Pluralsight CEU-Eligible Courses for CompTIA Network+ updated March 2018

Similar documents
Pluralsight CEU-Eligible Courses for CompTIA A+ updated March 2018

Skillsoft Pre-Approved for CompTIA CEUs

Hacker Academy Ltd COURSES CATALOGUE. Hacker Academy Ltd. LONDON UK

NetCom Learning Training Courses Pre-Approved for CompTIA CEUs

Skillsoft Pre-Approved for CompTIA CEUs

Skillsoft Pre-Approved for CompTIA CEUs

Course overview. CompTIA Security+ Certification (Exam SY0-501) Study Guide (G635eng v107)

Ethical Hacking and Prevention

Product Catalog Platinum 529,00 (1 jaar toegang) CertKit includes: Quizzes, Tips & Tricks, 24/7 help, practise tests and e-learning CompTIA

Ingram Micro Cyber Security Portfolio

Unlocking Potential Through Learning

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers

MCSA: Windows Server MCSA 2016 Windows 2016 Server 2016 MCSA 2016 MCSA : Installation, Storage, and Compute with Windows Server 2016

P a g e 1. Teknologisk Institut. Online kursus k SysAdmin & DevOps Collection

CISSP CEH PKI SECURITY + CEHv9: Certified Ethical Hacker. Upcoming Dates. Course Description. Course Outline

Aston Martin Institute

Security+ SY0-501 Study Guide Table of Contents

Business Skills Learning Sessions* SINGLE COURSE TITLES

TECHNICAL. Unlimited Access to Over 200 Live, Virtual Instructor-Led Technical Classes for 12 Months

AURA ACADEMY Training With Expertised Faculty Call Us On For Free Demo

TECHNICAL. Unlimited Access to Over 200 Live, Virtual Instructor-Led Technical Classes for 12 Months

TECHNICAL. Unlimited Access to Over 200 Live, Virtual Instructor-Led Technical Classes for 12 Months

6 MILLION AVERAGE PAY. CYBER Security. How many cyber security professionals will be added in 2019? for popular indursty positions are

CompTIA Cybersecurity Analyst+

IT Foundations Networking Specialist Certification with Exam

CompTIA Network+ Study Guide Table of Contents

Academic Services Group. Master Course List (Revised November 6, 2015)

DIABLO VALLEY COLLEGE CATALOG

Federal Virtual Training Environment (FedVTE) Pre-Approved for CompTIA CEUs

CASP CompTIA Advanced Security Practitioner Study Guide: (Exam CAS-001)

Diploma in Network (LAN/WAN) Administration

Certified Ethical Hacker

CHCSS. Certified Hands-on Cyber Security Specialist (510)

Advanced Diploma on Information Security

This course prepares candidates for the CompTIA Network+ examination (2018 Objectives) N

Technical Classes. Cisco. Cisco Authorized Courses CISSP. Coding & Programming. CCNA Certification Bootcamp ( exam) 2/6/2015 9am-4:30pm

CompTIA Security+ Study Guide (SY0-501)

Network Engineering/Cyber Security I & II

TestOut Network Pro - English 5.0.x COURSE OUTLINE. Modified

This ethical hacking course puts you in the driver's seat of a hands-on environment with a systematic process.

Certified Ethical Hacker (CEH)

Course 831 Certified Ethical Hacker v9

TestOut Network Pro - English 4.1.x COURSE OUTLINE. Modified

Advanced Ethical Hacking & Penetration Testing. Ethical Hacking

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers

ETHICAL HACKING & COMPUTER FORENSIC SECURITY

CompTIA Security+ Pre-approved Training for CompTIA Security+ Continuing Education Units (CEUs)

Cyber Security & Ethical Hacking Training. Introduction to Cyber Security Introduction to Cyber Security. Linux Operating System and Networking: LINUX

Windows Server 2016 MCSA Bootcamp

CPTE: Certified Penetration Testing Engineer

Cloud Customer Architecture for Securing Workloads on Cloud Services

Course 831 EC-Council Certified Ethical Hacker v10 (CEH)

Federal Virtual Training Environment (Fed/VTE) Pre-Approved for CompTIA CEUs

Idaho's Premiere Learning Center. Voted Best of Idaho Length. 5 Days Days 16. 2hrs. 1 day. Length. Length. 2 Days. 1 Day.

