Foundstone’s industry experts bring real-world experience to the classroom. Instructors have performed hundreds of network, web, e-commerce, and application security assessments; created many of the industry’s widely used security tools and utilities; developed award-winning Foundstone security software; and managed major security programs for corporate enterprises and government agencies.
The McAfee Foundstone Professional Services Enterprise Risk Assessment (ERA) four-day, instructor-led course provides comprehensive, hands-on training for technology professionals seeking to elevate their skills and awareness around identifying security risks.
Eliminate potential security flaws early in the software development lifecycle by understanding the processes for secure software design, development, and deployment.
Understand the techniques to identify, respond to, and recover from both insider and outsider attacks in this in-depth computer forensics course.
Security Awareness Training delivers highly targeted training videos to end users. These videos are designed to equip users with the literacy necessary to protect the organization from an attack and address compliance mandates. As each organization has unique challenges, you can choose the video modules most appropriate for your business.
Learn to identify and respond to security attacks, monitor traffic with SIEM, identify threat responses with McAfee Network Security Platform, and work with both McAfee Enterprise Security Manager (ESM) and McAfee Network Threat Response analysis techniques — core competencies for security operations center analysts.
Learn hacking fundamentals, network penetration testing, client and server penetration testing, and how to analyze digital forensics.
Learn how to execute Internet, intranet, and host-level security, as well as how to perform penetration assessments and develop countermeasures.
Defend against malicious hackers by learning their trade. Understand the latest techniques for exploiting web-based applications, recognize vulnerabilities, develop countermeasures, and perform ongoing assessments of web security in this hands-on course.
Defend your wireless networks with confidence. Learn the tools, techniques, and methods attackers use to target wireless infrastructures, and assess your security posture to develop effective countermeasures against increasingly sophisticated attacks.
Learn how to identify and respond to malware incidents and recognize the traces of differing attacks.
Build secure and reliable web applications using Java by understanding the key security features of the J2EE platform and common web security pitfalls.