaws and implement security countermeasures throughout the software development life cycle to improve the overall quality of products and applications
Students will learn how to scan, test, hack and secure target systems. The course covers the Five Phases of Ethical Hacking, diving into Reconnaissance, Gaining Access, Enumeration, Maintaining Access, and covering your tracks.
Students will conduct a penetration test on a company that has various departments, subnets and servers, and multiple operating systems with defense mechanisms architecture that has both militarized and non-militarized zones.
This half-day course will help you to understand security compliance considerations, social engineering, malware, and various other data security-related concepts. In this course, you will explore the hazards and pitfalls and learn how to use technology safely.
This course covers the duties of those who are responsible for monitoring and detecting security incidents in information systems and networks, and for executing a proper response to such incidents. Depending on the size of the organization, this individual may act alone or may be a member of a cybersecurity incident response team (CSIRT). The course introduces tools and tactics to manage cybersecurity risks, identify various types of common threats, evaluate the organization's security, collect and analyze cybersecurity intelligence, and handle incidents as they occur. Ultimately, the course promotes a comprehensive approach to security aimed toward those on the front lines of defense.
ounded in 2000, the IAPP is the world’s largest and most comprehensive privacy resource with a mission to define, support and improve the Privacy profession globally. Every day we access, share, manage and transfer data across companies, continents and the globe. Having the knowledge to build your organization’s privacy structures from the ground up has never been more important. With regulators worldwide calling for tech professionals to factor data privacy into their products and services, the job market for privacy-trained IT pros has never been stronger. The Principles of Privacy in Technology training is our premier course on privacy and data protection practices in the development, engineering, deployment and auditing of IT products and services. This training, offered worldwide, will give you an understanding of privacy-related issues and practices in the context of the design and implementation of information and communication technologies and systems.