Search by Topic


Course Search Results for:

security

  • Microsoft Windows Server
    Note: This course is being retired by Microsoft on December 31, 2021.

    This five-day, instructor-led course teaches IT professionals how they can enhance the security of the IT infrastructure that they administer. This course begins by emphasizing the importance of assuming that network breaches have occurred already, and then teaches you how to protect administrative credentials and rights to help ensure that administrators can perform only the tasks that they need to, when they need to. This course explains how you can use auditing and the Advanced Threat Analysis feature in Windows Server 2016 to identify security issues. You will also learn how to mitigate malware threats, secure your virtualization platform, and use deployment options such as Nano server and containers to enhance security. The course also explains how you can help protect access to files by using encryption and dynamic access control, and how you can enhance your network’s security.
    Course Details & Class Schedule
  • Microsoft SQL Server
    This course is being retired by Microsoft on December 31, 2021.

    This three-day instructor-led course provides students moving from earlier releases of SQL Server with an introduction to the new features in SQL Server 2016.
    Course Details & Class Schedule
  • Microsoft Visual Studio
    In this 5-day course, students will learn the basics of computer programming through the use of Microsoft Visual Studio 2013 and either the Visual C# or Visual Basic programming languages.
    Course Details & Class Schedule
  • Amazon AWS
    This course covers fundamental AWS cloud security concepts, including AWS access control, data encryption methods, and how network access to your AWS infrastructure can be secured. Based on the AWS Shared Security Model, you learn where you are responsible for implementing security in the AWS Cloud and what security-oriented services are available to you and why and how the security services can help meet the security needs of your organization.
    Course Details & Class Schedule
  • Microsoft Azure
    In this course students will gain the knowledge and skills needed to implement security controls, maintain the security posture, and identify and remediate vulnerabilities by using a variety of security tools. The course covers scripting and automation, virtualization, and cloud N-tier architecture.
    Course Details & Class Schedule
  • Microsoft Azure
    This course will provide foundational level knowledge on cloud concepts; core Azure services; security, privacy, compliance, and trust; and Azure pricing and support. Note: This course provides an Azure pass and time for you to participate in hands-on labs. If you do not need hands-on experience, consider the AZ-900T01: Microsoft Azure Fundamentals (1 day) course. The content for both courses align to the AZ-900 exam objective domain.
    Course Details & Class Schedule
  • Microsoft Azure
    This class is free of charge with the purchase of a Microsoft exam voucher for $99.

    This course will provide foundational level knowledge of cloud services and how those services are provided with Microsoft Azure. The course can be taken as an optional first step in learning about cloud services and Microsoft Azure, before taking further Microsoft Azure or Microsoft cloud services courses. This class is the first step on your Azure certification journey.
    Course Details & Class Schedule
  • Blockchain
    This dynamic instructor led course covers all known aspects of Blockchain security that exist in the Blockchain environment today. This course provides a detailed overview of all Blockchain security issues, including threats, risk mitigation, node security integrity, confidentiality, best security practices, advanced Blockchain security and more. The in-depth lab sessions will provide the student with practical, real world tools for not only recognizing security threats, but mitigation and prevention as well.
    Course Details & Class Schedule
  • Check Point Security
    The goal of this course is to provide an understanding of the advanced concepts and skills necessary to automate and orchestrate tasks relating to managing Check Point Security Policies.
    Course Details & Class Schedule
  • Check Point Endpoint Security
    The goal of this course is to provide a comprehensive understanding of Check Point Endpoint Security and how to deploy it within the corporate network environment.
    Course Details & Class Schedule
  • Check Point
    The goal of this course is to provide an understanding of the advanced concepts and skills necessary to automate and orchestrate tasks relating to managing Check Point Security Policies.
    Course Details & Class Schedule
  • Check Point
    This course provides a comprehensive understanding of the Check Point Multi-Domain Security Management solution and describes how to deploy it within the corporate network environment.
    Course Details & Class Schedule
  • Check Point
    The goal of this course is to provide an understanding of basic concepts and skills necessary to configure Check Point Security Gateway and Management Software Blades.
    Course Details & Class Schedule
  • Check Point
    This special CCSA and CCSE bundle covering Check Point Security Administration & Engineering (R80.20) provides you with an understanding of the basic concepts and skills necessary to configure Check Point Security Gateway and Management Software Blades.

