Skip to content

Explore Your Future with Alamo Colleges!

We offer what you need to achieve success. Come explore with us and find out why so many students have decided to call the Alamo Colleges the pathway to their future.

Not sure where to start? Our Career Assessment Tool can help.


Welcome to ACES

Alamo Colleges Education Services is a secure portal connecting Faculty, Staff & Students to Academic Resources, Email, and other Online Resources.

Support Contacts Helpdesk (210) 486-5000


Login to ACES

Library Info 

Library Information

1201 Kitty Hawk
Universal City, TX
(210) 486-5387
Hours: Mon.- Thurs. 7:30am-9:00pm; Fri. 7:30am-5:00pm; Sat. 9:00am-1:00pm
Button - Go To Library  

Security Training


Security +

This course covers general security concepts, communication security, infrastructure security, basics of cryptography, and operational/organizational security. Students will recognize and be able to differentiate and explain the access control models, authentication, recognize attacks and how to respond, suspicious code and appropriate actions, understand remote access technologies, security concerns of concepts such as wireless, routers, etc., identify and explain cryptographic algorithms, and understand the concepts of physical security.
5 days, 40 hours

Certified Information Systems Security Professional Exam Prep (CISSP)

This course is designed to review topics in the ten domains that make up the Common Body of Knowledge (CBK) covered by the CISSP examination, which are Access Control Systems and Methodology, Telecommunications & Network Security, Business Continuity & Disaster Recovery Planning, Security Management Practices, Security Architecture & Models, Law, Investigations and Ethics, Application & Systems Development, Cryptography, Computer Operations Security, and Physical Security.
5 days, 40 hours

Ethical Hacker

This class will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When a student leaves this class they will have hands on understanding and experience in Ethical Hacking.
5 days, 40 hours

Security Traffic Analysis with Wireshark

The Security Traffic Analysis course begins with an introduction to the topic of network analysis. The next several chapters introduce the student to Wireshark and a variety of the more advanced features of that tool. Those features are used heavily in the later part of the course. We then move to analyzing the OSI layers and work our way through the TCP/IP stack and protocols. In this area of the course, we look at how the traffic flows normally and then examine what it might look like when there are problems or maliciousness. As one example, we look closely at HTTP redirects, what they are for, and how they look in a traffic capture. We then look at how they could be used maliciously to install malware on a system without the user’s knowledge. Examples of this nature occur throughout this area of the class. The final chapters of the class look at known malicious traffic and learning how to recognize and analyze it. For example, we look at various types of network scans that might be conducted by a hacker. We then take it to the next level using tools learned earlier in the class. We not only determine that a scan was preformed, but also determine exactly what the attacker learned from the scan, i.e. which ports were found open by the hacker, did the hacker enumerate the operating system, services, user accounts, etc. Throughout the course, special attention is devoted to display filters as these are critical to both the final chapters of the course and to performing traffic analysis in the real world.
5 days, 40 hours 

CCNA Security: IINS (Implementing Cisco IOS Network Security)

This course focuses on the necessity of a comprehensive security policy and how it affects the posture of the network.  Learners will be able to perform basic tasks to secure a small branch type office network using Cisco IOS security features available through web-based GUIs (Cisco Router and Security Device Manger [SDM]) and the command line interface (CLI) on the Cisco routers and switches.  Upon completing this course, the learner will be able to: develop a comprehensive network with Cisco IOS Software security features; Configure a Cisco IOS zone-based  firewall to perform basic security operations on a network, configure site-to site VPNs using Cisco IOS features; Configure IPS on Cisco network routers; Configure LAN devices to control access, resist attacks, shield other network devices and systems, and protect the integrity and confidentiality of network trafficking.
5 days, 40 hours 

Continuing Education Calendar