Classroom & Virtual Instructor-Led Training

Hands-on security education wherever you are

Foundstone’s industry experts bring real-world experience to the classroom. Instructors have performed hundreds of network, web, e-commerce, and application security assessments; created many of the industry’s widely used security tools and utilities; developed award-winning Foundstone security software; and managed major security programs for corporate enterprises and government agencies.

Building Secure Software

Eliminate potential security flaws early in the software development lifecycle by understanding the processes for secure software design, development, and deployment.

Forensic & Incident Response Education (FIRE)

Understand the techniques to identify, respond to, and recover from both insider and outsider attacks in this in-depth computer forensics course.

Security Operations Center Administration I

Learn to identify and respond to security attacks, monitor traffic with SIEM, identify threat responses with McAfee Network Security Platform, and work with both McAfee Enterprise Security Manager (ESM) and McAfee Network Threat Response analysis techniques — core competencies for security operations center analysts.

Ultimate Hacking

Learn how to execute Internet, intranet, and host-level security, as well as how to perform penetration assessments and develop countermeasures.

Ultimate Hacking: Web

Defend against malicious hackers by learning their trade. Understand the latest techniques for exploiting web-based applications, recognize vulnerabilities, develop countermeasures, and perform ongoing assessments of web security in this hands-on course.

Ultimate Hacking: Wireless

Defend your wireless networks with confidence. Learn the tools, techniques, and methods attackers use to target wireless infrastructures, and assess your security posture to develop effective countermeasures against increasingly sophisticated attacks.

Ultimate Malware Analysis

Learn how to identify and respond to malware incidents and recognize the traces of differing attacks.

Writing Secure Code: Java (J2EE)

Build secure and reliable web applications using Java by understanding the key security features of the J2EE platform and common web security pitfalls.