    CCSA-R80.20: The goal of this course is to provide an understanding of basic concepts and skills necessary to configure Check Point Security Gateway and Management Software Blades.

    CCSE-R80.20: The goal of this course is to provide an understanding and skills necessary to configure and optimally manage Check Point Next Generation Firewalls.
    Course Details & Class Schedule
  • Check Point
    The goal of this course is to provide an understanding and skills necessary to configure and optimally manage Check Point Next Generation Firewalls.
    Course Details & Class Schedule
  • Check Point Security
    The goal of this course is to provide an understanding of the concepts and skills necessary to troubleshoot issues which may occur when managing the Check Point Security Management architecture and Security Gateways.
    Course Details & Class Schedule
  • Check Point Security
    Provide advanced troubleshooting skills to investigate and resolve more complex issues that may occur while managing your Check Point Security environment.
    Course Details & Class Schedule
  • Security
    The goal of the course is to prepare professionals for the challenging CCSP exam by covering the objectives of the exam based on the six domains as defined in the (ISC)2 CCSP common body of knowledge.
    Course Details & Class Schedule
  • CISM
    In this course, students will establish processes to ensure that information security measures align with established business needs.
    Course Details & Class Schedule
  • Security
    In this course, students will expand upon their knowledge by addressing the essential elements of the 8 domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals.
    Course Details & Class Schedule
  • Security
    In this course, students will evaluate organizational policies, procedures, and processes to ensure that an organizations information systems align with its overall business goals and objectives.
    Course Details & Class Schedule
  • CertNexus IoT
    In this course, students will learn general strategies for planning, designing, developing, implementing, and maintaining an IoT system through various case studies and by assembling and configuring an IoT device to work in a sensor network. Students will create an IoT device based on an ESP8266 microcontroller, implementing various common IoT features, such as analog and digital sensors, a web-based interface, MQTT messaging, and data encryption. This course prepares students for taking the CertNexus Certified Internet of Things (IoT) Practitioner (Exam ITP-110). This course includes a FREE exam voucher for ITP-110.
    Course Details & Class Schedule
  • The Cybersecurity Maturity Model Certification (CMMC), managed by the CMMC Accreditation Body (CMMC-AB), is a program through which an organization's cybersecurity program is measured by their initial and ongoing compliance with applicable cybersecurity practices as well as their integration of corresponding policies and plans into their overall business operations. By Fiscal Year 2026, all organizations providing products or services to the United States Department of Defense (DoD) must obtain at least a Maturity Level 1 certification under this program.
    Course Details & Class Schedule
  • Citrix (NetScaler) ADC
    Citrix Web App Firewall protects web apps and sites from known and unknown attacks. This threeday course will teach you how to address application services security requirements with Web App Firewall. After studying Citrix Web App Firewall, you'll learn about many different types of web attacks and vulnerabilities, such as SQL injection and cookie tampering, and how to protect against them. The course also covers policies, profiles and expressions; monitoring, management and reporting; and troubleshooting techniques. Highlighted features include the Adaptive Learning Engine and Secure Insight. This advanced course is designed for IT professionals with previous Citrix Networking experience.
    Course Details & Class Schedule
  • Citrix (NetScaler) ADC
    Learn how to configure your Citrix networking environment to address application services security requirements with Citrix Web App Firewall; automate and manage network services for scale-out of application architectures with Citrix Application Delivery Management; and optimize Citrix ADC-managed application delivery traffic. This fiveday course for experienced Citrix networking architects, engineers and administrators will teach you to deploy and manage Web App Firewall to protect web applications against different types of attacks. It will also give you a practical understanding of Citrix Application Delivery Management capabilities for centralized management of multiple Citrix ADC platforms, orchestration of changes, transaction reporting, infrastructure visualization and planning.
    Course Details & Class Schedule
  • Security
    COBIT 2019 builds on and integrates more than 25 years of development in this field, not only incorporating new insights from science, but also operationalizing these insights as practice. The heart of the COBIT framework updates COBIT principles while laying out the structure of the overall framework including: New concepts are introduced and terminology is explained—the COBIT Core Model and its 40 governance and management objectives provide the platform for establishing your governance program. The performance management system is updated and allows the flexibility to use maturity measurements as well as capability measurements. Introductions to design factors and focus areas offer additional practical guidance on flexible adoption of COBIT 2019, whether for specific projects or full implementation. From its foundation in the IT audit community, COBIT has developed into a broader and more comprehensive information and technology (I&T) governance and management framework and continues to establish itself as a generally accepted framework for I&T governance.
    Course Details & Class Schedule
  • CompTIA Security
    In this course, students will examine advanced security concepts, principles, and implementations that pertain to enterprise level security.
    Course Details & Class Schedule
  • CompTIA Security
    The course introduces tools and tactics to manage cybersecurity risks, identify various types of common threats, evaluate the organization's security, collect and analyze cybersecurity intelligence, and handle incidents as they occur.
    Course Details & Class Schedule
  • CompTIA Network+
    The student will describe the major networking technologies, systems, skills, and tools in use in modern networks.Taking this course will help the student prepare for the N10-007 exam and certification.
    Course Details & Class Schedule
  • CompTIA Security
    Security remains one of the hottest topics in IT and other industries. It seems that each week brings news of some new breach of privacy or security. As organizations scramble to protect themselves and their customers, the ability to conduct penetration testing is an emerging skill set that is becoming ever more valuable to the organizations seeking protection, and ever more lucrative for those who possess these skills. In this course, you will be introduced to some general concepts and methodologies related to pen testing, and you will work your way through a simulated pen test for a fictitious company.
    Course Details & Class Schedule
  • CompTIA Security
    In this course, students will build on their knowledge of and professional experience with security fundamentals, networks, and organizational security as you acquire the specific skills required to implement basic security services on any type of computer network.
    Course Details & Class Schedule
  • Security
    The CRISC course is designed for those who have experience with risk identification, assessment, and evaluation; risk response; risk monitoring; information systems control design and implementation; and information systems control monitoring and maintenance.
    Course Details & Class Schedule
  • Citrix Virtual Apps and Desktops
    Designed for experienced IT professionals this course builds on the foundational implementation and management skills introducing scalability, redundancy and security configurations.

