Category Archives: Wireless Technologies Training Courses

Satellite Communication Training Essentials

Introduction: Satellite Communication Training Essentials Course - Hands-on (Online, Onsite and Classroom Live!) This three-day Satellite Communication Training Essentials course reviews the essential elements of all satellite communications systems, with an emphasis on system design and performance. The objective is to inform new engineers and other professionals as well as those knowledgeable in...
Read more

Software Defined Radio (SDR) Training

Introduction: Introduction to Tactical Data Links (TDL) Training Course with Hands-on Exercises (Online, Onsite and Classroom Live) This three-day Software Defined Radio (SDR) Training course will provide the foundational skills required to develop software defined radios using the GNURadio framework. This course consists of both lecture material and worked SDR software examples. The...
Read more

CMMC Certified Professional Training (CCP)

Introduction: CMMC Certified Professional Training (CCP) (Online, Onsite, and Classroom Live!) Developed by the Office of the Under Secretary of Defense for Acquisition and Sustainment (OUSD A&S) and other federal stakeholders, the Cybersecurity Maturity Model Certification (CMMC) assesses and enhances the cybersecurity posture of the Defense Industrial Base. The CMMC encompasses multiple maturity...
Read more

Behavioral Malware Analysis Training

Introduction: Behavioral Malware Analysis Training Course with hands-on labs (Online, Onsite and Classroom Live) Learn how to perform dynamic malware analysis with this Behavioral Malware Analysis Training This Behavioral Malware Analysis Training course teaches you all the fundamental requirements necessary to analyze malicious software from a behavioral perspective. Using system monitoring tools, you will...
Read more

Network Forensics and Investigation Training

Introduction: Network Forensics and Investigation Training Course with hands-on labs (Online, Onsite and Classroom Live) Learn how to differentiate between normal and abnormal network traffic, track the flow of packets through a network, and attribute conversations and actions taken over a network segment to specific hosts or users. The preponderance of network traffic, particularly...
Read more

Network and Packet Analysis Training

Introduction: Network and Packet Analysis Training course with hands-on labs This Network and Packet Analysis Training course teaches the student the fundamental concepts, methodologies, and tools necessary to analyze network traffic for the purposes of intrusion and threat detection, network defense, and low profile offensive operations. The hands-on Network and Packet Analysis Training course...
Read more

MIDS Link 16 Network Design and Management Training

Introduction: This MIDS Link 16 Network Design and Management Training course provides students with a comprehensive understanding of Multifunctional Information Distribution System (MIDS) Link 16 Network Design and Management.  Particular emphasis is placed on practical training, with students utilizing both simulation and operational software applications. This MIDS Link 16 Network Design and Management...
Read more

MIDS Link 16 Training

Introduction: This MIDS Link 16 Training course provides students with a comprehensive understanding of Multifunctional Information Distribution System (MIDS) Link 16.  The course references both Allied Tactical Data Link Publications (ATDLPs) and United States (US) Military Standards (MIL-STDs) documentation. The MIDS Link 16 course is primarily aimed at those personnel who require a...
Read more

Cybersecurity Investigations and Network Forensics Analysis Training

Cybersecurity Investigations and Network Forensics Analysis Training
Learn to identify and capture suspicious data and patterns in seemingly unsuspicious traffic with this Cybersecurity Investigations and Network Forensics Analysis Training. In this Cybersecurity Investigations and Network Forensics Analysis Training course, you will develop the skills not only to capture suspicious data, but also to discern unusual patterns hidden...
Read more

0