IT Technician Pathways Course Guide

Designing Windows Server 2008 Network and Applications Infrastructure

Security. Protect your business from security threats with Pearl Technology. The Connection That Matters Most

ifuture ifuture have delivered Technical and Management trainings across PAN India, APAC and Middle East region

CompTIA Security+ (Exam SY0-401)

Mohammad Shahadat Hossain

PUBLIC COURSE SCHEDULE. January - June 2017

STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences

Title A User's Manual to the PMBOK Guide Access 2007 Programming by Example with VBA. XML. and ASP Adobe Photoshop CS5 for Photographers: The

PUBLIC COURSE SCHEDULE. July - December 2017

CEH: CERTIFIED ETHICAL HACKER v9

TERIBITE TECHNOLOGIES ACADEMY

About Us. We re now the world s largest independent IT training company, and we continue to lead

Microsoft Certified System Engineer

Architecting Microsoft Azure Solutions (proposed exam 535)

EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led

A Model for Penetration Testing

CSWAE Certified Secure Web Application Engineer

Type Vendor Exam # Name Size. Technical Cisco Interconnecting Cisco Networking Devices Part 1 (ICND1) 180

Application Training Application Courses

DIS10.1 Ethical Hacking and Countermeasures

Cisco Networking Academy CCNA Cybersecurity Operations 1.1 Curriculum Overview Updated July 2018

Security Readiness Assessment

Installation, Storage, and Compute with Windows Server

EC-Council C EH. Certified Ethical Hacker. Program Brochure

Understanding Cisco Cybersecurity Fundamentals

CIT 480: Securing Computer Systems. Putting It All Together

Upgrading your Skills to MCSA Windows Server 2012

MCSA Windows Server 2012

New Horizons Computer Learning Center Training

Software Development & Education Center Security+ Certification

Managing Microsoft 365 Identity and Access

Certified LAN and WAN Specialist (CLWS)

BLACK HAT USA 2013 ADD A CLASS REQUEST FORM INSTRUCTIONS

Erasable Programmable Read-Only Memory (EPROM) Electrically Erasable Programmable Read-Only Memory (EEPROM) CMOS 2.2.

Microsoft Certified Solutions Expert (MCSE)

UNITS HANDBOOK Unit Handbook (Units ) Relating to the following City & Guilds qualifications:

Academic Services Group Master Course List

Exam : Implementing Microsoft Azure Infrastructure Solutions

Experience working with Windows Server 2008 or Windows Server Experience working in a Windows Server infrastructure enterprise environment

Certified Secure Web Application Engineer

The SANS Institute Top 20 Critical Security Controls. Compliance Guide

CyberVista Certify cybervista.net

EZY Intellect Pte. Ltd.,

Protect Your Organization from Cyber Attacks

CYBERSECURITY PROFESSIONAL PENETRATION TESTER

Transcription:

