GO

Security Training & Certification from New Horizons

The Importance of Information Security Training

As more and more confidential information is stored and processed electronically and transmitted across company networks, as well as the Internet, the risk of unauthorized access increases. Naturally, the steady occurrence of data breaches and attacks on sensitive and confidential information is making data protection a critical component of an organization's leadership and governance strategy. As a result, IT departments endure the growing challenge of applying the best possible practices which will protect and secure company information.

New Horizons offers a variety of top information security training from leading IT Security vendors. At New Horizons, our information security offerings are designed to ensure that your organization can be the "Secure Organization"—enabling you to target specific training for your business based on information security threats and organizational job roles.

Benefits of Security Training from New Horizons

As more and more confidential information is stored and processed electronically, the risk of unauthorized access is on the rise. Data breaches and attacks make protection critical. At New Horizons, we are on the leading edge of cybersecurity with training programs designed to ensure that your organization can best prevent itself against attacks and, should one occur, significantly reduce your risk and increase your response time.

We offer information security courses and certifications from leaders in the cybersecurity space such as CompTIA, (ISC)², and EC-Council. These organizations are committed to setting strict security standards that any organization can implement. Earning certifications from these vendor-neutral organizations is an ideal way to prove your security professionals have the skills, knowledge, and commitment to protect your company’s most valuable data assets.

Questions About Security?

Information Security Course Details

Cisco Cybersecurity Courses

  • Cisco Implementing Advanced Cisco ASA Security v2.1 (SASAA)
    This course provides an updated training with labs on the key features on the Cisco ASA (covering up to the ASA 9.2.2 release). The goal of the course is to implement the key features of the Cisco ASA.
  • Cisco Implementing Cisco Edge Network Security Solutions (SENSS)
    Implementing Cisco Edge Network Security Solutions (SENSS) v1.0 is a five-day course that is part of the curriculum path leading to the Cisco Certified Network Professional Security (CCNP Security) certification. Additionally, it is designed to prepare security engineers with the knowledge and hands-on experience to prepare them to configure Cisco perimeter edge security solutions utilizing Cisco Switches, Cisco Routers, and Cisco Adaptive Security Appliance (ASA) Firewalls.
  • Cisco Implementing Cisco Network Security 3.0 (IINS)
    Implementing Cisco Network Security (IINS) v3.0 is a 5-day instructor-led course focusing on security principles and technologies, using Cisco security products to provide hands-on examples.
  • Cisco Implementing Cisco Secure Access Solutions (SISAS)
    At the end of the course, students will be able to reduce the risk to their IT infrastructures and applications using Ciscos ISE appliance feature and provide operational support identity and network access control.
  • Cisco Implementing Cisco Secure Mobility Solutions v1.0 (SIMOS)
    Implementing Cisco Secure Mobility Solutions (SIMOS) v1.0 is a course that is part of the curriculum path leading to the Cisco Certified Network Professional Security (CCNP Security) certification. This course is designed to prepare network security engineers with the knowledge and skills they need to protect data traversing a public or shared infrastructure such as the Internet by implementing and maintaining Cisco VPN solutions.
  • Cisco Implementing Cisco Threat Control Solutions v1.0 (SITCS1)
    Implementing Cisco Threat Control Solutions (SITCS) v1.0 is part of the curriculum path leading to the Cisco Certified Network Professional Security (CCNP Security) certification. Additionally, it is designed to prepare security engineers with the knowledge and hands-on experience so that they can deploy Ciscos Next Generation Firewall (NGFW) as well as Web Security, Email Security and Cloud Web Security.
  • Cisco Implementing Core Cisco ASA Security v1.0 (SASAC))
    This course provides update training on the key features of the post-8.4.1 release of the Cisco ASA adaptive security appliance, including 9.x features.
  • Cisco Introduction to 802.1X Operations for Cisco Security Professionals v1.0 (8021X)
    Students will gain the foundational knowledge of IEEE 802.1X protocol, the skills that are needed to configure the Cisco Identity Services Engine (ISE) for 802.1X operation, and hands-on experience configuring a network for 802.1X-based network services.
  • Cisco Securing Cisco Networks with Threat Detection and Analysis (SCYBER) 1.0
    This course is designed to teach students how a network security operations center (SOC) works and how to begin to monitor, analyze, and respond to security threats within the network and will help prepare students for the Cisco Cybersecurity Specialist exam (600-199 SCYBER).

