Pluralsight CEU-Eligible Courses for CompTIA Network+ updated March 2018
|
|
- Myles Griffin
- 6 years ago
- Views:
Transcription
1 Pluralsight CEU-Eligible Courses for CompTIA Network+ updated March 2018 Access Control Lists (ACLs) for Cisco CCNA / Advanced Access Control with Cisco ISE for CCNP Security ( ) SISAS Advanced Malware Analysis: Combating Exploit Kits Advanced Persistent Threats: The Big Picture Advanced Security for CCNA Security ( ) IINS Advanced Web Application Penetration Testing with Burp Suite Applying SQL Server 2016 Features to Real-world Data Problems Architecting and Implementing Azure Networking Architecting Azure Solutions (70-534): Application Storage and Data Access Strategy Architecting Azure Solutions (70-534): Design an Advanced Application Architecting Azure Solutions (70-534): Management, Monitoring, and Business Continuity Architecting Azure Solutions (70-534): Secure Resources Architecting Microsoft Azure Solutions (70-534): Design Web Apps Assessing and Mitigating Security Risks Automating Deployment and Scale of Azure IaaS Solutions AWS Certified Solutions Architect - Professional AWS Security Fundamentals AWS Security Operations: Designing for Acceptable Risk and Compliance AWS Security Operations: Securing Access to Object Storage AWS Security Operations: Securing Core AWS Infrastructure Services AWS Security Operations: Securing Managed Services Azure Resource Manager Deep Dive Azure Site Recovery: IaaS Migration and Disaster Recovery Azure SQL Data Warehouse: First Look Azure SQL Database for the SQL Server DBA Cisco ACI Programmability Cisco Data Center Network Design for CCDA DESGN ( ) Cisco Edge Network Design for CCDA DESGN ( ) Cisco ISE Guest Access for CCNP Security ( ) SISAS Cisco Network Design Blocks for CCDA DESGN ( ) CISSP - Communications and Network Security CISSP - Identity and Access Management CISSP - Security and Risk Management CISSP - Security Engineering CISSP - Security Operations CISSP : Security Assessment and Testing Citrix Networking Deep Dive Citrix XenDesktop/XenApp 7.6 LTSR CCA-V: Introduction Citrix XenDesktop/XenApp 7.6 LTSR CCA-V: Maintaining Citrix XenDesktop/XenApp 7.6 LTSR CCA-V: Managing Citrix XenDesktop/XenApp 7.6 LTSR CCA-V: Monitoring Citrix XenDesktop/XenApp 7.6 LTSR CCA-V: Troubleshooting Citrix XenDesktop/XenApp 7.6 LTSR CCP-V: Configuring Citrix XenDesktop/XenApp 7.6 LTSR CCP-V: Installing Citrix XenDesktop/XenApp 7.6 LTSR CCP-V: Introduction Citrix XenDesktop/XenApp 7.6 LTSR CCP-V: Pre-installation Citrix XenDesktop/XenApp 7.6 LTSR CCP-V: Testing 1
2 Computing, Communication, and Business Integration for CASP (CAS-002) Conducting Network Vulnerability Analysis Configuring a Cisco Router for Cisco CCNA / Create and Manage Virtual Machines on Microsoft Azure Creating a DMZ in Azure Cryptography: The Big Picture CSSLP : Secure Software Concepts CSSLP : Secure Software Requirements Cyber Security Awareness: Backing up Your Data Cyber Security Awareness: Digital Data Protection Cyber Security Awareness: Electronic Commerce Security Cyber Security Awareness: Identifying Personally Identifiable Information (PII) Cyber Security Awareness: Malware Explained Cyber Security Awareness: Mobile Device Security Cyber Security Awareness: Pairing Physical and Digital Security Cyber Security Awareness: Phishing and Whaling Cyber Security Awareness: Safer Digital Communications Cyber Security Awareness: Security by Geolocation Cyber Security Awareness: Security for Cloud Services Cyber Security Awareness: Security Overview Cyber Security Awareness: Social Engineering Cyber Security Awareness: Social Networking at Work Cyber Security Awareness: The Importance of Identity Protection Cyber Security Awareness: The Internet of Things (IoT) Cyber Security Awareness: The Protection and Destruction of Portable Data Cybersecurity Threats: Ransomware Data Center Infrastructure for CCNA Data Center ( / ) Deploy Azure Virtual Networks, VPNs, and Gateways Deploying and Integrating Azure AD Deploying and Managing Azure IaaS Virtual Machines Design a Database Environment with SQL Server 2014 (70-465) Design a Database Structure with SQL Server 2014 (70-465) Designing a Hybrid Cloud in Azure Designing and Implementing Security Policies Digital Forensics: Getting Started with File Systems Disaster Recovery for CompTIA Server+ (SK0-004) Enterprise Campus Design for CCDA DESGN ( ) Enterprise IP Routing Design for CCDA DESGN ( ) Enterprise IPv4/IPv6 Design for CCDA DESGN ( ) Enterprise LAN Switching for Cisco CCNA / Enterprise Security for CASP (CAS-002) Enterprise Security for CASP (CAS-002) Enterprise Security: Policies, Practices, and Procedures Enterprise Security: Policies, Practices, and Procedures Enterprise WAN Network Design for Cisco CCDP ARCH ( ) Ethical Hacking: Buffer Overflow Ethical Hacking: Cloud Computing Ethical Hacking: Cryptography 2
