Strategic Security Education

Get Comprehensive Training to Defend Against Threats

McAfee Foundstone provides a comprehensive network security training curriculum designed to meet the needs of individuals, departments, and organizations to develop highly skilled security professionals. Combining interactive classroom demonstrations and hands-on lab exercises that employ real-world scenarios, Foundstone courses arm students with the tools and methodologies they need to proactively defend against the latest security threats.

Courses are taught by the world’s foremost network security experts and developers of market-leading security technologies. Instructors have a broad range of expertise, from industry-leading IT and financial services companies to government agencies, including the Federal Deposit Insurance Corp., the U.S. Department of Justice, the U.S. Department of Defense, the Air Force Information Warfare Center, and the armed forces.

Classroom & Virtual Instructor-Led Training

Application Developers Role

Learn to identify how hackers attack applications, identify and assess application data, and work with user and session management.

Building Secure Software

Eliminate potential security flaws early in the software development lifecycle by understanding the processes for secure software design, development, and deployment.

Forensic & Incident Response Education (FIRE)

Understand the techniques to identify, respond to, and recover from both insider and outsider attacks in this in-depth computer forensics course.

Network Role

Learn how to identify and respond to network security issues, sniff networks, uncover vulnerabilities in network protocols, and find routing protocol attacks.

Security Awareness Training

Security Awareness Training delivers highly targeted training videos to end users. These videos are designed to equip users with the literacy necessary to protect the organization from an attack and address compliance mandates. As each organization has unique challenges, you can choose the video modules most appropriate for your business.

Security Operations Center Analyst I

Learn to identify and respond to security attacks, monitor traffic with SIEM, identify threat responses with McAfee Network Security Platform, and work with both McAfee Enterprise Security Manager (ESM) and McAfee Network Threat Response analysis techniques — core competencies for security operations center analysts.

Strategic Thinking and Assessing Risk

Learn how to identify risk in an enterprise-level environment, as well as perform effective risk assessments.

The Hacker Academy

Learn hacking fundamentals, network penetration testing, client and server penetration testing, and how to analyze digital forensics.

Ultimate Hacking

Learn how to execute Internet, intranet, and host-level security, as well as how to perform penetration assessments and develop countermeasures.

Ultimate Hacking: Expert

Learn to think like a hacker in this hands-on course for seasoned security professionals. Understand the increasingly sophisticated tools hackers use, and get the latest knowledge you need to defend against attacks and safeguard your company’s critical assets.

Ultimate Hacking: Human

Learn how to identify and respond to social engineering, as well as phone and email phishing techniques.

Ultimate Hacking: Mobile

Learn how to identify and respond to mobile security threats and vulnerabilities, including jailbreaking and rooting mobile devices.

Ultimate Hacking: Web

Defend against malicious hackers by learning their trade. Understand the latest techniques for exploiting web-based applications, recognize vulnerabilities, develop countermeasures, and perform ongoing assessments of web security in this hands-on course.

Ultimate Hacking: Windows Security

Combat threats to Windows. Assess architectural vulnerabilities and learn to deploy effective countermeasures using the latest programs to simulate breaches and responses in a series of hands-on exercises.

Ultimate Hacking: Wireless

Defend your wireless networks with confidence. Learn the tools, techniques, and methods attackers use to target wireless infrastructures, and assess your security posture to develop effective countermeasures against increasingly sophisticated attacks.

Ultimate Malware Analysis

Learn how to identify and respond to malware incidents and recognize the traces of differing attacks.

Writing Secure Code: ASP.NET (C#)

Build secure and reliable web applications using ASP.NET in this hands-on course. Understand the key security features of the .NET platform and how to avoid vulnerabilities.

Writing Secure Code: C++

Build secure and reliable enterprise applications using C++ in this hands-on course. Through real-world examples, learn the key security features of the C++ language and how to avoid design decisions that can introduce vulnerabilities.

Writing Secure Code: Java (J2EE)

Build secure and reliable web applications using Java by understanding the key security features of the J2EE platform and common web security pitfalls.