    You will learn techniques to investigate many of the common issues that can affect environment health and how to solve issues more effectively in the advanced troubleshooting section. You will leave this course with a good understanding of how to manage more complex solutions such as multi-location environments with configurations around StoreFront, the Delivery Controllers, Cloud Connectors and HDX.
    Course Details & Class Schedule
  • CyberSAFE
    Regardless of your computer experience, this class will help you become more aware of technology-related risks and what you can do to protect yourself and your organization from them. This course will help you to understand security compliance considerations, social engineering, malware, and various other data security-related concepts. In this course, you will explore the hazards and pitfalls and learn how to use technology safely and securely.
    Course Details & Class Schedule
  • CyberSec
    This course covers the duties of those who are responsible for monitoring and detecting security incidents in information systems and networks, and for executing a proper response to such incidents. Depending on the size of the organization, this individual may act alone or may be a member of a cybersecurity incident response team (CSIRT). The course introduces tools and tactics to manage cybersecurity risks, identify various types of common threats, evaluate the organization's security, collect and analyze cybersecurity intelligence, and handle incidents as they occur. Ultimately, the course promotes a comprehensive approach to security aimed toward those on the front lines of defense. This course is designed to assist students in preparing for the CyberSec First Responder™ (Exam CFR-310) certification examination. What you learn and practice in this course can be a significant part of your preparation.
    Course Details & Class Schedule
  • EC-Council
    The Certified Application Security Engineer (CASE) credential is developed in partnership with large application and software development experts globally. The CASE credential tests the critical security skills and knowledge required throughout a typical software development life cycle (SDLC), focusing on the importance of the implementation of secure methodologies and practices in today’s insecure operating environment. The CASE certified training program is developed concurrently to prepare software professionals with the necessary capabilities that are expected by employers and academia globally. It is designed to be a hands-on, comprehensive application security course that will help software professionals create secure applications. The training program encompasses security activities involved in all phases of the Software Development Lifecycle (SDLC): planning, creating, testing, and deploying an application. Unlike other application security trainings, CASE goes beyond just the guidelines on secure coding practices and includes secure requirement gathering, robust application design, and handling security issues in post development phases of application development. This makes CASE one of the most comprehensive certifications on the market today. It is desired by software application engineers, analysts, testers globally, and respected by hiring authorities.
    Course Details & Class Schedule
  • EC-Council
    In this course, students will learn in-depth content in each of the 5 CCISO Domains
    Course Details & Class Schedule
  • EC-Council
    CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so you will be better positioned to setup your security infrastructure and defend against future attacks. An understanding of system weaknesses and vulnerabilities helps organizations strengthen their system security controls to minimize the risk of an incident. CEH was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to achieve the CEH credential. You will be exposed to an entirely different posture toward the responsibilities and measures required to be secure. Now in its 11th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies.
    Course Details & Class Schedule
  • EC-Council
    Certified Network Defender (CND) is a vendor-neutral, hands-on, instructor-led comprehensive network security certification training program. It is a skills-based, lab intensive program based on a job-task analysis and cybersecurity education framework presented by the National Initiative of Cybersecurity Education (NICE). The course has also been mapped to global job roles and responsibilities and the Department of Defense (DoD) job roles for system/network administrators. The course is designed and developed after extensive market research and surveys.
    Course Details & Class Schedule
  • EC-Council
    This course will provide participants the necessary skills to identify an intruders footprints and to properly gather the necessary evidence to prosecute in the court of law.
    Course Details & Class Schedule
  • F5 Networks
    This course gives network administrators, network operators, and network engineers a functional understanding of the BIG-IP system as it is commonly deployed in an application delivery network. The course introduces students to the BIG-IP system, its configuration objects, how it processes traffic, and how typical administrative and operational activities are performed. The course includes lecture, hands-on labs, interactive demonstrations, and discussions.
    Course Details & Class Schedule
  • F5
