Cyber Security Training Courses
Learning Tree offers cyber security training courses and certification programs for all levels of an organization, including the C-suite, to ensure that everyone is responsible for protecting against cyber threats and supporting IT security programs and policies. Their curriculum covers specialized IT security training, security best practices, and certifications such as CISSP, CompTIA Security+, CASP, and CEH.
-
ISACA
The cloud audit certification training teaches the essential principles needed to successfully obtain the Certificate of Cloud Auditing Knowledge (CCAK).
cloud audit, auditing, auditing cloud computing systems, CCAK, Certificate of Cloud Auditing Knowledge, CCAK Certification, Cloud Security Alliance, ISACA, IT audit, security, cybersecurity, risk, privacy, governance, certification training, cloud security best practices, clowd audit, auditting, CCAK certification, cloud secuirty, IT auditing.
Intermediate2 daysOnline or In-classStarts from $2,995 -
CompTIA
This CompTIA Cloud+® certification training will prepare you to pass the CompTIA Cloud+ CV0-003 exam and earn the corresponding certification.
CompTIA Cloud+®, Certification Training, pass, exam, standard deployments, cloud technologies, create cloud solutions, workload migrations, cloud vendors, control costs, automation, orchestration, business value, cybersecurity, best practices, U.S. DoD Directive 8140/8570.01, Management, IAM, Level-I, CSSP Analyst, CSSP Infrastructure Support CompTIA Cloud+ Certification Training CompTIA Cloud Certification Training CompTIA Cloud+ Certification Exam cloud tecnologiecyber security CSSP Infrastructure Support
Foundation5 daysOnline or In-classStarts from $2,590 -
Microsoft
Learning Tree's Microsoft Azure Security certification provides IT Security Professionals with the knowledge to maintain an organization’s security posture.
security controls, security posture, security vulnerabilities, identity and access, platform protection, data protection, application security, security operations, defense in depth, least privileged access, role-based access control, multi-factor authentication, shared responsibility, zero trust model, Virtual Private Networks, VPN, Internet Security Protocol, IPSec, Secure Socket Layer, SSL, disk encryption, data encryption, Azure administration, Windows operating system, Linux operating system, scripting languages, PowerShell, CLI, Azure Security Engineer, certification exam, Microsoft Azure Security Technologies, securty, acess, platfrom, securtiy, opetartions, virtaul, IPSek, encription, sccurity, administraton
Intermediate4 daysOnline or In-classStarts from $2,990 -
Microsoft
This course provides foundational level knowledge on security, compliance, and identity concepts and related cloud-based Microsoft solutions. The content for this course aligns to the SC-900 exam objective domain.
Microsoft Security, Compliance, Identity, Cloud-based Solutions, Networking, Cloud Computing, General IT Knowledge, Microsoft Azure, Microsoft 365, Familiarization, Fundamentals, SCI, SC-900 Exam, Objective Domain, End-to-end Solution, Holistic Solution, Cloud Services, Cloud Security, Compliance Concepts, Identity Concepts, Security Concepts, Microsoft Tools, Microsoft Security Solutions, Identity Management, Access Management, Risk Management, Governance, Certification, Authentication, Authorization, Misconfigurations, Cybersecurity, Threats, Vulnerabilities, Policies, Best Practices
Foundation1 dayOnline or In-classStarts from $690 -
Microsoft
This course was designed for people who work in a Security Operations job role and helps learners prepare for the exam SC-200: Microsoft Security Operations Analyst.
Microsoft Security Operations Analyst Training, SC-200, investigate, respond, hunt for threats, Microsoft Azure Sentinel, Azure Defender, Microsoft 365 Defender, mitigate cyber threats, configure, Kusto Query Language, KQL, detection, analysis, reporting, security operations role, exam prep, Microsfot Security Operations Analyst, Azure Snetinel, Kusto Query Langauge
Intermediate4 daysOnline or In-classStarts from $2,990 -
Microsoft
This course includes identity content for Azure AD, enterprise application registration, conditional access, identity governance, and other identity tools.
Microsoft, Identity, Access, Administrator, Training, SC-300, Azure AD, design, implement, operate, organization, identity management, access management, secure authentication, authorization, enterprise applications, seamless experiences, self-service management, users, adaptive access, governance, troubleshooting, monitoring, reporting, environment, team, collaboration, strategic identity projects, modernize identity solutions, hybrid identity solutions, identity governance, identiy, adimnistrator, authenticaion, authoriztion, enterpise, experieces, managemnt, adaptie, govrenance, truobleshooting, monioring, reporing, envirnoment.
Intermediate4 daysOnline or In-classStarts from $2,990 -
Microsoft
This course helps learners prepare for the Microsoft Information Protection Administrator exam (SC-400).
Microsoft, Information Protection, Administrator, Training, SC-400, data governance, data loss prevention, sensitive information types, sensitivity labels, data retention policies, Office 365, message encryption, exam preparation, data security, information security, data protection, security policies, data classification, access control, compliance, risk management, threat detection, incident response, vulnerability management, cybersecurity, privacy, confidentiality, misconfigurations, audit logs, security assessments, security awareness, security training, encryption, decryption, key management, identity and access management, authentication, authorization, network security, endpoint security, cloud security, application security, mobile security, device management, data backup, disaster recovery, business continuity, legal and regulatory requirements, industry standards, best practices, mistakes, troubleshooting. Microsft, Infrmation, Prtection, Adminstrator, Traning, SC400, data goverance, data loss prevntion, sensetive, information types, sensivity, lables, data rentention, polices, Ofice 365, mesage, encrytion, exam prep, data secuirty, information secuirty, data protecton, secuirty polices, data clasification, access contol, complience, risk managment, threat detection, incident responce, vulnarability managment, cyberscurity, privicy, confidntiality, misconfigurations, audit logs, secuirty asssessments, secuirty awarness, secuirty traning, encrytion, decrytion, key managment, identity and access managment, athentication, authorisation, network secuirty, endpoint secuirty, cloud secuirty, application secuirty, mobile secuirty, device managment, data bakup, disaster recovery, business continuty, legal and regulatry requirments, industry standards, best pratices, commen mistakes, troubleshootin.
Intermediate3 daysOnline or In-classStarts from $2,650 -
(ISC)²®
The CCSP Training and Certification course teaches the knowledge & skills needed to pass the certification & become a Certified Cloud Security Professional.
