Cyber Security Foundations

Cyber Security Foundations Course Description

Duration: 5.00 days (40 hours)

When you consider just a few of the consequences of a security breach - your proprietary information completely accessible, hefty fines for security lapses, news headlines about your company's security breach, it becomes obvious: An in-depth and thorough understanding of cyber security fundamentals and best practices is absolutely necessary.

In this cybersecurity course, you will gain a global perspective of the challenges of designing a secure system, touching on all the cyber roles needed to provide a cohesive security solution. Through lecture, labs, and breakout discussion groups, you will learn about current threat trends across the Internet and their impact on organizational security. You will review standard cybersecurity terminology and compliance requirements, examine sample exploits, and gain hands-on experience mitigating controls. In a contained lab environment, you will work with live viruses, including botnets, worms, and Trojans.

In addition to technical cybersecurity components, you will learn and explore the non-technical aspects of cybersecurity necessary to mitigate risk and lessen exposure, including risk management, threat determination, disaster recovery, security policy management, and business continuity planning. This course provides an excellent foundation for those proceeding to CISSP, CEH, CISA, or CISM training.

Next Class Dates

Contact us to customize this class with your own dates, times and location. You can also call 1-888-563-8266 or chat live with a Learning Consultant.

Back to Top

Intended Audience for this Cyber Security Foundations Course

  • » Cybersecurity professionals, including security analysts, intel analysts, policy analysts, security operations personnel, network administrators, system integrators, VARS, and security consultants

Back to Top

Cyber Security Foundations Course Objectives

  • » Current cyber threats and cybersecurity site references
  • » Government-mandated directives and compliance requirements
  • » Cyber roles required to successfully design secure systems
  • » The attack cycle perpetrated by malicious hackers
  • » Enterprise policy requirements
  • » Best strategies for securing the enterprise with layered defenses
  • » How security zones and detailed logging augment information assurance
  • » Forensic challenges and incident response planning
  • » Risk management process
  • » Goals achievable with auditing, scanning, and testing systems
  • » Industry recommendations for maintaining secure access control
  • » Standards-based cryptographic solutions for securing communications

