CompTIA Security+ Pre-approved Training for CompTIA Security+ Continuing Education Units (CEUs)
|
|
- Jason Hopkins
- 6 years ago
- Views:
Transcription
1 CompTIA Security+ Pre-approved Training for CompTIA Security+ Continuing Education Units (CEUs) Note: Approved training courses in this document are subject to change without prior notification. Training submitted based on prior approval will remain valid. Training submitted after the date on this document must meet this documents training requirements. Training approved in this document is based on the CompTIA Security+ - SY0-401 objectives. Activity name to use when uploading CEUs into a certification record: Completed a Training Course Training formats accepted are Classroom-Based, Live Online, Private On-Site, and Self-paced e- learning. CEU Required Documentation: The certified professional must upload a certificate of completion into their certification record as proof of attendance. The completion certification must contain the following information: 1. Name of training provider 2. Training course title 3. Name of the certified professional 4. Date the training was completed The course duration hours are to be used when entering CEU hours in a certification record. Please see the training provider course descriptions for durations. If a certified professional cannot provide proof of completion the training cannot be used for CEUs. CEU Activity Guidelines: If renewing a good for life certification the training must have been completed within 90 days prior to enrolling in the Continuing Education (CE) program or within the 3-year CE cycle. If renewing a CE certification, training must be completed within the 3-year CE cycle.
2 CERTIFICATION PROVIDER COURSE TITLE APPLE MAVERICKS 101: OS X SUPPORT ESSENTIALS 10.9 MOUNTAIN LION 201: MAC OS X SERVER ESSENTIALS V10.8 MAVERICKS 201: OS X SERVER ESSENTIALS 10.9 CISCO INTERCONNECTING CISCO NETWORKING DEVICES PART 1 (ICND1) 1.0 INTERCONNECTING CISCO NETWORKING DEVICES, PART 1 (ICND1) 2.0 INTERCONNECTING CISCO NETWORKING DEVICES, PART 2 (ICND2) 2.0 COMPTIA CWNP EC-COUNCIL INTERCONNECTING CISCO NETWORKING DEVICES PART 2 (ICND2) 1.0 INTERCONNECTING CISCO NETWORKING DEVICES: ACCELERATED (CCNAX) 1.0 INTERCONNECTING CISCO NETWORKING DEVICES: ACCELERATED (CCNAX) 2.0 INTRODUCING CISCO DATA CENTER NETWORKING (DCICN) 1.0 INTRODUCING CISCO DATA CENTER TECHNOLOGIES (DCICT) 1.0 IMPLEMENTING CISCO IOS NETWORK SECURITY (IINS) 2.0 IMPLEMENTING CISCO SECURE ACCESS SOLUTIONS (SISAS) 1.0 IMPLEMENTING CISCO EDGE NETWORK SECURITY SOLUTIONS (SENSS) 1.0 IMPLEMENTING CISCO SECURE MOBILITY SOLUTIONS (SIMOS) 1.0 IMPLEMENTING CISCO THREAT CONTROL SOLUTIONS (SITCS) 1.0 IMPLEMENTING CISCO UNIFIED WIRELESS MOBILITY SERVICES (IUWMS) 2.0 IMPLEMENTING ADVANCED CISCO UNIFIED WIRELESS SECURITY (IAUWS) 2.0 COMPTIA ADVANCED SECURITY PRACTITIONER (CASP) (CAS-001) COMPTIA MOBILE APP SECURITY+ - IOS EDITION (IOS-001) COMPTIA MOBILE APP SECURITY+ - ANDROID EDITION (ADR-001) COMPTIA MOBILITY+ (MB0-001) COMPTIA SERVER+ (SK0-003) CWTS ENTERPRISE WI-FI FUNDAMENTALS CWNA ENTERPRISE WI-FI ADMINISTRATION CWSP ENTERPRISE WI-FI SECURITY CWDP ENTERPRISE WI-FI DESIGN CWAP ENTERPRISE WI-FI ANALYSIS & TROUBLESHOOTING CERTIFIED ETHICAL HACKER V8 (CEH)
3 GIAC EC-COUNCIL CERTIFIED SECURITY ANALYST (ECSA) NETWORK SECURITY ADMINISTRATOR (ENSA) EC-COUNCIL CERTIFIED CHIEF INFORMATION SECURITY OFFICER CCISO ADVANCED NETWORK DEFENSE (CAST 614) HARDENING YOUR ENTERPRISE NETWORK EXPLOITATION CONCEPTS AND METHODS (CAST 618) (BOOTCAMP) NETWORK FORENSICS: IDENTIFYING AND CORRELATING EVENTS (CAST 619) (NETWORK FORENSICS) COMPUTER HACKING FORENSIC INVESTIGATOR (CHFI) CERTIFIED INCIDENT HANDLER (CIH) EC-COUNCIL CERTIFIED SECURE PROGRAMMER.NET (ECSP) CERTIFIED SECURE COMPUTER USER (CSCU) ADVANCED MOBILE HACKING & FORENSICS (CAST 612) ELEVATING MOBILE FORENSICS & INVESTIGATION TO AN ART FORM DIGITAL MEDIA FORENSICS (CAST 621) (BASIC DIGI MEDIA FORENSICS) DIGITAL MEDIA FORENSICS II (CAST 622) (ADVANCED DIGI MEDIA FORENSICS) UNDERSTANDING MACHINE ASSEMBLY LANGUAGE (CAST 623 ) (ASSEMBLY FUNDAMENTALS) PACKET AND TRAFFIC ANALYSIS (CAST 620) (WIRETAP) NETWARS - TOURNAMENT DFIR NETWARS TOURNAMENT HOSTED: EMBEDDED DEVICE SECURITY ASSESSMENTS FOR THE REST OF US HOSTED: (ISC)² CERTIFIED SECURE SOFTWARE LIFECYCLE PROFESSIONAL (CSSLP) CBK EDUCATION PROGRAM HOSTED: OFFENSIVE COUNTERMEASURES: THE ART OF ACTIVE DEFENSES HOSTED: PHYSICAL PENETRATION TESTING - INTRODUCTION AUD507: AUDITING & MONITORING NETWORKS, PERIMETERS & SYSTEMS DEV522: DEFENDING WEB APPLICATIONS SECURITY ESSENTIALS DEV536: SECURE CODING: DEVELOPING DEFENSIBLE APPLICATIONS