CCSP, Certified Cloud Security Professional, training, certification, ISC ², security professionals, knowledge, cloud security, data security, cloud infrastructure security, information security, secure data centers, cloud environments, cloud-based data access, cloud security solutions, detecting, responding, security incidents, cloud computing technologies, Microsoft Azure, security practices, physical infrastructure, cloud resource access control, protection, sensitive data, load balancers, security operations centers, SOCs, cloud environment security, exam, industry standard, U.S. DoD Directive 8140/8570.01, Technical IAT Level-III, Information Assurance Security Architect/Engineer IASAE Level-III, CSP, CCPS, CCSP certification, CCSP exam
Intermediate5 daysOnline or In-classStarts from $4,095 -
CertNexus
This CertNexus Certified CyberSAFE Essentials Training helps you recognize & avoid phishing, social engineering attacks, viruses, ransomware & other malware attacks.
cybersecurity, cybersecurity training, network security, data security, technologyrisks, vulnerability, potential breaches, data breach, network breach, computer security, mobile security, internet security, cloud security, cyber safe, cyber security essentials, cyber security training, cybersecurity awareness, secure computing, online security, cyber awareness. cyber-security, cyber-sec, cybersecuritytraining, cyber-essentials, cyber safe essentials, network-security, data-security, cloud-security, internet-security, cybersec, cyberawareness
FoundationLess than a dayOnline or In-classStarts from $199 -
Cisco
In this 5-day Cisco course, you will gain an understanding of the network infrastructure devices, operations, and vulnerabilities of the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol suite.
Understanding Cybersecurity Operations Fundamentals, TCP/IP, network infrastructure, security concepts, network application operations, security incidents, cybersecurity analyst, security operations center, network protocol, devices, operational efficiency, Cisco Certified CyberOps Associate, certification, exams, self-study, Implementing and Administering Cisco Solutions, CCNA, Ethernet, Windows, Linux, networking security. Cybersecurity Operashuns Fundamentals, TCP/IP lol, networkss infrastructure, network apllication operations, Windows and Linnux operating systms, networkig security, Cisco Cerified CybrOps Assosiate, Implementing addministring Cisco Solutions, Ethernat.
Foundation5 daysOnline or In-classStarts from $4,295 -
CMMC
The Cybersecurity Maturity Model Certification (CMMC) Training Course prepares students for the CMMC-AB Certified CMMC Professional (CCP) certification.
CMMC certification, cybersecurity, maturity model, compliance, policies, plans, DoD, Cyber AB, accreditation, CCP, CMMC Professional, assessment team, lead assessor, marketplace, CCA, Certified CMMC Assessor, training, course, practices, business operations, Level requirements. Cybsersecurity Maturity Model Certification Cybersecurity Maturity Model Certfication Cybersecurity Maturiy Model Certification CMMC certiciation Cyber AB accredidation ACQ Accreditation Body CCP certificaton CMM Certified CMMC Manager CMA Certified CMMC Auditor CCN Certified CMMC Navigators
Foundation5 daysOnline or In-classStarts from $3,495 -
EC-Council
CYBRScore Ethical Hacking Essentials Labs include 22 hands-on labs to prepare you to exploit networks to discover how to protect your system from attackers.
Ethical Hacking, Labs, Techniques, Internet, Professionals, Exploit, Networks, Attacker, Protect, System, Learning Objectives, Certified Ethical Hacker, Certification, Course 2031, EC-Council, Hands-on, Bundle, Skilled, Role, Alignment, Discovery, Security, Penetration Testing, Vulnerability Assessment, Cybersecurity, Intrusion Detection, Misuse Detection, Attack Surface, Firewall, Encryption, Password Cracking, Social Engineering, Remote Access, Wireless Networks, Web Applications, SQL Injection, Malware Analysis, Incident Response, Forensics, Risk Assessment, Compliance, Governance, Misconfigurations, Exploits, Vulnerabilities, Reconnaissance, Footprinting, Scanning, Enumeration, Exploitation, Post-Exploitation, Persistence, Covering Tracks, Backdoors, Trojans, Worms, Viruses. Ethical Hacking Essentials Lab, Techinques, Intrussion Detection, Complience, Govenance, Misconfigurations, Vunerabilities, Persistense.
FoundationMulti-WeekStarts from $149 -
Learning Tree
CYBRScore Digital Media Forensics Essentials Labs include 19 hands-on labs that provide an introduction to media collection, imaging and analysis.
digital forensics, media forensics, computer forensics, network forensics, cyber forensics, investigation, analysis, evidence collection, imaging, data recovery, security techniques, hands-on labs, media collection, data analysis, forensic analysis, cybercrime investigation, criminal investigation, incident response, forensic tools, forensic software, forensic techniques
FoundationMulti-WeekStarts from $99 -
Learning Tree
In this Penetration Testing course, you will learn to discover weaknesses in your own network by using the mindset and methods of a hacker.
Penetration Testing, Pen Testing, hacking, cybersecurity, vulnerability assessment, network security, cyber defense, exploit, countermeasures, risk reduction, antivirus evasion, ethical hacking, security testing, OS security, network weaknesses, enterprise security, offensive security, defensive security, computer security, system security, IT security, cyber threat, cyber attack, security assessment, security training, security tools, hacker mindset, security measures, digital security, security seminar, cyber security certification
Intermediate4 daysOnline or In-classStarts from $2,990 -
Learning Tree
In this Vulnerability Assessment course, you learn how to create a network security vulnerability assessment checklist to prevent network exploitation.
Vulnerability Assessment, security breaches, evaluate risk, network security, checklist, exposed infrastructure, server vulnerabilities, desktop vulnerabilities, reports, vulnerability scanners, detect points of exposure, prevent network exploitation, vulnerabilty, assesssment, secuirty, breahces, netowrk, exposd, infrastructer, desktop vulnarabilities, vulnirability, scannars, exploitatoin.
Intermediate4 daysOnline or In-classStarts from $2,990 -
Learning Tree
This Defending the Perimeter from Cyber Attacks course will teach you to ensure the confidentiality and integrity of your organization’s information by protecting your communications and data.
Defending the Perimeter, Cyber Attacks, Training, confidentiality, integrity, availability, organization's information, protecting communications, data, security principles, secure firewalls, Virtual Private Network, VPN, network perimeter, malicious attacks, Basic security knowledge, System and Network Security Introduction, TCP/IP, client server architecture Defending the peremeter Cyber Attaks Trainig confedentiality integrety avaliability comunicationdatum secuirty firwallVirtual Privet Network malicous attakSytem and Network Security Intrduction TCP/IP cclient server arketecture
Intermediate4 daysOnline or In-classStarts from $2,990 -
Learning Tree
This Cyber Security Risk Assessment Training course teaches how to protect your organization by employing a standards-based risk management process.
risk assessment, security risk assessment, cybersecurity, laws and regulations, compliance assessment plan, risk management process, security posture, training, US, 2013, Cyber Security, cyber security, cyberscurity, cyberscurity risk assessment, mispelling, mistake.
Foundation4 daysOnline or In-classStarts from $2,990 -
EC-Council
This ECIH Certification course from EC-Council provides the skills to handle computer security incidents & preps you to pass the ECIH exam. Exam voucher included in tuition.
