Philadelphia Computer Training and IT Security Classes
TrainACE offers IT professionals, businesses, military, government agencies and groups with three types of IT security certification courses:
1) Click here to join one of our award winning, open enrollment classes at our Maryland or Virginia location. (With this option, we provide fly-in travel packages.)
2) Request a proposal for a private class for your group at your location or in one of our classrooms.
3) Purchase a self-paced, at home, online computer certification course (Request more information by completing the form on the right).
Some of the courses that we offer are listed below:
-Certified Ethical Hacker (CEH) Training:
The Certified Ethical Hacker (CEH) is the newest certification under the DoD 8570 Directive. Certified Ethical Hacker (CEHv8) Version 8 is a very hands-on five day boot camp course that explores the tactics commonly used to penetrate a network.
-Security + Training:
Security+ takes the first step in teaching you to implement and monitor security on networks and computer systems, and respond to security breaches in the appropriate manner.
– Certified Information Systems Security Professional (CISSP) Training:
The CISSP is a certification created by the International Information Systems Security Certification Consortium, Inc., (ISC)². Government agencies, government contractors (especially DOD), companies and organizations worldwide must have staff that have a common knowledge platform for and demonstrate competence in information security. (ISC)² helps fulfill these requirements with the CISSP.
-Advanced Penetration Testing (APT) Training:
Students that are Network/System Administrators with three (3) or more years of experience working in environments such as financial institutions, DoD networks, or similar high security environments will benefit greatly from this APT course. It is however primarily designed for Network/Web Application Penetration testers that are looking for the little tricks that will help them better attack high security environments.
– Cyber Security Training:
This class was written by a team of IT security and security training’s most respected professionals. This group of industry professionals were looking to create a course that dissects the art of hacking and creates professionals who deeply understand the “whys” of penetration testing /exploitation so that all traditional barriers can be broken.
– Computer Forensics Training (CHFI):
This class is an industry leading, internationally awarded Computer Hacking Forensics Investigator training course that will apply hands-on lab work to help students comprehend the processes of detecting hacker attacks and to gather the evidence required to be able to report the on-line crime and potentially take the criminal down for their attack. The CHFI certification class also conducts activities to help secure a network and prevent against network intrusion.
– Exploit Development Training:
This two week course, taught by Saumil Shah, combines the two most popular exploit development training seminars that are offered at industry conferences around the world, but are always sold out; Exploit Dev: No Assembly Required & Exploit Dev: Black OPs.
– Wireless Security Training:
The Advanced Wireless Security (AWS) course is the leading wireless security training class in the industry and was written under the guidance of three extremely respected industry professionals, Anthony Williams, Joe McCray and Vivek Ramachandran.
– Malware Analysis/Reverse Engineering (AMA) Training:
This class covers a wide variety of malware, from native Windows executables, to web-based malware with numerous types of obfuscation, students will take a hands-on approach to learn how to reverse-engineer malicious code using system/network monitoring utilities, debuggers, disassemblers and a handful of perl/python/ruby scripts.
The City of Brotherly Love has one of the strongest economies in the country, which is fueled by a very large population and a firm presence of technology. With businesses that stretch from industrial to high tech of every size, Philadelphia employees have long been thriving on the use of software applications for management of every type of project that comes up.