Ending Soon: $350 Off SANS OnDemand and vLive Training

Training Courses

Training Courses

Experience private cyber training courses at your government location. SIC is offering the same SANS computer security training courses that have been developed by industry leaders in numerous fields including network security, software security, forensics, security leadership, audit, and legal.

Security
Course Certification Days
SEC440: Critical Security Controls: Planning, Implementing, and Auditing 2
SEC524: Cloud Security Fundamentals 2
SEC580: Metasploit Kung Fu for Enterprise Pen Testing 2
SEC546: IPv6 Essentials 2
SEC455: SIEM Design & Implementation 2
SEC564: Red Team Operations and Threat Emulation 2
SEC567: Social Engineering for Penetration Testers 2
SEC480: Top 4 Mitigation Strategies: Implementing & Auditing 3
SEC579: Virtualization and Software-Defined Security 5
SEC566: Implementing and Auditing the Critical Security Controls - In-Depth GCCC 5
SEC301: Intro to Information Security GISF 5
SEC201: Computing & Technology Essentials 5
SEC545: Cloud Security Architecture and Operations 5
SEC550: Active Defense, Offensive Countermeasures and Cyber Deception 5
SEC401: Security Essentials Bootcamp Style GSEC 6
SEC504: Hacker Tools, Techniques, Exploits, and Incident Handling GCIH 6
SEC560: Network Penetration Testing and Ethical Hacking GPEN 6
SEC542: Web App Penetration Testing and Ethical Hacking GWAPT 6
SEC503: Intrusion Detection In-Depth GCIA 6
SEC660: Advanced Penetration Testing, Exploit Writing, and Ethical Hacking GXPN 6
SEC505: Securing Windows and PowerShell Automation GCWN 6
SEC501: Advanced Security Essentials - Enterprise Defender GCED 6
SEC617: Wireless Penetration Testing and Ethical Hacking GAWN 6
SEC575: Mobile Device Security and Ethical Hacking GMOB 6
SEC506: Securing Linux/Unix GCUX 6
SEC642: Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques 6
SEC460: Enterprise Threat and Vulnerability Assessment 6
SEC487: Open-Source Intelligence Gathering and Analysis 6
SEC511: Continuous Monitoring and Security Operations GMON 6
SEC530: Defensible Security Architecture 6
SEC555: SIEM with Tactical Analytics GCDA 6
SEC561: Immersive Hands-on Hacking Techniques 6
SEC562: CyberCity Hands-on Kinetic Cyber Range Exercise 6
SEC573: Automating Information Security with Python GPYC 6
SEC599: Defeating Advanced Adversaries - Implementing Kill Chain Defenses 6
SEC760: Advanced Exploit Development for Penetration Testers 6