Certified Cloud Security Professional (CCSP) 2018
Prepare for the ISC2 CCSP certification exam with the Certified Cloud Security Professional course and lab. The lab simulates real-world, hardware, software and command line interface environments and can be mapped to any text-book, course or training. The course and lab are focused on the ISC2 CCSP exam objectives and include topics such as architectural concepts and design requirements; cloud data security, cloud platform and infrastructure security; cloud application security, operations, and legal and compliance. The ISC2 CCSP course offers a solid foundation for taking and passing the Certified Cloud Security Professional (CCSP) exam..
Full description of Certified Cloud Security Professional (CCSP) 2018
Certified Information Security Manager (CISM)
The ISACA Certified Information Security Manager (CISM) exam is designed to certify the competency of security professionals to manage designs; oversee and assess an enterprise’s information security. The exam covers competency in the following domains: Information Security Governance; Information Security; Incident Management; Information Risk Management and Compliance; Information Security Program Development and Management..
Full description of Certified Information Security Manager (CISM)
Certified Information Systems Auditor (CISA)
The ISACA Certified Information Systems Auditor (CISA) exam is designed to certify the competency of security professionals to audit, control, monitor, and assess information technology and business systems. It covers process of auditing information systems governance and management of IT; protection of information assets; maintenance and service management; information systems operations; and much more..
Full description of Certified Information Systems Auditor (CISA)
Certified Information Systems Security Professional (CISSP) 2018
Gear up to prepare for the ISC2 CISSP certification exam with CISSP Third edition course. The comprehensive study guide provides complete coverage of all the objectives covered in the ISC2 CISSP exam and provides knowledge and skills on topics such as security capabilities of Information Systems, security architecture maintenance, vulnerabilities of security architectures, designs, solution elements, vulnerabilities in web-based systems, vulnerabilities in mobile systems, vulnerabilities in embedded devices, and a lot more. Upon the completion of this course, students will be prepared to take the Certified Information Systems Security Professional (CISSP) 2018 certification exam..
Full description of Certified Information Systems Security Professional (CISSP) 2018
Cisco CCNA Cyber Ops - Implementing Cisco Cybersecurity Operations (SECOPS) 210-255
Cisco CCNA Cyber Ops - Understanding Cisco Cybersecurity Fundamentals (SECFND) 210-250
Cisco CCNA Cyber Ops (210-250 and 210-255)
Today's organizations are challenged with rapidly detecting cybersecurity breaches and effectively responding to security incidents. Teams of people in Security Operations Centers (SOC’s) keep a vigilant eye on security systems, protecting their organizations by detecting and responding to cybersecurity threats.
The CCNA Cyber Ops certification prepares candidates to begin a career working with associate-level cybersecurity analysts within security operations centers..
Full description of Cisco CCNA Cyber Ops (210-250 and 210-255)
Cloud Computing Security Knowledge (CCSK)
The Cloud Computing Security Knowledge class provides students thorough coverage of cloud security fundamentals and prepares them to take the Cloud Security Alliance CCSK certification exam. The course begins with a detailed description of cloud computing and then expands into all major domains such as; Governance and Risk Management, the Cloud Architectural Framework and Business Continuity/Disaster Recovery..
Full description of Cloud Computing Security Knowledge (CCSK)
CompTIA Advanced Security Practitioner (CASP) CAS-003
Gain hands-on expertise in CompTIA Advanced Security Practitioner (CASP) certification exam with this course. CASP certification is a vendor-neutral credential designed for advanced-level IT security professionals to conceptualize, design, and engineer secure solutions across complex enterprise environments. The CAS-003 exam involves an application of critical thinking and judgment across a broad spectrum of security disciplines to propose and implement solutions that map to enterprise drivers while managing risk. There is no required prerequisite for this course however, the CASP certification is intended to follow CompTIA Security+ or equivalent experience and has a technical, hands-on focus at the enterprise level..
Full description of CompTIA Advanced Security Practitioner (CASP) CAS-003
CompTIA Cybersecurity Analyst (CySA+) CS0-001
CySA+ is the only intermediate high-stakes cybersecurity analyst certification with performance-based questions covering security analytics, intrusion detection and response. High-stakes exams are proctored at a Pearson VUE testing center in a highly secure environment. CySA+ is the most up-to-date security analyst certification that covers advanced persistent threats in a post-2014 cybersecurity environment. This course includes FREE access for 12 months to a cloud based lab platform to assist students develop the practical information technology (IT) skills necessary to succeed in high in demand IT jobs..
Full description of CompTIA Cybersecurity Analyst (CySA+) CS0-001
CompTIA PenTest PT0-001
The CompTIA PenTest+ certification verifies that successful candidates have the knowledge and skills required to plan and scope an assessment, understand legal and compliance requirements, perform vulnerability scanning and penetration testing, analyze data, and effectively report and communicate results..
Full description of CompTIA PenTest PT0-001
Data Security Compliance
This course outlines important data security measures to be taken by individuals to protect sensitive data and PI. Some of the topics include how to prevent data breaches, safeguard, protecting your personal information, and different types of breaches. The security measures outlined in this course not only protect the individual (mobile devices, etc) but also protect data up to the corporate level. These safe practices can prevent hacking into personal social media accounts up to hacking of sensitive corporate data and data breaches. Learn how to better protect yourself and your company by implementing these security measures into your usage..
