Security expert Mike Danseglio discusses the importance of IT Security Training and his passion for teaching CISSP and CEH.
IT Security Training CISSP / CEH Certification
Security is critical to every aspect of information technology, and in every role from the Chief Information Security Officer to the Security Engineer and IT Specialist. At Interface Technical Training we have security certification training that spans the entire range. This training is taught exclusively by Mike Danseglio CISSP CEH, a security veteran with more than 20 years of hands-on experience in the field.
Students learn all phases of IT security, including planning, implementation, and operations. They experience how hackers think, how they attack, and what they can do to protect their assets against a variety of threats. In the classroom, these classes use only real-world scenarios, never contrived or canned situations. Because security incidents aren’t theoretical paper-based problems, they’re emergencies that threaten an individual or a company.
The security curriculum at Interface Technical Training is divided into two training courses. First, the Information Security for the IT Professional (SEC250) teaches students how security works. This includes theoretical security concepts like cryptography and access control, but also how to apply these concepts in a holistic network defense. Throughout this course, Mike Danseglio emphasizes a comprehensive and resilient security architecture using time-tested security approaches like Defense in Depth and the Security Triad. This class has prepared many students to earn their Certified Information Systems Security Professional (CISSP) certification.
On the other end of the spectrum is the Certified Ethical Hacking & Countermeasures training (SEC550). This advanced security certification class uses the official Certified Ethical Hacker curriculum from EC-Council and immediately immerses students in the world of nefarious hackers. Students learn to think like hackers, use hacker tools, and apply documented attack techniques to discover and document system vulnerabilities. This class attacks a wide variety of operating systems including Windows Server 2003, Windows Server 2008, Windows XP, Windows 7, and BackTrack Linux, and uses multiple redundant physical networks in the classroom to ensure network-based attacks are realistic yet don’t destroy the Internet. By thinking and acting like a hacker, students develop methods that they will use to stop attacks against their networks without harming corporate assets or violating the law. This is an extremely advanced certification course that assumes security knowledge and computer expertise as a prerequisite, and hits the ground running.
At Interface Technical Training we have Mike Danseglio, an experienced security guru who knows how to teach and delivers both his experience and formal courseware. Nobody else has that.
This scenario-based course focuses on computer security as an applied process across job roles and industries. The course also helps to prepare students for achieving the Certified Information Systems Security Professional (CISSP) certification. This course is available in Arizona and online with Remote Live™
Learn how to solve the latest security threats and utilize advanced hacking techniques for system protection. CEHv8 is the latest ANSI accredited curriculum from the EC-Council and now includes security protection training for mobile platforms. This 5-day class is in Phoenix, AZ and available online with Remote Live™.
This 5-day instructor-led course will give participants the necessary skills to identify an intruder’s footprints and to properly gather the necessary evidence to prosecute. Many of today’s top tools of the forensic trade will be taught during this course, including software, hardware and specialized techniques. This class is in Phoenix, AZ and available online with RemoteLive™.
Create secure solutions using Public Key Infrastructure (PKI), SmartCards CLM and more!
Security+ validates knowledge of communication security, infrastructure security, cryptography,operational security, and general security concepts. This practical “hands-on” 5 day course will teach students the fundamental principles of installing and configuring computer and network security systems.