3 Ethical Hacking: Denial of Service Ethical Hacking: Evading IDS, Firewalls, and Honeypots Ethical Hacking: Hacking Mobile Platforms Ethical Hacking: Hacking Wireless Networks Ethical Hacking: Penetration Testing Ethical Hacking: Sniffing Ethical Hacking: Social Engineering Exam Review for CCNP R&S TSHOOT Exploit Development and Execution with the Metasploit Framework Exploitation: Evading Detection and Bypassing Countermeasures External Footprinting: Reconnaissance and Mapping Firewalls for CCNA Security ( ) IINS Fundamentals of Cloud Computing Fundamentals of Using Cisco ACI Getting Started Analyzing Malware Infections Getting Started with Azure Automation Getting Started with Azure Machine Learning Getting Started with Azure Operational Insights Getting Started with Citrix NetScaler Gateway 11 for XenDesktop Administrators Getting Started with OWASP Zed Attack Proxy (ZAP) for Web Application Penetration Testing Getting Started: Hybrid Identity with Microsoft Azure Google Cloud Platform Fundamentals Hands-On Incident Response Fundamentals How to Stop Man-in-the-Middle and Downgrade Attacks in Your Apps Implement Active Directory Domain Services in Windows Server 2016 Implement Windows Server 2016 IP Address Management (IPAM) Implementing a Security Assessment and Authorization Process Implementing Active Directory Certificate Services in Windows Server 2016 Implementing and Managing Azure Multi-factor Authentication Implementing and Securing Windows Server 2016 Core Networking Implementing Azure Application Services Implementing Containers on Windows Server 2016 Implementing High Availability in Windows Server 2016 Implementing Microsoft Azure Networking Implementing Physical Security Implementing Windows Server 2016 Connectivity and Remote Access Implementing Windows Server 2016 DHCP Implementing Windows Server 2016 Distributed Networking Services Implementing Windows Server 2016 DNS Implementing Windows Server 2016 Hyper-V Implementing Windows Server 2016 Identity Federation and Access Implementing Windows Server 2016 Software Defined Networking Implementing Windows Server 2016 Storage Solutions Importing and Exporting Oracle Data for DBAs Information Security Manager: Information Security Governance Information Systems Auditing: The Big Picture Information Systems Auditor: Acquisition and Development Information Systems Auditor: Governance and Management 3
4 Information Systems Auditor: Operations, Maintenance, and Service Information Systems Auditor: Protection of Information Assets Information Systems Auditor: The Process of Auditing Infrastructure Security for CCNP Routing & Switching SWITCH Installing Windows Server 2016 Introduction to Penetration Testing Using Metasploit IPv6 and Microsoft Windows ISE Posture Services for CCNP Security ( ) SISAS ISE Profiling Services for CCNP Security ( ) SISAS ISO/IEC Information Security: The Big Picture Juniper Networks JNCIS-ENT (JN0-343): Layer 2 Security Juniper Networks JNCIS-ENT (JN0-343): Layer 2 Switching and VLANs Juniper Networks JNCIS-ENT (JN0-343): Open Shortest Path First Juniper Networks JNCIS-ENT (JN0-343): Protocol-independent Routing Juniper Networks JNCIS-ENT (JN0-343): Spanning Tree Juniper Networks JNCIS-ENT: Intermediate System to Intermediate System Layer 2 Security for CCNA Security ( ) IINS LFCE: Advanced Linux Networking LFCE: Advanced Network and System Administration LFCE: Linux Service Management - HTTP Services LFCE: Network and Host Security Linux Network Programming Linux Network Security (LPIC-3 303) Maintaining and Monitoring Windows Server 2016 Malware Analysis Fundamentals Malware Analysis: The Big Picture Manage and Maintain Active Directory Domain Services in Windows Server 2016 Managing and Supporting DirectAccess with Windows Server 2016 Managing AWS Security and Identity Managing Azure AD Managing Azure IaaS with PowerShell Managing Certificates with AWS Certificate Manager Managing Configurations with Azure Automation DSC Managing Configurations with Azure Automation DSC Managing Information Security Incidents (ISO/IEC 27002) Managing Information Security Threats & Risks (ISO/IEC 27002) Managing Infrastructure with Microsoft Azure - Getting Started Mastering Microsoft Azure Resource Manager Microsoft Azure Administration for AWS Administrators Microsoft Azure Architecture - Getting Started Microsoft Azure Architecture for AWS Architects Microsoft Azure IaaS Monitoring and Management - Getting Started Microsoft Azure Security - Getting Started Microsoft Azure Virtual Machines - Getting Started Network Fundamentals and Protocols Network Interface Layer and Ethernet Operation for Cisco CCNA / Network Penetration Testing Using Python and Kali Linux Network Services for Cisco CCNA /
5 Network Vulnerability Scanning with OpenVAS Networking for CompTIA Server+ (SK0-004) OPSEC for Penetration Testers Payment Card Security, Processing, and the PCI Standards PCI DSS: The Big Picture Penetration Testing Automation Using Python and Kali Linux Penetration Testing Life Cycle Explained Penetration Testing OSINT Gathering with Recon-ng Penetration Testing SharePoint Penetration Testing: Setting the Scope and Rules of Engagement Penetration Testing: The Big Picture Performing and Analyzing Network Reconnaissance Performing OSINT Gathering on Corporate Targets Planning and Designing Microsoft Azure Compute Solutions Planning and Designing Microsoft Azure Networking Solutions Planning and Designing Microsoft Azure Security Solutions Play by Play: Enterprise Data Encryption with