Full description of Data Security Compliance
Cybersecurity Awareness - Building Your Cybersecurity Vocabulary
This course is focused on conveying topics and vocabulary specific to cyber security, so if you are new to infosec and want to start learning the basics, this course is for you. Throughout this course students will learn new words, their meanings, the context in which they are used and will ultimately gain an understanding of topics and terminology as they relate to cyber security. This course is aimed at beginning skill levels..
Full description of Cybersecurity Awareness - Building Your Cybersecurity Vocabulary
Cybersecurity Awareness - Cybersecurity While Traveling
This course’s target audience is anyone who travels or manages travel policies. It is not intended for a cyber security expert and does not go into too many technical details. This course is intended for a beginning level audience, but points to technology that can quickly escalate into intermediate or advanced discussions. Main concepts explored will include: Threats and Countermeasures, Wireless Situations, Wired Situations, Travel Triangle of Security, and Travel Tips..
Full description of Cybersecurity Awareness - Cybersecurity While Traveling
Cybersecurity Awareness - Electronic Commerce Security
The course will cover the different types of electronic commerce, and the associated risks. The students will learn how to interact with electronic commerce sites securely, how to secure electronic commerce sites, and have a better understanding of how they connect with business-to-business transactions, business-to-consumer transactions, consumer-to-consumer transactions, and how to secure those transactions. This courses is intended for all employees that engage in personal or professional e-commerce transactions. .
Full description of Cybersecurity Awareness - Electronic Commerce Security
Cybersecurity Awareness - Locking Down Our Public Information
This course will teach people how to limit their exposure and reduce what attackers are able to discover about them and their company. Upon course completion, learners will be exposed to tools and techniques to find their own information online and reduce the likelihood it will be abused. This course is focused on defensive security to help protect individuals and organizations. This is aimed at the beginner level, yet anyone who uses the internet would benefit from this course. Key concepts covered include: Understanding what information is available online, Google Dorks and the GHDB, Attackers Perspective on OSINT, Metadata, Geolocations, public footprint, Social media, Protecting information, and Tools of the trade. .
Full description of Cybersecurity Awareness - Locking Down Our Public Information
Cybersecurity Awareness - Malware Explained
This course talks about the history of malware, how it works, understanding the risk and how to protect against it. Students will learn the basics of malware in the context of both home and corporate users and will understand how to combat malicious software in an effective way. Corporate and home computer users will benefit from this course as it is intended for anyone with a vested interest in learning how to secure their systems from malware. .
Full description of Cybersecurity Awareness - Malware Explained
Cybersecurity Awareness - Mobile Device Security
Mobile device security is targeted at those who are moderate to heavy users of mobile devices but are unfamiliar with the risks inherent in accepting default, manufacturer and app vendor settings. This course introduces those who use mobile devices as part of their everyday background—whether at work, study, or play—to techniques for protecting those devices from being an attacker’s playground. By shifting security to the foreground, those who attend this course will learn to: Identify vulnerabilities in different mobile devices, apps, communications channels, Harden their devices against common attacks, Configure frequently used apps against misuse by others, Reduce exposure to compromised routers and electronic eavesdropping..
Full description of Cybersecurity Awareness - Mobile Device Security
Cybersecurity Awareness - Portable Data Protection and Destruction
This course is directed at those who have captured data over time and want to establish intentional control over its accessibility, use, and disposition. This course is appropriate for a range of individuals, from those who have not contemplated developing a data governance plan to those who have one in place but would like to validate assumptions they have made..
Full description of Cybersecurity Awareness - Portable Data Protection and Destruction
Cybersecurity Awareness - Secure Browsing
This course is intended to teach more about the number one tool we use to access the web: Our browser. We will discuss browser choices, how to configure a browser for our security and privacy needs and how to spot malicious websites. In addition to discussing these topics, lab/demos will be provided to ensure a firm grasp on the concepts being discussed. This is aimed at the beginner level, yet anyone who uses the internet would benefit from this course. Key concepts covered include Browser choices, Browser setup, VPN, private browsing, secure settings and cookies, Downloads and an introduction to TOR..
Full description of Cybersecurity Awareness - Secure Browsing
Cybersecurity Awareness - Secure Password Storage
This course is intended to teach people to stop remembering large numbers of passwords and how to manage password security across a large number of systems. In addition to discussing these topics, lab/demos will be provided to ensure a firm grasp on the concepts being discussed. Key concepts covered include: Password strength, Password reuse, Securely storing and using passwords, Password convenience, How to configure and manage password storage technology, and how to successfully use password storage technology. .
Full description of Cybersecurity Awareness - Secure Password Storage
Cybersecurity Awareness - Social Networking at Work
This course is directed at those who use social media accounts for business or personal use. This course will review different types of social media, review expectations of privacy, explain the risks of social media and provide ideas on how we can protect ourselves while using this technology..
Full description of Cybersecurity Awareness - Social Networking at Work
Cybersecurity Awareness - The Internet of Things
The Internet of Things will change our personal and professional lives forever. By 2020, there are expected to be over 50 billion devices communicating through the Internet. These devices will range from doorbells, thermostats, cars, and washing machines. This devices can make our lives easier and more efficient. At the same time, some of these devices may put our safety and privacy at risk. Knowing about the how the Internet of Things works and what we can do to be safe is important..
Full description of Cybersecurity Awareness - The Internet of Things