SlideShare a Scribd company logo
1 of 59
Cyber Security
Training, Courses & Certifications
Call Us Today: +1-972-665-9786
List of top cybersecurity training and courses
Why Tonex ?
Since 1993, Tonex has specialized in providing industry-leading training, courses, seminars, workshops, and
consulting services across a wide range of topics to Fortune 500 companies, government organizations,
universities and privately owned businesses from around the world.
Visit our Clients Page for a complete list of Tonex customers.
Who is TONEX for?
Tonex is for any organization in need of leading edge technology training. That includes:
Companies, from Fortune 500 to small businesses in all industries
Government agencies
Contractors and System Integrator
Defense and Military
Educational Institutes, Colleges and Universities
What types of courses are offered?
You name it, we provide it. Our courses are constantly updated to keep up with the latest technology, and we
continuously monitor business trends and world events to provide the most relevant subject matter anywhere.
VISIT TONEX.COMList of top cybersecurity training and courses
Who Should Attend
•IT professionals
•Airforce and Military cybersecurity
•DoD employees and contractors or service providers
•All DoD personnel in charge of information assurance
•Authorizing official representatives, chief information
officers, senior information assurance officers,
information system owners or certifying authorities
•Employees of federal agencies and the intelligence
community
•Assessors, assessment team members, auditors,
inspectors or program managers of information
technology area
•Any individual looking for information assurance
implementation for a company based on recent DoD
and NIST policies
•Information system owners, information owners,
business owners, and information system security
managers
VISIT TONEX.COMList of top cybersecurity training and courses
CYBERSECURITY FOUNDATION
28 COURSES
IOT SECURITY
1 COURSES
RISK MANAGEMENT FRAMEWORK TRAINING
6 COURSES
WIRELESS SECURITY TRAINING
9 COURSES
CYBERSECURITY FOUNDATION
1. Cloud Security Training Crash Course - 3 days
2. Computer Network Architecture Training - 3 days
3. Critical Infrastructure Protection (CIP) NERC Training - 2 days
4. Cyber Security Applied to Embedded Systems - 2 days
5. Cyber Security Certificate- Part 1 Vulnerabilities and Risk Management - 5 days
6. Cyber Threat Simulation Training - 3 days
7. Cybersecurity Systems Engineering Training - 3 days
8. Cybersecurity Test and Evaluation (T&E) Training - 2 days
9. Disaster Recovery and Business Continuity Training - 2 days
10. Electric Grid Cyberseucrity Master Certification - 4 Weeks
11. Fundamentals of Malwares And Protection Against Malware Training - 2 days
12. Fundamentals of Threats And Risk Management Training - 2 days
13. Hardware Security Training By TONEX - 2 days
14. ICS Cybersecurity Training - 4 days
15. Industrial Control System and SCADA Cybersecurity Training - 3 days
16. Information Security and Risk Management Training - 2 days
17. Introduction to Cryptography - 2 days
18. Introduction to Cryptography Training - Level 1 - 2 days
19. Introduction to Hacking Training - 3 days
20. Introduction to Secure Software Engineering Training - 2 days
21. Linux Security Training Crash Course - 4 days
22. Network Security Training - 2 days
23. Smart Grid Cybersecurity Training - 3 days
24. Software Security Training - 2 days
25. Software Testing Training -2 days
26. Threat Simulation and Modeling Training - 2 days
27. Usable Security Fundamental Training - 2 days
28. Web Security Training - 2 days
IOT SECURITY
1. IoT Security Training | IoT Security Awareness – 2 days
RISK MANAGEMENT FRAMEWORK TRAINING
1. Cybersecurity Procedures Overview, DoDI 8500.01 - 2 days
2. Cybersecurity Test and Evaluation Workshop - 3 days
3. RMF for DoD IT Crash Course - 4 days
4. RMF Procedures Overview , DoDI 8510.01 - 2 days
5. RMF Training | Introduction to Risk Management Framework - 2 days
6. RMF Training, Risk Management Framework Implementation - 3 days
WIRELESS SECURITY TRAINING
1. 5G Security Training | 5G Wireless Security Training - 5 days
2. Certified Wireless Security Professional Training - 5 days
3. GSM and GPRS Security - 2 days
4. GSM Fraud Training - 4 days
5. HSPA/HSPA+ and LTE Security Training - 3 days
6. LTE Security Training - LTE and LTE-Advanced Security - 2 days
7. Wireless Ethical Hacking | Penetration Testing Crash Course - 4 days
8. Wireless LAN Security Training - 2 days
9. Wireless Security Training - 3 days
CYBERSECURITY FOUNDATION
28 COURSES
VISIT TONEX.COMhttps://www.tonex.com/training-courses/cloud-security-training/
Price: $2,999.00
Course Number: 6001
Length: 3 Days
CYBERSECURITY FOUNDATION COURSE NAME
Cloud Security Training Crash Course
Topics Include:
•Experienced instructors including senior
technology leaders, project managers, technical
authors, engineers, educators, consultants, course
developers, and CTOs.
•Real life examples and practices.
•Small class size.
•Personalized instructor mentoring.
•Pre-training discussions
•Ongoing post-training support via e-mail, phone
and WebEx.
1
VISIT TONEX.COMhttps://www.tonex.com/training-courses/computer-network-architecture-training/
Price: $2,199.00
Length: 3 Days
CYBERSECURITY FOUNDATION COURSE NAME
Computer Network Architecture Training
Topics Include:
•The basics of Ethernet and LAN, different Ethernet
speeds, spanning tree algorithm, virtual LAN
(VLAN), virtual private networks (VPN) and
commonly used Wi-Fi which prepares you for
technical details of network architecture.
•The IPv4 and IPv6, the difference between them,
importance of mobile IP, headers and subnets for
IPv4 and IPv6.
•The OSI reference model including its seven layers
which is the most important topic in network
2
VISIT TONEX.COMhttps://www.tonex.com/training-courses/critical-infrastructure-protection-cip-nerc-training/
Price: $1,699.00
Length: 2 Days
CYBERSECURITY FOUNDATION COURSE NAME
Critical Infrastructure Protection (CIP)
NERC Training
Topics Include:
Critical Infrastructure Protection (CIP) NERC
training course consists of the following lessons,
which can be revised and tailored to the client’s
need.
3
VISIT TONEX.COMhttps://www.tonex.com/training-courses/cyber-security-applied-embedded-systems/
Price: $1,999.00
Length: 2 Days
CYBERSECURITY FOUNDATION COURSE NAME
Cyber Security
Applied to Embedded Systems
Topics Include:
•What is Cybersecurity?
•Basic principles of CIA
•Confidentiality
•Embedded system’s critical information
•Application code and surveillance data
•Unauthorized entities
•Integrity
•Availability and mission objectives
•Cyber Risks applied to Embedded Systems
•Principles and practices designed to safeguard
your embedded system
•Hacking tools and entry points and more…
4
VISIT TONEX.COMhttps://www.tonex.com/training-courses/cyber-security-certificate-part-1-vulnerabilities-
and-risk-management/
Price: $4,999.00
Length: 5 Days
CYBERSECURITY FOUNDATION COURSE NAME
Cyber Security Certificate - Part 1
Vulnerabilities and Risk Management
Topics Include:
The cyber security certificate- part 1, vulnerabilities
and risk management training consists of the
following lessons, which can be revised and
tailored to the client’s need.
5
VISIT TONEX.COMhttps://www.tonex.com/training-courses/cyber-threat-simulation-training/
Price: $3,999.00
Length: 3 Days
CYBERSECURITY FOUNDATION COURSE NAME
Cyber Threat Simulation Training
Topics Include:
•The concept of simulating
•Providing a detailed postmortem of how an
attacker overview of Cyber Threats
•Fear Factors
•Spectacular Factors
•Vulnerability Factors
•Professional Hackers to Cyber terrorists
•Syntactic Cyber Attacks
•Semantic Cyber Attacks
•Viruses
•Worms and more…
6
VISIT TONEX.COMhttps://www.tonex.com/training-courses/cybersecurity-systems-engineering-training/
Price: $2,499.00
Length: 3 Days
CYBERSECURITY FOUNDATION COURSE NAME
Cybersecurity Systems Engineering Training
Topics Include:
•Definition of Cyber security
•Information security principles
•System engineering approaches for Cyber security
•Cyber world
•Cyber space
•Cyber domain
•Cyber ecosystem
•Cyber culture
•Cyber environment and more…
7
VISIT TONEX.COMhttps://www.tonex.com/training-courses/cybersecurity-test-and-evaluation-te-training/
Price: $1,699.00
Length: 2 Days
CYBERSECURITY FOUNDATION COURSE NAME
Cybersecurity Test and Evaluation
(T&E) Training
Topics Include:
•Information
•ICT and Cybersecurity
•Cyber Crime
•Cyber Espionage
•Cyber Warfare
•National and Cybersecurity
•Cyber Power and National Security
•Governmental, National and International
Cybersecurity and more…
8
VISIT TONEX.COMhttps://www.tonex.com/training-courses/disaster-recovery-and-business-continuity-training/
Price: $1,699.00
Length: 2 Days
CYBERSECURITY FOUNDATION COURSE NAME
Disaster Recovery and Business
Continuity Training
Topics Include:
•Terminologies
•Types of disasters
•What will disasters do to the system?
•Establishing a need for disaster recovery
•Operational disruption and disasters
•Disaster recovery definition
•Principles of disaster recovery and business
•Activities regarding disaster recovery
•Disaster recovery and business continuity program