EC-Council, Certified Incident Handler, ECIH, program, computer security incidents, information system, incident response training, underlying principles, techniques, detecting, responding, emerging computer security threats, incident handling, response policies, information security experience, Learning Tree, certification prep course. CE-Council Incedent Handeler ECHI response training, incident handeling
Intermediate3 daysOnline or In-classStarts from $1,399 -
EC-Council
In this CEH training course, you are provided with the foundational knowledge needed to pass the EC-Council Certified Ethical Hacker (CEH v12) exam. You will learn how to deploy tools and techniques to protect your network through hands-on labs that mimic real-life scenarios.
CEH training, Certified Ethical Hacker training, CEH v12 exam, CEH Certification Exam, network protection techniques, hands-on labs, real-life scenarios, U.S. DoD Directive 8140/8570.01, CSSP Analyst, CSSP Infrastructure Support, CSSP Auditor, CSSP Incident Responder, CEP training, Ethical Hacker training, CEH v1.2 exam, CEH Certification, network protection tools, hands-on exercises
Intermediate5 daysOnline or In-classStarts from $3,664 -
EC-Council
In this method-driven course, you will learn a holistic approach covering vast concepts concerning organizational threat intelligence that are highly essential while building effective threat intelligence that can secure organizations from future threats or attacks.
Certified Threat Intelligence Analyst, C|TIA, EC-Council, training program, organizational threat intelligence, business risks, unknown threats, known threats, mitigate, method-driven, holistic approach, effective threat intelligence, secure, future threats, attacks, concepts, internal threats, external threats, Certified Threat Intellgence Analyst, C|TIA, CIA, CTIA.
Advanced3 daysOnline or In-classStarts from $2,995 -
CompTIA
This CASP+® Training course prepares you for the CASP+ exam certifying your knowledge and skills in enterprise security and risk management.
CompTIA CASP, CASP+ certification, enterprise security, risk management, research and analysis, computing, communications, business disciplines, DoD Directive 8140/8570.01, Technical IAT Level-III, Management IAM Level-II, Information Assurance Security Architect/Engineer IASAE Level-I, Level II, , navigational terms, s, terms, s, mistypes
Advanced5 daysOnline or In-classStarts from $3,290 -
CompTIA
This official CompTIA CySA+® certification training preps you to successfully pass the CS0-002 exam & be ready to meet advanced persistent threats head on.
CompTIA, CySA+, certification, training, exam, cybersecurity, analyst, APTs, scenario-based, foundational, knowledge, network security, tools, techniques, threats, DoD, directive, Technical, IAT, Level-II, CSSP, Auditor, Infrastructure, Support, Incident Responder, comptia, cysa, analyist, csa+, CySA, certification, traning, exame, cyber security, aps, networksecutriy, dirctive, technicall, cspp, infustracture, insident, responser
Intermediate5 daysOnline or In-classStarts from $3,290 -
CompTIA
This CompTIA PenTest+® course introduces the general concept and methodologies related to penetration testing & preps you for the PT0-002 exam.
CompTIA PenTest, PT0-002, certification exam, penetration testing, simulated pen test, DoD Directive 8140/8570.01, CSSP Analyst, CSSP Incident Responder, CSSP Auditor, CSSP Infrastructure Support, methodology, concepts. CompTIA Pentest PT0 002 pen-testing simulated pen-test DoD Directives 8140/8570.01 CPSS Analyst CPSS Incident Responder CPSS Auditor CPSS Infrastructure Support methology concept.
Intermediate5 daysOnline or In-classStarts from $3,290 -
Learning Tree
This identity & access management course will teach you to protect your IT resources. Learn Single Sign-On, PKI, Federated Identity Management & more!
Identity management, access management, IAM, IdM, Single Sign-On, SSO, Public Key Infrastructure, PKI, Federated Identity Management, FIM, security, Windows operating system, course 468, {course 468}, identitiy management, acess management, Idnetity Access Management, IdM, SSO, Pubic Key Infrastructure, Federated Identity Managment, secruity, Windows opperating system, course 468, {corse 468}
Intermediate4 daysOnline or In-classStarts from $2,990 -
CertNexus
This CyberSec First Responder Certification course from CertNexus preps you for the new CFR-410 exam & teaches you to detect, analyze & respond to threats to your network.
CyberSec First Responder Certification, CertNexus, IT Professionals, analyze threats, secure networks, problem-solving, protect organization, detect, analyze, respond, knowledge, practical skills, recover from attacks, thwart potential threats, CFR Certification Exam, U.S. DoD Directive 8140/8570.01, CSSP Analyst, CSSP Infrastructure Support, CSSP Incident Responder, CSSP Auditor, cybersick, cybersick first responder, cybersex first responder, cyber securityfirst responder, cyberspace first responder.
Intermediate5 daysOnline or In-classStarts from $3,290 -
EC-Council
Attend this EC-Council CHFI Certification course to get prepped to successfully pass the EC-Council EC0-312-49.
CHFI Certification, Computer Hacking Forensic Investigator Training, CHFI v10, Digital forensics, evidence analysis, cyber forensics, computer forensic, computer security, incident response, infrastructure support, DoD Directive 8140, DoD Directive 8570.01, CSSP Incident Responder, CSSP Infrastructure Support, searching and seizing, chain-of-custody, acquisition, preservation, analysis, reporting, digital evidence, EC-Council, certification course. CFI Certification Computer Hacking Forensic Investigator Training with variations of capitalization CHFIv10 Digital forensics with variations of spelling Cyber forensics with variations of spelling Forensic computer investigation Incident response with variations of capitalization Infrastructure support with variations of spelling DoD Directive 8140 with variations of capitalization and spelling DoD Directive 8570.01 with variations of capitalization and spelling CSSP Incident Responder with variations of capitalization and spelling CSSP Infrastructure Support with variations of capitalization and spelling Searching and seizing with variations of spelling Chain of custody with variations of capitalization and spelling Acquisition with variations of spelling Preservation with variations of spelling Analysis with variations of spelling Reporting with variations of spelling Digital evidence with variations of spelling EC-Council with variations of capitalization and spelling
Intermediate5 daysOnline or In-classStarts from $2,199 -
Learning Tree
CYBRScore Pentesting & Network Exploitation Labs include 4 hands-on labs on reconnaissance, scanning, enumeration, exploitation & pillaging for 802.3 networks.
Penetration Testing, Network Exploitation, Security Techniques, Internet, Skilled Professionals, Hands-on labs, Reconnaissance, Scanning, Enumeration, Exploitation, Pillaging, 802.3 Networks, Course 537, Pen Testing, Net Exploitation, Cybersecurity Techniques, Internet Security, Network Security, Network Vulnerability.
FoundationMulti-WeekStarts from $99 -
Learning Tree
CYBRScore Vulnerability & Assessment Management Labs include 19 hands-on labs on tools & techniques to detect security vulnerabilities in web-based apps, networks & systems.
