Foundstone’s industry experts bring real-world experience to the classroom. Instructors have performed hundreds of network, web, e-commerce, and application security assessments; created many of the industry’s widely used security tools and utilities; developed award-winning Foundstone security software; and managed major security programs for corporate enterprises and government agencies.
Learn to identify how hackers attack applications, identify and assess application data, and work with user and session management.
Eliminate potential security flaws early in the software development lifecycle by understanding the processes for secure software design, development, and deployment.
Understand the techniques to identify, respond to, and recover from both insider and outsider attacks in this in-depth computer forensics course.
Learn how to identify and respond to network security issues, sniff networks, uncover vulnerabilities in network protocols, and find routing protocol attacks.
Security Awareness Training delivers highly targeted training videos to end users. These videos are designed to equip users with the literacy necessary to protect the organization from an attack and address compliance mandates. As each organization has unique challenges, you can choose the video modules most appropriate for your business.
Learn to identify and respond to security attacks, monitor traffic with SIEM, identify threat responses with McAfee Network Security Platform, and work with both McAfee Enterprise Security Manager (ESM) and McAfee Network Threat Response analysis techniques — core competencies for security operations center analysts.
Learn how to identify risk in an enterprise-level environment, as well as perform effective risk assessments.
Learn hacking fundamentals, network penetration testing, client and server penetration testing, and how to analyze digital forensics.
Learn how to execute Internet, intranet, and host-level security, as well as how to perform penetration assessments and develop countermeasures.
Learn to think like a hacker in this hands-on course for seasoned security professionals. Understand the increasingly sophisticated tools hackers use, and get the latest knowledge you need to defend against attacks and safeguard your company’s critical assets.
Learn how to identify and respond to social engineering, as well as phone and email phishing techniques.
Learn how to identify and respond to mobile security threats and vulnerabilities, including jailbreaking and rooting mobile devices.
Defend against malicious hackers by learning their trade. Understand the latest techniques for exploiting web-based applications, recognize vulnerabilities, develop countermeasures, and perform ongoing assessments of web security in this hands-on course.
Combat threats to Windows. Assess architectural vulnerabilities and learn to deploy effective countermeasures using the latest programs to simulate breaches and responses in a series of hands-on exercises.
Defend your wireless networks with confidence. Learn the tools, techniques, and methods attackers use to target wireless infrastructures, and assess your security posture to develop effective countermeasures against increasingly sophisticated attacks.
Learn how to identify and respond to malware incidents and recognize the traces of differing attacks.
Build secure and reliable web applications using ASP.NET in this hands-on course. Understand the key security features of the .NET platform and how to avoid vulnerabilities.
Build secure and reliable enterprise applications using C++ in this hands-on course. Through real-world examples, learn the key security features of the C++ language and how to avoid design decisions that can introduce vulnerabilities.
Build secure and reliable web applications using Java by understanding the key security features of the J2EE platform and common web security pitfalls.