The Official CompTIA® Linux+® courseware builds on your existing experience with systems operations and administration to provide you with the knowledge and skills required to configure, manage, operate, and troubleshoot a Linux environment by using security best practices, scripting, and automation. This course will also prepare you for the Exam XKO-004.
In this course, you will learn how to implement, maintain, and deliver cloud technologies including network, storage, and virtualization technologies to create cloud solutions.
This course will prepare participants to take the FC0-U61 exam to obtain the IT Fundamentals+ certification and help participants learn some of the basic principles and techniques of providing PC, mobile, applications, and network support.
CompTIA A+ certified professionals are proven problem solvers. They support today’s core technologies from security to cloud to data management and more. CompTIA A+ is the industry standard for launching IT careers into today’s digital world. It is the only industry recognized credential with performance-based items to prove pros can think on their feet to perform critical IT support tasks in the moment. It is trusted by employers around the world to identify the go-to person in end point management and technical support roles. CompTIA A+ is regularly re-invented by IT experts to ensure that it validates core skills and abilities demanded in the workplace. The Official CompTIA® A+® Core 1 and Core 2 (Exams 220-1001 and 220-1002) course provides the background knowledge and skills you will require to be a successful A+ technician. It will help you prepare to take the CompTIA A+ Core Series certification examinations (exam numbers 220-1001 and 220-1002), in order to become a CompTIA A+ Certified Professional.
The CompTIA A+ course can benefit you in two ways. Whether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer interaction, where client communication and client training are important, or in an environment with limited customer interaction and an emphasis on hardware activities, this course provides the background knowledge and skills you will require to be a successful A+ technician. It can also assist you if you are preparing to take the CompTIA A+ certification examination, exam numbers 220-1102, in order to become a CompTIA A+ Certified Professional.
The CompTIA A+ course can benefit you in two ways. Whether you work or plan to work in a mobile or corporate environment where you have a high level of face-to-face customer interaction, where client communication and client training are important, or in an environment with limited customer interaction and an emphasis on hardware activities, this course provides the background knowledge and skills you will require to be a successful A+ technician. It can also assist you if you are preparing to take the CompTIA A+ certification examination, exam numbers 220-1101, in order to become a CompTIA A+ Certified Professional.
The stakes for software security are very high, and yet many development teams deal with software security only after the code has been developed and the software is being prepared for delivery. As with any aspect of software quality, to ensure successful implementation, security and privacy issues should be managed throughout the entire software development lifecycle. This course presents an approach for dealing with security and privacy throughout the entire software development lifecycle. You will learn about vulnerabilities that undermine security, and how to identify and remediate them in your own projects. You will learn general strategies for dealing with security defects and misconfiguration, how to design software to deal with the human element in security, and how to incorporate security into all phases of development.
The Internet of Things (IoT) allows organization to collect an extraordinary volume of data and new analysis tools can enable you to use this data to make well-informed decisions to be made quickly. But before you can successfully plan and implement an IoT solution, you must understand the various factors that will drive your decisions. Putting IoT systems into place can be a complicated proposition with unique considerations distinctly different from traditional IT solutions. This course will familiarize you with IoT components, understand the challenges that you may face, and make design decisions about your IoT projects.
This certification exam is designed for network security engineers and analysts who are tasked with designing secure network environments, implementing security policies and protocols related to IoT devices, and analyzing network systems for operational and security considerations, in addition to the security operations center (SOC) analysts who analyze and respond to security incidents, and develop organizational response processes. It is also beneficial to solutions architects, developers, and testers who design, develop, and test software solutions for their organizations. This certification is also relevant to operations engineers who deploy and maintain embedded and mission critical systems and perform organizational gap analysis.
In this course, students will learn general strategies for planning, designing, developing, implementing, and maintaining an IoT system through various case studies and by assembling and configuring an IoT device to work in a sensor network. Students will create an IoT device based on an ESP8266 microcontroller, implementing various common IoT features, such as analog and digital sensors, a web-based interface, MQTT messaging, and data encryption.
This class is based on the six HCISPP domains of the (ISC)² Common Body of Knowledge (CBK), ensuring students successfully prepare for the HCISPP exam and enhance their overall competencies in healthcare security and privacy.