Vulnerability assessment, management, security techniques, Internet, professionals, hands-on labs, detect, exploit, web-based applications, networks, computer systems, Windows, Linux OS, mitigation countermeasures, learning objectives, National Cybersecurity Workforce Framework, Vulnerability Assessment Analyst, NIST SP-800-181, course content, cyber security, Course 589 vulnurability assessment, mangement, secutiry techniques, internat, profeshnals, web-bassed applications, Countr 589, cybar security
FoundationMulti-WeekStarts from $99 -
Learning Tree
In this Managing PKI training course, you gain essential skills for designing, creating, and maintaining a Public Key Infrastructure (PKI).
PKI management, PKI training, Public Key Infrastructure, symmetric cryptography, asymmetric cryptography, digital signatures, Certificate Authority management, X.509 certificates, authentication, encryption, security, cryptography, certificate management, certificate authority, certificate authentication, digital certificate, hierarchical CA, cryptography techniques, PKI design, PKI creation, PKI maintenance, CA management, X.509 digital certificates, digital security, digital encryption, certificate hierarchy, certificate encryption, PKI encryption, PKI security, certificate design, certificate creation, certificate maintenance. PKI managment, PKI traning, Publick Key Infrastructure, simmetric cryptography, asymetric cryptography, digitaly signatures, Sertificate Authority management, X.509 sertificates, autorhentication, encryptioin, sercurity, crystography, sertificate managment, sertificate autorhity, sertificate autentication, digital sertificate, hierarchal CA, crystography techniques, PKI desing, PKI creaation, PKI maintainence, CA managment, digitaly encryptioin, sertificate hierarcy, sertificate encryptioin, PKI encryptioin, sertificate sercurity, sertificate desing, sertificate creaation, sertificate maintainence.
Foundation1 dayTeam Training -
Learning Tree
This Cyber Security Success Factors course provides an introduction to the 4 pillars of cyber security. Examine real cyber attacks & their countermeasures.
cyber security, cyber attacks, network passwords, data integrity, digital signatures, confidentiality, encryption, network authentication, open source tools, training, success factors, countermeasures, cyber securty, network passwrods, data integrety, digtal signatures, confidnetiality, encription, authentiction
Foundation1 dayTeam Training -
Learning Tree
This cybersecurity training course prepares managers, members of the board and senior executives to understand, assess, and take a proactive posture in cyber security.
cybersecurity training, cyber security, managers, boardroom, senior executives, risk assessment, risk management, security frameworks, security gaps, liability, DoD, 8570.01 Directive, certification objectives, cybersecutiry training, manager, boardrom, cyber secutiry, exectuives, risk assement, risk managment, secuirty frameworks, secutiry gaps, liablility, DOD, 857.01 Directive, sertification objectives.
IntermediateLess than a dayTeam Training -
ISACA
This CDPSE training course provides enterprises the ability to identify technologists who can keep the organization compliant efficiently and cost-effectively.
CDPSE, technical privacy, certification, privacy controls, systems, networks, applications, privacy by design, technology platforms, legal professionals, compliance, IT professionals, data breaches, technical privacy solutions, software engineer, domain architect, security, privacy engineer, privacy solutions architect, project manager, data scientist, privacy analyst, privacy manager. CDPSE CDPS, CDPCE, CDPSA privacy controls privary controls, pirvacy controls, privasy controls systems sytems, sysetms, systemms networks netoworks, netwroks, nertworks applications aplicaitons, appplications, aplicatoins compliance compiance, comliance, complience IT professionals IT professioanls, IT proffesionals, it professional
Intermediate3 daysOnline or In-classStarts from $3,595 -
IAPP
This course teaches you the body of knowledge for the IAPP’s globally recognized Information Privacy Professional/U.S. Government (CIPP/US) certification program.
U.S. government, privacy laws, regulations, policies, privacy program, development, management, compliance, auditing, records management, agency reporting obligations, ANSI-accredited, certification program, test takers, Privacy Certification Handbook 2018, examination prep course, key concepts, timed practice test, review, answers, instructor, exam blueprint, topic area, public sector, private sector, IAPP, Information Privacy Professional/U.S. Government, CIPP/US, goverment, privicy, complience, audting, IAP, Informatoin, Certfied
Foundation2 daysOnline or In-classStarts from $3,495 -
IAPP
This Certified Information Privacy Technologist Training is based on the body of knowledge for the IAPP’s ANSI-accredited Certified Information Privacy Professional/ U.S. (CIPT/US) certification program
Certified Information Privacy Technologist, CIPT, privacy, data protection, IT products, IT services, information and communication technologies, systems, ANSI-accredited, certification, IAPP, Certified Information Privacy Professional, US, tech pros, securing data privacy, examination prep course, key concepts, practice test, exam blueprint, potential test takers
Foundation2 daysOnline or In-classStarts from $3,495 -
IAPP
This course provides exam preparation for CIPM certification — the world’s first and only certification in privacy program management.
Certified Information Privacy Manager, CIPM, privacy program management, privacy program framework, privacy program operational lifecycle, privacy team, jurisdiction, industry, IAPP, ANSI-accredited, Certified Information Privacy Professional/ U.S., CIPM/US, credential, Body of Knowledge, Certified Information Privacy Professional/Management, cetified information privicy manager, CIPN, priacy program mangeement, priacy progam framework, priacy team, jursidiction, indsutry
Intermediate2 daysTeam Training -
(ISC)²®
CYBRScore Systems Security Essentials Labs include 32 hands-on labs on risk management, network security, identity & access management & security operations.
security, risk management, network security, identity management, access management, security operations, ISC 2, Certified Information Systems Security Professional, CISSP, labs, hands-on, techniques, Internet, professionals, essentials, bundle, learning objectives, Course 2058, secutiry, risck management, netwrok security, identitiy management, accesss management, secuirty operations, ISSC2, Certified Informations Systems Security Professional, CISPP, lab, handson, techniqeus, Interent, profesionals, essentails, bundel, lerning objectives, Cours 2058.
FoundationMulti-WeekStarts from $149 -
ASPE
Learn how zero trust security solves typical security issues, and how to implement it in your environment.
zero trust security, implementation, design, technical implementation, traditional security approach, federal agencies, physical access, connectivity, remote work, authentication, authorization, user access, applications, container networking, transaction-level controls, access rules, firewalls, trust, security issues, malicious, spoofing, authentication, authorization, network security, cybersecurity, secure access, data protection, cybersecurity training, cybersecurity awareness
Foundation3 daysOnline or In-classStarts from $1,695 -
ISACA
In this course, you will gain the knowledge needed to successfully pass the certification exam and become a CISM, ISACA Certified Information Security Manager.
CISM, Certified Information Security Manager, certification, exam, knowledge, skills, security governance, risk management, compliance, program development, incident management, CAP, Directive 8140/8570.01, IAM, Level-I, Level-II, CISN, Certifid Information Security Mangager, secuirity, goverance, complience, incidnt.
Intermediate4 daysOnline or In-classStarts from $3,664 -
ISACA
This official ISACA CRISC training course helps you prepare for the certification exam & provides you with in-depth coverage of the four CRISC domains.