Back to Top

Cyber Security Foundations Course Outline

      1. The Cyber Battlefield
        1. Critical Business Security
        2. Worldwide Internet Growth
        3. Security Fundamentals
        4. Security Goals
        5. Terminology Threats and Exposures
        6. Exploits and Exposures
        7. Hackers and Crackers
        8. Attack Methods
        9. Social Engineering
        10. Common Attack Vectors
        11. Traffic Analysis
          1. Responding to Threats and Attacks
        12. Documents and Procedures to Manage Risk
        13. Vulnerability Scanners
        14. Penetration Testing
        15. The OSSTMM
        16. NIST
        17. Risks of Penetration Testing
      2. The Structure of the Internet and TCP/IP
        1. CNCI
          1. Initiatives
        2. Legal Compliance Standards
          1. Acts
          2. Federal Agency Compliance
          3. Commercial Regulatory Compliance
        3. Internet Leadership IANA
          1. Regional Internet Registry
          2. Protocols and RFCs
        4. TCP/IP Model
          1. Network Access Layer
          2. Internet Layer
          3. Host-to-Host Layer
          4. Process Layer
        5. Domain Name Service
      3. Vulnerability Assessment and Tools
        1. Vulnerabilities and Exploits
        2. Vulnerability Assessment Tools
          1. Application-Level Scanners
          2. System-Level Scanners
          3. System-Level Testing Tools
          4. Open Source System-Level Scanner Tools
          5. Commercial System-Level Scanner Tools
        3. Advanced Attack Techniques and Tools
        4. Commercial Exploit Tools
          1. Free Exploit Tool: Metasploit
          2. Free Exploit Tool: BeEF
        5. Fuzz Testing
        6. Preventing Exploits and Attacks
        7. Patch Management
        8. Common Vulnerabilities and Exposures
        9. Alerts and Software
        10. Tools
        11. Vulnerability Research
        12. Common Security Sites
        13. Patch Management
        14. Tools
      4. Cyber Awareness
        1. Social Engineering
          1. Social Engineering Goals
          2. What Makes Social Engineering Possible
          3. Targets
          4. Attacks
          5. Phishing
          6. Phishing via Email
          7. Online Attacks
          8. Statistical Data
          9. Sources of Security Breaches
          10. Preventing Social Engineering
        2. Cyber Awareness: Policies and Procedures
          1. Security Policy Topics
          2. Social Media
          3. Social Networking Sites
      5. Cyber Attacks: Footprinting and Scanning
        1. Footprinting
          1. Gathering Information
          2. Unearthing Initial Information
          3. Internet Archive
          4. People Search
          5. Locations and Mapping
          6. Job Boards
          7. Financial Information
          8. Google and Search Operators
        2. Identifying the Target Network and Its Range
          1. WHOIS Utility
          2. DNS Online Search Tools
          3. Traceroute
          4. Footprinting Countermeasures
        3. Detecting Live Systems
          1. Bypassing Authentication
          2. War Dialing
          3. Wardriving
          4. ICMP: Ping
          5. Port Scanning
          6. Performing TCP and UDP Scans
          7. Port Numbers
        4. TCP Flags
          1. TCP ThreeWay Handshake
        5. Port Scanning Techniques
          1. TCP Full Connect Port Scan
          2. TCP HalfOpen (SYN) Scanning
          3. Nmap HalfOpen Scan
          4. UDP Port Scan
          5. Nmap Scan Types and Switches
          6. Port Scanning Tools
          7. OS Fingerprinting
          8. Active Stack Fingerprinting
          9. Passive Fingerprinting
        6. Proxies and Anonymizers
        7. Scanning Countermeasures
      6. Cyber Attacks: Breaking and Entering
        1. Password Attacks
        2. Privilege Escalation
        3. Maintaining Access
        4. Windows Authentication
          1. SysKey Encryption
          2. LAN Manager Password Encryption
          3. Windows LAN Manager and NTLM Hashes
          4. Linux Password Encryption
          5. SAM Database Insecurities
        5. Password Extraction Cracking
          1. Password Cracking Techniques
          2. Password Cracking Tools
          3. LCP
          4. John the Ripper
          5. Cain and Abel
        6. Password Cracking Countermeasures
        7. Covering Tracks
          1. Principle of Exchange
        8. Clearing the Logs
        9. Hiding Tools, Files, and Programs
          1. NTFS Alternate Data Streaming
        10. Information Hiding: Methods
          1. Steganography
          2. Steganography Detection
          3. Rootkits
        11. Countermeasures: Rootkits
      7. Cyber Attacks: Backdoors and Trojans
        1. Malware
        2. Trojans
          1. Trojan Infection Mechanisms
          2. Well-Known Trojans
          3. Distribution Methods Wrappers
          4. Trojan Autostart Methods
        3. Covert Communications
          1. Stealth Technique: Avoiding Detection
        4. Backdoor Countermeasures
        5. Malware Countermeasure
        6. Anti-Spyware Software
        7. Malware Countermeasure Practices
      8. Cyber Assessment and Risk Management
        1. Risk Management Steps
          1. Determining ALE
          2. CRAMM Process
          3. Risk Management Lifecycle
        2. Protected Assets
          1. CIA Triad
        3. Quantitative Risk Assessment
        4. Threat Determination Process
        5. Risk Assessment
          1. Lifecycle
          2. Steps
        6. Vulnerability Categories
        7. Business Assets vs. Risk
        8. Benefits of Risk Management
        9. Policy
        10. Assessment
      9. Security Policy Management
        1. Security Policy
          1. Use
          2. Importance
          3. Legal Issues
          4. Example
        2. Policy References
          1. Policies, Guides, Standards, Procedures, and Controls
          2. Security Policy Coverage Matrix
          3. Example: Internet Security Coverage Matrix
          4. Granular View of a Security Matrix
          5. Basic Policies
      10. Securing Hosts and Servers
