Search by Topic


Course Search Results for:

security

  • Microsoft Windows Server
    This five-day, instructor-led course teaches IT professionals how they can enhance the security of the IT infrastructure that they administer. This course begins by emphasizing the importance of assuming that network breaches have occurred already, and then teaches you how to protect administrative credentials and rights to help ensure that administrators can perform only the tasks that they need to, when they need to. This course explains how you can use auditing and the Advanced Threat Analysis feature in Windows Server 2016 to identify security issues. You will also learn how to mitigate malware threats, secure your virtualization platform, and use deployment options such as Nano server and containers to enhance security. The course also explains how you can help protect access to files by using encryption and dynamic access control, and how you can enhance your network’s security.
    Course Details & Class Schedule
  • Microsoft SQL Server
    This three-day instructor-led course provides students moving from earlier releases of SQL Server with an introduction to the new features in SQL Server 2016.
    Course Details & Class Schedule
  • Microsoft Visual Studio
    In this 5-day course, students will learn the basics of computer programming through the use of Microsoft Visual Studio 2013 and either the Visual C# or Visual Basic programming languages.
    Course Details & Class Schedule
  • Amazon AWS
    This course covers fundamental AWS cloud security concepts, including AWS access control, data encryption methods, and how network access to your AWS infrastructure can be secured. Based on the AWS Shared Security Model, you learn where you are responsible for implementing security in the AWS Cloud and what security-oriented services are available to you and why and how the security services can help meet the security needs of your organization.
    Course Details & Class Schedule
  • Microsoft Azure
    In this course students will gain the knowledge and skills needed to implement security controls, maintain the security posture, and identify and remediate vulnerabilities by using a variety of security tools. The course covers scripting and automation, virtualization, and cloud N-tier architecture.
    Course Details & Class Schedule
  • Microsoft Azure
    This course will provide foundational level knowledge on cloud concepts; core Azure services; security, privacy, compliance, and trust; and Azure pricing and support. Note: This course provides an Azure pass and time for you to participate in hands-on labs. If you do not need hands-on experience, consider the AZ-900T01: Microsoft Azure Fundamentals (1 day) course. The content for both courses align to the AZ-900 exam objective domain.
    Course Details & Class Schedule
  • Microsoft Azure
    This class is free of charge with the purchase of a Microsoft exam voucher for $99.

    This course will provide foundational level knowledge of cloud services and how those services are provided with Microsoft Azure. The course can be taken as an optional first step in learning about cloud services and Microsoft Azure, before taking further Microsoft Azure or Microsoft cloud services courses.
    Course Details & Class Schedule
  • Blockchain
    This dynamic instructor led course covers all known aspects of Blockchain security that exist in the Blockchain environment today. This course provides a detailed overview of all Blockchain security issues, including threats, risk mitigation, node security integrity, confidentiality, best security practices, advanced Blockchain security and more. The in-depth lab sessions will provide the student with practical, real world tools for not only recognizing security threats, but mitigation and prevention as well.
    Course Details & Class Schedule
  • Security
    The goal of the course is to prepare professionals for the challenging CCSP exam by covering the objectives of the exam based on the six domains as defined in the (ISC)2 CCSP common body of knowledge.
    Course Details & Class Schedule
  • CISM
    In this course, students will establish processes to ensure that information security measures align with established business needs.
    Course Details & Class Schedule
  • Security
    In this course, students will expand upon their knowledge by addressing the essential elements of the 8 domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals.
    Course Details & Class Schedule
  • Security
    In this course, students will evaluate organizational policies, procedures, and processes to ensure that an organizations information systems align with its overall business goals and objectives.
    Course Details & Class Schedule
  • CertNexus IoT
    In this course, students will learn general strategies for planning, designing, developing, implementing, and maintaining an IoT system through various case studies and by assembling and configuring an IoT device to work in a sensor network. Students will create an IoT device based on an ESP8266 microcontroller, implementing various common IoT features, such as analog and digital sensors, a web-based interface, MQTT messaging, and data encryption. This course prepares students for taking the CertNexus Certified Internet of Things (IoT) Practitioner (Exam ITP-110). This course includes a FREE exam voucher for ITP-110.
    Course Details & Class Schedule
  • Check Point Security
    The goal of this course is to provide an understanding of the advanced concepts and skills necessary to automate and orchestrate tasks relating to managing Check Point Security Policies.
    Course Details & Class Schedule
  • Check Point Endpoint Security
    The goal of this course is to provide a comprehensive understanding of Check Point Endpoint Security and how to deploy it within the corporate network environment.
    Course Details & Class Schedule
  • Check Point
    This course provides a comprehensive understanding of the Check Point Multi-Domain Security Management solution and describes how to deploy it within the corporate network environment.
    Course Details & Class Schedule
  • Check Point Security
    The goal of this course is to provide an understanding of the concepts and skills necessary to troubleshoot issues which may occur when managing the Check Point Security Management architecture and Security Gateways.
    Course Details & Class Schedule
  • Check Point Security
    Provide advanced troubleshooting skills to investigate and resolve more complex issues that may occur while managing your Check Point Security environment.
    Course Details & Class Schedule
  • Check Point
    The goal of this course is to provide an understanding of basic concepts and skills necessary to configure Check Point Security Gateway and Management Software Blades.
    Course Details & Class Schedule
  • Check Point
    This special CCSA and CCSE bundle covering Check Point Security Administration & Engineering (R80.20) provides you with an understanding of the basic concepts and skills necessary to configure Check Point Security Gateway and Management Software Blades.

