We're offering 20% off September Live Online classes! See which courses are applicable.   |   Details >

AccountIcon BigDataIcon BlogIcon default_resource_icon CartIcon checkmark_icon cloud_devops_icon computer_network_admin_icon cyber_security_icon gsa_schedule_icon human_resources_icon location_icon phone_icon plus_icon programming_software_icon project_management_icon redhat_linux_icon search_icon sonography_icon sql_database_icon webinar_icon

Search UMBC Training Centers

Filter By:

CompTIA Advanced Security Practitioner (CASP+)

CompTIA Advanced Security Practitioner CASP+ (exam CAS-003) is the only advanced level cybersecurity certification designed strictly for practitioners, not managers. In this course, you will expand on your knowledge of information security to apply more advanced principles that will keep your organization safe from the many ways it can be threatened This course can also benefit […]


Certified Information Systems Security Professional (CISSP) Training

UMBC Training Centers offers a 5-day CISSP Training class to prepare students for the (ISC)2 CISSP certification exam. Certified Information Systems Security Professional (CISSP) Certification was designed to recognize mastery of an international standard for information security and understanding of a Common Body of Knowledge (CBK). The certification is managed by the International Information Systems […]


Certified Wireless Security Professional (CWSP)

This Wireless LAN Security course consists of hands on learning using the latest enterprise wireless LAN security and auditing equipment. This course addresses in detail the most up-to-date WLAN intrusion and DoS tools and techniques, functionality of the 802.11i amendment to the 802.11 standard, the inner-workings of each EAP type used with wireless LANs today, […]


Certified Wireless Network Administrator (CWNA)

This Enterprise Wireless LAN Administration course, whether in an academic format or a 5-day fast-track format, provides the networking professional a complete foundation of knowledge for entering into or advancing in the wireless networking industry. From basic RF theory to 802.11 frame exchange processes, this course delivers hands-on training that will benefit the novice as […]


Certified Network Defender (CND)

Organizational focus on cyber defense is more important than ever as cyber breaches now have a far greater financial impact and can cause broad reputational damage.  Despite best efforts to prevent breaches, many organizations are still being compromised. Therefore, organizations must have, as part of their defense mechanisms, trained network engineers who are focused on […]


Certified Ethical Hacker (CEH) Training

The Certified Ethical Hacker CEH Training course at UMBC Training is a 40-hour immersion into ethical hacking designed to provide professionals with the expertise and insight necessary to prepare for and react to malicious intrusion. This class will immerse students in an interactive environment where they will be shown how to scan, test, hack, and […]


Certified Cybersecurity Analyst Program

Program Map Program Breakdown Application Why This Program Testimonials Register FAQ In recent years, the demand for cybersecurity professionals has soared. Forbes magazine reports that there may be as many as 3.5 million unfilled positions in the industry by 2021. Increasingly, cyber employers are seeking talent from non-traditional sources to fill their workforce. At the […]


Certificate in Cyber Foundations

This program provides candidates with the skills, knowledge and credentials required to successfully begin a career in the field of Information Technology. This program was designed by UMBC Training Centers in collaboration with senior executives and technical staff from the Department of Defense, leading Government Contractors, and Fortune 500 companies. There is a severe shortage […]


Secure Programming Best Practices

The primary objective of this course is to teach professional computer programmers about the common methods used by hackers to exploit vulnerabilities in computer programs, and how to program defensively to avoid introducing such vulnerabilities into their own programs. CLASS FORMAT AND SCHEDULE This is a self-paced, instructor-mentored course. Students access the course lessons through […]


Contact Us