Wintrac, Inc.

Badri Sukumar

Wintrac delivers private instructor-led onsite and online training across the United States and many countries worldwide. Wintrac offers over two thousand technology and soft skill classes that can be customized for your needs.These courses can be delivered onsite or online with a live instructor for any group size. We can offer private online classes in many of these technologies even for one or two students. You never have to worry about a class being cancelled or attending a public class that does not meet your needs.

Offerings

Showing 76-100 of 1693 results
  • COURSES: SCP Level Two - PKI & Biometrics

    PKI and Biometrics Implementation is a combination of instructor-led lecture, in-class discussions, and hands-on lab exercises. There are six domains covered in the course, covering issues such as: PKI Solutions File Encryption Solutions Deploying a Certificate Server Secure E-Mail Implementation This course is intended for network administrators, network security administrators, firewall and server administrators, IT managers, and candidates interested in advancing their SCNP credential to the SCNA certification. For other Security courses please visit http://wintrac.com/courses/coursesSecurity.asp
  • COURSES: SCP Level Two - PKI Concepts & Planning

    PKI Concepts and Planning is a combination of instructor-led lecture, in-class discussions, and hands-on lab exercises. There are six domains covered in the course, covering issues such as: Cryptography Fundamentals Digital Signatures Biometric Fundamentals PKI Fundamentals This course is intended for network administrators, network security administrators, firewall and server administrators, IT managers, and candidates interested in advancing their SCNP credential to the SCNA certification. For other Security courses please visit http://wintrac.com/courses/coursesSecurity.asp
  • COURSES: SCP Level One - Network Defense & Countermeasures

    Network Defense and Countermeasures is an instructor-led 5-day classroom delivery with structured and hands-on activities. It is the second course in the first level of the Security Certified Program, focusing on the student's understanding of the architecture for network defense. The course is designed for the student who is a network administrator responsible for maintaining a wide range of networking technologies. For other Security courses please visit http://wintrac.com/courses/coursesSecurity.asp
  • COURSES: SCP Level One - Network Security Fundamentals

    This course is designed to provide network administrators responsible for maintaining a wide range of network technologies with an awareness of security-related issues and the essential skills they need to implement security in a given network. This instructor-led 5-day classroom delivery with structured hands-on activities is the first course in Level One of the Security Certified Program. After completion of this course, students wishing to complete Level One should take the Network Defense and Countermeasures course Students learn to work with various protocols, and create security across different platforms in router-based networks. Covers several of the techniques commonly used by network attackers and countermeasures to guard against them. For other Security courses please visit http://wintrac.com/courses/coursesSecurity.asp
  • COURSES: Linux Network Security

    This extremely popular class focuses on network security, and makes an excellent companion class to the GL550: Host Security course. Protocols used in Linux, UNIX, and Windows are examined. After a detailed discussion of the TCP/IP suite component protocols and Ethernet operation, the student practices using various tools to capture, analyze, and generate IP traffic. Students then explore the tools and techniques used to exploit protocol weaknesses and perform more advanced network attacks. After building a thorough understanding of network based attacks, course focus shifts to the defensive solutions available. Students install, configure, and test one of the most popular and powerful NIDS solutions available. For other Security courses please visit http://wintrac.com/courses/coursesSecurity.asp
  • COURSES: Security Fundamentals

    Security is one of the key issues facing governmental, business and academic organizations today. The combined threats from hacking, international cyber terrorism and lax security pose a real risk to business and government alike. This one-day course will help employees at all levels of an organization to understand the importance of data security, recognize security risks and the measures taken to counter them, and apply best practices to their own activities. For other Security courses please visit http://wintrac.com/courses/coursesSecurity.asp
  • COURSES: Network Security Fundamentals

    Network Security Fundamentals is designed to provide Network Administrators with an awareness of security-related issues and the essential skills they need to implement security in a given network. This course is the first course offered in Level One: Defense of the Security Certified Program. For other Security courses please visit http://wintrac.com/courses/coursesSecurity.asp
  • COURSES: Network Defense And Countermeasures

    Network Defense and Countermeasures is the second course in the first level of the Security Certified Program. This course focuses on students' understanding of the architecture for network defense. For other Security courses please visit http://wintrac.com/courses/coursesSecurity.asp
  • COURSES: Hardening the Infrastructure