4 DEV541: SECURE CODING IN JAVA/JEE: DEVELOPING DEFENSIBLE APPLICATIONS DEV543: SECURE CODING IN C & C++ DEV544: SECURE CODING IN.NET: DEVELOPING DEFENSIBLE APPLICATIONS FOR572: ADVANCED NETWORK FORENSICS AND ANALYSIS MGT414: SANS +S TRAINING PROGRAM FOR THE CISSP CERTIFICATION EXAM MGT415: A PRACTICAL INTRODUCTION TO RISK ASSESSMENT MGT514: IT SECURITY STRATEGIC PLANNING, POLICY AND LEADERSHIP LEG523: LAW OF DATA SECURITY AND INVESTIGATIONS SEC301: INTRO TO INFORMATION SECURITY SEC401: SECURITY ESSENTIALS BOOTCAMP STYLE SEC440: CRITICAL SECURITY CONTROLS: PLANNING, IMPLEMENTING AND AUDITING SEC480: TOP 4 MITIGATION STRATEGIES: IMPLEMENTING & AUDITING SEC501: ADVANCED SECURITY ESSENTIALS - ENTERPRISE DEFENDER SEC502: PERIMETER PROTECTION IN-DEPTH SEC503: INTRUSION DETECTION IN-DEPTH SEC504: HACKER TOOLS, TECHNIQUES, EXPLOITS AND INCIDENT HANDLING SEC511: CONTINUOUS MONITORING AND SECURITY OPERATIONS SEC524: CLOUD SECURITY FUNDAMENTALS SEC542: WEB APP PENETRATION TESTING AND ETHICAL HACKING SEC546: IPV6 ESSENTIALS SEC560: NETWORK PENETRATION TESTING AND ETHICAL HACKING SEC561: INTENSE HANDS-ON PEN TESTING SKILL DEVELOPMENT (WITH SANS NETWARS) SEC562: CYBERCITY HANDS-ON KINETIC CYBER RANGE EXERCISE SEC566: IMPLEMENTING AND AUDITING THE CRITICAL SECURITY CONTROLS - INDEPTH SEC573: PYTHON FOR PENETRATION TESTERS SEC575: MOBILE DEVICE SECURITY AND ETHICAL HACKING SEC579: VIRTUALIZATION AND PRIVATE CLOUD SECURITY SEC580: METASPLOIT KUNG FU FOR ENTERPRISE PEN TESTING
5 SEC617: WIRELESS ETHICAL HACKING, PENETRATION TESTING, AND DEFENSES SEC642: ADVANCED WEB APP PENETRATION TESTING AND ETHICAL HACKING SEC760: ADVANCED EXPLOIT DEVELOPMENT FOR PENETRATION TESTERS SEC506: SECURING LINUX/UNIX SEC505: SECURING WINDOWS WITH THE CRITICAL SECURITY CONTROLS MGT535: INCIDENT RESPONSE TEAM MANAGEMENT MGT405: CRITICAL INFRASTRUCTURE PROTECTION ICS410: ICS/SCADA SECURITY ESSENTIALS FOR408: WINDOWS FORENSIC ANALYSIS FOR508: ADVANCED COMPUTER FORENSIC ANALYSIS AND INCIDENT RESPONSE ISACA FOR518: MAC FORENSIC ANALYSIS FOR526: MEMORY FORENSICS IN- DEPTH WEB APPLICATION SECURITY FOR AUDITORS - SEMINAR THE ESSENTIALS OF CLOUD COMPUTING FOR AUDIT PROFESSIONALS INFORMATION SECURITY MANAGEMENT INFORMATION SECURITY MANAGEMENT (ADVANCED) AUDIT & SECURITY OF FIREWALLS - SEMINAR SECURING & AUDITING MOBILE TECHNOLOGIES - SEMINAR SECURING & AUDITING WIRELESS & MOBILE TECHNOLOGIES - SEMINAR VIRTUALIZATION SECURITY & AUDIT - SEMINAR WINDOWS 8 SECURITY & AUDIT - SEMINAR CLOUD COMPUTING SECURITY & AUDIT - SEMINAR DATABASE SECURITY AND AUDIT - SEMINAR RISK-BASED APPROACH TO IT INFRASTRUCTURE SECURITY & CONTROL ASSESSMENTS IT RISK MANAGEMENT CGEIT EXAM REVIEW CISM EXAM REVIEW CISA EXAM REVIEW CRISC EXAM REVIEW MODULE 1 CISA: THE PROCESS OF AUDITING INFORMATION SYSTEMS
6 ISC(2) JUNIPER MODULE 5 CISA'S ROLE IN PROTECTION OF INFORMATION ASSETS MODULE 2 CISA'S ROLE IN IT GOVERNANCE MODULE 3 CISA'S ROLE IN SYSTEMS AND INFRASTRUCTURE LIFE CYCLE MANAGEMENT MODULE 4 CISA'S ROLE IN IT SERVICE DELIVERY AND SUPPORT COMPLETE CISA ONLINE REVIEW COURSE ALL 5 MODULES (ISC)2 TRAINING FOR CAP (ISC)2 TRAINING FOR CISSP (ISC)2 TRAINING FOR SSCP (ISC)2 TRAINING FOR CISSP-ISSAP (ISC)2 TRAINING FOR CISSP-ISSMP (ISC)2 TRAINING FOR CSSLP (ISC)2 TRAINING FOR CCFP (ISC)2 TRAINING FOR HCISPP OWASP TOP 10 (ISC)2 TRAINING FOR CISSP-ISSEP ACX SERIES UNIVERSAL ACCESS ROUTERS OVERVIEW AND DEPLOYMENT ADVANCED JUNIPER NETWORKS VPN IMPLEMENTATIONS (AJVI) ADVANCED JUNIPER NETWORKS WIRELESS LANS (AJWL) ADVANCED JUNOS ENTERPRISE ROUTING (AJER) ADVANCED JUNOS ENTERPRISE ROUTING TROUBLESHOOTING (AJERT) ADVANCED JUNOS ENTERPRISE SECURITY TROUBLESHOOTING (AJEST) ADVANCED JUNOS ENTERPRISE SWITCHING (AJEX) ADVANCED JUNOS ENTERPRISE SWITCHING TROUBLESHOOTING (AJEXT) ADVANCED JUNOS SECURITY (AJSEC) ATTACK PREVENTION WITH JUNIPER NETWORKS FIREWALLS (APJF) AX411 ACCESS POINT INSTALLATION AND CONFIGURATION BX7000 MULTI-ACCESS GATEWAY INSTALLATION AND INITIAL CONFIGURATION CONFIGURING JUNIPER NETWORKS FIREWALL/IPSEC VPN PRODUCTS (CJFV) CONFIGURING SECURITY THREAT RESPONSE MANAGER (CSTRM) DATA CENTER SWITCHING (DCX)
