#1 in Network,
Security, Forensic and Wireshark Training

SCOS is the European Wireshark University Authorized Training Partner

Learn more about cyber security by our experienced staff

Most popular courses on SCOS.training

Cloud & Internet of Things (IoT) Analysis and Security (5 days)

This course is designed for Networking and Security personnel that need to develop a set of packet investigation techniques through study of the Cloud…

Troubleshooting TCP/IP Network Wireshark University (5 days)

In this official Wireshark University lab-based course, you will discover effective Wireshark operations...
26 - 30 November 2018 Amsterdam/Hoofddorp

Advanced Network/Security Analysis (5 days)

This course is designed for Networking, and Security that need to further enhance their Network Analysis skills through study of Advanced
12 - 16 November 2018 Amsterdam/Hoofddorp

Ipswitch WhatsUp Gold Network Management Training (2 days)

This 2-day WhatsUp Gold course takes a comprehensive look at the basics of getting up to speed understanding and configuring WhatsUp Gold for your business and getting the best…

WiFi / 802.11 Network Analysis and Security (5 days)

This course is designed for Wireless Network Engineers, and Ethernet Network engineers desiring to add wireless capabilities to an existing network that possess a basic…

Cyber Security Investigations (5 days)

This course is designed for Cyber/Cloud Network Security that possess a basic to intermediate general security and networking knowledge. Successful completion of this course…

Get to know more! Send your information request here

Cyber Security Investigations

Audience: This course is designed for Cyber/Cloud Network Security that possess a basic to intermediate general security and networking knowledge. Successful completion of this course will provide these individuals with a path-way into the field of Network Forensics Analysis. Personnel that already posses a working knowledge of Host-based Forensics Analysis should also attend this course as a means of gaining expertise in the End-to-End Digital Forensics process.

Security lock

Contact us

Our experienced staff can provide you:

  • State-of-the-Art Network and Forensics Analysis

  • Ethernet, WiFi, VoIP, legacy systems analysis, design and verification

  • Post-event reconstruction and documentation

  • Professional training and customized curriculum development