We're offering 20% off September Live Online classes! See which courses are applicable.   |   Details >

  
AccountIcon BigDataIcon BlogIcon default_resource_icon CartIcon checkmark_icon cloud_devops_icon computer_network_admin_icon cyber_security_icon gsa_schedule_icon human_resources_icon location_icon phone_icon plus_icon programming_software_icon project_management_icon redhat_linux_icon search_icon sonography_icon sql_database_icon webinar_icon

Search UMBC Training Centers

Filter By:

Certified Cybersecurity Analyst Program Copy

Program Map Program Breakdown Application Why This Program Testimonials Register FAQ In recent years, the demand for cybersecurity professionals has soared. Forbes magazine reports that there may be as many as 3.5 million unfilled positions in the industry by 2021. Increasingly, cyber employers are seeking talent from non-traditional sources to fill their workforce. At the […]

Cybersecurity

Certified Authorization Professional (CAP)

Earning the CAP certification is a proven way to build your career and demonstrate your expertise within the risk management framework (RMF). The CAP is the only certification under the DoD8570 mandate that aligns with each RMF step. It shows employers you have the advanced technical skills and knowledge to authorize and maintain information systems […]

Cybersecurity

Certified Information Security Manager (CISM)

ISACA’s Certified Information Security Manager (CISM) certification indicates expertise in information security governance, program development and management, incident management and risk management. Take your career out of the technical realm to management! The management-focused CISM certification promotes international security practices and recognizes the individual who manages, designs, oversees and assesses an enterprise’s information security.Around the […]

Cybersecurity

Malcare (Reverse Engineering Malware)

This course, developed and delivered by our partner, Rendition Infosec, introduces students to the principles, practices, and tools used in reversing engineer. Once students are comfortable with these foundational concepts, they will take a deep-dive into the concepts and practices around reverse engineering malicious software. Students will perform many hands-on lab exercises to examine the […]

Cybersecurity

Systems Security Certified Practitioner (SSCP)

Earning a globally recognized advanced security administration and operations certification like the SSCP is a great way to grow your career and better secure your organization’s critical assets. SSCP certification demonstrates you have the advanced technical skills and knowledge to implement, monitor and administer IT infrastructure using security best practices, policies and procedures established by […]

Cybersecurity

CompTIA PenTest+

CompTIA® PenTest+® (Exam PT0-001) is the only penetration testing exam taken at a Pearson VUE testing center with both hands-on, performance-based questions and multiple-choice, to ensure each candidate possesses the skills, knowledge, and ability to perform tasks on systems. PenTest+ also includes management skills used to plan, scope, and manage weaknesses, not just exploit them. […]

Cybersecurity

Metasploit Framework, Pen Testing Methodology & Malware Triage

Penetration Testing Methodology was developed to provide students with a comprehensive hands-on exposure to the processes, tools and procedures used by penetration testers. This course teaches students concepts and methods involved in targeting, infiltrating and expanding access within networks. The course allows students to understand the attacker mindset and learn how to simulate a real-world […]

Cybersecurity

Penetration Testing Methodology

Penetration Testing Methodology was developed to provide students with a comprehensive hands-on exposure to the processes, tools and procedures used by penetration testers. This course teaches students concepts and methods involved in targeting, infiltrating and expanding access within networks. The course allows students to understand the attacker mindset and learn how to simulate a real-world […]

Cybersecurity

Network & Packet Analysis

This course teaches the student the fundamental concepts, methodologies, and tools necessary to analyze network traffic for the purposes of intrusion and threat detection, network defense, and low profile offensive operations. The hands-on course begins with discussing the role of network packet analysis in computer network operations (CNO). After a detailed discussion of the TCP/IP […]

Cybersecurity

Contact Us