Pluralsight CEU-Eligible Courses for CompTIA Network+ updated March 2018 Access Control Lists (ACLs) for Cisco CCNA 200-125/100-105 Advanced Access Control with Cisco ISE for CCNP Security (300-208) SISAS Advanced Malware Analysis: Combating Exploit Kits Advanced Persistent Threats: The Big Picture Advanced Security for CCNA Security (210-260) IINS Advanced Web Application Penetration Testing with Burp Suite Applying SQL Server 2016 Features to Real-world Data Problems Architecting and Implementing Azure Networking Architecting Azure Solutions (70-534): Application Storage and Data Access Strategy Architecting Azure Solutions (70-534): Design an Advanced Application Architecting Azure Solutions (70-534): Management, Monitoring, and Business Continuity Architecting Azure Solutions (70-534): Secure Resources Architecting Microsoft Azure Solutions (70-534): Design Web Apps Assessing and Mitigating Security Risks Automating Deployment and Scale of Azure IaaS Solutions AWS Certified Solutions Architect - Professional AWS Security Fundamentals AWS Security Operations: Designing for Acceptable Risk and Compliance AWS Security Operations: Securing Access to Object Storage AWS Security Operations: Securing Core AWS Infrastructure Services AWS Security Operations: Securing Managed Services Azure Resource Manager Deep Dive Azure Site Recovery: IaaS Migration and Disaster Recovery Azure SQL Data Warehouse: First Look Azure SQL Database for the SQL Server DBA Cisco ACI Programmability Cisco Data Center Network Design for CCDA DESGN (200-310) Cisco Edge Network Design for CCDA DESGN (200-310) Cisco ISE Guest Access for CCNP Security (300-208) SISAS Cisco Network Design Blocks for CCDA DESGN (200-310) CISSP - Communications and Network Security CISSP - Identity and Access Management CISSP - Security and Risk Management CISSP - Security Engineering CISSP - Security Operations CISSP : Security Assessment and Testing Citrix Networking Deep Dive Citrix XenDesktop/XenApp 7.6 LTSR CCA-V: Introduction Citrix XenDesktop/XenApp 7.6 LTSR CCA-V: Maintaining Citrix XenDesktop/XenApp 7.6 LTSR CCA-V: Managing Citrix XenDesktop/XenApp 7.6 LTSR CCA-V: Monitoring Citrix XenDesktop/XenApp 7.6 LTSR CCA-V: Troubleshooting Citrix XenDesktop/XenApp 7.6 LTSR CCP-V: Configuring Citrix XenDesktop/XenApp 7.6 LTSR CCP-V: Installing Citrix XenDesktop/XenApp 7.6 LTSR CCP-V: Introduction Citrix XenDesktop/XenApp 7.6 LTSR CCP-V: Pre-installation Citrix XenDesktop/XenApp 7.6 LTSR CCP-V: Testing 1

Computing, Communication, and Business Integration for CASP (CAS-002) Conducting Network Vulnerability Analysis Configuring a Cisco Router for Cisco CCNA 200-125/100-105 Create and Manage Virtual Machines on Microsoft Azure Creating a DMZ in Azure Cryptography: The Big Picture CSSLP : Secure Software Concepts CSSLP : Secure Software Requirements Cyber Security Awareness: Backing up Your Data Cyber Security Awareness: Digital Data Protection Cyber Security Awareness: Electronic Commerce Security Cyber Security Awareness: Identifying Personally Identifiable Information (PII) Cyber Security Awareness: Malware Explained Cyber Security Awareness: Mobile Device Security Cyber Security Awareness: Pairing Physical and Digital Security Cyber Security Awareness: Phishing and Whaling Cyber Security Awareness: Safer Digital Communications Cyber Security Awareness: Security by Geolocation Cyber Security Awareness: Security for Cloud Services Cyber Security Awareness: Security Overview Cyber Security Awareness: Social Engineering Cyber Security Awareness: Social Networking at Work Cyber Security Awareness: The Importance of Identity Protection Cyber Security Awareness: The Internet of Things (IoT) Cyber Security Awareness: The Protection and Destruction of Portable Data Cybersecurity Threats: Ransomware Data Center Infrastructure for CCNA Data Center (200-150/200-155) Deploy Azure Virtual Networks, VPNs, and Gateways Deploying and Integrating Azure AD Deploying and Managing Azure IaaS Virtual Machines Design a Database Environment with SQL Server 2014 (70-465) Design a Database Structure with SQL Server 2014 (70-465) Designing a Hybrid Cloud in Azure Designing and Implementing Security Policies Digital Forensics: Getting Started with File Systems Disaster Recovery for CompTIA Server+ (SK0-004) Enterprise Campus Design for CCDA DESGN (200-310) Enterprise IP Routing Design for CCDA DESGN (200-310) Enterprise IPv4/IPv6 Design for CCDA DESGN (200-310) Enterprise LAN Switching for Cisco CCNA 200-125/200-105 Enterprise Security for CASP (CAS-002) Enterprise Security for CASP (CAS-002) Enterprise Security: Policies, Practices, and Procedures Enterprise Security: Policies, Practices, and Procedures Enterprise WAN Network Design for Cisco CCDP ARCH (300-320) Ethical Hacking: Buffer Overflow Ethical Hacking: Cloud Computing Ethical Hacking: Cryptography 2