•and more…
9
VISIT TONEX.COMhttps://www.tonex.com/training-courses/electric-grid-cyberseucrity-master-certification/
Price: $29,999.00
Length: 4 Weeks
CYBERSECURITY FOUNDATION COURSE NAME
Electric Grid Cyberseucrity
Master Certification
Topics Include:
•Cybersecurity Principals
•Cybersecurity Foundation Blocks
•Cyber Security and the Electric Sector
•Cyber Awareness Challenges for the Utility
Communities
•Power Grid and Cyber Attacks
•Risks, threats, and vulnerabilities
•Cryptography
•Access Control
•Mitigating the Risk of Cyber Attack on Power Grid
Systems
•Penetration Testing Methodologies
10
VISIT TONEX.COMhttps://www.tonex.com/training-courses/fundamentals-of-malwares-and-protection-against-
malware-training/
Price: $1,699.00
Length: 2 Days
CYBERSECURITY FOUNDATION COURSE NAME
Fundamentals of Malwares And Protection
Against Malware Training
Topics Include:
•Definition of Computer security
•Why computer security?
•Privacy issues
•Risk of attacks in network
•Consequences of security violations
•Computer security policies
•Control laws in computer security
•Legal status of privacy
•Mobile code security
•Firewalls and network security issues
11
VISIT TONEX.COMhttps://www.tonex.com/training-courses/fundamentals-of-threats-and-risk-management-
training/
Price: $1,699.00
Length: 2 Days
CYBERSECURITY FOUNDATION COURSE NAME
Fundamentals of
Threats And Risk Management Training
Topics Include:
•Definition of Cyber security
•Information security principles
•System engineering approaches for Cyber security
•Cyber world
•Cyber space
•Cyber domain
•Cyber ecosystem
•Cyber culture
•Cyber environment
•Cognitive layer of cyber world
12
VISIT TONEX.COMhttps://www.tonex.com/training-courses/hardware-security-training-by-tonex/
Price: $1,699.00
Length: 2 Days
CYBERSECURITY FOUNDATION COURSE NAME
Hardware Security Training
Topics Include:
•History of hardware security
•Smart cards prone to attacks
•Radio Frequency Identification (RFID)
•Microelectronic industry business model
•Hardware threats
•IP vendor
•System integrator
•Manufacture
•Third IP design issue
•Design process-new approach
•Untrusted system integrator
•More…
13
VISIT TONEX.COMhttps://www.tonex.com/training-courses/ics-cybersecurity-training/
Price: $3,999.00
Length: 4 Days
CYBERSECURITY FOUNDATION COURSE NAME
ICS Cybersecurity Training
Topics Include:
•Evolution of Industrial Control Systems (ICS)
•Global Industrial Cybersecurity Professional (GICSP)
•ICS Industrial Sectors
•ICS Operation and Components
•ICS Design Consideration
•Real-Time Operating Systems
•Programming Controllers
•SCADA Systems
•Distributed Control System
•More…
14
VISIT TONEX.COMhttps://www.tonex.com/training-courses/industrial-control-system-scada-cybersecurity-
training/
Price: $2,499.00
Length: 3 Days
CYBERSECURITY FOUNDATION COURSE NAME
Industrial Control System and SCADA
Cybersecurity Training
Topics Include:
•Industrial Control Systems Overview
•Global Industrial Cybersecurity Professional (GICSP)
•Roles and Responsibilities of ICS
•Real-time Operating Systems
•Programmable Logic Controllers (PLC)
•Distributed Control Systems (DCS)
•Supervisory Control and Data Acquisition (SCADA)
•Master Servers
•Industrial Computing Applications and SCADA Systems
•Communication Protocols
•More…
15
VISIT TONEX.COMhttps://www.tonex.com/training-courses/information-security-and-risk-management-
training/
Price: $1,699.00
Length: 2 Days
CYBERSECURITY FOUNDATION COURSE NAME
Information Security and Risk
Management Training
Topics Include:
•History of information security
•Meaning of security
•Quality of being secured
•Layers of security
•Physical security
•Personal security
•Operational security
•Communication security
•Network security
•Information security
•Availability of information
•More…
16
VISIT TONEX.COMhttps://www.tonex.com/training-courses/introduction-to-cryptography/
Price: $1,999.00
Length: 2 Days
CYBERSECURITY FOUNDATION COURSE NAME
Introduction to Cryptography
Topics Include:
Introduction to Cryptography introduces course
participants to the field of cryptography. The
attendees will learn the foundations of modern
symmetric and key cryptography, cryptographic
algorithms, protocols, stream and Block ciphering and
other topics including: IPSec, SSL/TLS, OpenPGP, SSH,
Kerberos Feistel Networks, DES, and AES, S, encryption
modes of operation and principles of the public key
algorithms.
17
VISIT TONEX.COMhttps://www.tonex.com/training-courses/cryptography-training/
Price: $1,699.00
Length: 2 Days
CYBERSECURITY FOUNDATION COURSE NAME
Introduction to Cryptography Training – Level 1
Topics Include:
•Information security and cryptography
•Backgrounds and functions
•Basic terminology and concepts
•Symmetric key encryption
•Digital signatures
•Authentication and identification
•Public key cryptography
•Hash functions
•Key establishment, management, and certification
•Classes of attacks and security models
18
VISIT TONEX.COMhttps://www.tonex.com/training-courses/introduction-to-hacking-training/
Price: $2,458.90
Length: 3 Days
CYBERSECURITY FOUNDATION COURSE NAME
Introduction to Hacking Training
Topics Include:
•Brief Overview of Information Security
•Information Security Vulnerabilities and Attacks
•Types of Attacks to the System
•Definition of Hacking
•Who Is Considered as a Hacker?
•What Are Different Classes of Hacking?
•What Are the Phases of Hacking?
•Network Infrastructure Attack
•Operating System Attack
19
VISIT TONEX.COMhttps://www.tonex.com/training-courses/introduction-to-secure-software-engineering-
training/
Price: $1,699.00
Length: 2 Days
CYBERSECURITY FOUNDATION COURSE NAME
Introduction to
Secure Software Engineering Training
Topics Include:
•The history behind the software
•System software
•Computer software
•Computer operating system
•Graphical user interface (GUI)
•Local area network software
•Application software
•Computer file formats
•Software issues
•Programming languages
•Enterprise software
20
VISIT TONEX.COMhttps://www.tonex.com/training-courses/linux-security-training-crash-course/
Price: $2,999.00
Length: 4 Days
CYBERSECURITY FOUNDATION COURSE NAME
Linux Security Training Crash Course
Topics Include:
•Linux Security Training Crash Course provides the
participants with an in-depth coverage of Linux security
and Unix security issues.
21
VISIT TONEX.COMhttps://www.tonex.com/training-courses/network-security-training/
Price: $1,699.00
Length: 2 Days
CYBERSECURITY FOUNDATION COURSE NAME
Network Security Training
Topics Include:
•Network security training by TONEX introduces the
importance of security in networks and helps you to
understand the main components of a secured
network.
•Network security training helps you examine the
security related issues in networks and provides you
with necessary preparation to secure the networks
from attacks and exploits.
22
VISIT TONEX.COMhttps://www.tonex.com/training-courses/smart-grid-cybersecurity-training/
Price: $2,599.00
Length: 3 Days
CYBERSECURITY FOUNDATION COURSE NAME
Smart Grid Cybersecurity Training
Topics Include:
•Smart Grid Cybersecurity Training course will teach
you the important aspects of cybersecurity in smart
grids. The training consists of detailed information
about smart power systems, recent technologies
toward the smart grids, potential threats and
vulnerabilities in smart grids and security
assessment in smart grids in order to advance the
knowledge of audience about the cybersecurity in
smart grids.
23
VISIT TONEX.COMhttps://www.tonex.com/training-courses/software-security-training/
Price: $1,699.00
Length: 2 Days
CYBERSECURITY FOUNDATION COURSE NAME
Software Security Training
Topics Include:
•Software Security Training course introduces you to
a variety of topics in software security such as:
secure programming techniques, trusted computing
infrastructure, low level software attacks, wen
security, risk management techniques, symbolic
execution, and cloud/wireless/mobile device
security.
24
VISIT TONEX.COMhttps://www.tonex.com/training-courses/software-testing-training/
Price: $1,699.00
Length: 2 Days
CYBERSECURITY FOUNDATION COURSE NAME
Software Testing Training
Topics Include:
•Software testing training teaches you the advanced
software testing and principles for today’s rigorous
testing demand and provides you the powerful tool
and technique to reduce software defects, improve
the quality and enhance your business success.
25
VISIT TONEX.COMhttps://www.tonex.com/training-courses/threat-simulation-and-modeling-training/
Price: $1,699.00
Length: 2 Days
CYBERSECURITY FOUNDATION COURSE NAME
Threat Simulation and Modeling Training
Topics Include:
•Threat simulation and modeling training teaches
you the various types of threat modeling techniques
and helps you to apply threat modeling as an
advanced preventive form of security. TONEX as a
leader in security industry for more than 15 years is
now announcing the threat simulation and
modeling training which helps you to recognize
methodologies, tools and case studies of successful
threat modeling technique.
26
VISIT TONEX.COMhttps://www.tonex.com/training-courses/usable-security-fundamental-training/
Price: $1,699.00
Length: 2 Days
CYBERSECURITY FOUNDATION COURSE NAME
