COMPTIA Security+ Certification
The CompTIA® Security+® course is designed to help you prepare for the CompTIA Security+ certification examination (SY0-601). Students will implement and monitor security on networks, applications, and operating systems, and respond to security breaches.
Course Objectives:
Upon successful completion of this course, students will be able to:
- Identify the fundamental concepts of computer security.
- Identify security threats and vulnerabilities.
- Examine network security.
- Manage application, data and host security.
- Identify access control and account management security measures.
- Manage certificates.
- Identify compliance and operational security measures.
- Manage risk.
- Manage security incidents.
- Develop business continuity and disaster recovery plans.
Delivery Method: Online Live Virtual Instructor Led Training
Intended Audience: This course is targeted toward the information technology (IT) professional who has networking and administrative skills in Windows®-based Transmission Control Protocol/Internet Protocol (TCP/IP) networks; familiarity with other operating systems, such as Mac OS X®, Unix, or Linux; and who wants to further a career in IT by acquiring foundational knowledge of security topics; prepare for the CompTIA Security+ certification examination; or use Security+ as the foundation for advanced security certifications or career roles.
COMPTIA Advanced Security Practitioner (CASP+)
In this course, students will examine advanced security concepts, principles, and implementations that pertain to enterprise level security.
ETPL# 10129
Course Objectives:
Upon successful completion of this course, students will be able to:
- Identify enterprise security fundamentals.
- Apply enterprise security technology solutions.
- Implement security design and solutions.
- Manage risk, policies and procedures within an enterprise.
- Integrate security solutions within an enterprise.
- Conduct security research and analysis.
Delivery Method: Online Live Virtual Instructor Led Training
Intended Audience: This course is targeted toward an IT Professional that has the technical knowledge and skills required to conceptualize, design, and engineer secure solutions across complex enterprise environments. Students should have a minimum of 10 years' experience including at least 5 years of hands-on technical security experience.
Certified Information Systems Security Professional
This course will expand upon your knowledge by addressing the essential elements of the eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process, while providing a framework to prepare for CISSP certification. By defining eight security domains that comprise a CBK, industry standards for the information systems security professional have been established. The skills and knowledge you gain in this course will help you master the eight CISSP domains and ensure your credibility and success within the information systems security field.
ETPL# 8999
Course Objectives:
In this course, you will identify and reinforce the major security subjects from the eight domains of the (ISC)2 CISSP CBK. You will:
- Analyze components of the Security and Risk Management domain.
- Analyze components of the Asset Security domain.
- Analyze components of the Security Engineering domain.
- Analyze components of the Communications and Network Security domain.
- Analyze components of the Identity and Access Management domain.
- Analyze components of the Security Assessment and Testing domain.
- Analyze components of the Security Operations domain.
- Analyze components of the Software Development Security domain.
Delivery Method: Online Live Virtual Instructor Led Training
Intended Audience: This course is intended for experienced IT security-related practitioners, auditors, consultants, investigators, or instructors, including network or security analysts and engineers, network administrators, information security specialists, and risk management professionals, who are pursuing CISSP training and certification to acquire the credibility and mobility to advance within their current computer security careers or to migrate to a related career.
Through the study of all eight CISSP Common Body of Knowledge (CBK) domains, students will validate their knowledge by meeting the necessary preparation requirements to qualify to sit for the CISSP certification exam. Additional CISSP certification requirements include a minimum of five years of direct professional work experience in two or more fields related to the eight CBK security domains, or a college degree and four years of experience.
EC-Council Certified Ethical Hacker (CEH) v11
The Certified Ethical Hacker (CEH v11) program is a trusted and respected ethical hacking training Program that any information security professional will need. Since its inception in 2003, the Certified Ethical Hacker has been the absolute choice of the industry globally. It is a respected certification in the industry and is listed as a baseline certification on the United States Department of Defense Directive 8570. The CEH exam is ANSI 17024 compliant adding credibility and value to credential members.
The Certified Ethical Hacking v11 course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.
Delivery Method: Online Live Virtual Instructor Led Training
CyberSec First Responder (CFR): Threat Detection and Response
The CyberSec First Responder: Threat Detection and Response course, or CFR, will prepare security professionals to become the first line of response against cyber-attacks by teaching students to analyze threats, design secure computing and network environments, proactively defend networks, and respond/investigate cybersecurity incidents.
Delivery Method: Online Live Virtual Instructor Led Training
Intended Audience:
This course is designed for information assurance professionals who perform job functions related to the development, operation, management, and enforcement of security capabilities for systems and networks.
Certified Information Security Manager (CISM)
In this course, students will establish processes to ensure that information security measures align with established business needs.
ETPL# 10130
Course Objectives:
- Establish and maintain a framework to provide assurance that information security strategies are aligned with business objectives and consistent with applicable laws and regulations.
- Identify and manage information security risks to achieve business objectives.
- Create a program to implement the information security strategy.
- Implement an information security program.
- Oversee and direct information security activities to execute the information security program.
- Plan, develop, and manage capabilities to detect, respond to, and recover from information security incidents.
Delivery Method: Online Live Virtual Instructor Led Training
Intended Audience: The intended audience for this course is information security and IT professionals, such as network administrators and engineers, IT managers, and IT auditors, and other individuals who want to learn more about information security, who are interested in learning in-depth information about information security management, who are looking for career advancement in IT security, or who are interested in earning the CISM certification.