7 E-SERIES BROADBAND REMOTE ACCESS SERVER CONFIGURATION BASICS (BB) EX2200 AND EX2200-C ETHERNET SWITCHES INSTALLATION AND INITIAL CONFIGURATION EX3200, EX3300, AND EX4200 ETHERNET SWITCHES INSTALLATION AND INITIAL CONFIGURATION EX4500 ETHERNET SWITCH INSTALLATION AND INITIAL CONFIGURATION IC SERIES UNIFIED ACCESS CONTROL APPLIANCE INSTALLATION AND INITIAL CONFIGURATION IMPLEMENTING INTRUSION DETECTION AND PREVENTION PRODUCTS (IIDP) IMPLEMENTING JUNIPER NETWORKS SECURE ANALYTICS (IJSA) JNCIE ENTERPRISE BOOTCAMP (JNCIE-ENT) JNCIE SECURITY BOOTCAMP (JNCIE-SEC) JUNOS EDGE SECURITY SERVICES (JESS) JUNOS ENTERPRISE SWITCHING (JEX) JUNOS ENTERPRISE SWITCHING USING ELS (JEX-ELS) JUNOS INTRUSION PREVENTION SYSTEMS (JIPS) JUNOS MPLS AND VPNS (JMV) JUNOS PULSE MOBILE SECURITY SUITE (PMSS) JUNOS PULSE SECURE ACCESS (JPSA) JUNOS PULSE MOBILE SECURITY SUITE (PMSS) JUNOS PULSE SECURE ACCESS (JPSA) JUNOS SECURITY (JSEC) JUNOS SPACE-NETWORK DIRECTOR (JS-ND) JUNOS SPACE-SECURITY DIRECTOR (JS-SD) NETWORK AND SECURITY MANAGER FUNDAMENTALS (NSMF) STRM SERIES II SECURITY THREAT RESPONSE MANAGER HARDWARE INSTALLATION AND INITIAL CONFIGURATION M10I ROUTER INSTALLATION AND HARDWARE REPLACEMENT LINUX LINUX SECURITY LINUX SYSTEM ADMINISTRATION MICROSOFT SECURITY FUNDAMENTALS: MTA EXAM
8 WINDOWS SERVER 2008 ACTIVE DIRECTORY, CONFIGURING - CONFIGURING AND TROUBLESHOOTING IDENTITY AND ACCESS SOLUTIONS WITH WINDOWS SERVER 2008 ACTIVE DIRECTORY WINDOWS SERVER ADMINISTRATION FUNDAMENTALS: MTA EXAM WINDOWS SERVER 2008, SERVER ADMINISTRATOR - PLANNING AND IMPLEMENTING WINDOWS SERVER 2008 NETWORKING FUNDAMENTALS: MTA EXAM INSTALLING AND CONFIGURING WINDOWS SERVER 2012 ADMINISTERING WINDOWS SERVER 2012 CONFIGURING ADVANCED WINDOWS SERVER 2012 SERVICES WINDOWS SERVER 2008 ACTIVE DIRECTORY, CONFIGURING - CONFIGURING AND TROUBLESHOOTING WINDOWS SERVER 2008 ACTIVE DIRECTORY DOMAIN SERVICES WINDOWS SERVER 2008 NETWORK INFRASTRUCTURE, CONFIGURING - CONFIGURING AND TROUBLESHOOTING A WINDOWS SERVER 2008 NETWORK INFRASTRUCTURE DESIGNING AND IMPLEMENTING A SERVER INFRASTRUCTURE IMPLEMENTING AN ADVANCED SERVER INFRASTRUCTURE OVERVIEW OF ACTIVE DIRECTORY RIGHTS MANAGEMENT SERVICES WITH WINDOWS SERVER 2008 R2 MICROSOFT JUMP START: WINDOWS SERVER 2008 R2, SERVER VIRTUALIZATION UPDATING YOUR WINDOWS SERVER 2003 TECHNOLOGY SKILLS TO WINDOWS SERVER 2008 DEPLOYING WINDOWS SERVER 2008 CONFIGURING, MANAGING AND MAINTAINING WINDOWS SERVER 2008-BASED SERVERS FUNDAMENTALS OF WINDOWS SERVER 2008 CONFIGURING AND TROUBLESHOOTING INTERNET INFORMATION SERVICES IN WINDOWS SERVER 2008 DESIGNING WINDOWS SERVER 2008 NETWORK AND APPLICATIONS INFRASTRUCTURE IMPLEMENTING AND ADMINISTERING WINDOWS SHAREPOINT SERVICES 3.0 IN WINDOWS SERVER 2008
9 NOVELL RED HAT SYMANTEC DESIGNING WINDOWS SERVER 2008 ACTIVE DIRECTORY INFRASTRUCTURE AND SERVICES CONFIGURING AND TROUBLESHOOTING WINDOWS SERVER 2008 APPLICATIONS INFRASTRUCTURE OVERVIEW OF ACTIVE DIRECTORY RIGHTS MANAGEMENT SERVICES WITH WINDOWS SERVER 2008 R2 ZENWORKS FULL-DISK ENCRYPTION ADMINISTRATION AND TROUBLESHOOTING OPEN ENTERPRISE SERVER 11 ADMINISTRATION RED HAT SERVER HARDENING (RH413) SYMANTEC APP CENTER 4.1 ADMINISTRATION SYMANTEC APP CENTER 4.1.X INSTALLATION AND ADMINISTRATION SYMANTEC SECURITY INFORMATION MANAGER 4.7 VMWARE VMWARE NSX: INSTALL, CONFIGURE, MANAGE [6.0] VMWARE NSX FOR INTERNETWORKING EXPERTS FAST TRACK [V6.0] VSPHERE RESOURCE MANAGEMENT FUNDAMENTALS [V5.X] VSPHERE SECURITY FUNDAMENTALS [V5.X] VCLOUD NETWORKING AND SECURITY FUNDAMENTALS [V5.X] VMWARE MIRAGE: INSTALL, CONFIGURE, MANAGE [V5.0] GETTING STARTED DEVELOPING SECURITY SOLUTIONS WITH EPSEC VMWARE VSPHERE: MANAGE AND DESIGN FOR SECURITY [V4.1]
CompTIA Network+ Pre-approved Training for CompTIA Network+ Continuing Education Units (CEUs)