        1. Types of Hosts
        2. General Configuration Guidelines
          1. Clean Systems
          2. Unnecessary Services
          3. Warning Banners
          4. Limiting Access
          5. Configuring and Logging
        3. Security Patches
        4. Security Baselines
        5. Traffic Filtering Monitoring
        6. DoS Vulnerabilities
        7. Server Hardening
        8. Web Server Hardening
        9. Mail Server Hardening
        10. FTP Server Hardening
        11. DNS Server Hardening
          1. Other Servers
        12. Workstation Considerations
        13. Network Appliances
        14. Wireless Access Hardening
        15. VLAN Security
        16. Software Attacks
      11. Securing Communications
        1. Applying Cryptography to OSI Model
        2. Tunnels
        3. Securing Services
          1. Email
          2. FTP and Telnet
          3. SSL and TLS
          4. Gateway-to-Gateway VPN
          5. Host-to-Gateway VPN
          6. IP Security
          7. Wireless Access Communication
          8. Wireless Security
      12. Authentication and Cryptographic Solutions
        1. Authentication
        2. Authentication Issues
        3. Cryptosystems Password Authentication
        4. Hash Functions
        5. Kerberos Cryptographic Benefits
        6. Symmetric Key Encryption Asymmetric Encryption Digital Signatures PKI Components
        7. Models
        8. Policies
        9. Lifecycle
        10. Distribution
      13. Firewalls and Edge Devices
        1. General Security Integration
        2. Services
        3. Needs for Services
          1. Security Zones
          2. Filtering
          3. Screened Subnets
          4. Trusted Zones
          5. Devices
          6. Routers
          7. Firewalls
          8. DMZ Hosts
          9. Other Security Considerations
        4. Business-to-Business Communications
        5. Exceptions to Policy
          1. Special Services and Protocols
        6. Configuration Management
        7. Software Development Security
        8. Certification and Accreditation
        9. Common Criteria
        10. Intrusion Detection and Prevention
        11. Defense in Depth
        12. Network Device Logging
          1. Host Monitoring and Logging
          2. Events Correlation
          3. Placement of IDS Monitors and Sensors
          4. Monitoring
          5. Host-Based and Network-Based Differences
          6. Policy Managemet
          7. Behavioral Signatures
          8. IDS and IPS Weaknesses
          9. Encryption
          10. Incorrect Configuration
      14. Forensic Analysis
        1. Incident Handling
        2. Security Incident Response
          1. Time and Reaction Sensitivity
          2. Incident Handling Issues and Considerations
          3. Response Procedures
          4. Evidence
          5. Logging
          6. Log Analysis Tools
          7. Active Ports
          8. Dependency Walker
          9. Log Maintenance
      15. Disaster Recovery and Business Continuity
        1. Disaster Types
        2. Disaster Recovery Plan (DRP)
        3. DRP Goals
        4. Creating a DRP
        5. DRP Contents
        6. DRP Design Requirements
        7. DRP Priorities
        8. Recovery Strategies
        9. High Availability
        10. Data Collection Documentation
        11. DRP Testing
        12. Business Continuity Planning
        13. BCP Steps
      16. Cyber Evolution
        1. Cyber Forces
        2. Cyber Terrorism
        3. Cyber Security: Crime, War, or Fear Mongering?
        4. Cyber Future 7 Compliance Initiatives
        5. Cyber Defense in Depth
        6. Education and Training
      17. Labs
        1. Lab 1: Lab Setup
          1. Access the Virtual Lab Environment
          2. Configure BackTrack and Redhat Security Spin
          3. Rebuild Your Physical Computer
        2. Lab 2: Understanding TCP/IP
          1. Convert Binary to Decimal
          2. Convert Decimal to Binary
          3. Convert Hexadecimal to Decimal
          4. Analyze Wireshark Traffic
        3. Lab 3: Vulnerability Assessment
          1. Use Nessus
          2. Identify Coding Issues
        4. Lab 4: Cyber Awareness
          1. Identifying Social Engineering Attacks
          2. Detect Phishing Using Internet-Based Tools
        5. Lab 5: Cyber Scanning
          1. Trace Domains and IP Addresses
          2. Map Web Site Content with Teleport Pro
          3. Use Cheops for Graphical Display of Network
          4. Use GFI LanGuard
          5. Scan Using Nmap
          6. Scan Using Zenmap
          7. Perform Banner Grabbing
        6. Lab 6: Cyber Attacks and Passwords
          1. Crack Passwords via the GUI
          2. Crack Passwords via the CLI
          3. Hide Files with NTFS
        7. Lab 7: Cyber Attacks and Backdoors
          1. Perform Netcat Banner Grabbing
          2. Perform Netcat Shoveling
          3. Use Netcat to Port Scan
          4. Create and Detect a Trojan
        8. Lab 8: Risk Assessment
          1. Review Profile and Complete a Criticality Ranking
          2. Complete a Criticality Review
          3. Complete a Threat Profile
          4. Evaluate the Support Policy and Cost
        9. Lab 9: Security Policies
          1. Review Security Policies
          2. Develop an Incident Response Policy
        10. Lab 10: Host Security
          1. Use the RECUB Trojan
          2. Identify the RECUB Service
          3. Harden the System
        11. Lab 11: Covert Communications
          1. Hide Messages Using S-Tools
          2. Use Spam Mimic
        12. Lab 12: Authentication and Cryptography
          1. Use Ettercap
          2. Use Dsniff
          3. Explore Cain and Abel
        13. Lab 13: Snort IDS
          1. Install Snort IDS
          2. Configure Eagle X IDS
          3. Configure Rule to Ignore Hosts in Snort
        14. Lab 14: Forensic Analysis
          1. Examine an IIS Event Log and Identify Common
          2. Use CurrPorts to Identify Anomalies
          3. Use Jotti for Forensic Analysis
        15. Lab 15: Business Continuity Plan
          1. Identify When a Disaster Has Occurred
          2. Determine Key Assets
      18. Identify Potential Controls

