Classroom & Virtual Instructor-Led Training

Hands-on security education wherever you are

Foundstone’s industry experts bring real-world experience to the classroom. Instructors have performed hundreds of network, web, e-commerce, and application security assessments; created many of the industry’s widely used security tools and utilities; developed award-winning Foundstone security software; and managed major security programs for corporate enterprises and government agencies.

Enterprise Risk Assessment

The McAfee Foundstone Professional Services Enterprise Risk Assessment (ERA) four-day, instructor-led course provides comprehensive, hands-on training for technology professionals seeking to elevate their skills and awareness around identifying security risks.

Building Secure Software

Eliminate potential security flaws early in the software development lifecycle by understanding the processes for secure software design, development, and deployment.

Forensic & Incident Response Education (FIRE)

Understand the techniques to identify, respond to, and recover from both insider and outsider attacks in this in-depth computer forensics course.

Security Awareness Training

Security Awareness Training delivers highly targeted training videos to end users. These videos are designed to equip users with the literacy necessary to protect the organization from an attack and address compliance mandates. As each organization has unique challenges, you can choose the video modules most appropriate for your business.

Security Operations Center Administration I

Learn to identify and respond to security attacks, monitor traffic with SIEM, identify threat responses with McAfee Network Security Platform, and work with both McAfee Enterprise Security Manager (ESM) and McAfee Network Threat Response analysis techniques — core competencies for security operations center analysts.

The Hacker Academy

Learn hacking fundamentals, network penetration testing, client and server penetration testing, and how to analyze digital forensics.

Ultimate Hacking

Learn how to execute Internet, intranet, and host-level security, as well as how to perform penetration assessments and develop countermeasures.

Ultimate Hacking: Expert

Learn to think like a hacker in this hands-on course for seasoned security professionals. Understand the increasingly sophisticated tools hackers use, and get the latest knowledge you need to defend against attacks and safeguard your company’s critical assets.

Ultimate Hacking: Human

Learn how to identify and respond to social engineering, as well as phone and email phishing techniques.

Ultimate Hacking: Mobile

Learn how to identify and respond to mobile security threats and vulnerabilities, including jailbreaking and rooting mobile devices.

Ultimate Hacking: Web

Defend against malicious hackers by learning their trade. Understand the latest techniques for exploiting web-based applications, recognize vulnerabilities, develop countermeasures, and perform ongoing assessments of web security in this hands-on course.

Ultimate Hacking: Windows Security

Combat threats to Windows. Assess architectural vulnerabilities and learn to deploy effective countermeasures using the latest programs to simulate breaches and responses in a series of hands-on exercises.

Ultimate Hacking: Wireless

Defend your wireless networks with confidence. Learn the tools, techniques, and methods attackers use to target wireless infrastructures, and assess your security posture to develop effective countermeasures against increasingly sophisticated attacks.

Ultimate Malware Analysis

Learn how to identify and respond to malware incidents and recognize the traces of differing attacks.

Writing Secure Code: ASP.NET (C#)

Build secure and reliable web applications using ASP.NET in this hands-on course. Understand the key security features of the .NET platform and how to avoid vulnerabilities.

Writing Secure Code: C++

Build secure and reliable enterprise applications using C++ in this hands-on course. Through real-world examples, learn the key security features of the C++ language and how to avoid design decisions that can introduce vulnerabilities.

Writing Secure Code: Java (J2EE)

Build secure and reliable web applications using Java by understanding the key security features of the J2EE platform and common web security pitfalls.