ISACA, certification, CRISC, risk identification, IT risk assessment, risk response, risk mitigation, risk and control monitoring, reporting, enterprise risk management, IT professional, control professional, business analyst, project manager, compliance professional, defend, protect, future-proof, exam, experience, risk management, IS control, prep course, exam day, rules, exam dates, deadlines, risc, cric, crsc, crcs, isaca certification
Intermediate4 daysOnline or In-classStarts from $3,664 -
ISACA
This official ISACA CGEIT certification course preps you for the exam & provides you with in-depth coverage of the CGEIT Framework & its implementation.
CGEIT, certification, training, exam, governance, enterprise, IT, resources, benefits, risk, optimization, senior managers, CIOs, compliance, IS professionals, efficient, effective, practices, manage, organization, in-demand, experience, advisory, oversight, prep course, ISACA, candidate information guide, rules, deadlineCEGIT, sertification, traning, exm, goverance, enterprice, resourses, benifits, risck, optimisation, senoir mangers, COIs, complience, IT profesionals, efficent, effectiv, prctices, manag, orginization, expereience, advsory, oversight, prepration course, ICASA, candiate information guied, ruels, daedlines.
Intermediate4 daysOnline or In-classStarts from $3,664 -
ISACA
This official CISA training course provides in-depth coverage of the five CISA domains covered on the CISA certification exam and meets U.S. DoD Directive 8140/8570.01 Technical (IAT) Level-III and CSSP Auditor requirements.
CISA training, ISACA CISA, information systems auditing, control, information security, IT governance, management of IT, information systems acquisition, development, implementation, operations, maintenance, support, protection of information assets, CISA domains, CISA certification exam, US DoD Directive 8140/8570.01, Technical IAT Level-III, CSSP Auditor requirementCISA traning, ISACA CISAA, information system auditing, information secruity, IT governence, management or IT, information system aquisition, developement, implimentation, operation, maintenence, CISA domians, certifcation exam, DOD, DIRECTIVE 8140/8570.1, technical, IT level III, CSPP auditor
Intermediate4 daysOnline or In-classStarts from $3,664 -
(ISC)²®
This CISSP® Training and Certification prep course provides in-depth training in the (ISC)²® curriculum that will help prepare you to pass your CISSP exam.
CISSP, certification, training, prep course, security, risk, assets, design, framework, communication, networks, software development, exam, Information Systems Security Professional, DoD, Directive 8140/8570.01, IAT, Information Assurance Security Architect/Engineer, IASAE, Management, IAM, Level-III, Level-II, Level-I, , s.
Intermediate5 daysOnline or In-classStarts from $4,095 -
(ISC)²®
This SSCP® training and certification course prepares you to pass the exam and become a Systems Security Certified Practitioner.
SSCP, certification, course, exam, Systems Security Certified Practitioner, skills, concepts, domains, Access Controls, Security Operations, Administration, Incident Response, Cryptography, Network Security, DoD, Directive 8140, 8570.01, Technical, IAT, CSSP, Infrastructure, training, prepare, pass, official, ISC ², U.S., United Statesmay vary
Foundation5 daysOnline or In-classStarts from $3,695 -
(ISC)²®
This CGRC® training and certification course prepares you for the CGRC exam plus risk management frameworks.
CGRC, Certified in Governance Risk and Compliance, CAP, Certified Authorization Professional, information security, risk management, security risk management, authorization, organization mission, legal requirements, regulatory requirements, DoD, IAM, Level-I, Level-II, certification exam, training, practitioner. CGRC CRCG, CRGC, CGRC® Governance Goverance Compliance Complience Authorization Authorisation Information Informtion Security Secuirty Management Managment Requirements RequirmentCertification Certificaton Training Trainning Practitioner Practicioner
Foundation5 daysOnline or In-classStarts from $3,695 -
EC-Council
This CCISO Certification course from EC-Council focuses on applying information security management principles & preps you to pass the CCISO exam.
certification, training, information security, executives, management, principles, technical knowledge, executive management, aspiring CISO, seasoned professionals, knowledge transfer, critical areas, successful program, ISACA, CISM Certification Exam, DoD Directive 8140/8570.01, IAM Level-II, IAM Level-III, CSSP Manager, , s certfication traning execuitivemanagment prinicpletechncial knowledge exectuive management CISO aspiring knowlege tansfer crtitical aeraISACA certification CISM Certification DoD Directive 8140/8570.01 IAM Level II IAM Level III CSSP_Manager
Advanced5 daysOnline or In-classStarts from $2,499 -
CMMC
This Certified CMMC Assessor Training course prepares you to become a Certified Assessor Level 1, which enables you to conduct maturity level 1 assessment.
US, Certified CMMC Assessor Training, CCA, Certified CMMC Assessor exam, assessing the CMMC Level, workflow, efficiency, Department of Defense, DoD, cybersecurity requirements, Secretary of Defense, CMMC program, standard model, evaluating organizations, cybersecurity competency, compliance, handling Controlled Unclassified Information, CUI, virtual instructor-led training, virtual classrooms, real-time delivery methods, employee training, team performance. CCMC instead of CMMC assesing instead of assessing cyber security instead of cybersecurity DOD instead of DoD virtual instructor lead training instead of virtual instructor-led training
Intermediate5 daysOnline or In-classStarts from $3,495 -
CMMC
In the CMMC NIST course, you will learn what CMMC 2.0 is all about, how certification will work under the new model & requirements that must be satisfied.
CMMC, NIST, Cybersecurity Maturity Model Certification, Defense Industrial Base, consultants, contractors, DoD contracting organizations, SP 800-171, Non-Federal Organizations, U.S. Federal Government, controlled unclassified information, self-attestation guidance, 3rd party assessments, CCMC, NISTA, Cybersecurity Maturity Model Certifcation, Defence Industrial Base, SP 800 171, self-attestation guidiance, 3rd party asesments.
Intermediate4 daysOnline or In-classStarts from $2,990 -
Learning Tree
This NICE Framework workshop teaches you how to apply the NICE Cybersecurity Workforce Framework to your organization's specific cybersecurity workforce needs.
NICE Cybersecurity Workforce Framework, NICE Framework workshop, National Initiative for Cybersecurity Education, cybersecurity workforce needs, expert instructor, advisor, interactive format, applying NICE Framework, environment, cybersecurity, practical demonstration, organization, specific experience, NISE Cybersecurity Workforce Framework, NICE Cybersecurity Workforce Frame work, NIce Framework workshop, National Iniative for Cybersecurity Education, cyber security workforce needs, cybersecurity workforce, inexpert instructor, advisr, interactiv format.
Foundation1 dayTeam Training -
Learning Tree
In this NIST training course (Cybersecurity Framework), US government employees will learn how to meet all cyber laws & regulations in their agency.