Usable Security Fundamental Training
Topics Include:
•The usable security fundamental training course
introduces you to a variety of usability and user
interface problems related to system privacy and
security. Furthermore, it gives you the experience
needed in design studies aimed to prevent usability
issues in security and privacy systems.
27
VISIT TONEX.COMhttps://www.tonex.com/training-courses/web-security/
Price: $1,699.00
Length: 2 Days
CYBERSECURITY FOUNDATION COURSE NAME
Web Security Training
Topics Include:
•The web security training teaches you the
advanced web browsing vulnerabilities from system
penetration to identity theft as well as protection
solutions to ensure the web security. TONEX as a
leader in security industry for more than 15 years is
now announcing the web security training which
helps you to secure the communication between a
client and server as well as integrity of data in web.
28
IoT Security
1 COURSES
VISIT TONEX.COMhttps://www.tonex.com/training-courses/iot-security-training-iot-security-awareness/
Price: $1,899.00
Length: 2 Days
IOT SECURITY
IoT Security Training
IoT Security Awareness
Topics Include:
•IoT Security Training covers The Internet of Things
security and discusses IoT protocols, potential risks,
vulnerabilities, exploitation, data breaches, security
framework and mitigation.
1
Risk Management Framework Training
6 COURSES
VISIT TONEX.COMhttps://www.tonex.com/training-courses/cybersecurity-procedures-overview-dodi-8500-01/
Price: $1,699.00
Length: 2 Days
RISK MANAGEMENT FRAMEWORK TRAINING
Cybersecurity Procedures Overview
DoDI 8500.01
Topics Include:
•Cybersecurity Procedures Overview, DoDI 8500.01
training gives you a classified approach and step by
step procedure to secure your information system
based on DoD standard instructions. DoDI 8500.01
is a cybersecurity program to protect and defend
DoD information and Information Technology (DoD
IT) from prospective cybersecurity threats.
1
VISIT TONEX.COMhttps://www.tonex.com/training-courses/cybersecurity-test-evaluation-workshop/
Price: $3,999.00
Length: 3 Days
RISK MANAGEMENT FRAMEWORK TRAINING
Cybersecurity Test and Evaluation Workshop
Topics Include:
•Cybersecurity Test and Evaluation workshop covers
test and evaluation of many domains of business
and warfighting aspects of Department of Defense
(DoD) interconnected information technology (IT)
systems. We discuss evaluation and testing of
potential.
2
VISIT TONEX.COMhttps://www.tonex.com/training-courses/rmf-for-dod-it-crash-course/
Price: $3,999.90
Length: 4 Days
RISK MANAGEMENT FRAMEWORK TRAINING
RMF for DoD IT Crash Course
Topics Include:
•RMF for DoD IT crash course teaches you the in
depth information about Risk Management
Framework (RMF) for Department of Defense
(DoD) Information Technology (IT).
3
VISIT TONEX.COMhttps://www.tonex.com/training-courses/rmf-procedures-overview-dodi-8510-01/
Price: $1,699.00
Length: 2 Days
RISK MANAGEMENT FRAMEWORK TRAINING
RMF Procedures Overview , DoDI 8510.01
Topics Include:
•RMF Procedures Overview , DoDI 8510.01 training
establishes the Risk Management Framework (RMF)
for the Department of Defense (DoD) Information
Technology (IT) for cybersecurity policies,
responsibilities and risk management. RMF is a new
replacement to DoD Information Assurance
Certification and Accreditation Process (DIACAP)
and manages the cybersecurity life cycle for DoD IT
based on DoD, National Institute of Standards and
Technology (NIST) and Committee on National
Security Systems (CNSS) standards.
4
VISIT TONEX.COMhttps://www.tonex.com/training-courses/rmf-training-introduction-risk-management-
framework/
Price: $1,799.00
Length: 2 Days
RISK MANAGEMENT FRAMEWORK TRAINING
RMF Training
Introduction to Risk Management Framework
Topics Include:
•RMF Training, Introduction to Risk Management
Framework (RMF) offered by TONEX. Learn
about DoD Information Technology in-depth DoD
RMF basics. TONEX offers a series of Risk
Management Framework (RMF) for DoD
Information Technology in-depth DoD RMF basics.
5
VISIT TONEX.COMhttps://www.tonex.com/training-courses/rmf-training-risk-management-framework-
implementation/
Price: $2,499.00
Length: 3 Days
RISK MANAGEMENT FRAMEWORK TRAINING
RMF Training
Risk Management Framework Implementation
Topics Include:
•RMF Training, Risk Management Framework
Implementation training gives you a classified
approach and step by step procedure to implement
the RMF standard into your information system.
RMF can be applied through special publication
of National Institute of Standards and Technology
(NIST), NIST 800-37 to federal information systems.
6
Wireless Security Training
9 COURSES
VISIT TONEX.COMhttps://www.tonex.com/training-courses/5g-security-training/
Price: $4,999.00
Length: 5 Days
WIRELESS SECURITY TRAINING
5G Security Training
5G Wireless Security Training
Topics Include:
•TONEX 5G security training is an essential element
in the development of security policies and
technologies to protect 5G wireless networks from
hacking, cyber attacks and financial fraud.
1
VISIT TONEX.COMhttps://www.tonex.com/training-courses/certified-wireless-security-professional/
Price: $4,999.00
Course Number: 9071
Length: 5 Days
WIRELESS SECURITY TRAINING
Certified Wireless Security Professional Training
Topics Include:
•TONEX Boot Camps are intensive learning
experiences that cover the essential elements of
your chose subject. Boot camps are ideal for busy
professionals who want to stay current in their
fields but have limited time to be away from the
office.
2
VISIT TONEX.COMhttps://www.tonex.com/training-courses/gsm-gprs-security/
Price: $1,699.00
Course Number: 6031
Length: 2 Days
WIRELESS SECURITY TRAINING
GSM and GPRS Security
Topics Include:
•Having completed this course the participant will
be able to understand how security is implemented,
deployed and managed in GSM, GPRS and UMTS
networks, understand security concepts,
understand the benefits of new security techniques
applied and how they are implemented.
3
VISIT TONEX.COMhttps://www.tonex.com/training-courses/gsm-fraud-training/
Price: $3,999.00
Course Number: 6003
Length: 4 Days
WIRELESS SECURITY TRAINING
GSM Fraud Training
Topics Include:
•GSM Fraud (and Network Security) Training covers
the latest topics, sharpen your GSM fraud
prevention (GPRS, UMTS and LTE fraud is also
introduced) skills and learn new techniques led by
the profession’s leading GSM fraud practitioners.
4
VISIT TONEX.COMhttps://www.tonex.com/training-courses/hspa-lte-security/
Price: $2,199.00
Course Number: 6032
Length: 3 Days
College Credits: 15
WIRELESS SECURITY TRAINING
HSPA/HSPA+ and LTE Security Training
Topics Include:
•Having completed this course the participant will
be able to understand how security is implemented,
deployed and managed in GSM, EGPRS, UMTS,
HSPA/HSPA+ and LTE networks, understand security
concepts, understand the benefits of new security
techniques applied and how they are implemented.
5
HSPA/HSPA+
VISIT TONEX.COMhttps://www.tonex.com/training-courses/lte-security-training/
Price: $1,799.00
Length: 2 Days
WIRELESS SECURITY TRAINING
LTE Security Training
LTE and LTE-Advanced Security
Topics Include:
•LTE Security Training discusses how LTE/E-UTRAN
and EPC security substantially extends GSM,
3G/UMTS, and IMS security. LTE security training
also encompasses the E-UTRAN, EPC and IMS
security architectural.
6
VISIT TONEX.COMhttps://www.tonex.com/training-courses/wireless-ethical-hacking/
Price: $3,999.00
Course Number: 6503
Length: 4 Days
Continuing Education Credits: 26
WIRELESS SECURITY TRAINING
Wireless Ethical Hacking
Penetration Testing Crash Course
Topics Include:
•Overview of Wireless Systems
•Overview of GSM, GPRS/EDGE, UMTS,
HSPA/HSPA+, CDMA/CDMA2000,, WiMAX, WiFi,
802.1, Bluetooth/BLE, ZigBee, 802.15.4,
6LowPAN, LTE, LTE-Advanced, LTE-Advanced Pro,
and 5G
•Overview of TCP/IP
•Overview of Network and Computer Architecture
and Security Attacks
•Ethical Hacking and Penetration Testing
7
VISIT TONEX.COMhttps://www.tonex.com/training-courses/wireless-lan-security/
Price: $1,499.00
Course Number: 504
Length: 2 Days
WIRELESS SECURITY TRAINING
Wireless LAN Security Training
Topics Include:
•Wireless LANs Security Basics
•Why Is 802.11 Vulnerable to Attack?
•Risk Assessment
•Intermediate Security Measures
•Radio Transmission
•Inherent Insecurity
•802.11, 802.11a, 802.11b, 802.11g and 802.11n
•Ad Hoc vs. Infrastructure Mode
•Wired Equivalent Privacy (WEP)
•64-bit and 128-bit WEP encryption
8
VISIT TONEX.COMhttps://www.tonex.com/training-courses/wireless-security-training/
Price: $2,999.00
Course Number: 9072
Length: 3 Days
WIRELESS SECURITY TRAINING
Wireless Security Training
Topics Include:
•Wireless Network Architecture
•Overview of Security Technologies
•Wireless Security Fundamentals
•Wireless Security Techniques
•Wireless Security Exposed
•Wireless Security Strategies and Implementation
•Wireless Data Collection
•WiFi MAC Protocol Analysis
•Wireless Tools
•Wireless Information Analysis
•Concepts behind Crypto
9
VISIT TONEX.COM
Cybersecurity training, courses & Certification
https://www.tonex.com/cybersecurity-training/
Call Tonex Training Experts Today
+1-972-665-9786
List of cybersecurity training courses by Tonex