    CCSA-R80.20: The goal of this course is to provide an understanding of basic concepts and skills necessary to configure Check Point Security Gateway and Management Software Blades.

    CCSE-R80.20: The goal of this course is to provide an understanding and skills necessary to configure and optimally manage Check Point Next Generation Firewalls.
    Course Details & Class Schedule
  • Check Point
    The goal of this course is to provide an understanding and skills necessary to configure and optimally manage Check Point Next Generation Firewalls.
    Course Details & Class Schedule
  • Citrix (NetScaler) ADC
    Learn how to configure your Citrix networking environment to address application services security requirements with Citrix Web App Firewall; automate and manage network services for scale-out of application architectures with Citrix Application Delivery Management; and optimize Citrix ADC-managed application delivery traffic. This fiveday course for experienced Citrix networking architects, engineers and administrators will teach you to deploy and manage Web App Firewall to protect web applications against different types of attacks. It will also give you a practical understanding of Citrix Application Delivery Management capabilities for centralized management of multiple Citrix ADC platforms, orchestration of changes, transaction reporting, infrastructure visualization and planning.
    Course Details & Class Schedule
  • Citrix Virtual Apps and Desktops
    Designed for experienced IT professionals this course builds on the foundational implementation and management skills introducing scalability, redundancy and security configurations.