Ethical Hacking: Denial of Service Ethical Hacking: Evading IDS, Firewalls, and Honeypots Ethical Hacking: Hacking Mobile Platforms Ethical Hacking: Hacking Wireless Networks Ethical Hacking: Penetration Testing Ethical Hacking: Sniffing Ethical Hacking: Social Engineering Exam Review for CCNP R&S 300-135 TSHOOT Exploit Development and Execution with the Metasploit Framework Exploitation: Evading Detection and Bypassing Countermeasures External Footprinting: Reconnaissance and Mapping Firewalls for CCNA Security (210-260) IINS Fundamentals of Cloud Computing Fundamentals of Using Cisco ACI Getting Started Analyzing Malware Infections Getting Started with Azure Automation Getting Started with Azure Machine Learning Getting Started with Azure Operational Insights Getting Started with Citrix NetScaler Gateway 11 for XenDesktop Administrators Getting Started with OWASP Zed Attack Proxy (ZAP) for Web Application Penetration Testing Getting Started: Hybrid Identity with Microsoft Azure Google Cloud Platform Fundamentals Hands-On Incident Response Fundamentals How to Stop Man-in-the-Middle and Downgrade Attacks in Your Apps Implement Active Directory Domain Services in Windows Server 2016 Implement Windows Server 2016 IP Address Management (IPAM) Implementing a Security Assessment and Authorization Process Implementing Active Directory Certificate Services in Windows Server 2016 Implementing and Managing Azure Multi-factor Authentication Implementing and Securing Windows Server 2016 Core Networking Implementing Azure Application Services Implementing Containers on Windows Server 2016 Implementing High Availability in Windows Server 2016 Implementing Microsoft Azure Networking Implementing Physical Security Implementing Windows Server 2016 Connectivity and Remote Access Implementing Windows Server 2016 DHCP Implementing Windows Server 2016 Distributed Networking Services Implementing Windows Server 2016 DNS Implementing Windows Server 2016 Hyper-V Implementing Windows Server 2016 Identity Federation and Access Implementing Windows Server 2016 Software Defined Networking Implementing Windows Server 2016 Storage Solutions Importing and Exporting Oracle Data for DBAs Information Security Manager: Information Security Governance Information Systems Auditing: The Big Picture Information Systems Auditor: Acquisition and Development Information Systems Auditor: Governance and Management 3

