Skip to content

Welcome to ACES

Alamo Colleges Education Services is a secure portal connecting Faculty, Staff & Students to Academic Resources, Email, and other Online Resources.

Support Contacts Helpdesk (210) 486-5000

Vertical_Bar 

Login to ACES

http://aces.alamo.edu/
 

Close
Library Info 

Library Information

1201 Kitty Hawk
Universal City, TX
78148
(210) 486-5387
nlc-circulation@alamo.edu
Hours: Mon.- Thurs. 7:30am-9:00pm; Fri. 7:30am-5:00pm; Sat. 9:00am-1:00pm
                   
Vertical_Bar 
Button - Go To Library  
Close

Security Training

 

Security +

This course covers general security concepts, communication security, infrastructure security, basics of cryptography, and operational/organizational security. Students will recognize and be able to differentiate and explain the access control models, authentication, recognize attacks and how to respond, suspicious code and appropriate actions, understand remote access technologies, security concerns of concepts such as wireless, routers, etc., identify and explain cryptographic algorithms, and understand the concepts of physical security.
5 days, 40 hours
 

Certified Information Systems Security Professional Exam Prep (CISSP)

This course is designed to review topics in the ten domains that make up the Common Body of Knowledge (CBK) covered by the CISSP examination, which are Access Control Systems and Methodology, Telecommunications & Network Security, Business Continuity & Disaster Recovery Planning, Security Management Practices, Security Architecture & Models, Law, Investigations and Ethics, Application & Systems Development, Cryptography, Computer Operations Security, and Physical Security.
5 days, 40 hours
 

Ethical Hacker

This class will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When a student leaves this class they will have hands on understanding and experience in Ethical Hacking.
5 days, 40 hours

Security Traffic Analysis with Wireshark

The Security Traffic Analysis course begins with an introduction to the topic of network analysis. The next several chapters introduce the student to Wireshark and a variety of the more advanced features of that tool. Those features are used heavily in the later part of the course. We then move to analyzing the OSI layers and work our way through the TCP/IP stack and protocols. In this area of the course, we look at how the traffic flows normally and then examine what it might look like when there are problems or maliciousness. As one example, we look closely at HTTP redirects, what they are for, and how they look in a traffic capture. We then look at how they could be used maliciously to install malware on a system without the user’s knowledge. Examples of this nature occur throughout this area of the class. The final chapters of the class look at known malicious traffic and learning how to recognize and analyze it. For example, we look at various types of network scans that might be conducted by a hacker. We then take it to the next level using tools learned earlier in the class. We not only determine that a scan was preformed, but also determine exactly what the attacker learned from the scan, i.e. which ports were found open by the hacker, did the hacker enumerate the operating system, services, user accounts, etc. Throughout the course, special attention is devoted to display filters as these are critical to both the final chapters of the course and to performing traffic analysis in the real world.
5 days, 40 hours 

Continuing Education Calendar

SMTWTFS
  12345
6789101112
13141516171819
20212223242526
2728293031