CompTIA Network+ Pre-approved Training for CompTIA Network+ Continuing Education Units (CEUs) Note: Approved training courses in this document are subject to change without prior notification. Training
More informationNetCom Learning Training Courses Pre-Approved for CompTIA CEUs
NetCom Learning Training Courses Pre-Approved for CompTIA CEUs CE System Activity Name: Completed a Training Course Max CEUs Earned Per CE Cycle: CompTIA A+ - 16 CEUs CompTIA Network+ - 24 CEUs CompTIA
More informationFederal Virtual Training Environment (FedVTE) Pre-Approved for CompTIA CEUs
Federal Virtual Training Environment (FedVTE) Pre-Approved for CompTIA CEUs You can earn 1 CEU for each hour of training. Follow these requirements to earn and receive CEUs. All training must be at least
More informationSkillsoft Pre-Approved for CompTIA CEUs
Skillsoft Pre-Approved for CompTIA CEUs Note: Approved training courses in this document are subject to change without prior notification. Training submitted based on prior approval will remain valid.
More informationFederal Virtual Training Environment (Fed/VTE) Pre-Approved for CompTIA CEUs
Federal Virtual Training Environment (Fed/VTE) Pre-Approved for CompTIA CEUs Note: Approved training courses in this document are subject to change without prior notification. Training submitted based
More informationUnlocking Potential Through Learning
Unlocking Potential Through Learning CORPORATE HEAD OFFICE: 6, Babatola Drive, Off Obafemi Awolowo way, Behind Awolowo Glass house, Ikeja, Lagos. 08 Training Calender @ Newhorizonsnige @ new horizon solution
More informationPluralsight CEU-Eligible Courses for CompTIA Network+ updated March 2018
Pluralsight CEU-Eligible Courses for CompTIA Network+ updated March 2018 Access Control Lists (ACLs) for Cisco CCNA 200-125/100-105 Advanced Access Control with Cisco ISE for CCNP Security (300-208) SISAS
More informationApplication Training Application Courses
Office Adobe Microsoft Office 2013 (Word/Excel/Pow erpoint/outlook) Adobe CC Photoshop/InDesi gn/illustrator Quarter 1 Jan 17 - Jan 21, Mar 13 - Mar 17, Jan 24 - Quarter 2 Application Training Application
More informationBusiness Skills Learning Sessions* SINGLE COURSE TITLES
Business Skills Learning Sessions* ACCOUNTING TITLES Introduction to Business Accounting Bookkeeping and Payroll LEGAL TITLES Introduction to Legal Concepts Legal Office Administration HUMAN RESOURCES
More informationTECHNICAL. Unlimited Access to Over 200 Live, Virtual Instructor-Led Technical Classes for 12 Months
TECHNICAL Unlimited Access to Over 200 Live, Virtual Instructor-Led Technical Classes for 12 Months The Technical Club Membership provides the ultimate in flexibility and value. Take as many classes as
More informationPlaying Security Poker I match your degree and raise you by a certification or 2 Grumpy Old Security Men What s up Cert?
Playing Security Poker I match your degree and raise you by a certification or 2 Grumpy Old Security Men What s up Cert? Presented by: Curtis Coats, CISSP, CAP Kelley P. Archer, CISSR MN ISSA Agenda Types
More informationSkillsoft Pre-Approved for CompTIA CEUs
Skillsoft Pre-Approved for CompTIA CEUs Note: Approved training courses in this document are subject to change without prior notification. Training submitted based on prior approval will remain valid.
More informationWhat is the CISSP? Certified Ethical Hacker v8 or higher Certified Forensic Computer Examiner (CFCE) Certified Fraud Examiner (CFE)
What is the CISSP? (ISC)2 s Certified Information Systems Security Professional (CISSP ) is the gold standard professional certification for experienced information security and related professionals worldwide.
More informationCybersecurity Employment SecureNinja
Cybersecurity Employment Opportunities @ SecureNinja CyberSecurity, Technical Engineer Responsible for security measures for networks & information. Senior Software Security Consultant Location: Alexandria,
More informationKnowlogy Class Schedule
Knowlogy Class Schedule 2017 Table of Contents KNOWLOGY SCHEDULE OF COURSES... 3 OFFICE 2016... 3 OFFICE 2013... 4 OFFICE 2010... CISCO... COMPTIA... 6 EXCHANGE SERVER... 6 WINDOWS SERVER... 6 OFFICE36...