    Hardening the Infrastructure is designed to provide Network Administrators with an awareness of security-related issues and the essential skills they need to implement security in a given network. It is the first course offered in the first level of the Security Certified Program. For other Security courses please visit http://wintrac.com/courses/coursesSecurity.asp
  • COURSES: Network Defense and Countermeasures (Second Edition)

    Network Defense and Countermeasures (Second Edition) is designed to provide network administrators with an awareness of security-related issues and the essential skills they need to implement security in a given network. This is the second course of the Security Certified Program's level one certification track (the SCNP), and focuses primarily on defensive network technologies, such as firewalls and intrusion detection systems. For other Security courses please visit http://wintrac.com/courses/coursesSecurity.asp
  • COURSES: Advanced Security Implementation

    This course is designed to provide the foundation knowledge to network administrators and security professionals who are seeking to learn about advanced security issues surrounding PKI and biometrics. Advanced Security Implementation is designed to provide network administrators and security architects with an awareness of security-related issues and the essential skills they need to implement security in a given network. It is the first course offered in the second level of the Security Certified Program. This course is followed by Enterprise Security Solutions (ESS). For other Security courses please visit http://wintrac.com/courses/coursesSecurity.asp
  • COURSES: Enterprise Security Solutions

    Enterprise Security Solutions is designed to provide network administrators and security architects with an awareness of security-related issues and the essential skills they need to implement security in a given network. It is the second course offered in the second level of the Security Certified Program. This course is preceded by Advanced Security Implementation (ASI). For other Security courses please visit http://wintrac.com/courses/coursesSecurity.asp
  • COURSES: Certified Information Systems Security Professional (CISSP)

    Welcome to Certified Information Systems Security Professional (CISSP)®. With your completion of the prerequisites and necessary years of experience, you are firmly grounded in the knowledge requirements of today’s security professional. This course will expand upon your knowledge by addressing the essential elements of the 10 domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process, while providing the basic skills required to prepare for CISSP certification. For other Security courses please visit http://wintrac.com/courses/coursesSecurity.asp
  • COURSES: Computer Hacking Forensic Investigator

    The CHFI course will give participants the necessary skills to identify an intruder's footprints and to properly gather the necessary evidence to prosecute. Many of today's top tools of the forensic trade will be taught during this course, including software, hardware and specialized techniques. The need for businesses to become more efficient and integrated with one another, as well as the home user, has given way to a new type of criminal, the "cyber-criminal." It is no longer a matter of "will your organization be comprised (hacked)?" but, rather, "when?" Today's battles between corporations, governments, and countries are no longer fought only in the typical arenas of boardrooms or battlefields using physical force. Now the battlefield starts in the technical realm, which ties into most every facet of modern day life. For other Security courses please visit http://wintrac.com/courses/coursesSecurity.asp
  • COURSES: Security 5 : Security Fundamentals v1.0

    Any computer user needs to know how to protect information assets and securely connect to another system over a network. Security5 certification utilizes the working knowledge a computer user possesses to achieve better efficiency in using computing resources. The certification is targeted towards today?s knowledge workers who use computing resources in their daily activities. It educates them on practical aspects of security and networking to give them an advantage over common users. For other Security courses please visit http://wintrac.com/courses/coursesSecurity.asp
  • COURSES: EC Council Security Analyst (ECSA)

    Any computer user needs to know how to protect information assets and securely connect to another system over a network. Security5 certification utilizes the working knowledge a computer user possesses to achieve better efficiency in using computing resources. The certification is targeted towards today?s knowledge workers who use computing resources in their daily activities. It educates them on practical aspects of security and networking to give them an advantage over common users. For other Security courses please visit http://wintrac.com/courses/coursesSecurity.asp
  • COURSES: Ethical Hacking and Countermeasures 5.0 (CEH)

    You might find yourself asking, why choose this course, when there are several out there. The truth is that there cannot be any single course that can address all the issues in a detailed manner. Moreover, the rate at which exploits/tools/methods are being discovered by the security community makes it difficult for anybody to cover all of this information in one course. However, this doesn’t mean that the course is inadequate in any way. For other Security courses please visit http://wintrac.com/courses/coursesSecurity.asp
  • COURSES: EC Council Ethical Hacking and Countermeasures 5.0 (CEH)