Back to Top

Do you have the right background for Cyber Security Foundations?

Skills Assessment

We ensure your success by asking all students to take a FREE Skill Assessment test. These short, instructor-written tests are an objective measure of your current skills that help us determine whether or not you will be able to meet your goals by attending this course at your current skill level. If we determine that you need additional preparation or training in order to gain the most value from this course, we will recommend cost-effective solutions that you can use to get ready for the course.

Our required skill-assessments ensure that:

  1. All students in the class are at a comparable skill level, so the class can run smoothly without beginners slowing down the class for everyone else.
  2. NetCom students enjoy one of the industry's highest success rates, and pass rates when a certification exam is involved.
  3. We stay committed to providing you real value. Again, your success is paramount; we will register you only if you have the skills to succeed.
This assessment is for your benefit and best taken without any preparation or reference materials, so your skills can be objectively measured.

Take your FREE Skill Assessment test »

Back to Top

Award winning, world-class Instructors

Carmille A.
- Highly-skilled in graphics and web software including Adobe CS3, CS4 & CS5 Photoshop, Dreamweaver, Illustrator, InDesign, Captivate, Acrobat and Quark; - Expert in Microsoft Office, including Excel, Word and PowerPoint. Licensed Application Instructor and Microsoft Certified Trainer since 2000. - Over 20 years of experience as Creative Director for multinational corporations such as McCann Erickson, Lintas, and Publicis. Bio: Carmille has been a Licensed Application Instructor and Microsoft Certified Trainer for years. She specializes in web development, business productivity and digital media applications such as SharePoint, Quark and the Adobe Creative Suite as well as numerous programming languages including XML, XHMTL, HTML and CSS. Carmille is passionate about educating and has a unique talent for making complex design and development principals seem "easy" to students from all levels of expertise. She currently teaches Adobe Graphic and Web Designer, Microsoft Office Specialist, SharePoint End User and the acclaimed Website Development Professional courses at NetCom Learning. Her 20+ years of experience as Creative Director for multinational corporations bring a special and innovative approach to her classes at NetCom Learning.
Charles W.
- Expert in Microsoft Office applications such as Excel, Word, PowerPoint, Outlook, Project, Visio, and Access as well as Adobe Graphic and Web Designer (InDesign, Acrobat, Photoshop, Illustrator, Dreamweaver and Flash Catalyst)
- Holds an A.A.S in Graphic Design as well as various Awards and Affiliations, including MCT, MCP, MCAS, and Office 2007 Master.
- Senior Lead Trainer for over 10 years.


