In this section

Share this page

Access Control

Access ControlWho gets in?

Control who has access by locking down your systems, including hosts, networks, applications and data flows.

Access Control Training

Below is a sample of courses offered per competency and does not represent all courses available.

  • Communication Security
  • Advanced VoIP: Securing UC Networks
  • Wireless LAN Security and Analysis
  • Troubleshooting TCP/IP Networks with Wireshark
  • SIP Protocol Essentials
  • Cisco Secure Access Control System
  • Deploying Cisco ASA VPN Solutions
  • Cisco Advanced SSL VPN
  • Dell SonicWALL Secure Remote Access Basic Administrator (SRABA)
  • IPv6 Security Migration
  • HDI Knowledge Management Foundations: KCS Principles
  • Cybersecurity Compliance & Mobility
  • ITIL Service Lifecycle: Planning, Protection, and Optimisation
  • Global Communications

Remote Access

  • Cisco Secure Access Control System
  • Implementing Cisco IOS Network Security
  • Deploying Cisco ASA VPN Solutions
  • Check Point Security Expert R75
  • Junos Security

Communication and Remote Access Vendors

  • Cisco, Juniper,Blue Coat, F5, Checkpoint, Dell SonicWall, Citrix, Microsoft

Logging and Monitoring

  • Requirements Validation and Testing
  • Unix Fundamentals
  • ITIL Service Capability: Release, Control, and Validation

Penetration Testing

  • Certified Ethical Hacker
  • Advanced VoIP: Securing UC Networks
  • Data Modeling
  • Foundstone Ultimate Hacking


  • Security+ Prep Course
  • Foundstone Writing Secure Code
  • Information Systems Security Architecture Professional


  • Implementing Cisco Intrusion Prevention System

To access our full list of Security courses please visit our Security Training Courses page here

For more information on Contingency Planning please contact us on +971 4 4464 987