Information Security

Information Security

  • Certified Application Security Engineer.NET

    Overview The Certified Application Security Engineer (CASE) focuses on secure application software development processes. It is a, hands-on, comprehensive application security course that will help you create a secure application software. This course encompasses security activities involved in all phases of the Secure Software Development Lifecycle (SDLC): planning, creating, testing, and deploying an application. Unlike [...]

  • Certified Incident Handler

    Certified Incident Handler Overview The EC-Council Certified Incident Handler program is designed to provide the fundamental skills to handle and respond to the computer security incidents in an information system. The course addresses various underlying principles and techniques for detecting and responding to current and emerging computer security threats. Students will learn how to handle [...]

  • Certified Threat Intelligence Analyst (CTIA)

    Certified Threat Intelligence Analyst (CTIA) Overview Certified Threat Intelligence Analyst (C|TIA) is a training and credentialing program designed and developed in collaboration with cybersecurity and threat intelligence experts across the globe to help organizations identify and mitigate business risks by converting unknown internal and external threats into known threats. It is a comprehensive specialist-level program [...]

  • Deep Discovery Training for Certified Professionals

    Deep Discovery Training for Certified Professionals Overview Trend Micro™ Deep Discovery Training for Certified Professionals is a three-day, instructor-led training course where participants will learn how to deploy and manage a Trend Micro™ Deep Discovery threat protection solution using: Trend Micro™ Deep Discovery Inspector Trend Micro™ Deep Discovery Analyzer Trend Micro™ Deep Discovery Email Inspector [...]

  • Deep Security 10 training for Certified Professionals

    Deep Security 10 training for Certified Professionals Overview Trend Micro™ Deep Security 10 Training for Certified Professionals is a three-day, instructor-led training course where participants will learn how to use Trend Micro™ Deep Security for advanced server security of physical, virtual and cloud-based computers. This course details the basic architecture of the Deep Security solution, [...]

  • EC-Council Certified Secure Programmer

    Overview The EC-Council Certified Secure Programmer (ECSP) Java is a comprehensive 3-day course that provides hands-on training covering Java security features, policies, strengths, and weaknesses. It helps developers to understand how to write secure and robust Java applications, and provides advanced knowledge in various aspects of Java development that can effectively prevent hostile and buggy [...]

  • EC-Council Certified Secure Programmer (Java)

    EC-Council Certified Secure Programmer (Java) Today, Java is embedded in 3 billion devices from laptops and super computers to game consoles, mobile phones, etc. Java is widely adopted because of its ability to be a platform and architecture independent characteristic that encourages developers and industry alike. New Horizons Singapore provides a 3-day comprehensive hands-on course [...]

  • Firewall 8.1 Essentials: Configuration and Management (EDU-210)

    Overview The Palo Alto Networks Firewall 8.1 Essentials: Configuration and Management (EDU-210) course is a five day instructor-led training that will enable you to: Configure and manage the essential features of Palo Alto Networks next generation firewalls Configure and manage GlobalProtect to protect systems that are located outside of the data center perimeter Configure and [...]

  • Firewall 8.1: Optimizing Firewall Threat Prevention (EDU-214)

    Overview The Palo Alto Networks Firewall 8.1: Optimizing Firewall Threat Prevention (EDU-214) course is four days of instructor-led training that emphasizes the PAN-OS® threat prevention capabilities. After completing this course, you should be able to: Describe the cyber-attack lifecycle and recognize common forms of attack Describe PAN-OS® threat prevention capabilities Use firewall logs and reports [...]