More informationPluralsight CEU-Eligible Courses for CompTIA A+ updated March 2018
Pluralsight CEU-Eligible Courses for CompTIA A+ updated March 2018 Access Control Lists (ACLs) for Cisco CCNA 200-125/100-105 Administering Office 365 Quick Start Advanced Access Control with Cisco ISE
More informationSECURITY+ COMPETITIVE ANALYSIS 1. GIAC GSEC 2. (ISC)2 SSCP 3. EC-COUNCIL CEH
SECURITY+ COMPETITIVE ANALYSIS 1. GIAC GSEC 2. (ISC)2 SSCP 3. EC-COUNCIL CEH 1 SECURITY+ VS GIAC GSEC Where does GSEC fit? 3 CompTIA Security+ and GIAC Security Essentials (GSEC) Feature CompTIA Security+
More informationAbout Us. We re now the world s largest independent IT training company, and we continue to lead
About Us As changes in technology have accelerated, it s become even more essential for people to master technology to be productive, invaluable employees who optimize, program and invent solutions and
More informationCERTIFICATION TRAINING - ISC2
MERIT CLASSES The Michigan Cyber Range features a cybersecurity education experience based upon the National Institute of Standards and Technology National Initiative for Cybersecurity Education (NICE).
More informationTERIBITE TECHNOLOGIES ACADEMY
Phone: 09080699264, 08088649 CISCO COURSES CCNA-DC - CCNA Data Center DCNXK - Implementing the Cisco Nexus 000 and 2000 v2.0 DCNX7K - Configuring Cisco Nexus 7000 Switches v.0 DCUCI - Data Center Unified
More informationMohammad Shahadat Hossain
Mohammad Shahadat Hossain Principal Security Architect at Grameenphone Limited Summary Has extensive knowledge and experience on following:- NIST Cyber Security Framework SANS Top 20 Security Control Network
More informationCISSP CEH PKI SECURITY + CEHv9: Certified Ethical Hacker. Upcoming Dates. Course Description. Course Outline
CISSP CEH PKI SECURITY + CEHv9: Certified Ethical Hacker Learn to find security vulnerabilities before the bad guys do! The Certified Ethical Hacker (CEH) class immerses students in an interactive environment
More informationTECHNICAL. Unlimited Access to Over 200 Live, Virtual Instructor-Led Technical Classes for 12 Months
TECHNICAL Unlimited Access to Over 200 Live, Virtual Instructor-Led Technical Classes for 12 Months The Technical Club Membership provides the ultimate in flexibility and value. Take as many classes as
More informationUPDATED: 10/17/16. Senior Level. Senior Specialty Threat, Consultant, Engineer, Manager. Mid Level Analyst
WORKFORCE COLLABORATIVE: CYBERSECURITY BUILDING THE TALENT PIPELINE SECURITY ANALYST CAREER PATHWAY UPDATED: 10/17/16 CYBERSECURITY SECURITY ANALYST CAREER PATHWAY Senior Level Senior Specialty Threat,
More informationCertified Ethical Hacker V9
Certified Ethical Hacker V9 Certificate: Certified Ethical Hacker Duration: 5 Days Course Delivery: Blended Course Description: Accreditor: EC Council Language: English This is the world s most advanced
More informationProduct Catalog Platinum 529,00 (1 jaar toegang) CertKit includes: Quizzes, Tips & Tricks, 24/7 help, practise tests and e-learning CompTIA
Product Catalog Platinum 529,00 (1 jaar toegang) CertKit includes: Quizzes, Tips & Tricks, 24/7 help, practise tests and e-learning 220-902 CompTIA A+ 1Z0-808: Java SE 8 Programming I 1Z0-809: Java SE
More informationTECHNICAL. Unlimited Access to Over 200 Live, Virtual Instructor-Led Technical Classes for 12 Months
TECHNICAL Unlimited Access to Over 200 Live, Virtual Instructor-Led Technical Classes for 12 Months The Technical Club Membership provides the ultimate in flexibility and value. Take as many classes as
More informationNew Horizons Computer Learning Center Training
New Horizons Computer Learning Center Training Professional Feb Mar Apr May CND Certified Network Defender Program 12-Feb CEH v9 Certified Ethical Hacker 18-22 Jan 8-12 CNFE Certified Network Forensics
More informationVendor Start Date End Date Event Name
Vendor Start Date End Date Event Name Arista 8/15/18 8/17/18 Arista Configuration Essentials - ACE Arista 8/20/18 8/21/18 ARISTA LINUX ESSENTIALS - ALE Arista 8/22/18 8/23/18 ARISTA PROGRAMMING ESSENTIALS
More informationCourse overview. CompTIA Security+ Certification (Exam SY0-501) Study Guide (G635eng v107)
Overview This course is intended for those wishing to qualify with CompTIA Security+. CompTIA's Security+ Certification is a foundation-level certificate designed for IT administrators with 2 years' experience
More informationImplementing and Administering Security in a Microsoft Windows Server 2003 Network. Designing Security for a Microsoft Windows Server 2003 Network
Sohrab (Mohsen) Valipour Karimi Web Application & Network Penetration Testing and Security Darvaze Shemiran, Sadat St, Sepehr St, NO 36 Telephone: 09127252886 Email: sohrab.blackripper@gmail.com www.hackingtutorial.org
More informationPUBLIC COURSE SCHEDULE. January - June 2017
PUBLIC COURSE SCHEDULE January - June 7 January - June 7 /6 ABU Yose. Yose. FCPRO LPROX. PNK APPLE ipad Apple ipad for Business Use OS X Yosemite - OS X Support Essentials. Yosemite - OS X Server Essentials.
More informationDEEPER KNOWLEDGE. ADVANCED SECURITY.