More Related Content

What's hot

Ceh v11 all you need to know-converted
Ceh v11   all you need to know-convertedCeh v11   all you need to know-converted
Ceh v11 all you need to know-convertedredteamacademypromo
 
Cyber Defence Intelligence (CDI)
Cyber Defence Intelligence  (CDI)Cyber Defence Intelligence  (CDI)
Cyber Defence Intelligence (CDI)FloydCarrasquillo
 
Science of Security: Cyber Ecosystem Attack Analysis Methodology
Science of Security: Cyber Ecosystem Attack Analysis MethodologyScience of Security: Cyber Ecosystem Attack Analysis Methodology
Science of Security: Cyber Ecosystem Attack Analysis MethodologyShawn Riley
 
Stopping Advanced Attacks on their Onset: A Practical Look at Modern Day Prev...
Stopping Advanced Attacks on their Onset: A Practical Look at Modern Day Prev...Stopping Advanced Attacks on their Onset: A Practical Look at Modern Day Prev...
Stopping Advanced Attacks on their Onset: A Practical Look at Modern Day Prev...IBM Security
 
The Library of Sparta
The Library of SpartaThe Library of Sparta
The Library of SpartaLancope, Inc.
 
EC-Council Cyber Security Training and Certifications
EC-Council Cyber Security Training and CertificationsEC-Council Cyber Security Training and Certifications
EC-Council Cyber Security Training and CertificationsITpreneurs
 
CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...
CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...
CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...TI Safe
 
Cyber_Services_2015_company_intro_ENG_v2p0
Cyber_Services_2015_company_intro_ENG_v2p0Cyber_Services_2015_company_intro_ENG_v2p0
Cyber_Services_2015_company_intro_ENG_v2p0Ferenc Fresz
 
Online MS in Cybersecurity at NYU
Online MS in Cybersecurity at NYUOnline MS in Cybersecurity at NYU
Online MS in Cybersecurity at NYUNYU Tandon Online
 
Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]
Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]
Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]Nancy Nimmegeers
 
Instructional Security Consultants
Instructional Security ConsultantsInstructional Security Consultants
Instructional Security Consultantsgoneblasting
 
2. Chapter introduction & update
2. Chapter introduction & update2. Chapter introduction & update
2. Chapter introduction & updateisc2-hellenic
 
Career in Cyber Security
Career in Cyber SecurityCareer in Cyber Security
Career in Cyber Securityhackersguru
 
Web applications: How Penetration Tests can improve your Risk Assessment
Web applications: How Penetration Tests can improve your Risk AssessmentWeb applications: How Penetration Tests can improve your Risk Assessment
Web applications: How Penetration Tests can improve your Risk AssessmentPECB
 
FireEye - Breaches are inevitable, but the outcome is not
FireEye - Breaches are inevitable, but the outcome is not FireEye - Breaches are inevitable, but the outcome is not
FireEye - Breaches are inevitable, but the outcome is not MarketingArrowECS_CZ
 
Improve Cybersecurity posture by using ISO/IEC 27032
Improve Cybersecurity posture by using ISO/IEC 27032Improve Cybersecurity posture by using ISO/IEC 27032
Improve Cybersecurity posture by using ISO/IEC 27032PECB
 
Get training in cyber security & place yourself in good companies through...
Get training in cyber security & place yourself in good companies through...Get training in cyber security & place yourself in good companies through...
Get training in cyber security & place yourself in good companies through...CCI Training Center
 

What's hot (20)

Ceh v11 all you need to know-converted
Ceh v11   all you need to know-convertedCeh v11   all you need to know-converted
Ceh v11 all you need to know-converted
 
Hiring for cybersecurity
Hiring for cybersecurityHiring for cybersecurity
Hiring for cybersecurity
 
Cyber Defence Intelligence (CDI)
Cyber Defence Intelligence  (CDI)Cyber Defence Intelligence  (CDI)
Cyber Defence Intelligence (CDI)
 
Science of Security: Cyber Ecosystem Attack Analysis Methodology
Science of Security: Cyber Ecosystem Attack Analysis MethodologyScience of Security: Cyber Ecosystem Attack Analysis Methodology
Science of Security: Cyber Ecosystem Attack Analysis Methodology
 
Stopping Advanced Attacks on their Onset: A Practical Look at Modern Day Prev...
Stopping Advanced Attacks on their Onset: A Practical Look at Modern Day Prev...Stopping Advanced Attacks on their Onset: A Practical Look at Modern Day Prev...
Stopping Advanced Attacks on their Onset: A Practical Look at Modern Day Prev...
 
The Library of Sparta
The Library of SpartaThe Library of Sparta
The Library of Sparta
 
ISA Toronto Chapter Presentation-March 2017
ISA Toronto  Chapter Presentation-March 2017ISA Toronto  Chapter Presentation-March 2017
ISA Toronto Chapter Presentation-March 2017
 
EC-Council Cyber Security Training and Certifications
EC-Council Cyber Security Training and CertificationsEC-Council Cyber Security Training and Certifications
EC-Council Cyber Security Training and Certifications
 
CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...
CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...
CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...
 
Cyber_Services_2015_company_intro_ENG_v2p0
Cyber_Services_2015_company_intro_ENG_v2p0Cyber_Services_2015_company_intro_ENG_v2p0
Cyber_Services_2015_company_intro_ENG_v2p0
 
Online MS in Cybersecurity at NYU
Online MS in Cybersecurity at NYUOnline MS in Cybersecurity at NYU
Online MS in Cybersecurity at NYU
 
Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]
Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]
Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]
 
Instructional Security Consultants
Instructional Security ConsultantsInstructional Security Consultants
Instructional Security Consultants
 
2. Chapter introduction & update
2. Chapter introduction & update2. Chapter introduction & update
2. Chapter introduction & update
 
Career in Cyber Security
Career in Cyber SecurityCareer in Cyber Security
Career in Cyber Security
 
Web applications: How Penetration Tests can improve your Risk Assessment
Web applications: How Penetration Tests can improve your Risk AssessmentWeb applications: How Penetration Tests can improve your Risk Assessment
Web applications: How Penetration Tests can improve your Risk Assessment
 
FireEye - Breaches are inevitable, but the outcome is not
FireEye - Breaches are inevitable, but the outcome is not FireEye - Breaches are inevitable, but the outcome is not
FireEye - Breaches are inevitable, but the outcome is not
 
SOC Analyst Course
SOC Analyst CourseSOC Analyst Course
SOC Analyst Course
 
Improve Cybersecurity posture by using ISO/IEC 27032
Improve Cybersecurity posture by using ISO/IEC 27032Improve Cybersecurity posture by using ISO/IEC 27032
Improve Cybersecurity posture by using ISO/IEC 27032
 
Get training in cyber security & place yourself in good companies through...
Get training in cyber security & place yourself in good companies through...Get training in cyber security & place yourself in good companies through...
Get training in cyber security & place yourself in good companies through...
 

Similar to List of cybersecurity training courses by Tonex

Cybersecurity Training Seminars, 44 Courses : Tonex Training
Cybersecurity Training Seminars, 44 Courses : Tonex TrainingCybersecurity Training Seminars, 44 Courses : Tonex Training
Cybersecurity Training Seminars, 44 Courses : Tonex TrainingBryan Len
 
5G Wireless Security Training : Tonex Training
5G Wireless Security Training : Tonex Training5G Wireless Security Training : Tonex Training
5G Wireless Security Training : Tonex TrainingBryan Len
 
Web Security Training
Web Security Training Web Security Training
Web Security Training Tonex
 
Most Advanced Cybersecurity, Network Security Training - Tonex Training
Most Advanced Cybersecurity, Network Security Training - Tonex TrainingMost Advanced Cybersecurity, Network Security Training - Tonex Training
Most Advanced Cybersecurity, Network Security Training - Tonex TrainingBryan Len
 
Tonex Cybersecurity Fundamentals, Cybersecurity Training and Certification
Tonex Cybersecurity Fundamentals, Cybersecurity Training and CertificationTonex Cybersecurity Fundamentals, Cybersecurity Training and Certification
Tonex Cybersecurity Fundamentals, Cybersecurity Training and CertificationBryan Len
 
How to Build a Winning Cybersecurity Team
How to Build a Winning Cybersecurity TeamHow to Build a Winning Cybersecurity Team
How to Build a Winning Cybersecurity TeamGlobal Knowledge Training
 
CISSP Certification Training Course
CISSP Certification Training CourseCISSP Certification Training Course
CISSP Certification Training CourseRicky Lionel Vaz
 
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...360 BSI
 
5G Security Training
5G Security Training5G Security Training
5G Security TrainingTonex
 
