Certified Cloud Security Professional (CCSP) 2018
Prepare for the ISC2 CCSP certification exam with the Certified Cloud Security Professional course and lab. The lab simulates real-world, hardware, software and command line interface environments and can be mapped to any text-book, course or training. The course and lab are focused on the ISC2 CCSP exam objectives and include topics such as architectural concepts and design requirements; cloud data security, cloud platform and infrastructure security; cloud application security, operations, and legal and compliance. The ISC2 CCSP course offers a solid foundation for taking and passing the Certified Cloud Security Professional (CCSP) exam..
Full description of Certified Cloud Security Professional (CCSP) 2018
Certified Information Security Manager (CISM)
The ISACA Certified Information Security Manager (CISM) exam is designed to certify the competency of security professionals to manage designs; oversee and assess an enterprise’s information security. The exam covers competency in the following domains: Information Security Governance; Information Security; Incident Management; Information Risk Management and Compliance; Information Security Program Development and Management..
Full description of Certified Information Security Manager (CISM)
Certified Information Systems Auditor (CISA)
The ISACA Certified Information Systems Auditor (CISA) exam is designed to certify the competency of security professionals to audit, control, monitor, and assess information technology and business systems. It covers process of auditing information systems governance and management of IT; protection of information assets; maintenance and service management; information systems operations; and much more..
Full description of Certified Information Systems Auditor (CISA)
Certified Information Systems Security Professional (CISSP) 2018
Gear up to prepare for the ISC2 CISSP certification exam with CISSP Third edition course. The comprehensive study guide provides complete coverage of all the objectives covered in the ISC2 CISSP exam and provides knowledge and skills on topics such as security capabilities of Information Systems, security architecture maintenance, vulnerabilities of security architectures, designs, solution elements, vulnerabilities in web-based systems, vulnerabilities in mobile systems, vulnerabilities in embedded devices, and a lot more. Upon the completion of this course, students will be prepared to take the Certified Information Systems Security Professional (CISSP) 2018 certification exam..
Full description of Certified Information Systems Security Professional (CISSP) 2018
Cloud Computing Security Knowledge (CCSK)
The Cloud Computing Security Knowledge class provides students thorough coverage of cloud security fundamentals and prepares them to take the Cloud Security Alliance CCSK certification exam. The course begins with a detailed description of cloud computing and then expands into all major domains such as; Governance and Risk Management, the Cloud Architectural Framework and Business Continuity/Disaster Recovery..
Full description of Cloud Computing Security Knowledge (CCSK)
CompTIA Advanced Security Practitioner (CASP) CAS-003
Gain hands-on expertise in CompTIA Advanced Security Practitioner (CASP) certification exam with this course. CASP certification is a vendor-neutral credential designed for advanced-level IT security professionals to conceptualize, design, and engineer secure solutions across complex enterprise environments. The CAS-003 exam involves an application of critical thinking and judgment across a broad spectrum of security disciplines to propose and implement solutions that map to enterprise drivers while managing risk. There is no required prerequisite for this course however, the CASP certification is intended to follow CompTIA Security+ or equivalent experience and has a technical, hands-on focus at the enterprise level..
Full description of CompTIA Advanced Security Practitioner (CASP) CAS-003
CompTIA PenTest PT0-001
The CompTIA PenTest+ certification verifies that successful candidates have the knowledge and skills required to plan and scope an assessment, understand legal and compliance requirements, perform vulnerability scanning and penetration testing, analyze data, and effectively report and communicate results..
Full description of CompTIA PenTest PT0-001
Microsoft MS-101 - Microsoft 365 Mobility and Security
Get certified for the Microsoft 365 certification exam with the Microsoft 365: Mobility and Security (MS-101) course. The MS-101 study guide completely covers all the exam objectives and teaches you how to evaluate, plan, migrate, deploy, and manage Microsoft 365 services. This Microsoft 365 certification training has the best learning resources to help you understand all the basic and advanced topics covered in the Microsoft MS-101 certification exam..
Full description of Microsoft MS-101 - Microsoft 365 Mobility and Security
Systems Security Certified Practitioner (SSCP)
Get certified for the (ISC)² SSCP certification exam with the Systems Security Certified Practitioner (SSCP) course and lab. The lab can be mapped to any course, textbook, or training, therefore, adding value and a hands-on component to training. The SSCP course covers the common needs for privacy, confidentiality, integrity, and availability; SSCPs and professional ethics; ongoing, continuous monitoring, and more. The SSCP training will help you understand exam objectives completely with its various interactive learning resources..
Full description of Systems Security Certified Practitioner (SSCP)
Data Security Compliance
This course outlines important data security measures to be taken by individuals to protect sensitive data and PI. Some of the topics include how to prevent data breaches, safeguard, protecting your personal information, and different types of breaches. The security measures outlined in this course not only protect the individual (mobile devices, etc) but also protect data up to the corporate level. These safe practices can prevent hacking into personal social media accounts up to hacking of sensitive corporate data and data breaches. Learn how to better protect yourself and your company by implementing these security measures into your usage..
Full description of Data Security Compliance