Charles is a Technical Trainer & Instructional Designer for over 10 years. He is a Microsoft Certified Trainer and dedicates himself to Microsoft Office applications such as Excel, Word, PowerPoint, Outlook, Project, Visio, and Access. He is also an Adobe specialist and holds a degree in Graphic Design.

Charles is well known for his high evaluation scores, achieving 8.75 out of 9 on a regular basis, teaching in one-on-one, instructor-led, and web-based environments; one of the reasons for his high evaluation is his expertise in increasing personnel performance by developing and implementing programs constructed from the job task analysis process. Charles currently teaches Adobe Graphic and Web Designer, and Microsoft Office Specialist courses at NetCom Learning.
Donna H.
- High-skilled trainer and speaker. Delivered presentations in Dubai, Tokyo, London, New York, and China.
- ITIL V3 Expert, teaching ITIL courses since 2005. More than 99% of her students have passed their ITIL Certification exams.
- Process Improvement Expert with more than 15 years of experience in the Support Center industry as a practitioner, consultant and certified trainer.


Donna is an expert in project management and Process Improvement. Her amazing presentation skills have taken her around the world, giving arrangements in Dubai, Tokyo, London, New York and China to name a few. "The Donna", as she is known in the industry, has more than 15 years of experience in the Support Center industry as a practitioner, consultant and certified trainer.

Donna holds ITIL V3 Expert Certification and offers training and consulting services through NetCom Learning on Process Improvement framework as well as the ITIL practitioner level suite of Lifecycle and Capability Stream certification courses. She began presenting ITIL classes in 2005, and 99% of her students have passed their ITIL Certification exams. Along with ITIL courses, she promotes best practices in the support center industry, focusing on customer service skills training, individual and support center certification, training and consulting, and process infrastructure improvement.
Ginger M.
- Bachelor's Degree in Accounting and a Masters of Business Administration from Rutgers University.
- Over 9 years of experience as a Master Certified Trainer. Expert in MS Dynamics GP Financials, Installation, HR/Payroll, Project Accounting, Inventory and Integration Manager.
- Project Manager to various MS Dynamics Great Plains implementations.


Ginger holds a Bachelor's Degree in Accounting and a Masters of Business Administration from Rutgers University. Her career started as an Auditor for Deloitte & Touch and over the years she developed her passion for Microsoft Dynamics, implementing Dynamics GP and Project Cost in the Professional Services, Commercial Real Estate and Medical Facilities vertical markets.

Ginger's experience with Microsoft Dynamics is unparalleled. As a Certified Master Dynamics trainer, she stays abreast of the latest Dynamics modules and shares experience with a very hands-on training technique at NetCom Learning.
Hisham S.
- Masters Degree in Computer Science and several academic projects published over the years.
- Over 20 years of experience as a professor in local and foreign universities, and as a trainer focusing on Web Development.
- In-depth knowledge of programming, including MySQL, PHP, and AJAX.


Hisham holds a Masters Degree in Computer Science, in addition to having more than 20 years of experience as a professor and a trainer. His proven expertise, including a position as a Professor of the Department of Computer Science at Minia University Egypt, and a Professor of the Department of Computer Science at City University of New York, in MySQL, PHP, and AJAX is beyond comparison.

