• Request Info

Network Security Training Partners

Core Secured Training Partners

Core Secured Training Partners utilize Core Security solutions within their security intelligence, vulnerability management, and penetration testing training curricula.

 

InfoSec Institute

http://www.infosecinstitute.com

InfoSec Institute was founded in 1998 by a group of information security instructors that desired to build a business by offering the best possible training experience for students. InfoSec Institute has trained over 10,000 individuals on everything from industry standard certifications as the CISSP to highly technical customized Windows Kernel Reverse Engineering courses.

Unlike other training companies that have been founded by non-technical business persons, InfoSec Institute deeply understands the needs of today's IT professionals and is best positioned to offer world class training. Our wide range of security-specific classes help a diverse group of customers get the training they deserve. Our satisfied customers include the CIA, NSA, FBI, US Army, Microsoft, HP, Verizon, Sprint, AT&T and many others.

 

ARAMA TECH

www.aramatech.com

ARAMA TECH provides advisory, assessments and implementation of GRC processes and Information Security Management processes based on Industry's standards, Best Practices and frameworks such as CobiT5, ISO 27002 and PCI. The ARAMA TECH approach ensures the most effective way of bringing back the value of GRC and Information Security Management and supporting solutions to organizations! ARAMA TECH offers full end-to-end implementation services which includes but is not limited to
designing strategy.

 

Axxum Technologies

http://www.axxumtech.com

Axxum Technologies is a leading provider of managed security services to the Federal Government. Leveraging their deep and diverse experience, Axxum Technologies provides top notch solutions in the area of security engineering, vulnerability assessment, penetration testing, IV&V and information assurance. Axxum Technologies' skilled professionals are intimate in the development and deployment of advanced cybersecurity solutions and bleeding edge capabilities which are paramount in helping maintain the secure posture necessary for survival in today's cyber battlefield.

 

Forward Discovery

An information security training and e-forensics company with offices in Washington DC, Texas, North Carolina and Delaware, Forward Discovery consists of highly qualified experts who possess industry certifications, advanced degrees and real world experience. Forward Discovery is a Core Security partner for penetration testing training, incident response training and digital investigation in the United States and abroad.

 

The Hacker Academy

http://www.thehackeracademy.com/

The Hacker Academy specializes in information security training and produces the best courses that closely fit real time security issues and assures that all aspects of their classes are of the highest quality. With its headquarters in Chicago, Illinois, The Hacker Academy offers classes at locations across the country and on-site.  At The Hacker Academy, instructors have extensive experience as consultants, authors and practitioners.  The Hacker Academy has been featured live on CNBC and have been covered by many media outlets including cbsnews.com, the Christian Science Monitor, AOL and others.  Client list includes the likes of NASA, Social Security Administration, Google, and the Department of Defense.

 

IT Security Experts

http://www.itse.co.uk/

Founded over a decade ago, ITSE have a wealth of IT Security Experience and knowledge assisting Enterprise Organisations enhance their security posture.

This knowledge, commitment to customers and experience has been proven time and time again by customers engaging ITSE as their Trusted Security Advisors Based on our expertise and ability, we specialise in best of breed solutions and are proud to be a Core Security Partner for the UK

Founded over a decade ago, ITSE have a wealth of IT Security Experience and knowledge assisting Enterprise Organisations enhance their security posture.

This knowledge, commitment to customers and experience has been proven time and time again by customers engaging ITSE as their Trusted Security Advisors Based on our expertise and ability, we specialise in best of breed solutions and are proud to be a Core Security Partner for the UK

Founded over a decade ago, ITSE have a wealth of IT security experience and knowledge assisting enterprise organisations enhance their security posture.

This knowledge, commitment to customers and experience have been proven time and time again by customers engaging ITSE as their Trusted Security Advisors. Based on our expertise and ability, we specialise in best of breed solutions and are proud to be a Core Security Partner for the UK.

Founded over a decade ago, ITSE have a wealth of IT Security Experience and knowledge assisting Enterprise Organisations enhance their security posture.