Information Systems Auditor: Operations, Maintenance, and Service Information Systems Auditor: Protection of Information Assets Information Systems Auditor: The Process of Auditing Infrastructure Security for CCNP Routing & Switching 300-115 SWITCH Installing Windows Server 2016 Introduction to Penetration Testing Using Metasploit IPv6 and Microsoft Windows ISE Posture Services for CCNP Security (300-208) SISAS ISE Profiling Services for CCNP Security (300-208) SISAS ISO/IEC 27001 Information Security: The Big Picture Juniper Networks JNCIS-ENT (JN0-343): Layer 2 Security Juniper Networks JNCIS-ENT (JN0-343): Layer 2 Switching and VLANs Juniper Networks JNCIS-ENT (JN0-343): Open Shortest Path First Juniper Networks JNCIS-ENT (JN0-343): Protocol-independent Routing Juniper Networks JNCIS-ENT (JN0-343): Spanning Tree Juniper Networks JNCIS-ENT: Intermediate System to Intermediate System Layer 2 Security for CCNA Security (210-260) IINS LFCE: Advanced Linux Networking LFCE: Advanced Network and System Administration LFCE: Linux Service Management - HTTP Services LFCE: Network and Host Security Linux Network Programming Linux Network Security (LPIC-3 303) Maintaining and Monitoring Windows Server 2016 Malware Analysis Fundamentals Malware Analysis: The Big Picture Manage and Maintain Active Directory Domain Services in Windows Server 2016 Managing and Supporting DirectAccess with Windows Server 2016 Managing AWS Security and Identity Managing Azure AD Managing Azure IaaS with PowerShell Managing Certificates with AWS Certificate Manager Managing Configurations with Azure Automation DSC Managing Configurations with Azure Automation DSC Managing Information Security Incidents (ISO/IEC 27002) Managing Information Security Threats & Risks (ISO/IEC 27002) Managing Infrastructure with Microsoft Azure - Getting Started Mastering Microsoft Azure Resource Manager Microsoft Azure Administration for AWS Administrators Microsoft Azure Architecture - Getting Started Microsoft Azure Architecture for AWS Architects Microsoft Azure IaaS Monitoring and Management - Getting Started Microsoft Azure Security - Getting Started Microsoft Azure Virtual Machines - Getting Started Network Fundamentals and Protocols Network Interface Layer and Ethernet Operation for Cisco CCNA 200-125/100-105 Network Penetration Testing Using Python and Kali Linux Network Services for Cisco CCNA 200-125/200-105 4

Network Vulnerability Scanning with OpenVAS Networking for CompTIA Server+ (SK0-004) OPSEC for Penetration Testers Payment Card Security, Processing, and the PCI Standards PCI DSS: The Big Picture Penetration Testing Automation Using Python and Kali Linux Penetration Testing Life Cycle Explained Penetration Testing OSINT Gathering with Recon-ng Penetration Testing SharePoint Penetration Testing: Setting the Scope and Rules of Engagement Penetration Testing: The Big Picture Performing and Analyzing Network Reconnaissance Performing OSINT Gathering on Corporate Targets Planning and Designing Microsoft Azure Compute Solutions Planning and Designing Microsoft Azure Networking Solutions Planning and Designing Microsoft Azure Security Solutions Play by Play: Enterprise Data Encryption with Azure Revealed Play by Play: Ethical Hacking - Deconstructing the Hack Play by Play: Exploring the Internet of Vulnerabilities Play by Play: Social Engineering with Troy Hunt and Lars Klint Post Exploitation: Performing Infrastructure Analysis Practical SQL Server In-Memory OLTP Tables and Objects Practical SQL Server Security, Compliance, and Auditing Pre 2017 - Create and Manage Virtual Machines for Azure Solutions (70-532) Pre 2017 - Design and Implement Web Apps for Azure Solutions (70-532) Pre 2017 - Implementing Active Directory for Azure Infrastructure (70-533) Pre 2017 - Implementing Storage for Azure Infrastructure (70-533) Pre 2017 - Implementing Virtual Machines for Azure Infrastructure (70-533) Pre 2017 - Implementing Virtual Networks for Azure Infrastructure (70-533) Pre 2017 - Implementing Web Apps for Azure Infrastructure (70-533) Pre 2017 - Prepare to Pass the Azure Solutions (70-532) Exam Pre 2017 - Preparing to Pass the Microsoft Azure (70-533) Exam Providing Disaster Recovery with Azure Services Research and Analysis for CASP (CAS-002) Risk Management and Incident Response for CASP (CAS-002) Risk Management and Information Systems Control: Introduction to Risk Risk Management and Information Systems Control: IT Risk Assessment Risk Management and Information Systems Control: Risk and Control Monitoring and Reporting Risk Management and Information Systems Control: Risk Identification Risk Management and Information Systems Control: Risk Response and Mitigation Risks, Vulnerabilities, and Threats Routing IPv4 and IPv6 for Cisco CCNA 200-125/100-105 Secure Software Development Securing AWS Using CIS Foundations Benchmark Security Standard Securing Linux Servers Securing Multi-tenant ASP.NET Web Apps Securing Network Devices for CCNA Security (210-260) IINS Securing Virtual Machines with Azure Key Vault 5