InfoSec Institute Courses (Private Sessions Only)

  • Advanced Ethical Hacking
    Advanced Ethical Hacking Boot Camp aims to train you on how to successfully attack fully patched and hardened systems, how to circumvent common security controls, and how to get to confidential data.
  • Certified in Risk and Information Systems Control (CRISC) Boot Camp
    The course introduces tools and tactics to manage cybersecurity risks, identify various types of common threats, evaluate the organization's security, collect and analyze cybersecurity intelligence, and handle incidents as they occur.
  • Computer Forensics Boot Camp
    Our Computer Forensics Boot Camp prepares students for the two industry recognized computer forensic certifications, the IACRB Certified Computer Forensics Examiner (CCFE) and (ISC)2 Certified Cyber Forensics Professional (CCFP).
  • Incident Response & Network Forensics
    The Incident Response and Network Forensics course addresses cutting edge attack vectors as well as tried and true methods for compromise. You leave the 5 day course with the knowledge of how to prevent incidents and the skills to defend against a security incident if it does happen.
  • Secure Coding in .NET - ASP.NET and C# Edition
    This comprehensive 3-day course is designed to educate professional programmers on the skills necessary to develop and deploy secure applications as a fundamental element of the entire application development process.
  • Web Application Penetration Testing
    The Web Application Penetration Testing Boot Camp focuses on preparing students for the real world of Web App Pen Testing through extensive lab exercises, thought provoking lectures led by an expert instructor.

ISACA Course

  • Certified Information Security Manager (CISM)
    Establish and maintain a framework to provide assurance that information security strategies are aligned with business objectives and consistent with applicable laws and regulations.

Information Security Course Details

CompTIA Cybersecurity Courses

  • CompTIA Security+ Certification
    The CompTIA Security+ certification course is designed to help you prepare for the SY0-401 exam. Students will implement and monitor security on networks, applications, and operating systems, and respond to security breaches.
  • CompTIA Cybersecurity Analyst (CSA+) Certification
    The course introduces tools and tactics to manage cybersecurity risks, identify various types of common threats, evaluate the organization's security, collect and analyze cybersecurity intelligence, and handle incidents as they occur.
  • CompTIA Advanced Security Practitioner (CASP)
    In this course, students will examine advanced security concepts, principles, and implementations that pertain to enterprise level security.

EC-Council Courses

  • Certified Ethical Hacker (CEH)
    In 18 comprehensive modules, the course covers 270 attack technologies, commonly used by hackers. Throughout the CEH course, you will be immersed in a hacker's mindset, evaluating not just logical, but physical security.
  • Computer Hacking Forensic Investigator (CHFI)
    Computer forensics enables the systematic and careful identification of evidence in computer related crime and abuse cases. This may range from tracing the tracks of a hacker through a client’s systems, to tracing the originator of defamatory emails, to recovering signs of fraud.
  • EC-Council Certified Security Analyst (ECSA)/LPT v9.0
    In this course, students will learn EC-Council's Licensed Penetrations Tester (LPT), a natural evolution and extended value addition to its series of security related professional certifications.
  • EC Council Certified Secure Programmer .NET (ECSP.NET)
    The course teaches developers how to identify security flaws and implement security countermeasures throughout the software development life cycle to improve the overall quality of products and applications.

(ISC)² Courses

Logical Operations Cybersecurity Courses

  • CyberSAFE (Securing Assets for the End User)
    This course is designed for you as a non-technical end-user of computers, mobile devices, networks,and the Internet, to enable you to use technology more securely to minimize digital risks.
  • CyberSec First Responder: Threat Detection and Response
    This course will prepare security professionals to become the first line of response against cyber-attacks by teaching students to analyze threats, design secure computing and network environments, proactively defend networks, and respond/investigate cybersecurity incidents.

Kaspersky Lab Courses

Microsoft Cybersecurity Course

  • 40032 Networking and Security Fundamentals
    This five-day course helps you prepare for Microsoft Technology Associate Exams 98-366 and 98-367, and build an understanding of these topics: Network Infrastructures, Network Hardware, Protocols and Services, Security Layers, Operating System Security, Network Security, and Security Software.

NIST Cybersecurity Framework (NCSF) Courses

  • The NCSF Foundation Certification Course (Coming Soon)
    This coures covers current cybersecurity challenges and explains how organizations that implement an NCSF program can mitigate these risks.
  • The NCSF Practitioner Certification Course
    This course details the current cybersecurity challenges plus teaches in depth the UMass Lowell NCSF Control Factory Methodology on how to build, test, maintain and continually improve a cybersecurity program based on the NIST Cybersecurity Framework.