SpectroTech

Security Courses

Security Courses

Browse the range of security courses below and click on a course of interest to learn more about each of our Aruba security courses, CWNP security courses or EC-Council security courses. When you’re ready to take the next step in your information technology security or cybersecurity career contact SpectroTech online or call 1300 WiFi 000, that’s 1300 9434 000 to reserve your seat in an upcoming class.

Click here to view our current Training schedule.

Aruba Security Courses:

 

ClearPass Essentials (CPE)

The Aruba ClearPass Essentials (CPE) course prepares attendees with the foundation skills and knowledge in Network Access Control using the ClearPass product portfolio. The 5-day Instructor Led Training (ILT) provides classroom based, interactive learning with modules and labs designed to teach attendees the major features of the product portfolio. Attendees will learn how to setup ClearPass as a AAA server and configure the Policy Manager, Guest, OnGuard and OnBoard feature sets. The CPE class also covers integration with external Active Directory (AD) servers, Monitoring and Reporting, as well as best practices.

 

Aruba Advanced ClearPass Troubleshooting and Solutions

The Aruba Advanced ClearPass Troubleshooting and Solutions course, formally named ClearPass Advanced Labs (CPA) prepares attendees who are familiar with ClearPass products to master their knowledge and experience through a series of challenging lab exercises, under the guidance of an Aruba Certified Instructor (ACI). In this course, attendee’s are presented with customer case studies, and are required to design ClearPass services, and integrate network devices to meet the customer’s requirements.

 

CWNP Security Courses:

 

Wi-Fi Security (CWSP)

The CWSP Wireless LAN Security course consists of hands-on learning using the latest enterprise wireless LAN equipment. This course addresses in detail the most important and relevant WLAN security protocols, exchanges, and deployment strategies in the enterprise today. We focus heavily on understanding the functionality of the 802.11i amendment (now part of the larger standard), including authentication, encryption, and key management. 802.1X and EAP are also central to this conversation, with an in-depth examination of the inner-workings of each authentication mode and EAP type used in wireless LANs today.

 

EC-Council Security Courses:

 

Certified Ethical Hacker (CEH)

The Certified Ethical Hacker (CEH) course and overall program is the most desired information security training program any information security professional will ever want to be in. To master the hacking technologies, you will need to become one, but an ethical one! The accredited course provides the advanced hacking tools and techniques used by hackers and information security professionals alike to break into an organization. Gain the skills to beat a hacker by learning to think like one. Click to learn more about the course and register for an upcoming Certified Ethical Hacker (CEH) course in Sydney, Melbourne, Brisbane or Canberra.

 

Computer Hacking Forensic Investigator (CHFI)

Digital forensics is a key component in Cyber Security. Many people hear the term forensics, or computer forensics, or digital forensics and instantly think, that’s just for law enforcement, but the truth is, digital forensics has a key place on every cyber security team. In fact, without it, chances are your organizations Security posture and maturity will fail to see its full potential.

The Computer Hacking Forensic Investigator course provides a strong baseline knowledge of key concepts and practices in the digital forensic domains relevant to today’s organizations. The course provides its attendees a firm grasp on the domains of digital forensics.

 

Certified Network Defender (CND)

Students enrolled in the Certified Network Defender (CND) course, will gain a detailed understanding and hands on ability to function in real life situations involving network defense. They will gain the technical depth required to actively design a secure network in your organization. This program will be akin to learning math instead of just using a calculator. This course gives you the fundamental understanding of the true construct of data transfer, network technologies, software technologies so that you understand how networks operate, understand what software is automating and how to analyze the subject material.