Facebook

Courses

We found 186 courses available for you
See

Certified Penetration Testing Professional | CPENT eLearning

14 Lessons
24 hours
All Levels

Course Description EC-Council’s Certified Penetration Tester (CPENT) program is all …

Computer Hacking Forensic Investigator | CHFI eLearning

16 Lessons
24 hours
All Levels

Course Description The Computer Hacking Forensic Investigator (CHFI) course delivers …

What you'll learn
Establish threat intelligence and key learning points to support pro-active profiling and scenario modeling
Perform anti-forensic methods detection
Perform post-intrusion analysis of electronic and digital media to determine the who, where, what, when, and how the intrusion occurred
Extract and analyze of logs from various devices like proxy, firewall, IPS, IDS, Desktop, laptop, servers, SIM tool, router, firewall, switches AD server, DHCP logs, Access Control Logs & conclude as part of investigation process.
Identify & check the possible source / incident origin.
Recover deleted files and partitions in Windows, Mac OS X, and Linux
Conduct reverse engineering for known and suspected malware files
Collect data using forensic technology methods in accordance with evidence handling procedures, including collection of hard copy and electronic documents

Oracle 19c Database Administration II (Oracle DBA II) (TTOR20619)

40 hours
Intermediate

Geared for participants experienced with Oracle 19c DBA essentials Oracle …

What you'll learn
Creating CDBs and Regular PDBs
Managing CDBs and PDBs
Backup and Duplicate
Upgrading and Transporting CDBs and Regular PDBs
Backup Strategies and Terminology
Restore and Recovery Concepts
Using Flashback Technologies
Duplicating a Database
Installing Grid Infrastructure and Oracle Database
Patching Grid Infrastructure and Oracle Database
Upgrading to Oracle Grid Infrastructure
Oracle Database 18c: New Features
Using General Overall Database Enhancements
Monitoring and Tuning Database Performance
Managing Application PDBs
Managing Security in Multitenant databases
Recovery and Flashback
Configuring and Using RMAN
Diagnosing Failures
Performing Recovery
Transporting Data
RMAN Troubleshooting and Tuning
Creating an Oracle Database by using DBCA
Oracle Restart
Upgrading the Oracle Database
Installing Grid Infrastructure for a Standalone server
Using Availability Enhancements
Tuning SQL Statements

Advanced Architecting on AWS

23 Lessons
24 hours
Intermediate

Course Description Learn how to build complex solutions that incorporate …

What you'll learn
Apply the AWS Well-Architected Framework
Manage multiple AWS accounts for your organization
Connect an on-premises datacenter to the AWS Cloud
Discuss billing implications of connecting multi-region VPCs
Move large data from an on-premises datacenter to AWS
Design large data stores for the AWS Cloud
Understand different architectural designs for scaling a large website
Protect your infrastructure from distributed denial of service (DDOS) attacks
Secure your data on AWS with encryption
Design protection of data at rest and data in transit
Enhance the performance of your solutions
Select the most appropriate AWS deployment mechanism

Certified Penetration Testing Professional | CPENT

14 Lessons
120 hours
Intermediate

Course Description EC-Council’s Certified Penetration Tester (CPENT) program is all …

Certified Incident Handler | ECIH

9 Lessons
40 hours
All Levels

Course Description The EC-Council Certified Incident Handler (ECIH) program focuses …

What you'll learn
To enable individuals and organizations with the ability to handle and respond to different types of cybersecurity incidents in a systematic way.
To ensure that organization can identify, contain, and recover from an attack.
To reinstate regular operations of the organization as early as possible and mitigate the negative impact on the business operations.
To be able to draft security policies with efficacy and ensure that the quality of services is maintained at the agreed levels.
To minimize the loss and after-effects breach of the incident.
For individuals: To enhance skills on incident handling and boost their employability.

SESAv3.1: Securing Email with Cisco Email Security Appliance v3.1

144 Lessons
24 hours
Intermediate

Course Description Learn to deploy high-availability email protection against the …

ENAUI: Implementing Automation for Cisco Enterprise Solutions

24 Lessons
24 hours
Intermediate

Course Description: Implementing Automation for Cisco Enterprise Solutions (ENAUI) is …

What you'll learn
Describe the various models and APIs of the Cisco IOS-XE platform to perform Day 0 operations, improve troubleshooting methodologies with custom tools, augment the Command-Line Interface (CLI) using scripts, and integrate various workflows using Ansible and Python
Explain the paradigm shift of model-driven telemetry and the building blocks of a working solution
Control the tools and APIs to automate Cisco DNA infrastructure managed by Cisco DNA Center™
Demonstrate workflows (configuration, verification, health checking, and monitoring) using Python, Ansible, and Postman
Explain Cisco SD-WAN solution components, implement a Python library that works with the Cisco SD-WAN APIs to perform configuration, inventory management, and monitoring tasks, and implement reusable Ansible roles to automate provisioning new branch sites on an existing Cisco SD-WAN infrastructure
Manage the tools and APIs to automate Cisco Meraki managed infrastructure and demonstrate workflows (configuration, verification, health checking, monitoring) using Python, Ansible, and Postman