5G Security, 5G Wireless Security Training 2019
5G Security, 5G Wireless Security Training 20195G Security, 5G Wireless Security Training 2019
5G Security, 5G Wireless Security Training 2019Tonex
 
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...360 BSI
 
EC-Council Certified Network Defender
EC-Council Certified Network DefenderEC-Council Certified Network Defender
EC-Council Certified Network DefenderITpreneurs
 
IT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAE
IT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAEIT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAE
IT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAE360 BSI
 
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAECybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE360 BSI
 
IT Information Security Management Principles, 28 February - 02 March 2016 Du...
IT Information Security Management Principles, 28 February - 02 March 2016 Du...IT Information Security Management Principles, 28 February - 02 March 2016 Du...
IT Information Security Management Principles, 28 February - 02 March 2016 Du...360 BSI
 
Sec+ start guide #30001
Sec+ start guide #30001Sec+ start guide #30001
Sec+ start guide #30001kmperkins85
 
Information Technology Security Management
Information Technology Security ManagementInformation Technology Security Management
Information Technology Security ManagementMITSDEDistance
 
Lucideus Certified Cyber Security Analyst
Lucideus Certified Cyber Security Analyst Lucideus Certified Cyber Security Analyst
Lucideus Certified Cyber Security Analyst Lucideus Tech
 
IT Information Security Management Principles, 15 - 18 May 2016 Dubai UAE
IT Information Security Management Principles, 15 - 18 May 2016 Dubai UAEIT Information Security Management Principles, 15 - 18 May 2016 Dubai UAE
IT Information Security Management Principles, 15 - 18 May 2016 Dubai UAE360 BSI
 
IT Information Security Management Principles, 23 - 26 November 2015 Dubai UAE
IT Information Security Management Principles, 23 - 26 November 2015 Dubai UAEIT Information Security Management Principles, 23 - 26 November 2015 Dubai UAE
IT Information Security Management Principles, 23 - 26 November 2015 Dubai UAE360 BSI
 

Similar to List of cybersecurity training courses by Tonex (20)

Cybersecurity Training Seminars, 44 Courses : Tonex Training
Cybersecurity Training Seminars, 44 Courses : Tonex TrainingCybersecurity Training Seminars, 44 Courses : Tonex Training
Cybersecurity Training Seminars, 44 Courses : Tonex Training
 
5G Wireless Security Training : Tonex Training
5G Wireless Security Training : Tonex Training5G Wireless Security Training : Tonex Training
5G Wireless Security Training : Tonex Training
 
Web Security Training
Web Security Training Web Security Training
Web Security Training
 
Most Advanced Cybersecurity, Network Security Training - Tonex Training
Most Advanced Cybersecurity, Network Security Training - Tonex TrainingMost Advanced Cybersecurity, Network Security Training - Tonex Training
Most Advanced Cybersecurity, Network Security Training - Tonex Training
 
Tonex Cybersecurity Fundamentals, Cybersecurity Training and Certification
Tonex Cybersecurity Fundamentals, Cybersecurity Training and CertificationTonex Cybersecurity Fundamentals, Cybersecurity Training and Certification
Tonex Cybersecurity Fundamentals, Cybersecurity Training and Certification
 
How to Build a Winning Cybersecurity Team
How to Build a Winning Cybersecurity TeamHow to Build a Winning Cybersecurity Team
How to Build a Winning Cybersecurity Team
 
CISSP Certification Training Course
CISSP Certification Training CourseCISSP Certification Training Course
CISSP Certification Training Course
 
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
 
5G Security Training
5G Security Training5G Security Training
5G Security Training
 
5G Security, 5G Wireless Security Training 2019
5G Security, 5G Wireless Security Training 20195G Security, 5G Wireless Security Training 2019
5G Security, 5G Wireless Security Training 2019
 
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
 
EC-Council Certified Network Defender
EC-Council Certified Network DefenderEC-Council Certified Network Defender
EC-Council Certified Network Defender
 
IT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAE
IT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAEIT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAE
IT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAE
 
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAECybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
 
IT Information Security Management Principles, 28 February - 02 March 2016 Du...
IT Information Security Management Principles, 28 February - 02 March 2016 Du...IT Information Security Management Principles, 28 February - 02 March 2016 Du...
IT Information Security Management Principles, 28 February - 02 March 2016 Du...
 
Sec+ start guide #30001
Sec+ start guide #30001Sec+ start guide #30001
Sec+ start guide #30001
 
Information Technology Security Management
Information Technology Security ManagementInformation Technology Security Management
Information Technology Security Management
 
Lucideus Certified Cyber Security Analyst
Lucideus Certified Cyber Security Analyst Lucideus Certified Cyber Security Analyst
Lucideus Certified Cyber Security Analyst
 
IT Information Security Management Principles, 15 - 18 May 2016 Dubai UAE
IT Information Security Management Principles, 15 - 18 May 2016 Dubai UAEIT Information Security Management Principles, 15 - 18 May 2016 Dubai UAE
IT Information Security Management Principles, 15 - 18 May 2016 Dubai UAE
 
IT Information Security Management Principles, 23 - 26 November 2015 Dubai UAE
IT Information Security Management Principles, 23 - 26 November 2015 Dubai UAEIT Information Security Management Principles, 23 - 26 November 2015 Dubai UAE
IT Information Security Management Principles, 23 - 26 November 2015 Dubai UAE
 

More from Wesley Comal

Fogpod, Your Daily Essentials but Innovated
Fogpod, Your Daily Essentials but Innovated Fogpod, Your Daily Essentials but Innovated
Fogpod, Your Daily Essentials but Innovated Wesley Comal
 
Electronic Warfare Threat Modeling and Simulation
Electronic Warfare Threat Modeling and Simulation Electronic Warfare Threat Modeling and Simulation
Electronic Warfare Threat Modeling and Simulation Wesley Comal
 
Millimeter Wave Training - mmW
Millimeter Wave Training - mmWMillimeter Wave Training - mmW
Millimeter Wave Training - mmWWesley Comal
 
SysML Training - Systems Modeling Language Training
SysML Training - Systems Modeling Language TrainingSysML Training - Systems Modeling Language Training
SysML Training - Systems Modeling Language TrainingWesley Comal
 
Electronic Warfare
Electronic WarfareElectronic Warfare
Electronic WarfareWesley Comal
 
CQ Business Coach - Professional Business Coaching
CQ Business Coach - Professional Business CoachingCQ Business Coach - Professional Business Coaching
CQ Business Coach - Professional Business CoachingWesley Comal
 
Join Accelerole - Mobile First Talent Development
Join Accelerole - Mobile First Talent DevelopmentJoin Accelerole - Mobile First Talent Development
Join Accelerole - Mobile First Talent DevelopmentWesley Comal
 

More from Wesley Comal (7)

Fogpod, Your Daily Essentials but Innovated
Fogpod, Your Daily Essentials but Innovated Fogpod, Your Daily Essentials but Innovated
Fogpod, Your Daily Essentials but Innovated
 
Electronic Warfare Threat Modeling and Simulation
Electronic Warfare Threat Modeling and Simulation Electronic Warfare Threat Modeling and Simulation
Electronic Warfare Threat Modeling and Simulation
 
Millimeter Wave Training - mmW
Millimeter Wave Training - mmWMillimeter Wave Training - mmW
Millimeter Wave Training - mmW
 
SysML Training - Systems Modeling Language Training
SysML Training - Systems Modeling Language TrainingSysML Training - Systems Modeling Language Training
SysML Training - Systems Modeling Language Training
 
Electronic Warfare
Electronic WarfareElectronic Warfare
Electronic Warfare
 
CQ Business Coach - Professional Business Coaching
CQ Business Coach - Professional Business CoachingCQ Business Coach - Professional Business Coaching
CQ Business Coach - Professional Business Coaching
 
Join Accelerole - Mobile First Talent Development
Join Accelerole - Mobile First Talent DevelopmentJoin Accelerole - Mobile First Talent Development
Join Accelerole - Mobile First Talent Development
 

Recently uploaded

Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirtrahman018755
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)Damian Radcliffe
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girladitipandeya
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Delhi Call girls
 
Denver Web Design brochure for public viewing
Denver Web Design brochure for public viewingDenver Web Design brochure for public viewing
Denver Web Design brochure for public viewingbigorange77
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...aditipandeya
 
Russian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service ThaneRussian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service ThaneCall girls in Ahmedabad High profile
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts servicevipmodelshub1
 
Call Girls in East Of Kailash 9711199171 Delhi Enjoy Call Girls With Our Escorts
Call Girls in East Of Kailash 9711199171 Delhi Enjoy Call Girls With Our EscortsCall Girls in East Of Kailash 9711199171 Delhi Enjoy Call Girls With Our Escorts
Call Girls in East Of Kailash 9711199171 Delhi Enjoy Call Girls With Our Escortsindian call girls near you
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebJames Anderson
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...SofiyaSharma5
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607dollysharma2066
 

Recently uploaded (20)

Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
 
Denver Web Design brochure for public viewing
Denver Web Design brochure for public viewingDenver Web Design brochure for public viewing
Denver Web Design brochure for public viewing
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
 
Russian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service ThaneRussian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
 
Call Girls in East Of Kailash 9711199171 Delhi Enjoy Call Girls With Our Escorts
Call Girls in East Of Kailash 9711199171 Delhi Enjoy Call Girls With Our EscortsCall Girls in East Of Kailash 9711199171 Delhi Enjoy Call Girls With Our Escorts
Call Girls in East Of Kailash 9711199171 Delhi Enjoy Call Girls With Our Escorts
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girls
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
 