Securing Your Node.js Web App Security Concepts for CCNA Security (210-260) IINS Security for CompTIA Server+ (SK0-004) Security for Hackers and Developers: Code Auditing Security for Hackers and Developers: Exploit Development Security for Hackers and Developers: Fuzzing Security for Hackers and Developers: Overview Security for Hackers and Developers: Reverse Engineering Security Management: The Big Picture Server Administration for CompTIA Server+ (SK0-004) Server Architecture for CompTIA Server+ (SK0-004) Solving Real World Problems with SQL Server 2016 Query Store SQL Server 2016 New Features for Developers SQL Server Reporting Services Playbook SQL Server Standard Edition Survival Guide SQL Server: Analyzing Query Performance for Developers SQL Server: Building Simple Asynchronous Applications SQL Server: Consolidation Tactics and Best Practices SQL Server: Improving Storage Subsystem Performance SQL Server: Indexing for Performance SQL Server: Installing and Configuring SQL Server 2016 SQL Server: Introduction to Query Store SQL Server: Replacing Profiler with Extended Events SQL Server: Scaling SQL Server 2012 and 2014: Part 2 SQL Server: Understanding and Using Azure SQL Database SQL Server: Understanding and Using DBCC Commands SQL Server: Upgrading and Migrating to SQL Server 2016 Storage for CompTIA Server+ (SK0-004) Technical Integration of Enterprise Components for CASP (CAS-002) The Information Security Big Picture The Issues of Identity and Access Management (IAM) Threat Intelligence: The Big Picture Threat Modeling Fundamentals Threat Modeling: The Big Picture Troubleshooting and Exam Prep for Cisco CCNA 200-125/200-105 Troubleshooting Cisco Networks: Infrastructure Services for CCNP R&S 300-135 TSHOOT Troubleshooting Cisco Networks: Internet Security for CCNP R&S 300-135 TSHOOT Troubleshooting Cisco Networks: IPv4 Routing Protocols for CCNP R&S 300-135 TSHOOT Troubleshooting Cisco Networks: IPv6 Routing Protocols for CCNP R&S 300-135 TSHOOT Troubleshooting Cisco Networks: Layer 2 Protocols for CCNP R&S 300-135 TSHOOT Troubleshooting Essentials for Cisco CCNA 200-125/100-105 Understanding and Using Azure Storage USB Forensics: Duplication USB Forensics: Writeblocking and Impersonation Using Cisco ACI with VMware vsphere Integration Using Failover Clusters in Windows Server 2016 VPNs for CCNA Security (210-260) IINS Web App Hacking: Caching Problems 6

Web App Hacking: Cookie Attacks Web App Hacking: Hacking Authentication Web App Hacking: Hacking Password Reset Functionality Web App Hacking: Sensitive Data Exposure Web Application Penetration Testing Fundamentals Web Application Penetration Testing with Burp Suite What's New in SQL Server 2016 Reporting Services Windows Server 2016 Security Hardening Windows Server Administration Fundamentals Using PowerShell Windows: How It's Hacked, How to Protect It Wireless Network Penetration Testing Wireless Network Penetration Testing Advanced Techniques Writing Penetration Testing Reports 7