Azure Revealed Play by Play: Ethical Hacking - Deconstructing the Hack Play by Play: Exploring the Internet of Vulnerabilities Play by Play: Social Engineering with Troy Hunt and Lars Klint Post Exploitation: Performing Infrastructure Analysis Practical SQL Server In-Memory OLTP Tables and Objects Practical SQL Server Security, Compliance, and Auditing Pre Create and Manage Virtual Machines for Azure Solutions (70-532) Pre Design and Implement Web Apps for Azure Solutions (70-532) Pre Implementing Active Directory for Azure Infrastructure (70-533) Pre Implementing Storage for Azure Infrastructure (70-533) Pre Implementing Virtual Machines for Azure Infrastructure (70-533) Pre Implementing Virtual Networks for Azure Infrastructure (70-533) Pre Implementing Web Apps for Azure Infrastructure (70-533) Pre Prepare to Pass the Azure Solutions (70-532) Exam Pre Preparing to Pass the Microsoft Azure (70-533) Exam Providing Disaster Recovery with Azure Services Research and Analysis for CASP (CAS-002) Risk Management and Incident Response for CASP (CAS-002) Risk Management and Information Systems Control: Introduction to Risk Risk Management and Information Systems Control: IT Risk Assessment Risk Management and Information Systems Control: Risk and Control Monitoring and Reporting Risk Management and Information Systems Control: Risk Identification Risk Management and Information Systems Control: Risk Response and Mitigation Risks, Vulnerabilities, and Threats Routing IPv4 and IPv6 for Cisco CCNA / Secure Software Development Securing AWS Using CIS Foundations Benchmark Security Standard Securing Linux Servers Securing Multi-tenant ASP.NET Web Apps Securing Network Devices for CCNA Security ( ) IINS Securing Virtual Machines with Azure Key Vault 5
6 Securing Your Node.js Web App Security Concepts for CCNA Security ( ) IINS Security for CompTIA Server+ (SK0-004) Security for Hackers and Developers: Code Auditing Security for Hackers and Developers: Exploit Development Security for Hackers and Developers: Fuzzing Security for Hackers and Developers: Overview Security for Hackers and Developers: Reverse Engineering Security Management: The Big Picture Server Administration for CompTIA Server+ (SK0-004) Server Architecture for CompTIA Server+ (SK0-004) Solving Real World Problems with SQL Server 2016 Query Store SQL Server 2016 New Features for Developers SQL Server Reporting Services Playbook SQL Server Standard Edition Survival Guide SQL Server: Analyzing Query Performance for Developers SQL Server: Building Simple Asynchronous Applications SQL Server: Consolidation Tactics and Best Practices SQL Server: Improving Storage Subsystem Performance SQL Server: Indexing for Performance SQL Server: Installing and Configuring SQL Server 2016 SQL Server: Introduction to Query Store SQL Server: Replacing Profiler with Extended Events SQL Server: Scaling SQL Server 2012 and 2014: Part 2 SQL Server: Understanding and Using Azure SQL Database SQL Server: Understanding and Using DBCC Commands SQL Server: Upgrading and Migrating to SQL Server 2016 Storage for CompTIA Server+ (SK0-004) Technical Integration of Enterprise Components for CASP (CAS-002) The Information Security Big Picture The Issues of Identity and Access Management (IAM) Threat Intelligence: The Big Picture Threat Modeling Fundamentals Threat Modeling: The Big Picture Troubleshooting and Exam Prep for Cisco CCNA / Troubleshooting Cisco Networks: Infrastructure Services for CCNP R&S TSHOOT Troubleshooting Cisco Networks: Internet Security for CCNP R&S TSHOOT Troubleshooting Cisco Networks: IPv4 Routing Protocols for CCNP R&S TSHOOT Troubleshooting Cisco Networks: IPv6 Routing Protocols for CCNP R&S TSHOOT Troubleshooting Cisco Networks: Layer 2 Protocols for CCNP R&S TSHOOT Troubleshooting Essentials for Cisco CCNA / Understanding and Using Azure Storage USB Forensics: Duplication USB Forensics: Writeblocking and Impersonation Using Cisco ACI with VMware vsphere Integration Using Failover Clusters in Windows Server 2016 VPNs for CCNA Security ( ) IINS Web App Hacking: Caching Problems 6
7 Web App Hacking: Cookie Attacks Web App Hacking: Hacking Authentication Web App Hacking: Hacking Password Reset Functionality Web App Hacking: Sensitive Data Exposure Web Application Penetration Testing Fundamentals Web Application Penetration Testing with Burp Suite What's New in SQL Server 2016 Reporting Services Windows Server 2016 Security Hardening Windows Server Administration Fundamentals Using PowerShell Windows: How It's Hacked, How to Protect It Wireless Network Penetration Testing Wireless Network Penetration Testing Advanced Techniques Writing Penetration Testing Reports 7
Pluralsight CEU-Eligible Courses for CompTIA A+ updated March 2018
Pluralsight CEU-Eligible Courses for CompTIA A+ updated March 2018 Access Control Lists (ACLs) for Cisco CCNA 200-125/100-105 Administering Office 365 Quick Start Advanced Access Control with Cisco ISE
More informationSkillsoft Pre-Approved for CompTIA CEUs
Skillsoft Pre-Approved for CompTIA CEUs Note: Approved training courses in this document are subject to change without prior notification. Training submitted based on prior approval will remain valid.