List of cybersecurity training courses by Tonex

  • 1. Cyber Security Training, Courses & Certifications Call Us Today: +1-972-665-9786 List of top cybersecurity training and courses
  • 2. Why Tonex ? Since 1993, Tonex has specialized in providing industry-leading training, courses, seminars, workshops, and consulting services across a wide range of topics to Fortune 500 companies, government organizations, universities and privately owned businesses from around the world. Visit our Clients Page for a complete list of Tonex customers. Who is TONEX for? Tonex is for any organization in need of leading edge technology training. That includes: Companies, from Fortune 500 to small businesses in all industries Government agencies Contractors and System Integrator Defense and Military Educational Institutes, Colleges and Universities What types of courses are offered? You name it, we provide it. Our courses are constantly updated to keep up with the latest technology, and we continuously monitor business trends and world events to provide the most relevant subject matter anywhere. VISIT TONEX.COMList of top cybersecurity training and courses
  • 3. Who Should Attend •IT professionals •Airforce and Military cybersecurity •DoD employees and contractors or service providers •All DoD personnel in charge of information assurance •Authorizing official representatives, chief information officers, senior information assurance officers, information system owners or certifying authorities •Employees of federal agencies and the intelligence community •Assessors, assessment team members, auditors, inspectors or program managers of information technology area •Any individual looking for information assurance implementation for a company based on recent DoD and NIST policies •Information system owners, information owners, business owners, and information system security managers VISIT TONEX.COMList of top cybersecurity training and courses
  • 4. CYBERSECURITY FOUNDATION 28 COURSES IOT SECURITY 1 COURSES RISK MANAGEMENT FRAMEWORK TRAINING 6 COURSES WIRELESS SECURITY TRAINING 9 COURSES
  • 5. CYBERSECURITY FOUNDATION 1. Cloud Security Training Crash Course - 3 days 2. Computer Network Architecture Training - 3 days 3. Critical Infrastructure Protection (CIP) NERC Training - 2 days 4. Cyber Security Applied to Embedded Systems - 2 days 5. Cyber Security Certificate- Part 1 Vulnerabilities and Risk Management - 5 days 6. Cyber Threat Simulation Training - 3 days 7. Cybersecurity Systems Engineering Training - 3 days 8. Cybersecurity Test and Evaluation (T&E) Training - 2 days 9. Disaster Recovery and Business Continuity Training - 2 days 10. Electric Grid Cyberseucrity Master Certification - 4 Weeks 11. Fundamentals of Malwares And Protection Against Malware Training - 2 days 12. Fundamentals of Threats And Risk Management Training - 2 days 13. Hardware Security Training By TONEX - 2 days 14. ICS Cybersecurity Training - 4 days 15. Industrial Control System and SCADA Cybersecurity Training - 3 days 16. Information Security and Risk Management Training - 2 days 17. Introduction to Cryptography - 2 days 18. Introduction to Cryptography Training - Level 1 - 2 days 19. Introduction to Hacking Training - 3 days 20. Introduction to Secure Software Engineering Training - 2 days 21. Linux Security Training Crash Course - 4 days 22. Network Security Training - 2 days 23. Smart Grid Cybersecurity Training - 3 days 24. Software Security Training - 2 days 25. Software Testing Training -2 days 26. Threat Simulation and Modeling Training - 2 days 27. Usable Security Fundamental Training - 2 days 28. Web Security Training - 2 days
  • 6. IOT SECURITY 1. IoT Security Training | IoT Security Awareness – 2 days
  • 7. RISK MANAGEMENT FRAMEWORK TRAINING 1. Cybersecurity Procedures Overview, DoDI 8500.01 - 2 days 2. Cybersecurity Test and Evaluation Workshop - 3 days 3. RMF for DoD IT Crash Course - 4 days 4. RMF Procedures Overview , DoDI 8510.01 - 2 days 5. RMF Training | Introduction to Risk Management Framework - 2 days 6. RMF Training, Risk Management Framework Implementation - 3 days
  • 8. WIRELESS SECURITY TRAINING 1. 5G Security Training | 5G Wireless Security Training - 5 days 2. Certified Wireless Security Professional Training - 5 days 3. GSM and GPRS Security - 2 days 4. GSM Fraud Training - 4 days 5. HSPA/HSPA+ and LTE Security Training - 3 days 6. LTE Security Training - LTE and LTE-Advanced Security - 2 days 7. Wireless Ethical Hacking | Penetration Testing Crash Course - 4 days 8. Wireless LAN Security Training - 2 days 9. Wireless Security Training - 3 days
  • 10. VISIT TONEX.COMhttps://www.tonex.com/training-courses/cloud-security-training/ Price: $2,999.00 Course Number: 6001 Length: 3 Days CYBERSECURITY FOUNDATION COURSE NAME Cloud Security Training Crash Course Topics Include: •Experienced instructors including senior technology leaders, project managers, technical authors, engineers, educators, consultants, course developers, and CTOs. •Real life examples and practices. •Small class size. •Personalized instructor mentoring. •Pre-training discussions •Ongoing post-training support via e-mail, phone and WebEx. 1
  • 11. VISIT TONEX.COMhttps://www.tonex.com/training-courses/computer-network-architecture-training/ Price: $2,199.00 Length: 3 Days CYBERSECURITY FOUNDATION COURSE NAME Computer Network Architecture Training Topics Include: •The basics of Ethernet and LAN, different Ethernet speeds, spanning tree algorithm, virtual LAN (VLAN), virtual private networks (VPN) and commonly used Wi-Fi which prepares you for technical details of network architecture. •The IPv4 and IPv6, the difference between them, importance of mobile IP, headers and subnets for IPv4 and IPv6. •The OSI reference model including its seven layers which is the most important topic in network 2
  • 12. VISIT TONEX.COMhttps://www.tonex.com/training-courses/critical-infrastructure-protection-cip-nerc-training/ Price: $1,699.00 Length: 2 Days CYBERSECURITY FOUNDATION COURSE NAME Critical Infrastructure Protection (CIP) NERC Training Topics Include: Critical Infrastructure Protection (CIP) NERC training course consists of the following lessons, which can be revised and tailored to the client’s need. 3
  • 13. VISIT TONEX.COMhttps://www.tonex.com/training-courses/cyber-security-applied-embedded-systems/ Price: $1,999.00 Length: 2 Days CYBERSECURITY FOUNDATION COURSE NAME Cyber Security Applied to Embedded Systems Topics Include: •What is Cybersecurity? •Basic principles of CIA •Confidentiality •Embedded system’s critical information •Application code and surveillance data •Unauthorized entities •Integrity •Availability and mission objectives •Cyber Risks applied to Embedded Systems •Principles and practices designed to safeguard your embedded system •Hacking tools and entry points and more… 4
  • 14. VISIT TONEX.COMhttps://www.tonex.com/training-courses/cyber-security-certificate-part-1-vulnerabilities- and-risk-management/ Price: $4,999.00 Length: 5 Days CYBERSECURITY FOUNDATION COURSE NAME Cyber Security Certificate - Part 1 Vulnerabilities and Risk Management Topics Include: The cyber security certificate- part 1, vulnerabilities and risk management training consists of the following lessons, which can be revised and tailored to the client’s need. 5
  • 15. VISIT TONEX.COMhttps://www.tonex.com/training-courses/cyber-threat-simulation-training/ Price: $3,999.00 Length: 3 Days CYBERSECURITY FOUNDATION COURSE NAME Cyber Threat Simulation Training Topics Include: •The concept of simulating •Providing a detailed postmortem of how an attacker overview of Cyber Threats •Fear Factors •Spectacular Factors •Vulnerability Factors •Professional Hackers to Cyber terrorists •Syntactic Cyber Attacks •Semantic Cyber Attacks •Viruses •Worms and more… 6
  • 16. VISIT TONEX.COMhttps://www.tonex.com/training-courses/cybersecurity-systems-engineering-training/ Price: $2,499.00 Length: 3 Days CYBERSECURITY FOUNDATION COURSE NAME Cybersecurity Systems Engineering Training Topics Include: •Definition of Cyber security •Information security principles •System engineering approaches for Cyber security •Cyber world •Cyber space •Cyber domain •Cyber ecosystem •Cyber culture •Cyber environment and more… 7
  • 17. VISIT TONEX.COMhttps://www.tonex.com/training-courses/cybersecurity-test-and-evaluation-te-training/ Price: $1,699.00 Length: 2 Days CYBERSECURITY FOUNDATION COURSE NAME Cybersecurity Test and Evaluation (T&E) Training Topics Include: •Information •ICT and Cybersecurity •Cyber Crime •Cyber Espionage •Cyber Warfare •National and Cybersecurity •Cyber Power and National Security •Governmental, National and International Cybersecurity and more… 8
  • 18. VISIT TONEX.COMhttps://www.tonex.com/training-courses/disaster-recovery-and-business-continuity-training/ Price: $1,699.00 Length: 2 Days CYBERSECURITY FOUNDATION COURSE NAME Disaster Recovery and Business Continuity Training Topics Include: •Terminologies •Types of disasters •What will disasters do to the system? •Establishing a need for disaster recovery •Operational disruption and disasters •Disaster recovery definition •Principles of disaster recovery and business •Activities regarding disaster recovery •Disaster recovery and business continuity program •and more… 9
