Cybersecurity

Most of our cybersecurity training will help you prepare for certification exams. But, enrolling in a cybersecurity training is at first a strategic choice, helping you to get involved in a branch that is in high demand at the moment.

This cybersecurity training, exclusive to Eccentrix, is one of the most interesting when it comes to learning information security. It is training designed to help participants acquire key knowledge on how cyberattacks work, and how to prevent them. How are hackers able to...
This course covers the duties of those who are responsible for monitoring and detecting security incidents in information systems and networks, and for executing a proper response to such incidents. Depending on the size of the organization, this individual may act alone or may...
In today's organizational environment, almost every role involves working with computers in some manner. Recent events indicate that security breaches can happen to almost any computer user, at home or office. This course is intended to provide you with an introduction to common...
Welcome to CyberSAFE (Securing Assets For End-users) Extended Edition. Regardless of your computer experience, this class will help you become more aware of technology-related risks and what you can do to protect yourself and your organization from them. This course will...
This course is the official courseware for the Security Certified Program SC0-471 certification exam. The Strategic Infrastructure Security (SIS) course is designed to follow the hands-on skills utilized in the Tactical Perimeter Defense (TPD) course. The SIS course continues...
You will establish processes to ensure that information security measures align with established business needs. The intended audience for this course is information security and IT professionals, such as network administrators and engineers, IT managers, and IT auditors, and...
This course is the official courseware for the Security Certified Program SC0-451 certification exam. The Tactical Perimeter Defense course is designed to provide network administrators and certification candidates with hands-on tasks on the most fundamental perimeter security...
This five-day, highly technical course focuses on properly securing machines running the Linux operating systems. A broad range of general security techniques such as packet filtering, password policies, and file integrity checking are covered. Advanced security technologies...
This five-day course covers all requirements for the globally-recognized CASP certification. This mastery-level certification demonstrates knowledge of security concepts, tools and procedures to conceptualize, design, and engineer secure solutions across complex...
The (ISC)2 Systems Security Certified Practitioner (SSCP) five-day course covers seven domains which they describe as 'the compendium of topics pertaining to an Information Systems Security Practitioner', the CBK (Common Body of Knowledge). The seven domains maps directly to the...
Welcome to Certified Information Systems Security Professional (CISSP)®: Fourth Edition. With your completion of the prerequisites and necessary years of experience, you are firmly grounded in the knowledge requirements of today’s security professional. This course will...