    In this 4 day course, students are provided with a functional understanding of how to deploy, tune, and operate F5 Advanced Web Application Firewall to protect their web applications from HTTP-based attacks. The course includes lecture, hands-on labs, and discussion about different F5 Advanced Web Application Firewall tools for detecting and mitigating threats from multiple attack vectors such web scraping, Layer 7 Denial of Service, brute force, bots, code injection, and zero day exploits.
    Course Details & Class Schedule
  • F5
    This course uses lectures and hands-on exercises to give participants real-time experience in setting up and configuring the BIG-IP Advanced Firewall Manager (AFM) system. Students are introduced to the AFM user interface, stepping through various options that demonstrate how AFM is configured to build a network firewall and to detect and protect against DoS (Denial of Service) attacks. Reporting and log facilities are also explained and used in the course labs. Further Firewall functionality and additional DoS facilities for DNS and SIP traffic are discussed.
    Course Details & Class Schedule
  • F5
    This three-day course gives network administrators, network operators, and network engineers a functional understanding of BIG-IP Access Policy Manager as it is commonly deployed in both application delivery network and remote access settings. The course introduces students to BIG-IP Access Policy Manager, its configuration objects, how it commonly deployed, and how typical administrative and operational activities are performed. The course includes lecture, hands-on labs, interactive demonstrations, and discussions.
    Course Details & Class Schedule
  • F5
    This course gives networking professionals a functional understanding of the BIG-IP DNS system as it is commonly used. The course covers configuration and ongoing management of the BIG-IP DNS system, and includes a combination of lecture, discussion, and hands-on labs.
    Course Details & Class Schedule
  • F5
    This course gives network professionals a functional understanding of BIG-IP Local Traffic Manager, introducing students to both commonly used and advanced BIG-IP LTM features and functionality. Incorporating lecture, extensive hands-on labs, and classroom discussion, the course helps students build the well-rounded skill set needed to manage BIG-IP LTM systems as part of a flexible and high performance application delivery network.
    Course Details & Class Schedule
  • F5
    This course uses lectures and hands-on exercises to give participants real-time experience in configuring and using the BIG-IQ® product. Students are introduced to BIG-IQ, its interface, and its various functionality.
    Course Details & Class Schedule
  • F5
    This course provides networking professionals a functional understanding of iRules development. The course builds on the foundation of the Administering BIG-IP or Configuring LTM course, demonstrating how to logically plan and write iRules to help monitor and manage common tasks involved with processing traffic on the BIG-IP system. Extensive course labs consist of writing, applying and evaluating the effect of iRules on local traffic. This hands-on course includes lectures, labs, and discussions.
    Course Details & Class Schedule
  • F5
    In this 1 day course, participants identify and mitigate common web application vulnerabilities on the client and application sides of the threat spectrum. Participants use F5 Advanced WAF to quickly configure advanced protection against common Layer 7 vulnerabilities (OWASP Top Ten) and bot defense.
    Course Details & Class Schedule
  • F5
    This course gives networking professionals hands-on knowledge of how to troubleshoot a BIG-IP system using a number of troubleshooting techniques as well as troubleshooting and system tools. This course includes lectures, labs, and discussions.
    Course Details & Class Schedule
  • This class is based on the six HCISPP domains of the (ISC)² Common Body of Knowledge (CBK), ensuring students successfully prepare for the HCISPP exam and enhance their overall competencies in healthcare security and privacy.
    Course Details & Class Schedule
  • Cisco
    The Implementing and Configuring Cisco Identity Services Engine (SISE) v3.0 course shows you how to deploy and use Cisco® Identity Services Engine (ISE) v2.4, an identity and access control policy platform that simplifies the delivery of consistent, highly secure access control across wired, wireless, and VPN connections. This hands-on course provides you with the knowledge and skills to implement and use Cisco ISE, including policy enforcement, profiling services, web authentication and guest access services, BYOD, endpoint compliance services, and TACACS+ device administration. Through expert instruction and hands-on practice, you will learn how to use Cisco ISE to gain visibility into what is happening in your network, streamline security policy management, and contribute to operational efficiency.
    Course Details & Class Schedule
  • Cisco Security Core Technologies
    In this course, Implementing and Operating Cisco Security Core Technologies (SCOR), students will master the skills and technologies needed to implement core Cisco security solutions to provide advanced threat protection against cybersecurity attacks. Students will learn security for networks, cloud and content, endpoint protection, secure network access, visibility and enforcements. They will get extensive hands-on experience deploying Cisco Firepower Next-Generation Firewall and Cisco ASA Firewall; configuring access control policies, mail policies, and 802.1X Authentication; and more. Students will also get introductory practice on Cisco Stealthwatch Enterprise and Cisco Stealthwatch Cloud threat detection features.