  • 19. VISIT TONEX.COMhttps://www.tonex.com/training-courses/electric-grid-cyberseucrity-master-certification/ Price: $29,999.00 Length: 4 Weeks CYBERSECURITY FOUNDATION COURSE NAME Electric Grid Cyberseucrity Master Certification Topics Include: •Cybersecurity Principals •Cybersecurity Foundation Blocks •Cyber Security and the Electric Sector •Cyber Awareness Challenges for the Utility Communities •Power Grid and Cyber Attacks •Risks, threats, and vulnerabilities •Cryptography •Access Control •Mitigating the Risk of Cyber Attack on Power Grid Systems •Penetration Testing Methodologies 10
  • 20. VISIT TONEX.COMhttps://www.tonex.com/training-courses/fundamentals-of-malwares-and-protection-against- malware-training/ Price: $1,699.00 Length: 2 Days CYBERSECURITY FOUNDATION COURSE NAME Fundamentals of Malwares And Protection Against Malware Training Topics Include: •Definition of Computer security •Why computer security? •Privacy issues •Risk of attacks in network •Consequences of security violations •Computer security policies •Control laws in computer security •Legal status of privacy •Mobile code security •Firewalls and network security issues 11
  • 21. VISIT TONEX.COMhttps://www.tonex.com/training-courses/fundamentals-of-threats-and-risk-management- training/ Price: $1,699.00 Length: 2 Days CYBERSECURITY FOUNDATION COURSE NAME Fundamentals of Threats And Risk Management Training Topics Include: •Definition of Cyber security •Information security principles •System engineering approaches for Cyber security •Cyber world •Cyber space •Cyber domain •Cyber ecosystem •Cyber culture •Cyber environment •Cognitive layer of cyber world 12
  • 22. VISIT TONEX.COMhttps://www.tonex.com/training-courses/hardware-security-training-by-tonex/ Price: $1,699.00 Length: 2 Days CYBERSECURITY FOUNDATION COURSE NAME Hardware Security Training Topics Include: •History of hardware security •Smart cards prone to attacks •Radio Frequency Identification (RFID) •Microelectronic industry business model •Hardware threats •IP vendor •System integrator •Manufacture •Third IP design issue •Design process-new approach •Untrusted system integrator •More… 13
  • 23. VISIT TONEX.COMhttps://www.tonex.com/training-courses/ics-cybersecurity-training/ Price: $3,999.00 Length: 4 Days CYBERSECURITY FOUNDATION COURSE NAME ICS Cybersecurity Training Topics Include: •Evolution of Industrial Control Systems (ICS) •Global Industrial Cybersecurity Professional (GICSP) •ICS Industrial Sectors •ICS Operation and Components •ICS Design Consideration •Real-Time Operating Systems •Programming Controllers •SCADA Systems •Distributed Control System •More… 14
  • 24. VISIT TONEX.COMhttps://www.tonex.com/training-courses/industrial-control-system-scada-cybersecurity- training/ Price: $2,499.00 Length: 3 Days CYBERSECURITY FOUNDATION COURSE NAME Industrial Control System and SCADA Cybersecurity Training Topics Include: •Industrial Control Systems Overview •Global Industrial Cybersecurity Professional (GICSP) •Roles and Responsibilities of ICS •Real-time Operating Systems •Programmable Logic Controllers (PLC) •Distributed Control Systems (DCS) •Supervisory Control and Data Acquisition (SCADA) •Master Servers •Industrial Computing Applications and SCADA Systems •Communication Protocols •More… 15
  • 25. VISIT TONEX.COMhttps://www.tonex.com/training-courses/information-security-and-risk-management- training/ Price: $1,699.00 Length: 2 Days CYBERSECURITY FOUNDATION COURSE NAME Information Security and Risk Management Training Topics Include: •History of information security •Meaning of security •Quality of being secured •Layers of security •Physical security •Personal security •Operational security •Communication security •Network security •Information security •Availability of information •More… 16
  • 26. VISIT TONEX.COMhttps://www.tonex.com/training-courses/introduction-to-cryptography/ Price: $1,999.00 Length: 2 Days CYBERSECURITY FOUNDATION COURSE NAME Introduction to Cryptography Topics Include: Introduction to Cryptography introduces course participants to the field of cryptography. The attendees will learn the foundations of modern symmetric and key cryptography, cryptographic algorithms, protocols, stream and Block ciphering and other topics including: IPSec, SSL/TLS, OpenPGP, SSH, Kerberos Feistel Networks, DES, and AES, S, encryption modes of operation and principles of the public key algorithms. 17
  • 27. VISIT TONEX.COMhttps://www.tonex.com/training-courses/cryptography-training/ Price: $1,699.00 Length: 2 Days CYBERSECURITY FOUNDATION COURSE NAME Introduction to Cryptography Training – Level 1 Topics Include: •Information security and cryptography •Backgrounds and functions •Basic terminology and concepts •Symmetric key encryption •Digital signatures •Authentication and identification •Public key cryptography •Hash functions •Key establishment, management, and certification •Classes of attacks and security models 18
  • 28. VISIT TONEX.COMhttps://www.tonex.com/training-courses/introduction-to-hacking-training/ Price: $2,458.90 Length: 3 Days CYBERSECURITY FOUNDATION COURSE NAME Introduction to Hacking Training Topics Include: •Brief Overview of Information Security •Information Security Vulnerabilities and Attacks •Types of Attacks to the System •Definition of Hacking •Who Is Considered as a Hacker? •What Are Different Classes of Hacking? •What Are the Phases of Hacking? •Network Infrastructure Attack •Operating System Attack 19
  • 29. VISIT TONEX.COMhttps://www.tonex.com/training-courses/introduction-to-secure-software-engineering- training/ Price: $1,699.00 Length: 2 Days CYBERSECURITY FOUNDATION COURSE NAME Introduction to Secure Software Engineering Training Topics Include: •The history behind the software •System software •Computer software •Computer operating system •Graphical user interface (GUI) •Local area network software •Application software •Computer file formats •Software issues •Programming languages •Enterprise software 20
  • 30. VISIT TONEX.COMhttps://www.tonex.com/training-courses/linux-security-training-crash-course/ Price: $2,999.00 Length: 4 Days CYBERSECURITY FOUNDATION COURSE NAME Linux Security Training Crash Course Topics Include: •Linux Security Training Crash Course provides the participants with an in-depth coverage of Linux security and Unix security issues. 21
  • 31. VISIT TONEX.COMhttps://www.tonex.com/training-courses/network-security-training/ Price: $1,699.00 Length: 2 Days CYBERSECURITY FOUNDATION COURSE NAME Network Security Training Topics Include: •Network security training by TONEX introduces the importance of security in networks and helps you to understand the main components of a secured network. •Network security training helps you examine the security related issues in networks and provides you with necessary preparation to secure the networks from attacks and exploits. 22
  • 32. VISIT TONEX.COMhttps://www.tonex.com/training-courses/smart-grid-cybersecurity-training/ Price: $2,599.00 Length: 3 Days CYBERSECURITY FOUNDATION COURSE NAME Smart Grid Cybersecurity Training Topics Include: •Smart Grid Cybersecurity Training course will teach you the important aspects of cybersecurity in smart grids. The training consists of detailed information about smart power systems, recent technologies toward the smart grids, potential threats and vulnerabilities in smart grids and security assessment in smart grids in order to advance the knowledge of audience about the cybersecurity in smart grids. 23
  • 33. VISIT TONEX.COMhttps://www.tonex.com/training-courses/software-security-training/ Price: $1,699.00 Length: 2 Days CYBERSECURITY FOUNDATION COURSE NAME Software Security Training Topics Include: •Software Security Training course introduces you to a variety of topics in software security such as: secure programming techniques, trusted computing infrastructure, low level software attacks, wen security, risk management techniques, symbolic execution, and cloud/wireless/mobile device security. 24
  • 34. VISIT TONEX.COMhttps://www.tonex.com/training-courses/software-testing-training/ Price: $1,699.00 Length: 2 Days CYBERSECURITY FOUNDATION COURSE NAME Software Testing Training Topics Include: •Software testing training teaches you the advanced software testing and principles for today’s rigorous testing demand and provides you the powerful tool and technique to reduce software defects, improve the quality and enhance your business success. 25
  • 35. VISIT TONEX.COMhttps://www.tonex.com/training-courses/threat-simulation-and-modeling-training/ Price: $1,699.00 Length: 2 Days CYBERSECURITY FOUNDATION COURSE NAME Threat Simulation and Modeling Training Topics Include: •Threat simulation and modeling training teaches you the various types of threat modeling techniques and helps you to apply threat modeling as an advanced preventive form of security. TONEX as a leader in security industry for more than 15 years is now announcing the threat simulation and modeling training which helps you to recognize methodologies, tools and case studies of successful threat modeling technique. 26