More informationHacker Academy Ltd COURSES CATALOGUE. Hacker Academy Ltd. LONDON UK
Hacker Academy Ltd COURSES CATALOGUE Hacker Academy Ltd. LONDON UK TABLE OF CONTENTS Basic Level Courses... 3 1. Information Security Awareness for End Users... 3 2. Information Security Awareness for
More informationNetCom Learning Training Courses Pre-Approved for CompTIA CEUs
NetCom Learning Training Courses Pre-Approved for CompTIA CEUs CE System Activity Name: Completed a Training Course Max CEUs Earned Per CE Cycle: CompTIA A+ - 16 CEUs CompTIA Network+ - 24 CEUs CompTIA
More informationSkillsoft Pre-Approved for CompTIA CEUs
Skillsoft Pre-Approved for CompTIA CEUs Note: Approved training courses in this document are subject to change without prior notification. Training submitted based on prior approval will remain valid.
More informationSkillsoft Pre-Approved for CompTIA CEUs
Skillsoft Pre-Approved for CompTIA CEUs Note: Approved training courses in this document are subject to change without prior notification. Training submitted based on prior approval will remain valid.
More informationCourse overview. CompTIA Security+ Certification (Exam SY0-501) Study Guide (G635eng v107)
Overview This course is intended for those wishing to qualify with CompTIA Security+. CompTIA's Security+ Certification is a foundation-level certificate designed for IT administrators with 2 years' experience
More informationEthical Hacking and Prevention
Ethical Hacking and Prevention This course is mapped to the popular Ethical Hacking and Prevention Certification Exam from US-Council. This course is meant for those professionals who are looking for comprehensive
More informationProduct Catalog Platinum 529,00 (1 jaar toegang) CertKit includes: Quizzes, Tips & Tricks, 24/7 help, practise tests and e-learning CompTIA
Product Catalog Platinum 529,00 (1 jaar toegang) CertKit includes: Quizzes, Tips & Tricks, 24/7 help, practise tests and e-learning 220-902 CompTIA A+ 1Z0-808: Java SE 8 Programming I 1Z0-809: Java SE
More informationIngram Micro Cyber Security Portfolio
Ingram Micro Cyber Security Portfolio Ingram Micro Inc. 1 Ingram Micro Cyber Security Portfolio Services Trainings Vendors Technical Assessment General Training Consultancy Service Certification Training
More informationUnlocking Potential Through Learning
Unlocking Potential Through Learning CORPORATE HEAD OFFICE: 6, Babatola Drive, Off Obafemi Awolowo way, Behind Awolowo Glass house, Ikeja, Lagos. 08 Training Calender @ Newhorizonsnige @ new horizon solution
More informationComputer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers
Computer Information Systems (CIS) CIS 101 Introduction to Computers This course provides an overview of the computing field and its typical applications. Key terminology and components of computer hardware,
More informationMCSA: Windows Server MCSA 2016 Windows 2016 Server 2016 MCSA 2016 MCSA : Installation, Storage, and Compute with Windows Server 2016
indows Server 2016 MCSA 2016 MCSA: Windows Server MCSA 2016 Windows 2016 Server 2016 MCSA 2016 MCSA 2016 70-740: Installation, Storage, and Compute with Windows Server 2016 70-741: Networking with Windows
More informationP a g e 1. Teknologisk Institut. Online kursus k SysAdmin & DevOps Collection
P a g e 1 Online kursus k72751 SysAdmin & DevOps Collection P a g e 2 Title Estimated Duration (hrs) Ruby on Rails - Fundamentals 1,5 Ruby on Rails - Database Fundamentals 1,22 Python: The Basics 3,5 Python:
More informationCISSP CEH PKI SECURITY + CEHv9: Certified Ethical Hacker. Upcoming Dates. Course Description. Course Outline
CISSP CEH PKI SECURITY + CEHv9: Certified Ethical Hacker Learn to find security vulnerabilities before the bad guys do! The Certified Ethical Hacker (CEH) class immerses students in an interactive environment
More informationAston Martin Institute
Aston Martin Institute Your membership includes FREE Unlimited Access to 1,200+ IT, Cyber Security, Project Management, IT Service Management and Business Skills video courses with university Certificates
More informationSecurity+ SY0-501 Study Guide Table of Contents
Security+ SY0-501 Study Guide Table of Contents Course Introduction Table of Contents About This Course About CompTIA Certifications Module 1 / Threats, Attacks, and Vulnerabilities Module 1 / Unit 1 Indicators
More informationBusiness Skills Learning Sessions* SINGLE COURSE TITLES
Business Skills Learning Sessions* ACCOUNTING TITLES Introduction to Business Accounting Bookkeeping and Payroll LEGAL TITLES Introduction to Legal Concepts Legal Office Administration HUMAN RESOURCES
More informationTECHNICAL. Unlimited Access to Over 200 Live, Virtual Instructor-Led Technical Classes for 12 Months
TECHNICAL Unlimited Access to Over 200 Live, Virtual Instructor-Led Technical Classes for 12 Months The Technical Club Membership provides the ultimate in flexibility and value. Take as many classes as
More informationAURA ACADEMY Training With Expertised Faculty Call Us On For Free Demo
ETHICAL HACKING (CEH) CURRICULUM Introduction to Ethical Hacking What is Hacking? Who is a Hacker? Skills of a Hacker? Types of Hackers? What are the Ethics and Legality?? Who are at the risk of Hacking
More informationTECHNICAL. Unlimited Access to Over 200 Live, Virtual Instructor-Led Technical Classes for 12 Months
