Hands on Security Training Courses

Hands on Security Training Courses

Local, instructor-led live Hands on Security training courses demonstrate through interactive discussion and hands-on practice the fundamentals and advanced topics of Hands on Security. Hands on Security training is available as "onsite live training" or "remote live training". Onsite live training can be carried out locally on customer premises in the UAE or in NobleProg corporate training centers in the UAE. Remote live training is carried out by way of an interactive, remote desktop. NobleProg -- Your Local Training Provider

Testimonials

★★★★★
★★★★★

Hands on Security Course Outlines

CodeNameDurationOverview
ethhackEthical Hacker35 hours

This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

The purpose of the Ethical Hacking Training is to:

  • Establish and govern minimum standards for credentialing professional information security specialists in ethical hacking measures.
  • Inform the public that credentialed individuals meet or exceed the minimum standards.
  • Reinforce ethical hacking as a unique and self-regulating profession.

Audience:

The Course is ideal for those working in positions such as, but not limited to:

  • Security Engineers
  • Security Consultants
  • Security Managers
  • IT Director/Managers
  • Security Auditors
  • IT Systems Administrators
  • IT Network Administrators
  • Network Architects
  • Developers
embeddedsecurityEmbedded systems security21 hours

This training introduces the system architectures, operating systems, networking, storage, and cryptographic issues that should be considered when designing secure embedded systems.

By the end of this course, participants will have a solid understanding of security principles, concerns, and technologies. More importantly, participants will be equipped with the techniques needed for developing safe and secure embedded software.

Audience
    Embedded systems professionals
    Security professionals

Format of the course
    Part lecture, part discussion, hands-on practice

iastInteractive Application Security Testing (IAST)14 hours

Interactive Application Security Testing (IAST) is a form of application security testing that combines Static Application Security Testing (SAST) and Dynamic Application Security Testing (DAST) or Runtime Application Self-protection (RASP) techniques. IAST is able to report the specific lines of code responsible for a security exploit and replay the behaviors leading to and following such an exploit.

In this instructor-led, live training, participants will learn how to secure an application by instrumenting runtime agents and attack inducers to simulate application behavior during an attack.  

By the end of this training, participants will be able to:

  • Simulate attacks against applications and validate their detection and protection capabilities
  • Use RASP and DAST to gain code-level visibility into the data path taken by an application under different runtime scenarios
  • Quickly and accurately fix the application code responsible for detected vulnerabilities
  • Prioritize the vulnerability findings from dynamic scans
  • Use RASP real-time alerts to protect applications in production against attacks.
  • Reduce application vulnerability risks while maintaining production schedule targets
  • Devise an integrated strategy for overall vulnerability detection and protection

Audience

  • DevOps engineers
  • Security engineers
  • Developers

Format of the course

  • Part lecture, part discussion, exercises and heavy hands-on practice
shiroApache Shiro: Securing your Java application7 hours

Apache Shiro is a powerful Java security framework that performs authentication, authorization, cryptography, and session management.

In this instructor-led, live training, participants will learn how to secure a web application with Apache Shiro.

By the end of this training, participants will be able to:

  • Use Shiro's API to secure various types of applications, including mobile, web and enterprise
  • Enable logins from various data sources, including LDAP, JDBC, Active Directory, etc.

Audience

  • Developers
  • Security engineers

Format of the course

  • Part lecture, part discussion, exercises and heavy hands-on practice
secanaSecurity Analyst35 hours

 

Target Audience would be - Network server administrators, firewall administrators, information security analysts, system administrators, and risk assessment professionals 

ehcmEthical Hacking and Countermeasures35 hours

Description:

This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defences work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how Intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation.

Target Audience:

This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.

Upcoming Hands on Security Courses

CourseCourse DateCourse Price [Remote / Classroom]
Embedded systems security - DubaiTue, 2018-10-02 09:3022050AED / 29800AED
Weekend Hands on Security courses, Evening Hands on Security training, Hands on Security boot camp, Hands on Security instructor-led, Weekend Hands on Security training, Evening Hands on Security courses, Hands on Security coaching, Hands on Security instructor, Hands on Security trainer, Hands on Security training courses, Hands on Security classes, Hands on Security on-site, Hands on Security private courses, Hands on Security one on one training

Course Discounts

Course Venue Course Date Course Price [Remote / Classroom]
Enabling SOA with BPM and BPMN Dubai Sun, 2018-09-16 09:30 10530AED / 16430AED
Marketing Analytics using R Dubai Tue, 2018-09-18 09:30 19845AED / 27595AED
Systems Modelling with SysML Dubai Mon, 2018-12-03 09:30 19845AED / 27595AED
Forecasting with R Dubai Sun, 2018-12-09 09:30 13230AED / 19130AED
Comprehensive Git Dubai Tue, 2019-01-01 09:30 15795AED / 23545AED

Course Discounts Newsletter

We respect the privacy of your email address. We will not pass on or sell your address to others.
You can always change your preferences or unsubscribe completely.

Some of our clients