  • 36. VISIT TONEX.COMhttps://www.tonex.com/training-courses/usable-security-fundamental-training/ Price: $1,699.00 Length: 2 Days CYBERSECURITY FOUNDATION COURSE NAME Usable Security Fundamental Training Topics Include: •The usable security fundamental training course introduces you to a variety of usability and user interface problems related to system privacy and security. Furthermore, it gives you the experience needed in design studies aimed to prevent usability issues in security and privacy systems. 27
  • 37. VISIT TONEX.COMhttps://www.tonex.com/training-courses/web-security/ Price: $1,699.00 Length: 2 Days CYBERSECURITY FOUNDATION COURSE NAME Web Security Training Topics Include: •The web security training teaches you the advanced web browsing vulnerabilities from system penetration to identity theft as well as protection solutions to ensure the web security. TONEX as a leader in security industry for more than 15 years is now announcing the web security training which helps you to secure the communication between a client and server as well as integrity of data in web. 28
  • 39. VISIT TONEX.COMhttps://www.tonex.com/training-courses/iot-security-training-iot-security-awareness/ Price: $1,899.00 Length: 2 Days IOT SECURITY IoT Security Training IoT Security Awareness Topics Include: •IoT Security Training covers The Internet of Things security and discusses IoT protocols, potential risks, vulnerabilities, exploitation, data breaches, security framework and mitigation. 1
  • 40. Risk Management Framework Training 6 COURSES
  • 41. VISIT TONEX.COMhttps://www.tonex.com/training-courses/cybersecurity-procedures-overview-dodi-8500-01/ Price: $1,699.00 Length: 2 Days RISK MANAGEMENT FRAMEWORK TRAINING Cybersecurity Procedures Overview DoDI 8500.01 Topics Include: •Cybersecurity Procedures Overview, DoDI 8500.01 training gives you a classified approach and step by step procedure to secure your information system based on DoD standard instructions. DoDI 8500.01 is a cybersecurity program to protect and defend DoD information and Information Technology (DoD IT) from prospective cybersecurity threats. 1
  • 42. VISIT TONEX.COMhttps://www.tonex.com/training-courses/cybersecurity-test-evaluation-workshop/ Price: $3,999.00 Length: 3 Days RISK MANAGEMENT FRAMEWORK TRAINING Cybersecurity Test and Evaluation Workshop Topics Include: •Cybersecurity Test and Evaluation workshop covers test and evaluation of many domains of business and warfighting aspects of Department of Defense (DoD) interconnected information technology (IT) systems. We discuss evaluation and testing of potential. 2
  • 43. VISIT TONEX.COMhttps://www.tonex.com/training-courses/rmf-for-dod-it-crash-course/ Price: $3,999.90 Length: 4 Days RISK MANAGEMENT FRAMEWORK TRAINING RMF for DoD IT Crash Course Topics Include: •RMF for DoD IT crash course teaches you the in depth information about Risk Management Framework (RMF) for Department of Defense (DoD) Information Technology (IT). 3
  • 44. VISIT TONEX.COMhttps://www.tonex.com/training-courses/rmf-procedures-overview-dodi-8510-01/ Price: $1,699.00 Length: 2 Days RISK MANAGEMENT FRAMEWORK TRAINING RMF Procedures Overview , DoDI 8510.01 Topics Include: •RMF Procedures Overview , DoDI 8510.01 training establishes the Risk Management Framework (RMF) for the Department of Defense (DoD) Information Technology (IT) for cybersecurity policies, responsibilities and risk management. RMF is a new replacement to DoD Information Assurance Certification and Accreditation Process (DIACAP) and manages the cybersecurity life cycle for DoD IT based on DoD, National Institute of Standards and Technology (NIST) and Committee on National Security Systems (CNSS) standards. 4
  • 45. VISIT TONEX.COMhttps://www.tonex.com/training-courses/rmf-training-introduction-risk-management- framework/ Price: $1,799.00 Length: 2 Days RISK MANAGEMENT FRAMEWORK TRAINING RMF Training Introduction to Risk Management Framework Topics Include: •RMF Training, Introduction to Risk Management Framework (RMF) offered by TONEX. Learn about DoD Information Technology in-depth DoD RMF basics. TONEX offers a series of Risk Management Framework (RMF) for DoD Information Technology in-depth DoD RMF basics. 5
  • 46. VISIT TONEX.COMhttps://www.tonex.com/training-courses/rmf-training-risk-management-framework- implementation/ Price: $2,499.00 Length: 3 Days RISK MANAGEMENT FRAMEWORK TRAINING RMF Training Risk Management Framework Implementation Topics Include: •RMF Training, Risk Management Framework Implementation training gives you a classified approach and step by step procedure to implement the RMF standard into your information system. RMF can be applied through special publication of National Institute of Standards and Technology (NIST), NIST 800-37 to federal information systems. 6
  • 48. VISIT TONEX.COMhttps://www.tonex.com/training-courses/5g-security-training/ Price: $4,999.00 Length: 5 Days WIRELESS SECURITY TRAINING 5G Security Training 5G Wireless Security Training Topics Include: •TONEX 5G security training is an essential element in the development of security policies and technologies to protect 5G wireless networks from hacking, cyber attacks and financial fraud. 1
  • 49. VISIT TONEX.COMhttps://www.tonex.com/training-courses/certified-wireless-security-professional/ Price: $4,999.00 Course Number: 9071 Length: 5 Days WIRELESS SECURITY TRAINING Certified Wireless Security Professional Training Topics Include: •TONEX Boot Camps are intensive learning experiences that cover the essential elements of your chose subject. Boot camps are ideal for busy professionals who want to stay current in their fields but have limited time to be away from the office. 2
  • 50. VISIT TONEX.COMhttps://www.tonex.com/training-courses/gsm-gprs-security/ Price: $1,699.00 Course Number: 6031 Length: 2 Days WIRELESS SECURITY TRAINING GSM and GPRS Security Topics Include: •Having completed this course the participant will be able to understand how security is implemented, deployed and managed in GSM, GPRS and UMTS networks, understand security concepts, understand the benefits of new security techniques applied and how they are implemented. 3
  • 51. VISIT TONEX.COMhttps://www.tonex.com/training-courses/gsm-fraud-training/ Price: $3,999.00 Course Number: 6003 Length: 4 Days WIRELESS SECURITY TRAINING GSM Fraud Training Topics Include: •GSM Fraud (and Network Security) Training covers the latest topics, sharpen your GSM fraud prevention (GPRS, UMTS and LTE fraud is also introduced) skills and learn new techniques led by the profession’s leading GSM fraud practitioners. 4
  • 52. VISIT TONEX.COMhttps://www.tonex.com/training-courses/hspa-lte-security/ Price: $2,199.00 Course Number: 6032 Length: 3 Days College Credits: 15 WIRELESS SECURITY TRAINING HSPA/HSPA+ and LTE Security Training Topics Include: •Having completed this course the participant will be able to understand how security is implemented, deployed and managed in GSM, EGPRS, UMTS, HSPA/HSPA+ and LTE networks, understand security concepts, understand the benefits of new security techniques applied and how they are implemented. 5 HSPA/HSPA+
  • 53. VISIT TONEX.COMhttps://www.tonex.com/training-courses/lte-security-training/ Price: $1,799.00 Length: 2 Days WIRELESS SECURITY TRAINING LTE Security Training LTE and LTE-Advanced Security Topics Include: •LTE Security Training discusses how LTE/E-UTRAN and EPC security substantially extends GSM, 3G/UMTS, and IMS security. LTE security training also encompasses the E-UTRAN, EPC and IMS security architectural. 6
  • 54. VISIT TONEX.COMhttps://www.tonex.com/training-courses/wireless-ethical-hacking/ Price: $3,999.00 Course Number: 6503 Length: 4 Days Continuing Education Credits: 26 WIRELESS SECURITY TRAINING Wireless Ethical Hacking Penetration Testing Crash Course Topics Include: •Overview of Wireless Systems •Overview of GSM, GPRS/EDGE, UMTS, HSPA/HSPA+, CDMA/CDMA2000,, WiMAX, WiFi, 802.1, Bluetooth/BLE, ZigBee, 802.15.4, 6LowPAN, LTE, LTE-Advanced, LTE-Advanced Pro, and 5G •Overview of TCP/IP •Overview of Network and Computer Architecture and Security Attacks •Ethical Hacking and Penetration Testing 7
  • 55. VISIT TONEX.COMhttps://www.tonex.com/training-courses/wireless-lan-security/ Price: $1,499.00 Course Number: 504 Length: 2 Days WIRELESS SECURITY TRAINING Wireless LAN Security Training Topics Include: •Wireless LANs Security Basics •Why Is 802.11 Vulnerable to Attack? •Risk Assessment •Intermediate Security Measures •Radio Transmission •Inherent Insecurity •802.11, 802.11a, 802.11b, 802.11g and 802.11n •Ad Hoc vs. Infrastructure Mode •Wired Equivalent Privacy (WEP) •64-bit and 128-bit WEP encryption 8
  • 56. VISIT TONEX.COMhttps://www.tonex.com/training-courses/wireless-security-training/ Price: $2,999.00 Course Number: 9072 Length: 3 Days WIRELESS SECURITY TRAINING Wireless Security Training Topics Include: •Wireless Network Architecture •Overview of Security Technologies •Wireless Security Fundamentals •Wireless Security Techniques •Wireless Security Exposed •Wireless Security Strategies and Implementation •Wireless Data Collection •WiFi MAC Protocol Analysis •Wireless Tools •Wireless Information Analysis •Concepts behind Crypto 9
  • 57.
  • 58. VISIT TONEX.COM Cybersecurity training, courses & Certification https://www.tonex.com/cybersecurity-training/ Call Tonex Training Experts Today +1-972-665-9786