This course covers the duties of those who are responsible for monitoring and detecting security incidents in information systems and networks, and for executing a proper response to such incidents. Depending on the size of the organization, this individual may act alone or may be a member of a cybersecurity incident response team (CSIRT). The course introduces tools and tactics to manage cybersecurity risks, identify various types of common threats, evaluate the organization’s security, collect and analyze cybersecurity intelligence, and handle incidents as they occur. Ultimately, the course promotes a comprehensive approach to security aimed toward those on the front lines of defense. This course is designed to assist students in preparing for the CyberSec First Responder™ (Exam CFR-310) certification examination. What you learn and practice in this course can be a significant part of your preparation.
Regardless of your computer experience, this class will help you become more aware of technology-related risks and what you can do to protect yourself and your organization from them. This course will help you to understand security compliance considerations, social engineering, malware, and various other data security-related concepts. In this course, you will explore the hazards and pitfalls and learn how to use technology safely and securely.
The CRISC course is designed for those who have experience with risk identification, assessment, and evaluation; risk response; risk monitoring; information systems control design and implementation; and information systems control monitoring and maintenance.
This course will provide participants the necessary skills to identify an intruders footprints and to properly gather the necessary evidence to prosecute in the court of law.
The goal of the course is to prepare professionals for the challenging CCSP exam by covering the objectives of the exam based on the six domains as defined in the (ISC)2 CCSP common body of knowledge.
In this course, students will expand upon their knowledge by addressing the essential elements of the 8 domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals.
In this course, students will establish processes to ensure that information security measures align with established business needs.
IAPP training can provide your staff with the knowledge they need to help you meet your privacy program goals of reduced risk, improved compliance, enhanced brand loyalty and more. The IAPP offers privacy and data protection training programs specifically designed to extend that knowledge to those on your team requiring a solid understanding of privacy principles and practices.
In this course, students will examine advanced security concepts, principles, and implementations that pertain to enterprise level security.
Security remains one of the hottest topics in IT and other industries. It seems that each week brings news of some new breach of privacy or security. As organizations scramble to protect themselves and their customers, the ability to conduct penetration testing is an emerging skill set that is becoming ever more valuable to the organizations seeking protection, and ever more lucrative for those who possess these skills. In this course, you will be introduced to some general concepts and methodologies related to pen testing, and you will work your way through a simulated pen test for a fictitious company.
The course introduces tools and tactics to manage cybersecurity risks, identify various types of common threats, evaluate the organization’s security, collect and analyze cybersecurity intelligence, and handle incidents as they occur.
Network professionals will learn the information to deploy wireless networks using Cisco controller and unified switching architectures policies and best practices, as well as ensure the proper implementation of mobility standards and wireless components.
This course, Deploying Cisco Unified Contact Center Express (UCCXD) v6.0, provides the student with hands-on experience and knowledge of tasks typically performed during contact center deployment. This includes the deployment of Cisco Unified Contact Center Express and Cisco Unified IP Interactive Voice Response (IVR) (Cisco Unified CCX and Cisco Unified IP IVR).
Learn how a Security Operations Center (SOC) functions and gain the introductory-level skills and knowledge required for success.
CCNA Cyber Ops prepares candidates to begin a career working with associate-level cybersecurity analysts within security operations centers.
This course provides update training on the key features of the post-8.4.1 release of the Cisco ASA adaptive security appliance, including 9.x features.
This course provides an updated training with labs on the key features on the Cisco ASA (covering up to the ASA 9.2.2 release). The goal of the course is to implement the key features of the Cisco ASA.
Introducing Cisco Data Center Networking (DCICN) v6.1 is a five-day course is designed to help students prepare for the Cisco CCNA Data Center certification and for associate-level data center roles. The course covers foundational knowledge, skills, and technologies including network protocols and host-to-host communication, data center networking concepts.
Designing Cisco Data Center Infrastructure (DCID) is a 5 day course that focuses on data center design based on Cisco solutions. The course includes theoretical content, as well as design-oriented case studies that are in the form of testlets. The course is designed to help students prepare for Cisco CCNP® Data Center certification and for professional-level data center roles.