TECHNICAL Unlimited Access to Over 200 Live, Virtual Instructor-Led Technical Classes for 12 Months The Technical Club Membership provides the ultimate in flexibility and value. Take as many classes as
More informationTECHNICAL. Unlimited Access to Over 200 Live, Virtual Instructor-Led Technical Classes for 12 Months
TECHNICAL Unlimited Access to Over 200 Live, Virtual Instructor-Led Technical Classes for 12 Months The Technical Club Membership provides the ultimate in flexibility and value. Take as many classes as
More information6 MILLION AVERAGE PAY. CYBER Security. How many cyber security professionals will be added in 2019? for popular indursty positions are
PROGRAM Objective Cyber Security is the most sought after domain, and NASSCOM projects a requirment of over 1 million trained professionals by 2025. Tevel training program is an industry & employability
More informationCompTIA Cybersecurity Analyst+
CompTIA Cybersecurity Analyst+ Course CT-04 Five days Instructor-Led, Hands-on Introduction This five-day, instructor-led course is intended for those wishing to qualify with CompTIA CSA+ Cybersecurity
More informationIT Foundations Networking Specialist Certification with Exam
IT Foundations Networking Specialist Certification with Exam MSIT113 / 200 Hours / 12 Months / Self-Paced / Materials Included Course Overview: Gain hands-on expertise in CompTIA A+ certification exam
More informationCompTIA Network+ Study Guide Table of Contents
CompTIA Network+ Study Guide Table of Contents Course Introduction Table of Contents Getting Started About This Course About CompTIA Certifications Module 1 / Local Area Networks Module 1 / Unit 1 Topologies
More informationAcademic Services Group. Master Course List (Revised November 6, 2015)
Academic Services Group Master Course List (Revised November 6, 015) This is the course list for free, online, self-paced training offered to ASU UTO employees from Jan 1 May 30, 016. The courses are divided
More informationDIABLO VALLEY COLLEGE CATALOG
COMPUTER NETWORK TECHNOLOGY CNT Despina Prapavessi, Dean Math and Computer Sciences Division Math Building, Room 267 Possible career opportunities These CNT-courses prepare students for a career path in
More informationFederal Virtual Training Environment (FedVTE) Pre-Approved for CompTIA CEUs
Federal Virtual Training Environment (FedVTE) Pre-Approved for CompTIA CEUs You can earn 1 CEU for each hour of training. Follow these requirements to earn and receive CEUs. All training must be at least
More informationCASP CompTIA Advanced Security Practitioner Study Guide: (Exam CAS-001)
CASP CompTIA Advanced Security Practitioner Study Guide: (Exam CAS-001) Gregg, Michael ISBN-13: 9781118083192 Table of Contents Foreword xxi Introduction xxvii Assessment Test xliv Chapter 1 Cryptographic
More informationDiploma in Network (LAN/WAN) Administration
Diploma in Network (LAN/WAN) Administration The Diploma in Network (LAN/WAN) Administration program prepares students to setup Local & Wide Area Networks using Cisco routers and Catalyst switches in a
More informationCertified Ethical Hacker
Certified Ethical Hacker Certified Ethical Hacker Course Objective Describe how perimeter defenses function by ethically scanning and attacking networks Conduct information systems security audits by understanding
More informationCHCSS. Certified Hands-on Cyber Security Specialist (510)
CHCSS Certified Hands-on Cyber Security Specialist () SYLLABUS 2018 Certified Hands-on Cyber Security Specialist () 2 Course Description Entry level cyber security course intended for an audience looking
More informationAdvanced Diploma on Information Security
Course Name: Course Duration: Prerequisites: Course Fee: Advanced Diploma on Information Security 300 Hours; 12 Months (10 Months Training + 2 Months Project Work) Candidate should be HSC Pass & Basic
More informationThis course prepares candidates for the CompTIA Network+ examination (2018 Objectives) N
CompTIA Network+ (Exam N10-007) Course Description: CompTIA Network+ is the first certification IT professionals specializing in network administration and support should earn. Network+ is aimed at IT
More informationTechnical Classes. Cisco. Cisco Authorized Courses CISSP. Coding & Programming. CCNA Certification Bootcamp ( exam) 2/6/2015 9am-4:30pm
Technical Classes Cisco CCNA Certification Bootcamp (200-120 exam) 2/9/2015 2/13/2015 9am-5pm 4/20/2015 4/24/2015 9am-5pm Cisco Authorized Courses CCNP: ROUTE 4/13/2015 4/17/2015 9am-5pm CCNP: SWITCH CCNP:
More informationCompTIA Security+ Study Guide (SY0-501)
CompTIA Security+ Study Guide (SY0-501) Syllabus Session 1 At the end of this session, students will understand what risk is and the basics of what it means to have security in an organization. This includes
More informationNetwork Engineering/Cyber Security I & II
Network Engineering/Cyber Security I & II Program Description: The first year course teaches the basic techniques of computer safety and maintenance. Students learn to assemble/disassemble personal computers
More informationTestOut Network Pro - English 5.0.x COURSE OUTLINE. Modified
TestOut Network Pro - English 5.0.x COURSE OUTLINE Modified 2018-03-06 TestOut Network Pro Outline - English 5.0.x Videos: 130 (17:10:31) Demonstrations: 78 (8:46:15) Simulations: 88 Fact Sheets: 136 Exams:
More informationThis ethical hacking course puts you in the driver's seat of a hands-on environment with a systematic process.