DEEPER KNOWLEDGE. ADVANCED SECURITY. Global Information Assurance Certification (GIAC) develops and administers the premier certifications for information security professionals. More than 30 certifications
More informationEC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led
EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led Certification: Certified Network Defender Exam: 312-38 Course Description This course is a vendor-neutral, hands-on,
More informationWorkforce Certification
Services Include Secure certification testing in our hi-tech labs. Group testing for your company or organization. Test and certification preparation training. Community Proctoring Services. Workforce
More informationNew Horizons Computer Learning Center Training Calendar
Note: New Horizons Computer Learning Center Training Calendar All classes which are running as both Classroom and OLL will have a recording of the session available for 6 months. All Microsoft OLL classes
More informationCyberSec First Responder Continuing Education Program
CyberSec First Responder Continuing Education Program Overview This document identifies the details of the continuing education program for Logical Operations CyberSec First Responder certification. This
More informationCourse 831 Certified Ethical Hacker v9
Course 831 Certified Ethical Hacker v9 Duration: 5 days What You Get: CEH v9 Certification exam voucher 5 days of high quality classroom training 18 comprehensive modules 40% of class hours dedicated to
More informationCyberSec First Responder Continuing Education Program
CyberSec First Responder Continuing Education Program Overview This document identifies the details of the continuing education program for Logical Operations CyberSec First Responder certification. This
More informationT R A I N I N G S C H E D U L E
AUTHORIZED TRAINING CENTER AUTHORIZED TESTING CENTER I N I X I N D O S U R A B A Y A Jl. Jemursari Utara II No.24 Surabaya 60237 Email : sales_sby@inixindo.co.id 1.00 INIXINDO AUTHORIZED TRAINING PROGRAMMING
More informationTitle A User's Manual to the PMBOK Guide Access 2007 Programming by Example with VBA. XML. and ASP Adobe Photoshop CS5 for Photographers: The
Title A User's Manual to the PMBOK Guide Access 2007 Programming by Example with VBA. XML. and ASP Adobe Photoshop CS5 for Photographers: The Ultimate Workshop Advanced Android 4 Games Advanced Database
More informationCyberVista Certify cybervista.net
ONLINE CYBERSECURITY CERTIFICATION TRAINING CyberVista Certify ONLINE CYBERSECURITY CERTIFICATION TRAINING CyberVista Certify CyberVista offers the industry s most comprehensive cybersecurity training
More informationT R A I N I N G S C H E D U L E
AUTHORIZED TRAINING CENTER AUTHORIZED TESTING CENTER Jl. Raya Jemursari No.64, Surabaya 60237 Jawa Timur, Indonesia Email : info@inixindosurabaya.id www.inixindosurabaya.id 1.00 INIXINDO AUTHORIZED TRAINING
More informationIT Technician Pathways Course Guide
IT Technician Pathways Course Guide Stage Computer Retail Sales and Support Course Name or Topic Introduction to Retail or Business Fundamentals Related 3 rd Party Certifications C-ID IT-MC C-ID BUS 100
More informationDoD Directive (DoDD) 8570 & GIAC Certification
DoD Directive (DoDD) 8570 & GIAC Certification Date Updated: October 2010 What is DoDD 8570? Department of Defense Directive 8570 provides guidance and procedures for the training, certification, and management
More informationIngram Micro Cyber Security Portfolio
Ingram Micro Cyber Security Portfolio Ingram Micro Inc. 1 Ingram Micro Cyber Security Portfolio Services Trainings Vendors Technical Assessment General Training Consultancy Service Certification Training
More informationCourse 831 EC-Council Certified Ethical Hacker v10 (CEH)
Course 831 EC-Council Certified Ethical Hacker v10 (CEH) Duration: 5 days What You Get: CEH v10 Certification exam voucher 5 days of high quality classroom training 18 comprehensive modules 40% of class
More informationBuilding the Cybersecurity Workforce. November 2017
Building the Cybersecurity Workforce November 2017 Our Global Footprint Measuring Kaplan University s Educational Impact For every career path +1MM students annually served Facilities in 30+ countries
More informationCND Exam Blueprint v2.0
EC-Council C ND Certified Network Defende r CND Exam Blueprint v2.0 CND Exam Blueprint v2.0 1 Domains Objectives Weightage Number of Questions 1. Computer Network and Defense Fundamentals Understanding
More informationPUBLIC COURSE SCHEDULE. July - December 2017
PUBLIC COURSE SCHEDULE July - December 2017 July - December 2017 BIG DATA days cost BDIDA Introduction to Data Analysis 2 650 150 (d) 18-19 BDB Big Data Bootcamp (Apache Hadoop/Pig/Hive) 2 650 150(d) 02-03
More informationThe fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS
The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS WELCOME SANS Institute, in collaboration with Augusta Warrior Project and Augusta University, is presenting
More informationCertifications Part Two: Security Certifications By Shawn Conaway
Certifications Part Two: Certifications By Shawn Conaway Information security spans many different roles and responsibilities. Growth in the available number of security certifications now provides enough
More informationExplore the IT Landscape with our Training Passport
Explore the IT Landscape with our Training Passport 20 Days of Training to Share Among Your Team for $7,500. Choose from an extensive listing of over 400 course titles. Get our Training Passport to save
More informationCareer Paths In Cybersecurity
Career Paths In Cybersecurity Introductions Rob Ashcraft Sr. Technical Advisor 26-yrs in Information Technology 14-yrs in Information Security Held positions as Technician, IT Management, IT Sales Double
More informationCIT 480: Securing Computer Systems. Putting It All Together
CIT 480: Securing Computer Systems Putting It All Together Assurance 1. Asset identification 1. Systems and information assets. 2. Infrastructure model and control 1. Network diagrams and inventory database.
More informationCourse Schedule January December 2019
Course Schedule January December 2019 Freewater Technologies Service Disabled Veteran Owned Small Business 816 Greenbrier Circle, Suite 201 Chesapeake, VA 23320 (757) 499-6150 www.freewatertech.com Microsoft
More informationTHE KERNEL. Our in-house professional team is highly skilled in delivering cutting-edge solutions to our clients.