    This course will help you prepare to take the Implementing and Operating Cisco Security Core Technologies (350-701 SCOR) exam. It also helps you prepare for the CCNP Security and CCIE Security certifications and for senior-level security roles featuring Cisco security solutions.
    Course Details & Class Schedule
  • Cisco
    The Cisco Service Provider – 5G solution course introduces the participants to evolution of 5th generation cellular networks, discuss the various trends driving the need for 5G, business impact of 5G networks and Cisco’s 5G solution for the service providers to deploy and rollout new services to customers and enable them to improve operational efficiency.

    The course will cover Cisco 5G Powerx consisting Unified Enablement Platform, Seamless X-Access convergence, 3-Stage realization program. The Cisco ultra services platform, Cisco 5G policy Suite (CPS) solutions, Cisco SONFlex, NCS500 service access routers, Cisco Security for 5G networks and Cisco SP network automation are discussed in detail.
    Course Details & Class Schedule
  • Microsoft 365
    This course covers three central elements of Microsoft 365 enterprise administration – Microsoft 365 security management, Microsoft 365 compliance management, and Microsoft 365 device management. In Microsoft 365 security management, you will examine all the common types of threat vectors and data breaches facing organizations today, and you will learn how Microsoft 365’s security solutions address these security threats. You will be introduced to the Microsoft Secure Score, as well as to Azure Active Directory Identity Protection and much more.
    Course Details & Class Schedule
  • Microsoft 365
    This four-MOC packaged set aligned to Microsoft 365 Exam: Microsoft 365 Security Administrator contains courseware that helps prepare students for Exams MS-500. Passing this exam is required to earn the Microsoft 365 Security Administrator certification.
    Course Details & Class Schedule
  • NIST
    This course is targeted at IT and Cybersecurity professionals looking to become certified on how to operationalize the NIST Cybersecurity Framework (NCSF) across an enterprise and its supply chain.
    Course Details & Class Schedule
  • NIST
    This course is targeted at IT and Cybersecurity professionals looking to become certified on how to operationalize the NIST Cybersecurity Framework (NCSF) across an enterprise and its supply chain.
    Course Details & Class Schedule
  • Palo Alto Prisma Access SASE Security
    The Prisma Access SASE Security: Design and Operation (EDU-318) course describes Prisma Access Secure Access Service Edge (SASE) and how it helps organizations embrace cloud and mobility by providing network and network security services from the cloud.