EC Council Certified Ethical Hacker V9 This ethical hacking course puts you in the driver's seat of a hands-on environment with a systematic process. Here, you will be exposed to an entirely different
More informationCertified Ethical Hacker (CEH)
Certified Ethical Hacker (CEH) COURSE OVERVIEW: The most effective cybersecurity professionals are able to predict attacks before they happen. Training in Ethical Hacking provides professionals with the
More informationCourse 831 Certified Ethical Hacker v9
Course 831 Certified Ethical Hacker v9 Duration: 5 days What You Get: CEH v9 Certification exam voucher 5 days of high quality classroom training 18 comprehensive modules 40% of class hours dedicated to
More informationTestOut Network Pro - English 4.1.x COURSE OUTLINE. Modified
TestOut Network Pro - English 4.1.x COURSE OUTLINE Modified 2017-07-06 TestOut Network Pro Outline - English 4.1.x Videos: 141 (18:42:14) Demonstrations: 81 (10:38:59) Simulations: 92 Fact Sheets: 145
More informationAdvanced Ethical Hacking & Penetration Testing. Ethical Hacking
Summer Training Internship Program 2017 (STIP - 2017) is a practical oriented & industrial level training program for all students who have aspiration to work in the core technical industry domain. This
More informationComputer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers
Computer Information Systems (CIS) CIS 101 Introduction to Computers This course provides an overview of the computing field and its typical applications. Key terminology and components of computer hardware,
More informationETHICAL HACKING & COMPUTER FORENSIC SECURITY
ETHICAL HACKING & COMPUTER FORENSIC SECURITY Course Description From forensic computing to network security, the course covers a wide range of subjects. You will learn about web hacking, password cracking,
More informationCompTIA Security+ Pre-approved Training for CompTIA Security+ Continuing Education Units (CEUs)
CompTIA Security+ Pre-approved Training for CompTIA Security+ Continuing Education Units (CEUs) Note: Approved training courses in this document are subject to change without prior notification. Training
More informationCyber Security & Ethical Hacking Training. Introduction to Cyber Security Introduction to Cyber Security. Linux Operating System and Networking: LINUX
Cyber Security & Ethical Hacking Training. Introduction to Cyber Security Introduction to Cyber Security HTML PHP Database Linux Operating System and Networking: LINUX NETWORKING Information Gathering:
More informationWindows Server 2016 MCSA Bootcamp
Course Overview This course will provide experienced IT professionals who wish to either upgrade their skills for the purpose of certifying on Microsoft Windows Server 2016 or who wish to gain information
More informationCPTE: Certified Penetration Testing Engineer
www.peaklearningllc.com CPTE: Certified Penetration Testing Engineer (5 Days) *Includes exam voucher, course video, an exam preparation guide About this course Certified Penetration Testing Engineer certification
More informationCloud Customer Architecture for Securing Workloads on Cloud Services
Cloud Customer Architecture for Securing Workloads on Cloud Services http://www.cloud-council.org/deliverables/cloud-customer-architecture-for-securing-workloads-on-cloud-services.htm Webinar April 19,
More informationCourse 831 EC-Council Certified Ethical Hacker v10 (CEH)
Course 831 EC-Council Certified Ethical Hacker v10 (CEH) Duration: 5 days What You Get: CEH v10 Certification exam voucher 5 days of high quality classroom training 18 comprehensive modules 40% of class
More informationFederal Virtual Training Environment (Fed/VTE) Pre-Approved for CompTIA CEUs
Federal Virtual Training Environment (Fed/VTE) Pre-Approved for CompTIA CEUs Note: Approved training courses in this document are subject to change without prior notification. Training submitted based
More informationIdaho's Premiere Learning Center. Voted Best of Idaho Length. 5 Days Days 16. 2hrs. 1 day. Length. Length. 2 Days. 1 Day.
10051 W. Emerald Street, Suite 120 Boise, Idaho 83704 PHONE: (208) 327-0768 Idaho's Premiere Learning Center Voted Best of Idaho 2017 http://www.etidaho.com Trending Now 20740 Installation, Storage and
More informationIT Technician Pathways Course Guide
IT Technician Pathways Course Guide Stage Computer Retail Sales and Support Course Name or Topic Introduction to Retail or Business Fundamentals Related 3 rd Party Certifications C-ID IT-MC C-ID BUS 100
More informationDesigning Windows Server 2008 Network and Applications Infrastructure
Designing Windows Server 2008 Network and Applications Infrastructure Course No. 6435B - 5 Days Instructor-led, Hands-on Introduction This five-day course will provide students with an understanding of
More informationSecurity. Protect your business from security threats with Pearl Technology. The Connection That Matters Most
Security Protect your business from security threats with Pearl Technology The Connection That Matters Most Committed to Your Future When it comes to your business, security can mean many things. But to
More informationifuture ifuture have delivered Technical and Management trainings across PAN India, APAC and Middle East region
ifuture ifuture technologies o er wide range of trainings as a Microsoft Silver Learning Partner and we o er authorized training program. We o er Core technology trainings which are highly focused on Industry
More informationCompTIA Security+ (Exam SY0-401)
CompTIA Security+ (Exam SY0-401) Course Overview This course will prepare students to pass the current CompTIA Security+ SY0-401 certification exam. After taking this course, students will understand the
More informationMohammad Shahadat Hossain
Mohammad Shahadat Hossain Principal Security Architect at Grameenphone Limited Summary Has extensive knowledge and experience on following:- NIST Cyber Security Framework SANS Top 20 Security Control Network
More informationPUBLIC COURSE SCHEDULE. January - June 2017
PUBLIC COURSE SCHEDULE January - June 7 January - June 7 /6 ABU Yose. Yose. FCPRO LPROX. PNK APPLE ipad Apple ipad for Business Use OS X Yosemite - OS X Support Essentials. Yosemite - OS X Server Essentials.
More informationSTUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences
STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences Undergraduate Programs - Bachelor B.S. Computer Game Design Upon completion of the B.S. degree in Computer Game Design, students
More informationTitle A User's Manual to the PMBOK Guide Access 2007 Programming by Example with VBA. XML. and ASP Adobe Photoshop CS5 for Photographers: The
Title A User's Manual to the PMBOK Guide Access 2007 Programming by Example with VBA. XML. and ASP Adobe Photoshop CS5 for Photographers: The Ultimate Workshop Advanced Android 4 Games Advanced Database
More informationPUBLIC COURSE SCHEDULE. July - December 2017
PUBLIC COURSE SCHEDULE July - December 2017 July - December 2017 BIG DATA days cost BDIDA Introduction to Data Analysis 2 650 150 (d) 18-19 BDB Big Data Bootcamp (Apache Hadoop/Pig/Hive) 2 650 150(d) 02-03
More informationCEH: CERTIFIED ETHICAL HACKER v9
CEH: CERTIFIED ETHICAL HACKER v9 SUMMARY The Certified Ethical Hacker (CEH) program is the core of the most desired information security training system any information security professional will ever
More informationTERIBITE TECHNOLOGIES ACADEMY
Phone: 09080699264, 08088649 CISCO COURSES CCNA-DC - CCNA Data Center DCNXK - Implementing the Cisco Nexus 000 and 2000 v2.0 DCNX7K - Configuring Cisco Nexus 7000 Switches v.0 DCUCI - Data Center Unified
More informationAbout Us. We re now the world s largest independent IT training company, and we continue to lead
About Us As changes in technology have accelerated, it s become even more essential for people to master technology to be productive, invaluable employees who optimize, program and invent solutions and
More informationMicrosoft Certified System Engineer
529 Hahn Ave. Suite 101 Glendale CA 91203-1052 Tel 818.550.0770 Fax 818.550.8293 www.brandcollege.edu Microsoft Certified System Engineer Program Summary This instructor-led program with a combination
More informationArchitecting Microsoft Azure Solutions (proposed exam 535)
Architecting Microsoft Azure Solutions (proposed exam 535) IMPORTANT: Significant changes are in progress for exam 534 and its content. As a result, we are retiring this exam on December 31, 2017, and
More informationEC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led
EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led Certification: Certified Network Defender Exam: 312-38 Course Description This course is a vendor-neutral, hands-on,
More informationA Model for Penetration Testing
A Model for Penetration Testing Chuck Easttom Collin College Professional Development chuck@chuckeasttom.com Research Gate Publication Abstract Penetration testing is an increasingly integral part of cyber
More informationCSWAE Certified Secure Web Application Engineer
CSWAE Certified Secure Web Application Engineer Overview Organizations and governments fall victim to internet based attacks every day. In many cases, web attacks could be thwarted but hackers, organized
More informationType Vendor Exam # Name Size. Technical Cisco Interconnecting Cisco Networking Devices Part 1 (ICND1) 180
s Technical Cisco 100-105 Interconnecting Cisco Networking Devices Part 1 (ICND1) 180 Technical Cisco 200-105 Interconnecting Cisco Networking Devices Part 2 (ICND2) 137 Technical Cisco 200-125 Cisco Certified
More informationApplication Training Application Courses
Office Adobe Microsoft Office 2013 (Word/Excel/Pow erpoint/outlook) Adobe CC Photoshop/InDesi gn/illustrator Quarter 1 Jan 17 - Jan 21, Mar 13 - Mar 17, Jan 24 - Quarter 2 Application Training Application
More informationDIS10.1 Ethical Hacking and Countermeasures
DIS10.1 Ethical Hacking and Countermeasures ABOUT DIS Why choose Us. Data and internet security council is the worlds top most information security certification body. Our uniquely designed course for
More informationCisco Networking Academy CCNA Cybersecurity Operations 1.1 Curriculum Overview Updated July 2018
Cisco Networking Academy CCNA Cybersecurity Operations 1.1 Curriculum Overview Updated July 2018 Cybersecurity Opportunities Cybercrime Costs Security Spending Cybersecurity Ventures: Cybersecurity Market
More informationSecurity Readiness Assessment
Security Readiness Assessment Jackson Thomas Senior Manager, Sales Consulting Copyright 2015 Oracle and/or its affiliates. All rights reserved. Cloud Era Requires Identity-Centric Security SaaS PaaS IaaS
More informationInstallation, Storage, and Compute with Windows Server
Installation, Storage, and Compute with Windows Server 2016-740 Module 1: Installing, upgrading, and migrating servers and workloadst Introducing Windows Server 2016 Preparing and installing Nano Server
More informationEC-Council C EH. Certified Ethical Hacker. Program Brochure
EC-Council TM C EH Program Brochure Target Audience This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the
More informationUnderstanding Cisco Cybersecurity Fundamentals
210-250 Understanding Cisco Cybersecurity Fundamentals NWExam.com SUCCESS GUIDE TO CISCO CERTIFICATION Exam Summary Syllabus Questions Table of Contents Introduction to 210-250 Exam on Understanding Cisco
More informationCIT 480: Securing Computer Systems. Putting It All Together
CIT 480: Securing Computer Systems Putting It All Together Assurance 1. Asset identification 1. Systems and information assets. 2. Infrastructure model and control 1. Network diagrams and inventory database.
