Ending Soon! Get an iPad Air with Smart Keyboard, or Surface Go, or $300 Off with Online Training through Aug 21!

Training Courses

Training Courses

Experience private cyber training courses at your government location. SIC is offering the same SANS computer security training courses that have been developed by industry leaders in numerous fields including network security, software security, forensics, security leadership, audit, and legal.

Security
Course Certification Course Demo
SEC301: Introduction to Cyber Security GISF 5
SEC401: Security Essentials Bootcamp Style GSEC 6
SEC402: Cybersecurity Writing: Hack the Reader 2
SEC440: Critical Security Controls: Planning, Implementing, and Auditing 2
SEC450: Blue Team Fundamentals: Security Operations and Analysis 6
SEC455: SIEM Design & Implementation 2
SEC460: Enterprise Threat and Vulnerability Assessment 6
SEC487: Open-Source Intelligence (OSINT) Gathering and Analysis 6
SEC501: Advanced Security Essentials - Enterprise Defender GCED 6
SEC503: Intrusion Detection In-Depth GCIA 6
SEC504: Hacker Tools, Techniques, Exploits, and Incident Handling GCIH 6
SEC505: Securing Windows and PowerShell Automation GCWN 6
SEC506: Securing Linux/Unix GCUX 6
SEC511: Continuous Monitoring and Security Operations GMON 6
SEC524: Cloud Security and Risk Fundamentals 2
SEC530: Defensible Security Architecture and Engineering GDSA 6
SEC534: Secure DevOps: A Practical Introduction 2
SEC540: Cloud Security and DevOps Automation 5
SEC542: Web App Penetration Testing and Ethical Hacking GWAPT 6
SEC545: Cloud Security Architecture and Operations 5
SEC546: IPv6 Essentials 2
SEC550: Active Defense, Offensive Countermeasures and Cyber Deception 5
SEC555: SIEM with Tactical Analytics GCDA 6
SEC560: Network Penetration Testing and Ethical Hacking GPEN 6
SEC562: CyberCity Hands-on Kinetic Cyber Range Exercise 6
SEC564: Red Team Exercises and Adversary Emulation 2
SEC566: Implementing and Auditing the Critical Security Controls - In-Depth GCCC 5
SEC567: Social Engineering for Penetration Testers 2
SEC573: Automating Information Security with Python GPYC 6
SEC575: Mobile Device Security and Ethical Hacking GMOB 6
SEC580: Metasploit Kung Fu for Enterprise Pen Testing 2
SEC599: Defeating Advanced Adversaries - Purple Team Tactics & Kill Chain Defenses GDAT 6
SEC617: Wireless Penetration Testing and Ethical Hacking GAWN 6
SEC642: Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques 6
SEC660: Advanced Penetration Testing, Exploit Writing, and Ethical Hacking GXPN 6
SEC760: Advanced Exploit Development for Penetration Testers 6