    This course is intended for people in the fields of public cloud security and cybersecurity, or for anyone who wants to learn how to secure remote networks and mobile users.
    Course Details & Class Schedule
  • Red Hat Networking
    As an infrastructure administrator or security professional, this course prepares you to identity and mitigate threats to OpenShift container-based infrastructure. You will also understand how to implement and manage secure architecture, policies, and procedures for modern containerized applications and software-defined networking.

    You will discover how to use secure and trusted container images, registries, and source code; manage network and storage isolation; implement application single sign-on; and configure appropriate security constraints and service role–based access control. You will also understand how existing core Linux technologies - such as namespaces, cgroups, seccomp, capabilities, and SELinux—provide a robust and mature host environment with strongly secure containers.

    This course is based on Red Hat®Enterprise Linux® 7.5, Red Hat® OpenShift® Container Platform 3.11, and Red Hat® Identity Manager 7.5.

    Course Details & Class Schedule
  • Red Hat Linux
    This course is ideal for security administrators and system administrators who need to manage the secure operation of servers running Red Hat® Enterprise Linux®, whether deployed on physical hardware, as virtual machines, or as cloud instances. Maintaining security of computing systems is a process of managing risk through the implementation of processes and standards backed by technologies and tools. In this course, you will discover and understand the resources that can be used to help you implement and comply with your security requirements. This course is based on Red Hat Enterprise Linux 7.5, Red Hat Satellite 6.3, Red Hat Ansible® Engine 2.5, Red Hat Ansible Tower 3.2, and Red Hat Insights.
    Course Details & Class Schedule
  • Microsoft Technical Training
    Learn how to investigate, respond to, and hunt for threats using Microsoft Azure Sentinel, Azure Defender, and Microsoft 365 Defender. In this course you will learn how to mitigate cyberthreats using these technologies. Specifically, you will configure and use Azure Sentinel as well as utilize Kusto Query Language (KQL) to perform detection, analysis, and reporting. The course was designed for people who work in a Security Operations job role and helps learners prepare for the exam SC-200: Microsoft Security Operations Analyst.
    Course Details & Class Schedule
  • This course provides Identity and Access Management Professionals with the knowledge and skills needed to implement identity controls, maintain an organization’s identity & access posture, and identify and remediate identity vulnerabilities. This course includes topics for identity management and governance, access management for applications and device, and end-to-end authentication and access management operations.
    Course Details & Class Schedule
  • Learn how to protect information in your Microsoft 365 deployment. This course focuses on data governance and information protection within your organization. The course covers implementation of data loss prevention policies, sensitive information types, sensitivity labels, data retention policies and Office 365 message encryption among other related topics. The course helps learners prepare for the Microsoft Information Protection Administrator exam (SC-400).
    Course Details & Class Schedule
  • This course provides foundational level knowledge on security, compliance, and identity concepts and related cloud-based Microsoft solutions.
    Course Details & Class Schedule
  • Cisco
    The Securing Email with Cisco Email Security Appliance (SESA) v3.1 course shows you how to deploy and use Cisco® Email Security Appliance to establish protection for your email systems against phishing, business email compromise, and ransomware, and to help streamline email security policy management. This hands-on course provides you with the knowledge and skills to implement, troubleshoot, and administer Cisco Email Security Appliance, including key capabilities such as advanced malware protection, spam blocking, anti-virus protection, outbreak filtering, encryption, quarantines, and data loss prevention.
    Course Details & Class Schedule
  • Cisco