This knowledge, commitment to customers and experience has been proven time and time again by customers engaging ITSE as their Trusted Security Advisors Based on our expertise and ability, we specialise in best of breed solutions and are proud to be a Core Security Partner for the UK

 

The International Council of Electronic Commerce Consultants 

http://www.eccouncil.org

The International Council of Electronic Commerce Consultants (EC-Council®) is a member-driven international organization of academicians, industry practitioners and professionals from the e-Business domain. Members include practitioners from all levels of various fields and in a broad range of industries. These include specialized areas such as academics and education, information technology, healthcare, manufacturing, financial, communications and government.

EC-Council provides professional certification and facilitates peer interaction to build and enhance the knowledge, skill and professional growth of its members. EC-Council offers several options for aspiring and practicing electronic commerce professionals to internalize and draw on skills identified as essential web industry standard for electronic commerce.

 

iVOLUTION Technologies 

iVOLUTION Security Technologies develops strategic and tactical security solutions that help organizations to develop a proactive process for securing their network infrastructures and information assets world wide. iVOUTION is a leading security technology solution provider with world-class security consulting services, including penetration testing, assessment, security auditing and training that ties directly to it´s operational practices. With operations in Canada, the United States and United Kingdom iVOLUTION Security is uniquely suited to understand the diverse requirements of its clients.

 

Lares Consulting

http://www.lares.com/

The Lares team is comprised of an extensively trained and highly experienced information security professionals who are dedicated to providing a comprehensive approach to organizational information security. Our approach allows our clients to make informed decisions about their information security programs and effectively "secure what matters most".

To stay ahead of the curve of threats and provide the highest level of service to our customers, all Lares engineers are required to meet baseline standards of performing work in the information security field for more than 8 years before joining the team. In addition, all members of the staff hold active CISSP certifications as well as many other IT security certifications.

 

Mile2

http://www.mile2.com

Mile2's distinction over the competition is that our instructors immerse themselves deeply into their specialty. As such, they are able to bring about exciting laboratory exercises and real life examples into the classroom resulting in a fulfilling learning experience for our students. Mile2's instructor capabilities are derived not merely from the expected academic qualifications, but more importantly from impressive hands-on, real-world experience.

New threats arise every day, and you can assume with certainty that your information assets are at risk. Allow Mile2 to train your staff on how to secure your network and mount counter offensives. We can also train your staff to identify and secure the evidence necessary to prosecute the perpetrators, a favorable outcome of which will act as a deterrent to others with malicious and criminal intent.

 

Security University

http://www.securityuniversity.net

Security University's goal is to "help raise the level of computer security and information assurance in your company" by providing hands-on computer security training for executives, network professionals, system administrators, security administrators and consultants.

Security University is the leading provider of hands-on computer security and information assurance training for IT professionals. Security University is the first computer security training company to provide IT professionals a complete hands-on computer security curriculum for the creation of secure infrastructures. Each class provides SU escalating security workshops and hands-on technical labs that teach how to plan, implement, build and maintain security and compliance to reduce risk.

 

Training Camp

http://www.trainingcamp.com

Training Camp is the recognized leader in providing accelerated learning courses that offer information technology and business professionals rapid skills transfer and accelerated time to competency. Training Camp's programs cover the most in-demand vendor and vendor-neutral certifications for information technology, management, sales and customer service. Training Camp, founded in 1999, is a privately held company headquartered in Philadelphia, PA.

 

TrueSec

http://www.TrueSec.com

TrueSec is a cutting edge company in the IT-security and infrastructure field and Sweden's leading consulting/training company. We have elite IT-security and infrastructure knowledge, which allows us to offer the highest quality consulting and training solutions available on the market today. Our employees are not only instructors they are also active consultants, many of them are Microsoft MVP (Most Valuable Professional). We each have our own field of expertise, together we have a broad and deep understanding of the different components that make up today's heterogeneous IT-environment, which is necessary when guiding customers toward a secure IT-infrastructure.

 

Next Steps

Request Info

SHARE