    You will learn techniques to investigate many of the common issues that can affect environment health and how to solve issues more effectively in the advanced troubleshooting section. You will leave this course with a good understanding of how to manage more complex solutions such as multi-location environments with configurations around StoreFront, the Delivery Controllers, Cloud Connectors and HDX.
    Course Details & Class Schedule
  • Security
    COBIT 2019 builds on and integrates more than 25 years of development in this field, not only incorporating new insights from science, but also operationalizing these insights as practice. The heart of the COBIT framework updates COBIT principles while laying out the structure of the overall framework including: New concepts are introduced and terminology is explained—the COBIT Core Model and its 40 governance and management objectives provide the platform for establishing your governance program. The performance management system is updated and allows the flexibility to use maturity measurements as well as capability measurements. Introductions to design factors and focus areas offer additional practical guidance on flexible adoption of COBIT 2019, whether for specific projects or full implementation. From its foundation in the IT audit community, COBIT has developed into a broader and more comprehensive information and technology (I&T) governance and management framework and continues to establish itself as a generally accepted framework for I&T governance.
    Course Details & Class Schedule
  • CompTIA Security
    In this course, students will examine advanced security concepts, principles, and implementations that pertain to enterprise level security.
    Course Details & Class Schedule
  • CompTIA Security
    The course introduces tools and tactics to manage cybersecurity risks, identify various types of common threats, evaluate the organization's security, collect and analyze cybersecurity intelligence, and handle incidents as they occur.
    Course Details & Class Schedule
  • CompTIA Network+
    The student will describe the major networking technologies, systems, skills, and tools in use in modern networks.Taking this course will help the student prepare for the N10-007 exam and certification.
    Course Details & Class Schedule
  • CompTIA Security
    Security remains one of the hottest topics in IT and other industries. It seems that each week brings news of some new breach of privacy or security. As organizations scramble to protect themselves and their customers, the ability to conduct penetration testing is an emerging skill set that is becoming ever more valuable to the organizations seeking protection, and ever more lucrative for those who possess these skills. In this course, you will be introduced to some general concepts and methodologies related to pen testing, and you will work your way through a simulated pen test for a fictitious company.
    Course Details & Class Schedule
  • CompTIA Security
    In this course, students will build on their knowledge of and professional experience with security fundamentals, networks, and organizational security as you acquire the specific skills required to implement basic security services on any type of computer network.
    Course Details & Class Schedule
  • Security
    The CRISC course is designed for those who have experience with risk identification, assessment, and evaluation; risk response; risk monitoring; information systems control design and implementation; and information systems control monitoring and maintenance.
    Course Details & Class Schedule
  • Citrix Virtual Apps and Desktops
    Students will learn techniques to investigate many of the common issues that can affect environment health and how to solve issues more effectively in the advanced troubleshooting section. Students will leave this course with a good understanding of how to manage more complex solutions such as multi-location environments with configurations around StoreFront, the Delivery Controllers, Cloud Connectors and HDX.
    Course Details & Class Schedule
  • CyberSAFE
    Regardless of your computer experience, this class will help you become more aware of technology-related risks and what you can do to protect yourself and your organization from them. This course will help you to understand security compliance considerations, social engineering, malware, and various other data security-related concepts. In this course, you will explore the hazards and pitfalls and learn how to use technology safely and securely.
    Course Details & Class Schedule
  • CyberSec
    This course covers the duties of those who are responsible for monitoring and detecting security incidents in information systems and networks, and for executing a proper response to such incidents. Depending on the size of the organization, this individual may act alone or may be a member of a cybersecurity incident response team (CSIRT). The course introduces tools and tactics to manage cybersecurity risks, identify various types of common threats, evaluate the organization's security, collect and analyze cybersecurity intelligence, and handle incidents as they occur. Ultimately, the course promotes a comprehensive approach to security aimed toward those on the front lines of defense. This course is designed to assist students in preparing for the CyberSec First Responder™ (Exam CFR-310) certification examination. What you learn and practice in this course can be a significant part of your preparation.
    Course Details & Class Schedule
  • EC-Council
    The Certified Application Security Engineer (CASE) credential is developed in partnership with large application and software development experts globally. The CASE credential tests the critical security skills and knowledge required throughout a typical software development life cycle (SDLC), focusing on the importance of the implementation of secure methodologies and practices in today’s insecure operating environment. The CASE certified training program is developed concurrently to prepare software professionals with the necessary capabilities that are expected by employers and academia globally. It is designed to be a hands-on, comprehensive application security course that will help software professionals create secure applications. The training program encompasses security activities involved in all phases of the Software Development Lifecycle (SDLC): planning, creating, testing, and deploying an application. Unlike other application security trainings, CASE goes beyond just the guidelines on secure coding practices and includes secure requirement gathering, robust application design, and handling security issues in post development phases of application development. This makes CASE one of the most comprehensive certifications on the market today. It is desired by software application engineers, analysts, testers globally, and respected by hiring authorities.
    Course Details & Class Schedule
  • EC-Council
    In this course, students will learn in-depth content in each of the 5 CCISO Domains
    Course Details & Class Schedule
  • EC-Council
    CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so you will be better positioned to setup your security infrastructure and defend against future attacks. An understanding of system weaknesses and vulnerabilities helps organizations strengthen their system security controls to minimize the risk of an incident. CEH was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to achieve the CEH credential. You will be exposed to an entirely different posture toward the responsibilities and measures required to be secure. Now in its 11th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies.
    Course Details & Class Schedule
  • EC-Council
    Certified Network Defender (CND) is a vendor-neutral, hands-on, instructor-led comprehensive network security certification training program. It is a skills-based, lab intensive program based on a job-task analysis and cybersecurity education framework presented by the National Initiative of Cybersecurity Education (NICE). The course has also been mapped to global job roles and responsibilities and the Department of Defense (DoD) job roles for system/network administrators. The course is designed and developed after extensive market research and surveys.
    Course Details & Class Schedule
  • EC-Council
    This course will provide participants the necessary skills to identify an intruders footprints and to properly gather the necessary evidence to prosecute in the court of law.
    Course Details & Class Schedule
  • F5
    This course provides networking professionals a functional understanding of iRules development. The course builds on the foundation of the Administering BIG-IP or Configuring LTM course, demonstrating how to logically plan and write iRules to help monitor and manage common tasks involved with processing traffic on the BIG-IP system. Extensive course labs consist of writing, applying and evaluating the effect of iRules on local traffic. This hands-on course includes lectures, labs, and discussions.
    Course Details & Class Schedule
  • This class is based on the six HCISPP domains of the (ISC)² Common Body of Knowledge (CBK), ensuring students successfully prepare for the HCISPP exam and enhance their overall competencies in healthcare security and privacy.
    Course Details & Class Schedule
  • Cisco
    The Implementing and Configuring Cisco Identity Services Engine (SISE) v3.0 course shows you how to deploy and use Cisco® Identity Services Engine (ISE) v2.4, an identity and access control policy platform that simplifies the delivery of consistent, highly secure access control across wired, wireless, and VPN connections. This hands-on course provides you with the knowledge and skills to implement and use Cisco ISE, including policy enforcement, profiling services, web authentication and guest access services, BYOD, endpoint compliance services, and TACACS+ device administration. Through expert instruction and hands-on practice, you will learn how to use Cisco ISE to gain visibility into what is happening in your network, streamline security policy management, and contribute to operational efficiency.
    Course Details & Class Schedule
  • Cisco Security Core Technologies
    In this course, Implementing and Operating Cisco Security Core Technologies (SCOR), students will master the skills and technologies needed to implement core Cisco security solutions to provide advanced threat protection against cybersecurity attacks. Students will learn security for networks, cloud and content, endpoint protection, secure network access, visibility and enforcements. They will get extensive hands-on experience deploying Cisco Firepower Next-Generation Firewall and Cisco ASA Firewall; configuring access control policies, mail policies, and 802.1X Authentication; and more. Students will also get introductory practice on Cisco Stealthwatch Enterprise and Cisco Stealthwatch Cloud threat detection features.