THE KERNEL Our in-house professional team is highly skilled in delivering cutting-edge solutions to our clients. Since our founding in 1986, and establishing The Kernel s UAE office in 2008, our company
More informationSkillsoft Pre-Approved for CompTIA CEUs
Skillsoft Pre-Approved for CompTIA CEUs Note: Approved training courses in this document are subject to change without prior notification. Training submitted based on prior approval will remain valid.
More informationDon t Miss Our Biggest Savings of the Year! Offer Ends July 27, 2018
Don t Miss Our Biggest Savings of the Year! Offer Ends July 27, 2018 Choose from an extensive listing of over 400 course titles. Get our Training Passport to save more than 64% on some of our most popular
More informationCyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security
CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships About SANS The SANS (SysAdmin, Audit, Network, Security) Institute Established in 1989 Cooperative research
More informationAston Martin Institute
Aston Martin Institute Your membership includes FREE Unlimited Access to 1,200+ IT, Cyber Security, Project Management, IT Service Management and Business Skills video courses with university Certificates
More informationCompTIA Cybersecurity Analyst+
CompTIA Cybersecurity Analyst+ Course CT-04 Five days Instructor-Led, Hands-on Introduction This five-day, instructor-led course is intended for those wishing to qualify with CompTIA CSA+ Cybersecurity
More informationComputer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers
Computer Information Systems (CIS) CIS 101 Introduction to Computers This course provides an overview of the computing field and its typical applications. Key terminology and components of computer hardware,
More informationEC-Council C EH. Certified Ethical Hacker. Program Brochure
EC-Council TM C EH Program Brochure Target Audience This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the
More informationA United States Cyber Academy Program
The GIAC certifications I earned in the Academy really helped open doors for me as a cybersecurity professional. Justin Sappington, Information Security Analyst at Umpqua Bank A United States Cyber Academy
More informationThe fast track to top skills and top jobs in cyber. Guaranteed.
The fast track to top skills and top jobs in cyber. Guaranteed. NO COST TO SELECTED PARTICIPANTS WELCOME The SANS Institute is presenting the SANS CyberTalent Immersion Academy for Women to encourage women
More informationSecurity. Protect your business from security threats with Pearl Technology. The Connection That Matters Most
Security Protect your business from security threats with Pearl Technology The Connection That Matters Most Committed to Your Future When it comes to your business, security can mean many things. But to
More informationLONDON SUMMER 2016 SAT 9 SAT 16 JULY, 2016 #SANSLONDON. 14 SANS COURSES SEC566 Implementing and Auditing the Critical Security Controls- In Depth
THE WORLD S LARGEST & MOST TRUSTED PROVIDER OF CYBER URITY TRAINING LONDON SUMMER 201 SAT 9 SAT 1 JULY, 201 #SANSLONDON 401 Security Essentials Bootcamp Style 03 Intrusion Detection In-Depth 0 Securing
More informationThe fast track to top skills and top jobs in cyber. FREE TO TRANSITIONING VETERANS
The fast track to top skills and top jobs in cyber. FREE TO TRANSITIONING VETERANS FAST TRACK Three steps to a cybersecurity career QUALIFY Take the qualifying exam, complete the application process, and
More informationExuberant Learning Services. Exuberant group. Telecom & IT Training Brochure Expand your limits Through our global scale
Exuberant Learning Services Exuberant group Telecom & IT Training Brochure 2016 Expand your limits Through our global scale We invite you to partner with us We offer In-house programs to the High end Telecommunication
More informationCompTIA Mobility+ Certification
CompTIA Mobility+ Certification Duration: 5 days Price: $4000 Certifications: CompTIA Mobility+ Exams: MB0-001 Course Overview The mobile age is upon us. More and more people are using tablets, smartphones,
More informationExplore the IT Landscape with our Training Passport
Explore the IT Landscape with our Training Passport 20 Days of Training to Share Among Your Team. Choose from an extensive listing of over 400 course titles. Get our Training Passport to save more than
More informationThe fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS
The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS WELCOME SANS Institute, in collaboration with RP6, is presenting the SANS VetSuccess CyberTalent Immersion
More informationTechnical Classes. Cisco. Cisco Authorized Courses CISSP. Coding & Programming. CCNA Certification Bootcamp ( exam) 2/6/2015 9am-4:30pm
Technical Classes Cisco CCNA Certification Bootcamp (200-120 exam) 2/9/2015 2/13/2015 9am-5pm 4/20/2015 4/24/2015 9am-5pm Cisco Authorized Courses CCNP: ROUTE 4/13/2015 4/17/2015 9am-5pm CCNP: SWITCH CCNP:
More informationBLACK HAT USA 2013 ADD A CLASS REQUEST FORM INSTRUCTIONS
Use one form per registrant. BLACK HAT USA 2013 ADD A CLASS REQUEST FORM INSTRUCTIONS This form is for those who have existing USA 2013 Training Registration and have an existing Confirmation Number. If
More informationAuthorized Juniper Networks Training 2013
Authorized Juniper Networks Training 2013» Enterprise Routing & Switching» Service Provider» Security» Firewall / VPN» Network Management» Wireless» Junos Pulse» Junos Software» Junos Space 1 www.indc.de
More informationAcademic Services Group. Master Course List (Revised November 6, 2015)
Academic Services Group Master Course List (Revised November 6, 015) This is the course list for free, online, self-paced training offered to ASU UTO employees from Jan 1 May 30, 016. The courses are divided
More informationClock hour to semester credit hour conversions are made based on current academic standards as outlined in the academic policy of the University.