    You might find yourself asking, why choose this course, when there are several out there. The truth is that there cannot be any single course that can address all the issues in a detailed manner. Moreover, the rate at which exploits/tools/methods are being discovered by the security community makes it difficult for anybody to cover all of this information in one course. However, this doesn’t mean that the course is inadequate in any way. For other Security courses please visit http://wintrac.com/courses/coursesSecurity.asp
  • COURSES: Tactical Perimeter Defense

    This course is the official courseware for the Security Certified Program SC0-451 certification exam. The Tactical Perimeter Defense course is designed to provide network administrators and certification candidates with hands-on tasks on the most fundamental perimeter security technologies. The network perimeter is often the first line of defense in an organization’s network, and this course covers the issues every administrator must be familiar with. For other Security courses please visit http://wintrac.com/courses/coursesSecurity.asp
  • COURSES: Strategic Infrastructure Security

    This course is the official courseware for the Security Certified Program SC0-471 certification exam. The Strategic Infrastructure Security (SIS) course is designed to follow the hands-on skills utilized in the Tactical Perimeter Defense (TPD) course. The SIS course continues with hardening of strategic elements of your infrastructure, such as your Windows and Linux servers, and goes into detail on one of the most critical areas to understand in security, Cryptography. For other Security courses please visit http://wintrac.com/courses/coursesSecurity.asp
  • COURSES: Certified Network Defense Architect 5.0

    This class will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When a student leaves this intensive 5 day class, they will have hands on understanding and experience in Ethical Hacking. This course prepares you for EC-Council CNDA exam 312-99. For other Security courses please visit http://wintrac.com/courses/coursesSecurity.asp
  • COURSES: Certified Network Defense Architect 5.0

    This class will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When a student leaves this intensive 5 day class, they will have hands on understanding and experience in Ethical Hacking. This course prepares you for EC-Council CNDA exam 312-99. For other Security courses please visit http://wintrac.com/courses/coursesSecurity.asp
  • COURSES: Computer Hacking Forensic Investigator v3

    The CHFI course will give participants the necessary skills to identify an intruder's footprints and to properly gather the necessary evidence to prosecute. Many of today's top tools of the forensic trade will be taught during this course, including software, hardware and specialized techniques. The need for businesses to become more efficient and integrated with one another, as well as the home user, has given way to a new type of criminal, the "cyber-criminal." It is no longer a matter of "will your organization be comprised (hacked)?" but, rather, "when?" Today's battles between corporations, governments, and countries are no longer fought only in the typical arenas of boardrooms or battlefields using physical force. For other Security courses please visit http://wintrac.com/courses/coursesSecurity.asp
  • COURSES: CISSP AND CISSO COMBINATION

    The CISSP/CISSO is a premier security certification and one of the most difficult certifications to achieve, making training an important part of exam preparation. This 5-day course is designed to ensure a solid understanding of the popular 10 Security Domains areas of the Common Body of Knowledge (CBK). Students will learn about security policy development, secure software development procedures, network vulnerabilities, attack types and corresponding countermeasures, cryptography concepts and their uses, disaster recovery plans and procedures, risk analysis, crucial laws and regulations, forensics basics, computer crime investigation procedures, and physical security. Mile2's “in-depth” course focuses on the preparation of passing both mile2's CISSO and ISC2's CISSP exam. Upon completion, the student will be fully prepared to take and successfully pass the CISSP/CISSO exam. For other Security courses please visit http://wintrac.com/courses/coursesSecurity.asp
  • COURSES: CERTIFIED DIGITAL FORENSIC EXAMINER

    Computer Forensics was developed by U.S. federal law enforcement agents during the mid to late 1980s to meet the challenges of white-collar crimes being committed with the assistance of a PC. By 1985 enforcement agents were being trained in the automated environment and by 1989 software and protocols were beginning to emerge in the discipline. The Certified Digital Forensics Examiner program is designed to train Cyber Crime Investigators whereby students are taught electronic discovery and advanced investigation techniques. For other Security courses please visit http://wintrac.com/courses/coursesSecurity.asp

Vendor Details

16523 S.W. McGwire Ct.
Beaverton, OR 97007
US
503.259.0312

Request More Info