    This course will help you prepare to take the Implementing and Operating Cisco Security Core Technologies (350-701 SCOR) exam. It also helps you prepare for the CCNP Security and CCIE Security certifications and for senior-level security roles featuring Cisco security solutions.
    Course Details & Class Schedule
  • Cisco
    The Cisco Service Provider – 5G solution course introduces the participants to evolution of 5th generation cellular networks, discuss the various trends driving the need for 5G, business impact of 5G networks and Cisco’s 5G solution for the service providers to deploy and rollout new services to customers and enable them to improve operational efficiency.

    The course will cover Cisco 5G Powerx consisting Unified Enablement Platform, Seamless X-Access convergence, 3-Stage realization program. The Cisco ultra services platform, Cisco 5G policy Suite (CPS) solutions, Cisco SONFlex, NCS500 service access routers, Cisco Security for 5G networks and Cisco SP network automation are discussed in detail.
    Course Details & Class Schedule
  • Microsoft 365
    This course covers three central elements of Microsoft 365 enterprise administration – Microsoft 365 security management, Microsoft 365 compliance management, and Microsoft 365 device management. In Microsoft 365 security management, you will examine all the common types of threat vectors and data breaches facing organizations today, and you will learn how Microsoft 365’s security solutions address these security threats. You will be introduced to the Microsoft Secure Score, as well as to Azure Active Directory Identity Protection and much more.
    Course Details & Class Schedule
  • Microsoft 365
    This four-MOC packaged set aligned to Microsoft 365 Exam: Microsoft 365 Security Administrator contains courseware that helps prepare students for Exams MS-500. Passing this exam is required to earn the Microsoft 365 Security Administrator certification.
    Course Details & Class Schedule
  • NIST
    This course is targeted at IT and Cybersecurity professionals looking to become certified on how to operationalize the NIST Cybersecurity Framework (NCSF) across an enterprise and its supply chain.
    Course Details & Class Schedule
  • NIST
    This course is targeted at IT and Cybersecurity professionals looking to become certified on how to operationalize the NIST Cybersecurity Framework (NCSF) across an enterprise and its supply chain.
    Course Details & Class Schedule
  • Red Hat Networking
    As an infrastructure administrator or security professional, this course prepares you to identity and mitigate threats to OpenShift container-based infrastructure. You will also understand how to implement and manage secure architecture, policies, and procedures for modern containerized applications and software-defined networking.