NIST, National Institute of Standards and Technology, Cybersecurity Framework, Risk Assessment, Risk Management, US Government, Cybersecurity, Protect, Losses, Laws, Regulations, Attendees, Course Notes, Workbook, Workshops, Source documents, Download, Free of charge. NIST NST, NYST, NEST, NISt National Institute of Standards and Technology National Insitute of Standards and Technology, National Instutute of Standards and Technology, National Institute for Standards and Technology Cybersecurity Cyber security, cyber-security Regulations Regualtions, Regelations, Regulashuns Attendees Attendes, Attendeeship, Attendeese
Intermediate4 daysOnline or In-classStarts from $2,990 -
APMG International
This course covers the U.S. Office of Management and Budget (OMB) mandate requiring the adoption of Technology Business Management (TBM) across the Federal Government. Completing this course will enable you to leverage authoritative data with automation and move away from the manual, time-consuming self-reporting that currently burdens federal agencies.
Technology Business Management, TBM, APMG Certification, US Office of Management and Budget, OMB, federal government, authoritative data, automation, self-reporting, Technolgy Business Management, TMB, APMG Certificaton, US Offce of Management and Budget, OM, federl governmnt
Intermediate3 daysOnline or In-classStarts from $2,650 -
Learning Tree
This course provides an introduction to fundamental cybersecurity risk management concepts and how they are applied to modern supply chains.
2014, cybersecurity, risk management, supply chain, suppliers, third-party, fourth-party, mitigation strategies, hardware, software, services, external sources, analyzing, treating, monitoring, cyber risk, cyberscurity, cybsersecurity, securty, risc, managment, suply chain, supplers, third party, forth party, mitigtion, hadware, softwere, analysing, treeting, monitering, cybar risk
Intermediate2 daysOnline or In-classStarts from $1,950 -
Learning Tree
In this NIST Compliance Checklist course, learn to assess your regulatory environment, & select & implement a successful risk management framework.
NIST Compliance Checklist, NIST training, NIST framework, risk assessment, risk management, cyber security, cyber risk, cyber readiness, organizational cyber security, organizational risk management, cybersecurity posture, NIST compliance, cybersecurity failures, risk management framework, cybersecurity risk management, cybersecurity priority, NIST NIST Complience Checklist, NIST traning, NIST frame work, cybersecutiry, cyberrisk, cybersecurity posutre
Foundation1 dayTeam Training -
Learning Tree
This GDPR training course covers GDPR understanding & an overview of the 1998 UK Data Protection Act & the new 2018 EU Data Protection Regulation.
EU GDPR, Data Protection Act 1998, sensitive data, personally identifiable information, compliance, training, awareness, regulation, changes, organizations, manage, process, store, EU citizens, shake up, legislation, half day, affect, requirements, UK Data Protection Act, GDPR readiness, EU Data Protection Regulation, EEU GDPR, Datta Protection Act 1998, sensetive data, personally identifable information, compliense, trining, awarness, regelation, chnges, orgnizations, manage, proces, store, EECitizens, shke up, lejislation, hlaf day, afct, requrements, UK Data Protekshon Act, GDPR reediness, EU Data Protekshon Regulashon
Intermediate1 dayTeam Training -
ISACA
This official ISACA Cybersecurity Nexus (CSX) Practitioner course is designed by industry experts and preps you for the exam.
CSX certification, cybersecurity training, ISACA certification, NIST framework, Identify, Protect, Detect, Respond, Recover, IT professionals, C-suite, boot camp course, certification prep training, cybersecurity framework, global security framework, cyber security field, in-demand certification, Cyberscurity, CSX pratictioner, Identifi, Dectect
Intermediate5 daysTeam Training -
Microsoft
This Microsoft Cybersecurity Architect (SC-100) course prepares students with the background to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance (GRC), security operations (SecOps), and data and applications.
Microsoft, Cybersecurity, Architect, course, design, evaluate, strategies, Zero Trust, Governance Risk Compliance, GRC, security operations, SecOps, data, applications, solutions, specify, requirements, cloud infrastructure, service models, SaaS, PaaS, IaaS, Microssoft, Cybersescurity, Archtect, Zerro Trsut, Govenrance Risk Complience, Secuity Oprations, Aaplcations, Slnutions, cloud infrasturcture, misplelling, IAS
Advanced4 daysOnline or In-classStarts from $2,990 -
Learning Tree
This Securing Web Applications, Services and Servers Training course will teach you to integrate robust security measures into the web application development process.
Web application security, web server security, web service security, cybersecurity, OWASP, secure web development, application security measures, secure web architecture, web security best practices, web app security risks, web security remediation, web app defense, web service defense, secure app development. websevice, cyberscecurity, securty
Intermediate4 daysOnline or In-classStarts from $2,990 -
Learning Tree
This secure software development course covers best practices needed to avoid opening up users, customers & organizations to attack at the application layer.
secure software development, software security, coding and testing, secure programming, information security policy, best practices, risk mitigation, higher quality applications, robustly protected applications, software developer training, application layer security, proactive requirements, software security practices, software development course, software security training, good software security practices, software developers, good information security policy, security strategy, incident response, staff training, prevent attacks, application security, software vulnerabilities, application vulnerabilities, software vulnerabilities, secure coding practices, secure software coding, secure code writing, secure application development, application development security, software design security, secure coding training, secure software training, secure coding best practices, secure software design, software security standards, coding security, software development security, software assurance, software engineering security, software security professionals, secure coding techniques, software security testing, software security processes, secure software processes, secure software architecture, secure software design patterns, software security assessments, prevent software defects, prevent software vulnerabilities, software security risks, secure programming principles, secure coding guidelines, secure coding standards, secure coding tools, software security tools, security mindset, secure software culture, information security training, data security training, software security training courses, secure development lifecycle, secure SDLC, software security training programs, security training for developers, secure software development lifecycle. secure software developement software securty secur programming infosec policy best practises risk mitigations qualilty applications software vulnerabilites appication vulnerabilities secure codding software develpment course software develpment training software engeneering security software securtiy professionals secur software culture data securty training secur software developement lifecycle.
Foundation2 daysOnline or In-classStarts from $1,295 -
EC-Council
This EC-Council Certified Application Security Engineer (CASE) .NET course teaches how to create secure applications & to achieve CASE .NET certification
EC-Council, Application Security Engineer, CASE, .NET, training, software professional, hands-on, comprehensive, security skills, knowledge, software development life cycle, SDLC, secure methodologies, insecure operating environment, exam, certification, secure programming concepts, programming experience, desktop, mobile, web, cloud applications, multiple choice questions, passing score, software developers, testers, architects, high quality, security, privacy. EC-Counsil Application Secutiry Engineer CAE Net traning software profesional lifecycle methedologieinsecure opperating environment Certifiate passsing score developperarchitctprivicy
Intermediate3 daysOnline or In-classStarts from $2,995 -
(ISC)²®
This CSSLP® Training and Certification course provides you with in-depth coverage of the skills and concepts of the eight domains of software security.