- Prior Learning Assessment - Corporate Articulation ROUGHTON INVESTMENTS Credit Recommendation Guide (CRG) The following courses have been evaluated by Corporate Articulation to potentially fulfill General
More informationJuniper Networks Certified Professional Security Bootcamp, AJSEC and JIPS (JNCIP-SEC BC)
Juniper Networks Certified Professional Security Bootcamp, AJSEC and JIPS (JNCIP-SEC BC) This course combines both Advanced Junos Security (AJSEC) and Junos Intrusion Prevention Systems (JIPS) into five
More informationSkills You Will Gain. PC Component + Laptop Troubleshooting + Configuration Printers-+ peripherals Troubleshooting + NetworkSupport Technician
LEVEL3 IT TECHNICIAN PATHWAY Job Prospects IT Technician 1st/2nd /3rdLine Support Hardware Engineer Prerequisite No prior experience necessary Progression Network Infrastructure Server Infrastructure Cloud
More informationCourse Library ITProTV/EdutainmentLive LLC 10/9/2017
Course Library ITProTV/EdutainmentLive LLC 10/9/2017 Apple Mac Integration Basics - Mavericks 10.9 (Exam 9L0-409) Mac Integration Basics - 10.11 El Capitan Mac Integration Basics 10.12 Sierra Mac Integration
More informationDescriptions for CIS Classes (Fall 2017)
Descriptions for CIS Classes (Fall 2017) Major Core Courses 1. CIS 1015. INTRODUCTION TO COMPUTER INFORMATION SYSTEMS. (3-3-0). This course provides students an introductory overview to basic computer
More informationAuthorized Learning Partner. Wi-Fi Certification Presentation
Authorized Learning Partner Wi-Fi Certification Presentation .Who is CWNP? CWNP is the IT industry standard for enterprise Wi-Fi certification and training since 2001. Certifications from entry-level to
More informationITU CBS. Digital Security Capacity Building: Role of the University GLOBAL ICT CAPACITY BUILDING SYMPOSIUM SANTO DOMINGO 2018
GLOBAL ICT CAPACITY BUILDING SYMPOSIUM ITU CBS SANTO DOMINGO 2018 Digital Capacity Building: Role of the University 18 20 June 2018 Santo Domingo, Dominican Republic Dr. Nizar Ben Neji Faculty of Sciences
More informationCourse 832 EC-Council Computer Hacking Forensic Investigator (CHFI)
Course 832 EC-Council Computer Hacking Forensic Investigator (CHFI) Duration: 5 days You Will Learn How To Understand how perimeter defenses work Scan and attack you own networks, without actually harming
More informationDIABLO VALLEY COLLEGE CATALOG
COMPUTER NETWORK TECHNOLOGY CNT Despina Prapavessi, Dean Math and Computer Sciences Division Math Building, Room 267 Possible career opportunities These CNT-courses prepare students for a career path in
More informationCompTIA Network+ (Exam N10-006)
CompTIA Network+ (Exam N10-006) Course Specifications Course Number: ELK93-012_rev1.1 Course length: 5.0 day(s) Course Description The CompTIA Network+ (Exam N10-006) course builds on your existing user-level
More informationA UNIVERSAL SECURITY GATEWAY
A UNIVERSAL SECURITY GATEWAY IDS /IPS / HTTP AV/ Web Content Filter / Web Load Balancer / Web Reverse Proxy / Multi-line Internet / Network IP &Protocol Monitor / IP Reputation Blocker / Captive Portal
More information2017 PORT SECURITY SEMINAR & EXPO. ISACA/CISM Information Security Management Training for Security Directors/Managers
2017 PORT SECURITY SEMINAR & EXPO ISACA/CISM Information Security Management Training for Security Directors/Managers Agenda Introduction ISACA Information security vs. cybersecurity CISM certification
More informationComputer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers
Computer Information Systems (CIS) CIS 101 Introduction to Computers This course provides an overview of the computing field and its typical applications. Key terminology and components of computer hardware,
More informationIT Foundations Networking Specialist Certification with Exam
IT Foundations Networking Specialist Certification with Exam MSIT113 / 200 Hours / 12 Months / Self-Paced / Materials Included Course Overview: Gain hands-on expertise in CompTIA A+ certification exam
More informationCertified Information Security Manager (CISM) Course Overview
Certified Information Security Manager (CISM) Course Overview This course teaches students about information security governance, information risk management, information security program development,
More informationDefense Information Services Agency (DISA) Training Pre-Approved for CompTIA CEUs
Defense Information Services Agency (DISA) Training Pre-Approved for CompTIA CEUs Note: Approved training courses in this document are subject to change without prior notification. Training submitted based
More informationThe fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS
The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS WELCOME SANS Institute is presenting the SANS VetSuccess Immersion Academy in the DC Metro area. For transitioning
More informationType Vendor Exam # Name Size. Technical Cisco Interconnecting Cisco Networking Devices Part 1 (ICND1) 180
s Technical Cisco 100-105 Interconnecting Cisco Networking Devices Part 1 (ICND1) 180 Technical Cisco 200-105 Interconnecting Cisco Networking Devices Part 2 (ICND2) 137 Technical Cisco 200-125 Cisco Certified
More informationMobility Windows 10 Bootcamp
Mobility Windows 10 Bootcamp Length: 8 days Format: Bootcamp Time: Day About This Course This boot camp is designed to provide students with the knowledge and skills required to install and configure Windows
More informationTestOut Network Pro - English 4.1.x COURSE OUTLINE. Modified
TestOut Network Pro - English 4.1.x COURSE OUTLINE Modified 2017-07-06 TestOut Network Pro Outline - English 4.1.x Videos: 141 (18:42:14) Demonstrations: 81 (10:38:59) Simulations: 92 Fact Sheets: 145
More informationNetworking Fundamentals Training
Networking Fundamentals Training INNOVATIVE ACADEMY s Best Computer Networking Training in Bangalore is designed so Innovative to help you clear the Comp-TIA s N+ Certification. You will gain excellent
More informationCCISO Blueprint v1. EC-Council
CCISO Blueprint v1 EC-Council Categories Topics Covered Weightage 1. Governance (Policy, Legal, & Compliance) & Risk Management 1.1 Define, implement, manage and maintain an information security governance
More information6 MILLION AVERAGE PAY. CYBER Security. How many cyber security professionals will be added in 2019? for popular indursty positions are
PROGRAM Objective Cyber Security is the most sought after domain, and NASSCOM projects a requirment of over 1 million trained professionals by 2025. Tevel training program is an industry & employability
More information