    You will discover how to use secure and trusted container images, registries, and source code; manage network and storage isolation; implement application single sign-on; and configure appropriate security constraints and service role–based access control. You will also understand how existing core Linux technologies - such as namespaces, cgroups, seccomp, capabilities, and SELinux—provide a robust and mature host environment with strongly secure containers.

    This course is based on Red Hat®Enterprise Linux® 7.5, Red Hat® OpenShift® Container Platform 3.11, and Red Hat® Identity Manager 7.5.

    Course Details & Class Schedule
  • Red Hat Linux
    This course is ideal for security administrators and system administrators who need to manage the secure operation of servers running Red Hat® Enterprise Linux®, whether deployed on physical hardware, as virtual machines, or as cloud instances. Maintaining security of computing systems is a process of managing risk through the implementation of processes and standards backed by technologies and tools. In this course, you will discover and understand the resources that can be used to help you implement and comply with your security requirements. This course is based on Red Hat Enterprise Linux 7.5, Red Hat Satellite 6.3, Red Hat Ansible® Engine 2.5, Red Hat Ansible Tower 3.2, and Red Hat Insights.
    Course Details & Class Schedule
  • Cisco
    The Securing Email with Cisco Email Security Appliance (SESA) v3.1 course shows you how to deploy and use Cisco® Email Security Appliance to establish protection for your email systems against phishing, business email compromise, and ransomware, and to help streamline email security policy management. This hands-on course provides you with the knowledge and skills to implement, troubleshoot, and administer Cisco Email Security Appliance, including key capabilities such as advanced malware protection, spam blocking, anti-virus protection, outbreak filtering, encryption, quarantines, and data loss prevention.
    Course Details & Class Schedule
  • Cisco
    The Securing the Web with Cisco Web Security Appliance (SWSA) v3.0 course shows you how to implement, use, and maintain Cisco® Web Security Appliance (WSA), powered by Cisco Talos, to provide advanced protection for business email and control against web security threats. Through a combination of expert instruction and hands-on practice, you’ll learn how to deploy proxy services, use authentication, implement policies to control HTTPS traffic and access, implement use control settings and policies, use the solution’s anti-malware features, implement data security and data loss prevention, perform administration of Cisco WSA solution, and more.
    Course Details & Class Schedule
  • Amazon AWS
    This course demonstrates how to efficiently use AWS security services to stay secure in the AWS Cloud. The course focuses on the security practices that AWS recommends for enhancing the security of your data and systems in the cloud. The course highlights the security features of AWS key services including compute, storage, networking, and database services. You will also learn how to leverage AWS services and tools for automation, continuous monitoring and logging, and responding to security incidents.
    Course Details & Class Schedule
  • Cisco
    The Understanding Cybersecurity Operations Fundamentals (CBROPS) v1.0 course teaches an understanding of the network infrastructure devices, operations, and vulnerabilities of the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol suite. You will learn basic information about security concepts, common network application operations and attacks, the Windows and Linux operating systems, and the types of data used to investigate security incidents. After completing this course, you will have the basic knowledge required to perform the job role of an associate-level cybersecurity analyst in a threat-centric security operations center to strengthen network protocol, protect your devices and increase operational efficiency. This course prepares you for the Cisco Certified CyberOps Associate certification. New – Recommended as preparation for the following exams: 200-201 - CBROPS Understanding Cisco Cybersecurity Operations Fundamentals Please note that this course is a combination of Instructor-Led and Self-Paced Study - 5 days in the classroom and approx. 1 day of self-study. The self-study content will be provided as part of the digital courseware that you will receive at the beginning of the course and should be part of your preparation for the exam.
    Course Details & Class Schedule