ASM is focused on providing a curriculum based on the needs of the student. List below are some graphics that explain some of the concepts we utilize to evolve a workable training sequence.

 

 

blooms-taxonomy

 Source: (Alford, Herbert & Fragenheim 2006)

 graph-2 copy

Here are some of our customized courses available only through ASM:

Customized SOHO (Small Office Home Office) Security Training Course 
Please download PDF[sc:pdficon ]

Introduction to Programming Using C
Please download PDF[sc:pdficon ]

Introduction to Programming Using C Workshop

Electronics, Programming and IoT
Please download PDF[sc:pdficon ]

Electronics, Programming and IoT Workshop

Defending Your Systems & Networks When Attacked
Please download PDF[sc:pdficon ]

Electronics Circuits & Systems
Please download PDF[sc:pdficon ]

LIVE Digital Forensics
Please download PDF[sc:pdficon ]

Managing Virus, Trojans & Malware using Symantec Endpoint Protection
Please download PDF[sc:pdficon ]

Cyber Crime Forensics Outline
Please download PDF[sc:pdficon ]

Cisco Prime Infrastructure
Please download PDF[sc:pdficon ]