More informationUpgrading your Skills to MCSA Windows Server 2012
Upgrading your Skills to MCSA Windows Server 2012 OD20417D; On-Demand, Video-based Course Description Get hands-on instruction and practice configuring and implementing new features and functionality in
More informationMCSA Windows Server 2012
MCSA Windows Server 2012 This course is developed for IT professionals who need to design, plan, implement, manage and support Microsoft Windows 2012 networks or who plan to take the related MCSE and MCSA
More informationNew Horizons Computer Learning Center Training
New Horizons Computer Learning Center Training Professional Feb Mar Apr May CND Certified Network Defender Program 12-Feb CEH v9 Certified Ethical Hacker 18-22 Jan 8-12 CNFE Certified Network Forensics
More informationSoftware Development & Education Center Security+ Certification
Software Development & Education Center Security+ Certification CompTIA Security+ Certification CompTIA Security+ certification designates knowledgeable professionals in the field of security, one of the
More informationManaging Microsoft 365 Identity and Access
Course MS-500T01-A: Managing Microsoft 365 Identity and Access Page 1 of 3 Managing Microsoft 365 Identity and Access Course MS-500T01-A: 1 day; Instructor-Led Introduction Help protect against credential
More informationCertified LAN and WAN Specialist (CLWS)
529 Hahn Ave. Suite 101 Glendale CA 91203-1052 Tel 818.550.0770 Fax 818.550.8293 www.brandcollege.edu Certified LAN and WAN Specialist (CLWS) Program Summary This instructor-led program with a combination
More informationBLACK HAT USA 2013 ADD A CLASS REQUEST FORM INSTRUCTIONS
Use one form per registrant. BLACK HAT USA 2013 ADD A CLASS REQUEST FORM INSTRUCTIONS This form is for those who have existing USA 2013 Training Registration and have an existing Confirmation Number. If
More informationErasable Programmable Read-Only Memory (EPROM) Electrically Erasable Programmable Read-Only Memory (EEPROM) CMOS 2.2.
Day - 1 1. INTRODUCTION 1.1 What is Security? 1.2 What is Cyber Security? 1.3 What is Information Security? 1.4 What are the Layers of Security? 1.5 What are the Classification of Security? 1.6 What are
More informationMicrosoft Certified Solutions Expert (MCSE)
Microsoft Certified Solutions Expert (MCSE) Installing and Configuring Windows Server 2012 (70-410) Module 1: Deploying and Managing Windows Server 2012 Windows Server 2012 Overview Overview of Windows
More informationUNITS HANDBOOK Unit Handbook (Units ) Relating to the following City & Guilds qualifications:
4520 Unit Handbook (Units 600-641) November 2015 Version 1.0 Relating to the following City & Guilds qualifications: UNITS HANDBOOK 4520-01 Level 1 Certificate in ICT Professional Competence 4520-02 Level
More informationAcademic Services Group Master Course List
Academic Services Group Master Course List Revised May 5, 2017 SUMMARY Total Total Suites Courses Hours 1. End User Computing 118 324.4 2. Web, Mobil Apps & Document Design 122 388.4 3. Technical General
More informationExam : Implementing Microsoft Azure Infrastructure Solutions
Exam 70-533: Implementing Microsoft Azure Infrastructure Solutions Objective Domain Note: This document shows tracked changes that are effective as of January 18, 2018. Design and Implement Azure App Service
More informationExperience working with Windows Server 2008 or Windows Server Experience working in a Windows Server infrastructure enterprise environment
Networking with Windows Server 2016 va Day(s): 5 Course Code: M20741 Version: A Overview This 5-day classroom-based course provides the fundamental networking skills required to deploy and support Windows
More informationCertified Secure Web Application Engineer
Certified Secure Web Application Engineer ACCREDITATIONS EXAM INFORMATION The Certified Secure Web Application Engineer exam is taken online through Mile2 s Assessment and Certification System ( MACS ),
More informationThe SANS Institute Top 20 Critical Security Controls. Compliance Guide
The SANS Institute Top 20 Critical Security Controls Compliance Guide February 2014 The Need for a Risk-Based Approach A common factor across many recent security breaches is that the targeted enterprise
More informationCyberVista Certify cybervista.net
ONLINE CYBERSECURITY CERTIFICATION TRAINING CyberVista Certify ONLINE CYBERSECURITY CERTIFICATION TRAINING CyberVista Certify CyberVista offers the industry s most comprehensive cybersecurity training
More informationEZY Intellect Pte. Ltd.,
Microsoft Certified Solutions Associate (MCSA) Course 20741B: Networking with Windows Server 2016 Duration: 5 Days Associate Level: Window Server 2016 About this course This 5-day classroom-based course
More informationProtect Your Organization from Cyber Attacks
Protect Your Organization from Cyber Attacks Leverage the advanced skills of our consultants to uncover vulnerabilities our competitors overlook. READY FOR MORE THAN A VA SCAN? Cyber Attacks by the Numbers
More informationCYBERSECURITY PROFESSIONAL PENETRATION TESTER
2018 CYBERSECURITY PROFESSIONAL PENETRATION TESTER DIVERGENCE ACADEMY 11/3/2018 TABLE OF CONTENTS NETWORK EXPLOITATION AND PENTESTING... 4 WIRELESS PENTESTING AND NETWORK EXPLOITATION... 6 PYTHON FOR PENTESTERS...
More information