Security Institute
Information Technology collaboration with like-minded professionals, thought leaders and experts.
ATTACK-SURFACE Protection
This certification delves into advanced strategies for mitigating risks across your organization's attack surface. Topics covered include hop starvation techniques, data loss prevention mechanisms, and device obfuscation strategies. Prerequisites: Extensive background in cybersecurity risk assessment, vulnerability management, and familiarity with advanced ...ISSA-CHAPTER-23Q4
ISSA Austin Chapter Participation Badge demonstrates your commitment to staying at the forefront of security practices. Prerequisites: Active participation in local ISSA chapter events. Study Materials: ISSA community guidelines and engagement practices.ISSA-CHAPTER-24Q1
ISSA Austin Chapter Participation Badge demonstrates your commitment to staying at the forefront of security practices. Prerequisites: Active participation in local ISSA chapter events. Study Materials: ISSA community guidelines and engagement practices.ISSA-CHAPTER-24Q3
ISSA Austin Chapter Participation Badge demonstrates your commitment to staying at the forefront of security practices. Prerequisites: Active participation in local ISSA chapter events. Study Materials: ISSA community guidelines and engagement practices.NETANALYST Transition to Certified Enterprise Program
Certified NetAnalysts received training in network forensics security, performance and resilience in the areas of network protocol theory and analysis. This certification demonstrates mastry of the foundations that have been at the forefront of cybersecurity for over 30 years.SOLARWINDS Breach Lessons-Learned Prevention Strategies
Study of SolarWinds Breach lessons-learned gaining breach prevention strategies. An in-depth look into the SolarWinds breach's mechanics, the lessons learned, and best practices to prevent similar security incidents. Prerequisites: Solid understanding of cybersecurity, network architecture, and threat intelligence.TCP-QUIC Protocol Implications
Master the next generation of internet protocols including TCP/IP and QUIC. Prerequisites: In-depth understanding of current internet protocols. Study Materials: Updated protocol documentation and hands-on training modules.WIRESHARK Level One
The Wireshark Level One Certification signifies that the collaborator has a foundational understanding of network packet analysis using Wireshark. This level covers the basics of Wireshark operation, fundamental network troubleshooting techniques, and an introduction to advanced concepts like the QUIC protocol and SolarWinds breach analysis. Collaborators ...WIRESHARK Level Three
The Wireshark Level Three Certification represents the highest level of mastery in network packet analysis. Collaborators at this level are proficient in conducting expert-level analysis, managing large-scale network environments, and integrating Wireshark with other advanced tools and systems. This certification indicates a deep understanding of network ...WIRESHARK Level Two
The Wireshark Level Two Certification represents an intermediate level of expertise in network packet analysis. Collaborators who achieve this certification demonstrate advanced skills in analyzing complex network issues, enhanced protocol analysis, and network security diagnostics. This level builds upon the basics, introducing more sophisticated tools ...