Designing Cisco Data Center Infrastructure (DCID) is a 5 day course that focuses on data center design based on Cisco solutions. The course includes theoretical content, as well as design-oriented case studies that are in the form of testlets. The course is designed to help students prepare for Cisco CCNP® Data Center certification and for professional-level data center roles.
Introducing Cisco Data Center Networking (DCICN) v6.1 is a five-day course is designed to help students prepare for the Cisco CCNA Data Center certification and for associate-level data center roles. The course covers foundational knowledge, skills, and technologies including network protocols and host-to-host communication, data center networking concepts.
This course provides an updated training with labs on the key features on the Cisco ASA (covering up to the ASA 9.2.2 release). The goal of the course is to implement the key features of the Cisco ASA.
This course provides update training on the key features of the post-8.4.1 release of the Cisco ASA adaptive security appliance, including 9.x features.
CCNA Cyber Ops prepares candidates to begin a career working with associate-level cybersecurity analysts within security operations centers.
Learn how a Security Operations Center (SOC) functions and gain the introductory-level skills and knowledge required for success.
This course, Deploying Cisco Unified Contact Center Express (UCCXD) v6.0, provides the student with hands-on experience and knowledge of tasks typically performed during contact center deployment. This includes the deployment of Cisco Unified Contact Center Express and Cisco Unified IP Interactive Voice Response (IVR) (Cisco Unified CCX and Cisco Unified IP IVR).
Network professionals will learn the information to deploy wireless networks using Cisco controller and unified switching architectures policies and best practices, as well as ensure the proper implementation of mobility standards and wireless components.
The course introduces tools and tactics to manage cybersecurity risks, identify various types of common threats, evaluate the organization’s security, collect and analyze cybersecurity intelligence, and handle incidents as they occur.
Security remains one of the hottest topics in IT and other industries. It seems that each week brings news of some new breach of privacy or security. As organizations scramble to protect themselves and their customers, the ability to conduct penetration testing is an emerging skill set that is becoming ever more valuable to the organizations seeking protection, and ever more lucrative for those who possess these skills. In this course, you will be introduced to some general concepts and methodologies related to pen testing, and you will work your way through a simulated pen test for a fictitious company.
In this course, students will examine advanced security concepts, principles, and implementations that pertain to enterprise level security.
IAPP training can provide your staff with the knowledge they need to help you meet your privacy program goals of reduced risk, improved compliance, enhanced brand loyalty and more. The IAPP offers privacy and data protection training programs specifically designed to extend that knowledge to those on your team requiring a solid understanding of privacy principles and practices.
In this course, students will establish processes to ensure that information security measures align with established business needs.
In this course, students will expand upon their knowledge by addressing the essential elements of the 8 domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals.
The goal of the course is to prepare professionals for the challenging CCSP exam by covering the objectives of the exam based on the six domains as defined in the (ISC)2 CCSP common body of knowledge.
This course will provide participants the necessary skills to identify an intruders footprints and to properly gather the necessary evidence to prosecute in the court of law.
The CRISC course is designed for those who have experience with risk identification, assessment, and evaluation; risk response; risk monitoring; information systems control design and implementation; and information systems control monitoring and maintenance.
Regardless of your computer experience, this class will help you become more aware of technology-related risks and what you can do to protect yourself and your organization from them. This course will help you to understand security compliance considerations, social engineering, malware, and various other data security-related concepts. In this course, you will explore the hazards and pitfalls and learn how to use technology safely and securely.
This course covers the duties of those who are responsible for monitoring and detecting security incidents in information systems and networks, and for executing a proper response to such incidents. Depending on the size of the organization, this individual may act alone or may be a member of a cybersecurity incident response team (CSIRT). The course introduces tools and tactics to manage cybersecurity risks, identify various types of common threats, evaluate the organization’s security, collect and analyze cybersecurity intelligence, and handle incidents as they occur. Ultimately, the course promotes a comprehensive approach to security aimed toward those on the front lines of defense. This course is designed to assist students in preparing for the CyberSec First Responder™ (Exam CFR-310) certification examination. What you learn and practice in this course can be a significant part of your preparation.
This class is based on the six HCISPP domains of the (ISC)² Common Body of Knowledge (CBK), ensuring students successfully prepare for the HCISPP exam and enhance their overall competencies in healthcare security and privacy.