As a NetCom Learning instructor, Hisham stays up to date with the latest news in Advanced Website Development. He shares his knowledge and experience in a very focused and clear way, which students find very enticing.
J Tom K.
- Software Developer and sought-after Microsoft Certified Trainer (MCT) with over 30 years of hands-on experience.
- Expert in Microsoft technologies: .NET Framework, C#, VB .NET, ASP .NET, XML Web Services, ADO .NET, SQL Server, SharePoint Portal Server, Content Management Server, Commerce Server, BizTalk, MSMQ, COM+, COM Migration to .NET and PocketPC development.
- Extremely knowledgeable and rated as excellent by NetCom Learning students.


Tom Kinser is an accomplished Software Developer and sought-after Microsoft Certified Trainer (MCT). Tom is also an expert in successfully designing software, managing and training programmers for over 30 years.

Tom specializes in helping businesses, enterprises, and government agencies apply current technologies to solve their unique business problems. He accomplishes this via hands-on training in cutting-edge programming and database design techniques. Tom consistently delivers successful training engagements in both classroom and live-online settings and is rated as excellent by NetCom Learning students.
Joseph D.
- Highly-skilled Autodesk Certified Instructor; working with Autodesk Softwares since 1993.
- Expert in AutoCAD, Autodesk 3DS, Autodesk Revit, Mechanical Desktop, Inventor, and Architectural Desktop.
- Authored course materials for numerous Autodesk courses.


Joseph is an Autodesk Certified Instructor specializing in developing and teaching Autodesk courses, with a working knowledge of such products as AutoCAD, Autodesk 3DS, Autodesk Revit, Mechanical Desktop, Inventor, and Architectural Desktop.

In addition to teaching and developing courses for the past 10 years, Joseph has authored course materials for many AutoDesk courses. He is also well versed in Inventor 8 and 9.

Joseph demonstrates a straightforward, down-to-earth teaching style in order to reach students at widely differing levels of expertise. His extensive product knowledge and exuberant teaching style makes Joseph a consistently highly rated instructor at NetCom Learning.
Larry G.
- More than 14 years of experience as a Security Subject Matter Expert as well as black belt in a variety of martial arts.
- Numerous Challenge Coins from the US Government including the US Army, and the Criminal Investigation Command.
- Much acclaimed instructor at NetCom Learning, with evaluation scores of 8.8 out of 9.


Larry is a unique instructor and IT security expert. If you sit in one of his classes you might get the feeling of being in a martial arts class - That's exactly how Larry wants it! "The principles behind IT security are the same as those in a variety of martial arts," Larry says. In addition to teaching IT security for over 14 years, he has practiced martial arts since he was 13 years old and holds black belts in multiple disciplines including Tai Chi, Kung Fu, and Kick Boxing. "All of these techniques are like tools for different types of attacks," Larry explains.

Larry's excellence in certification training and passion for IT security has earned him numerous Challenge Coins from the US Government including the US Army, and the Criminal Investigation Command. He is also a much acclaimed instructor at NetCom Learning, with evaluation scores of 8.8 out of 9.
Michael G.
- Over 22 years of professional experience in the IT field, including more than a decade as a Certified Trainer.
- An expert in Cisco's Routing, Switching, Security, Voice and Wireless areas, as well as select Microsoft, Novell, CompTIA, Sun and CWNP courses.
- High-skilled and acclaimed instructor. Has trained over 900 students at Netcom Learning.


Michael has over 22 years of professional experience in the IT field, including more than a decade as a Certified Trainer. An expert in Cisco's Routing, Switching, Security, Voice and Wireless areas, Michael also teaches select Microsoft, Novell, CompTIA, Sun and CWNP courses.

Michael's dedication and passion for teaching is unmatched. He has trained over 900 students at Netcom Learning since 2006 and his evaluation scores average 8.7 out of 9.
Paul B.
- Microsoft Office Specialist with over 14 years of training experience.
- Expert in the IT industry, working in the IT field since 1986.
- Highly rated instructor with an all-time average evaluation score of 8.7 out of 9.


Paul is Subject Matter Expert specializing in the Microsoft Office Suite and SharePoint end-user technologies with more than 25 years of practical experience in the IT industry. He is also a Microsoft Certified Trainer (MCT) with over 14 years of training experience.

