CYBER Security Training
Get the security training needed to guard computer systems against emerging threats and to safeguard a company’s IT environment at The Academy.
Our cyber security curriculum includes technology-specific classes, certification preparation, vendor-neutral classes and those that meet the Department of Defense (DoD) Directive 8140 / 8570.1.
We offer classes that help lead to certifications for CompTIA Security+ and CASP, Microsoft MTA Security, Certified Ethical Hacker (CEH) and CISSP.
Attend the following hands-on, instructor-led cyber security training classes at The Academy. Not near one of our locations? Attend these same live classes from your home/office PC via our Live Online Classroom (LOC) technology.
NETWORK SECURITY CLASSES
SECURITY CERTIFICATIONS
CompTIA Security+ and CASP CompTIA Security+ validates knowledge of communication security, infrastructure security, cryptography, operational security, and general security concepts.
CompTIA Advanced Security Practitioner (CASP) is an advanced level security credential that proves competency in enterprise security; risk management; incident response; research and analysis; and integration of computing, communications, business disciplines and enterprise-level cybersecurity threats. It is an international, vendor-neutral certification.
Microsoft MTA Secuity Microsoft MTA Secuity is an introductory certification that builds an understanding of security layers, operating system, network Security and security software.
Certified Information Systems Security Professional (CISSP) Sponsored by ISC, the CISSP certification provides information security professionals with not only an objective measure of competence but a globally recognized standard of achievement. This credential is ideal for mid- and senior-level managers who are working toward or have already attained positions as CISOs, CSOs or Senior Security Engineers.
Ethical Hacker They say to beat a hacker you have to think like one. This certification is for an individual who is usually employed with the organization and who can be trusted to undertake an attempt to penetrate networks and/or computer systems using the same methods as a Hacker.