CSSLP, Certified Secure Software Lifecycle Professional, software security, software development, certification, software concepts, requirements, design, implementation, testing, lifecycle management, DoD Directive 8140/8570.01, Information Assurance Security Architect, IASAE, Level-I, Level-II, training, exam, in-depth coverage, premier, skills, concepts, achieve, prepared, official, ISC 2, CSSLPP, CSSPL, Certified Secured Software Lifecycle Professional, Information Assurance Security Architect/Engineering, IASAE Level 1, IASAE Level 2.
Intermediate5 daysOnline or In-classStarts from $4,095 -
Microsoft
The Microsoft 365 Security course will prepare you for the MS-500 exam & achieve Microsoft 365 Certified: Security Administrator Associate designation.
user access, password protection, multi-factor authentication, Azure Identity Protection, Azure AD, Active Directory Connect, conditional access, threat protection, threat vectors, Secure Score, Exchange Online Protection, Azure Advanced Threat Protection, Windows Defender Advanced Threat Protection, threat management, information protection, rights-managed content, message encryption, labels, policies, rules, data loss prevention, archiving, retention, data governance, content searches, investigations, data retention policies, tags, in-place records management, SharePoint, email retention, eDiscovery investigations, Microsoft 365 Security, Microsoft Security Administrator user acess passsword protection mult-factor authentication Azure Identity Protecton Azure AD Connect condtiional accesthraet protection Rights-managed cntent message enchryption data loss prevntion archiving retnetion Sharepoint eDiscovery investigations Microsoft Security Administrator instead of Microsoft 365 Security Administrator
Intermediate4 daysOnline or In-classStarts from $2,990 -
AWS
This Security Engineering on AWS course teaches how to efficiently use Amazon Web Services security services to stay secure & compliant in the AWS Cloud.
AWS security, AWS security services, cloud security, security practices, data security, system security, compute security, storage security, network security, database security, AWS services, automation, continuous monitoring, logging, security incidents, AWS Cloud security, cloud data security, cloud system security, AWS compute security, AWS storage security, AWS network security, AWS database security, continuous security monitoring, cloud security automation, cloud security incident response, AWS security automation, AWS security incident response, cloud data protection, AWS data protection, cloud system protection, AWS system protection, typo secury, securiy, securty.
Intermediate3 daysOnline or In-classStarts from $2,025 -
CertNexus
Prepare for the CSC-210 exam with this CertNexus Cyber Secure Coder certification training course.
training, software security, development teams, code, successful implementation, privacy issues, software development lifecycle, vulnerabilities, remediate, security defects, misconfiguration, design software, human element, incorporate security, CertNexus CSC-210 exam, cyber secure coder, cybersecurity, secure coding, secure software, secure development, privacy protection, security risks, cybersecurity training, security measures, software vulnerabilities, security best practices, security awareness, security guidelines, secure coding practices, application security, security testing, security audits, security controls, security assessments, security policies, vulnerability management, security threats, secure coding techniques, secure programming. cyber security, cyberscurity, secutiry, seecure, codeing, privcay, remmediate, devlopment, succsessful, human elemnt, development lifecylce, SecNexus, Secur Coder, CertNexus CSC 210, cybersecurity training, secure codeing, pryvacy, voynerabilities, reemmadiate, deelopment, Cert Nexis CSC210, cyber securities, secure developement.
Intermediate3 daysOnline or In-classStarts from $2,650 -
DevOps Institute
This SecDevOps Practitioner® (SDOP) Certification course builds on foundational SecDevOps knowledge while providing practical, hands-on experience.
SecDevOps Practitioner, SDOP, Certification Training, SecDevOps Foundation, SDOF, foundational practice, implementation, techniques, comprehensive understanding, pipeline architecture, effective team, best-practice processes, SeccDevOps, SDPP, Certificattion, Foundattion, implementaion
Intermediate2 daysOnline or In-classStarts from $1,950 -
(ISC)²®
The (ISC)² Certified in Cybersecurity (CC) opens opportunities for entry-level candidates to advanced certifications & future leadership roles. No experience required.
certified in cybersecurity, entry-level certification, cybersecurity certification, no experience required, recent graduates, career changers, IT professionals, advanced cybersecurity certifications, CISSP, Information Systems Security Professional, Security+, leadership roles, cyberscurity, cybsersecurity, certifed in cybersecurity, entery-level certification, cyberscurity certification, experiece required, recent gradutes, carer changers, IT profesionals, advaced cybersecurity certifications, CISSP, Infrmation systems security profesional, security+, lideraship roles.
Foundation1 dayOnline or In-classStarts from $690 -
EC-Council
CYBRScore Network Essentials Labs include 16 hands-on labs focused on security to prep you to work with a variety of hardware, software & network configurations.
configure, manage, troubleshoot, analyze traffic, wired networks, wireless networks, security, hardware, software, IT professional, CompTIA, Network+ certification, Course 2032, confgure, manag, troubleshot, any wierd networks, wireless neworks, securty, hardwear, softwear.
FoundationMulti-WeekStarts from $99 -
Learning Tree
This Disaster Recovery & Business Continuity course teaches you to identify vulnerabilities and implement a Business Continuity Management System (BCMS).
Disaster Recovery, Business Continuity, Training, Mission-Critical Continuity Needs, Sources of Risk, Incident Response Team Charter, Business Continuity Management System BCMS , Organizational Resilience, Disaster Recovery Plan, Internal Threats, External Threats, Organizational Business Continuity Planning, ICT Service Delivery, Line Management, Project Management, Facilities, Human Resources, Finance may vary and are not d due to lack of context
Foundation4 daysOnline or In-classStarts from $2,990 -
CompTIA
This CompTIA Security+® certification course prepares you for the CompTIA SY0-601 exam & ensures compliance & secures your organization.