A sought-after instructor and eternal favorite among students, his instructor feedback scores are among the industry's highest at 8.7 out of 9.0. As a trainer, his knowledge and passion for the subject matter as well as his personable nature, excellent communications skills and sense of humor are implicit in every class. NetCom Learning is proud to have Paul on our roster of IT geniuses.
Ramesh P.
Ramesh holds a Masters Degree in Computer Science with specialization in Information Security and is pursuing his Doctoral degree in IT from the University of South Australia (UniSA). He is a one of a kind trainer - he has been working in the IT field since 1995 and is an expert in C#, VB.NET, ASP.NET, Java/J2EE, PL/SQL, VB, ASP, and XML technologies. Ramesh also has extensive experience developing and implementing BizTalk and SharePoint in large corporations, as well as more than 10 years experience working with Oracle and SQL server/Sybase databases. With more than 19 certifications, Ramesh is an IT guru and trainer with worldwide experience, which includes presentations and trainings across US, Asia, and Middle East. He is a full time instructor at NetCom Learning and we couldn't be happier in having him as one of our Subject Matter Experts.
Richard L.
- Over 20 years experience in the IT industry.
- CEH and Microsoft training for many government agencies, including the United States Department of Homeland Security, and the Federal Bureau of Investigation.
- CEH and Microsoft training for Fortune corporations such as Merrill Lynch and ADP.


Richard is a premier Microsoft Certified Trainer and Certified EC-Council Instructor. He has over 20 years of experience as a network administrator, security consultant, vulnerability assessor, and penetration tester for assorted Fortune companies.

Richard??s knowledge on the development and implementation of policies and procedures concerning the security of network data is unsurpassed. He has conducted successful CEH and Microsoft training classes for many government agencies including the United States Department of Homeland Security, the Department of Justice and the Federal Bureau of Investigation, as well as Fortune enterprises such as Merrill Lynch and ADP.
Sam P.
- Team leader for the first undergraduate team to win the Duke Startup Challenge.
- Over 15 years of experience in the IT industry.
- NetCom Learning Instructor of the Year 2011.


Sam Polsky has spent his entire career in entrepreneurial pursuits, including such fields as biotechnology, software development, data management, and business process management. He began in entrepreneurship as team leader for the first undergraduate team to win the Duke Startup Challenge, a business development competition geared towards Duke Universitys various graduate schools.

Sam Polsky has since co-founded a consulting firm where he has been involved in software architecture, development and implementation. On top of that, Sam has been delivering acclaimed solutions in software architecture, development and implementation for over 15 years. He is a much-admired Subject Matter Expert and Trainer at NetCom Learning and was voted NetCom Learning Instructor of the Year 2011
Jose P.
Jose Marcial Portilla has a BS and MS in Mechanical Engineering from Santa Clara University. He has a great skill set in analyzing data, specifically using Python and a variety of modules and libraries. He hopes to use his experience in teaching and data science to help other people learn the power of the Python programming language and its ability to analyze data, as well as present the data in clear and beautiful visualizations. He is the creator of some of most popular Python Udemy courses including "Learning Python for Data Analysis and Visualization" and "The Complete Python Bootcamp". With almost 30,000 enrollments Jose has been able to teach Python and its Data Science libraries to thousands of students. Jose is also a published author, having recently written "NumPy Succintly" for Syncfusion's series of e-books.

See more...   See more instructors...

Back to Top

Recent Client Testimonials & Reviews

The classroom was awesome as always. Learned a ton. I will be putting into use.

- Michael D.

Course(s) Taken

» AngularJS Training: Comprehensive AngularJS Training

The classroom was very comfortable. Enjoyed learning from the instructor again.

- John K.

Course(s) Taken

» AngularJS Training: Comprehensive AngularJS Training

The instructor did a great job keeping us on track. We covered a lot of material.

- Tony P.

Course(s) Taken

» Data Analytics with R Language

  More testimonials »  

Back to Top