    The Securing the Web with Cisco Web Security Appliance (SWSA) v3.0 course shows you how to implement, use, and maintain Cisco® Web Security Appliance (WSA), powered by Cisco Talos, to provide advanced protection for business email and control against web security threats. Through a combination of expert instruction and hands-on practice, you’ll learn how to deploy proxy services, use authentication, implement policies to control HTTPS traffic and access, implement use control settings and policies, use the solution’s anti-malware features, implement data security and data loss prevention, perform administration of Cisco WSA solution, and more.
    Course Details & Class Schedule
  • Amazon AWS
    This course demonstrates how to efficiently use AWS security services to stay secure in the AWS Cloud. The course focuses on the security practices that AWS recommends for enhancing the security of your data and systems in the cloud. The course highlights the security features of AWS key services including compute, storage, networking, and database services. You will also learn how to leverage AWS services and tools for automation, continuous monitoring and logging, and responding to security incidents.
    Course Details & Class Schedule
  • Cisco
    The Understanding Cybersecurity Operations Fundamentals (CBROPS) v1.0 course teaches an understanding of the network infrastructure devices, operations, and vulnerabilities of the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol suite. You will learn basic information about security concepts, common network application operations and attacks, the Windows and Linux operating systems, and the types of data used to investigate security incidents. After completing this course, you will have the basic knowledge required to perform the job role of an associate-level cybersecurity analyst in a threat-centric security operations center to strengthen network protocol, protect your devices and increase operational efficiency. This course prepares you for the Cisco Certified CyberOps Associate certification. New – Recommended as preparation for the following exams: 200-201 - CBROPS Understanding Cisco Cybersecurity Operations Fundamentals Please note that this course is a combination of Instructor-Led and Self-Paced Study - 5 days in the classroom and approx. 1 day of self-study. The self-study content will be provided as part of the digital courseware that you will receive at the beginning of the course and should be part of your preparation for the exam.
    Course Details & Class Schedule
  • VMWare Carbon Black
    This one-day course teaches you how to use the VMware Carbon Black® App ControlTM product and leverage the capabilities to configure and maintain the system according to their organization’s security posture and organizational policies. This course provides an in-depth, technical understanding of the Carbon Black App Control product through comprehensive coursework and hands-on scenario-based labs.
    Course Details & Class Schedule
  • VMware Carbon Black Portfolio
    This 5-day course teaches you how to install, configure, and manage the VMware Carbon Black® Portfolio suite of products, which include: VMware Carbon Black® App Control™ Administrator, VMware Carbon Black® EDR™ Administrator. VMware Carbon Black Cloud Endpoint™ Standard, VMware Carbon Black® Cloud Audit and Remediation, VMware Carbon Black® Cloud Enterprise EDR™. You learn how to use the capabilities of the products according to the organization’s security posture and organizational policies. This course provides an in-depth, technical understanding of the Carbon Black Portfolio through comprehensive coursework, hands-on labs, and scenario-based exercises.
    Course Details & Class Schedule
  • VMware Workspace ONE
    In this five-day course, you will configure and secure unified endpoint activation, registration, and authentication. You will learn how to integrate industry-recognized enterprise technologies with VMware Workspace ONE®. Through a combination of hands-on labs, simulations, and interactive lectures, you learn how to configure and manage the endpoint lifecycle. The principles of enterprise mobility, unified endpoint, and identity management are addressed throughout the course. You will leave the training empowered with the foundational skills and knowledge needed to effectively implement Workspace ONE.
    Course Details & Class Schedule