CompTIA Security+, course, knowledge, certification exam, vendor-neutral, information system security, best practices, Security+ certification, systems, network security, network infrastructure, access control, assessments, audits, cryptography, organizational security, passing, U.S. DoD Directive 8140/8570.01, Technical IAT Level-II, Management IAM Level-I, requirements. Comptia Security, Comptia Security+ certification exam, Infomation system security, best practises, Security + certification, access controll, organisational security, cryptographycryptography
Intermediate5 daysOnline or In-classPremiumBundleStarts from $1,290 -
EC-Council
The C|CT Certification validates an individual’s fundamental cybersecurity skills across the domains of network defence, ethical hacking, digital forensics, and security operations.
cybersecurity, technician, certification, program, network defense, ethical hacking, digital forensics, security operations, C|CT, entry-level, foundational skills, validation, individual, domains, increasing need, strong skills, cybersecutiry, techician, certificaton, netwrok defense, ethcal hacking, digtal forensics, secuirty operations, C|TC
Foundation5 daysOnline or In-classStarts from $3,190 -
Learning Tree
The Information Security Training provides the knowledge and skills to analyze and assess network risks, then select & deploy appropriate countermeasures.
network security, cyber security, information protection, risk assessment, vulnerability analysis, threat detection, defense mechanisms, hacking prevention, intrusion prevention, data security, network defense, cyber defense, security measures, risk management, security analysis, cybersecurity training, information security training, network protection, vulnerability management, threat analysis, hacking protection, intrusion detection, network hardening, information assurance, security awareness, cyber awareness, security training, IT security training network secuirty, cyber secuity, infrormation security, rish assessment, vurneability analysis, thrat detection, defence mechanisms, hackign prevenetion, intertuption prevenetion, data secuirty, network defend, cyber defensee, securtiy measures, rick managment, sercurity analysis, cyber secuirty trainign, infromation security, newtork protectin, vurnerability managment, threat anaslysis, haacking protection, intursion detection, netwrok hardening, information assurance, servurity awarness, cybre awarness, sercurity trainign, IT secuirty training
Foundation4 daysOnline or In-classStarts from $2,990 -
EC-Council
In this Certified Network Defender (CND) training course, you will get prepped to pass the EC-Council CND 312-38 exam and learn how to manage a secure network.
Certified Network Defender CND , EC-Council, CND 312-38 exam, design network security, manage network security, defensive security, handle network defense, data security, configure networking technologies, install defensive software, confidentiality, integrity, availability, cyber security war, network administrators, enterprise network, network security, tactical expertise, secure data, build defenses, U.S. DoD Directive 8140/8570.01, Technical IAT Level-I, Technical IAT Level-II, Management IAM Level-I, CSSP Infrastructure Support, CYBRScore Lab Bundles, Certified Network Defendar, EC-Council Certified Network Defender, CND training, security network design, secure network managment, data securitas, configur networking tecnologies, defansive software, confidenciality, intgregity, avalability, cyber security, cyber defence, network administrator, enterprise networking, U.S. DoD Directive 8140/8570.01 Technical certified , CSSP infrastructure suport.
Intermediate5 daysOnline or In-classStarts from $2,199 -
Learning Tree
This boot camp goes in-depth into the tools, techniques and processes used by forensics examiners to find and extract evidence from computers.
Investigate, cybercrime, forensics, examiners, evidence, identify, preserve, extract, analyze, report, challenges, analysis, examination, operating systems, differences, Windows, Linux, hands-on labs, commercial, open-source, tools, Certified Computer Forensics Examiner, criminal record, basic computer skills, A+ certification, training, experience, in-depth, law enforcement, legal, information security, incident handling, desire to learn, develop skills. cybercriem, forensic, exaimners, evidnce, analyz, eximine, oerating systems, diffrences, Linaux, CCDE, Forinsics, IT professionals, corporete, incidennt handeling, skilles.
Intermediate5 daysOnline or In-classStarts from $4,599 -
Learning Tree
In this Introduction to Cybersecurity course, you'll learn to assess your environment, identify needs & enumerate critical elements of security awareness.
cybersecurity, cyber security, online security, internet safety, computer safety, data protection, data privacy, network security, IT security, information security, cybersecurity awareness, cyber safety, cyber awareness, disaster recovery, continuity of operations, security assessment, security needs, security deficits, security awareness
Foundation1 dayOnline or In-classStarts from $690 -
CompTIA
CYBRScore Security Essentials Labs include 19 distinct, hands-on labs that prepare you with the essential principles of network security & risk management.
network security, risk management, CompTIA Security+, CompTIA Security, network safety, risk mitigation, cyber security, InfoSec, risk assessment, security principles, Internet security, network risk, IT security, cyber safety, network protection, online safety, data security, Cybersecurity Essentials, Cybersecurity, Sec+, Comp TIA Security+, Comp TIA Security, cyber defense, cyber resiliency, cyber protection, cyber risk, network safety management, IT safety, data safety, cybersec, internet safety, risk management techniques, network safety principles, IT Security Essentials, online security, data protection, IT risk management, Cyber Security Essentials, Cyberdefense Essentials, Cyberresilience, Cyber protection Essentials.
FoundationMulti-WeekStarts from $99 -
Cisco
Learning Tree's SCOR training helps you prepare for the Cisco® CCNP® Security and CCIE® Security certifications and for senior-level security roles.
SCOR course outline, implementing Cisco security, operating Cisco security, CCNP security, CCIE security, senior-level security roles, advanced threat protection, cybersecurity attacks, security for networks, cloud and content, endpoint protection, secure network access, visibility and enforcements, Cisco firepower, next-generation firewall, Cisco ASA firewall, access control policies, mail policies, 802.1X authentication, Cisco Stealthwatch Enterprise, Cisco Stealthwatch Cloud, threat detection features, CCNP Security certification, CCIE Security certification, Cisco Certified Specialist-Security Core certification, Windows operating system, IOS networking, networking security concepts, security engineer, network engineer, network designer, network administrator, systems engineer, consulting systems engineer, technical solutions architect, Cisco integrators/partners, network manager, hands-on experience, best practices, professional-level security job roles, expert-level security job roles. implementig Cisco security operating Cisco secuity senior-level secuity roles cyberseciurity attacks Cloud and contnt endpoint protectioin secure network acces Cisco Firepoer back control policies mail polices Cisco Stealhwatch Techical Solutions Architech
Intermediate5 daysOnline or In-classStarts from $4,295 -
Cisco
Enroll in this official Securing Networks with Cisco Firepower Next-Generation IPS course & prep for exam 500-285, which helps earn the Cisco Certified Specialist - Network Security Firepower Certification.
network security, intrusion prevention system, firewall security, Cisco Firepower, NGIPS, event analysis, tuning and configuration, Snort rules, file inspection, malware inspection, security intelligence, domain awareness, system architecture, policies, manage devices, discovery, application control, network-based malware detection, performance tuning, event analysis, user administration, TCP/IP networking, IDS, IPS, security administrators, security consultants, network administrators, system engineers, technical support personnel, channel partners, resellers network secruity, intrusion prevention, firewall secruity cisco firepower, ngips, snort rulse file and malware inspection, security intellegence domain awarness, IP networking, IDP, ISP secruity administrator, secruity consultant, network administrator system enginner, technical support personel, channel partaners
Intermediate5 daysOnline or In-classStarts from $4,000 -
Cisco
Enroll in this official Securing Email with Cisco Email Security Appliance course & prep for exam 300-710, which leads to CCNP Security and Cisco Certified Specialist – Network Security Firepower certifications.
deploy, configure, setup, routing, high availability, migration, traffic control, NAT, VPN, SSL decryption, analysis, system administration, troubleshooting, Cisco Firepower, Threat Defense, ASA, Network Address Translation, SSL, remote-access, site-to-site decrpytion, sit-to-site, analysys
Intermediate5 daysOnline or In-classStarts from $4,295