Facebook

Courses

We found 272 courses available for you
See

C)SLO – Certified Security Leadership Officer eLearning

7 Lessons
40 hours
Intermediate

Course Description Mile2’s Certified Security Leadership Officer  course is designed …

What you'll learn
Upon completion, the Certified Security Leadership Officer candidate be able to competently take the C)SLO exam.
You will be versed in implementing strong security controls and managing an organization with an industry acceptable security posture.

C)NFE – Certified Network Forensic Examiner eLearning

20 Lessons
40 hours
Intermediate

Course Description The Certified Network Forensics Examiner, C)NFE,  certification was …

What you'll learn
Upon completion, Certified Network Forensics Examiner students will have knowledge to perform network forensic examinations.
Be able to accurately report on their findings, and be ready to sit for the C)NFE exam.

C)DFE – Certified Digital Forensic Examiner eLearning

32 Lessons
40 hours
Intermediate

Course Description The Certified Digital Forensics Examiner, C)DFE certification is …

What you'll learn
Upon completion, the Certified Digital Forensics Examiner candidate will be able to competently take the CDFE exam.

C)PTC- Certified Penetration Testing Consultant eLearning

12 Lessons
40 hours
Intermediate

Course Description: The Certified Penetration Testing Consultant, C)PTC , course …

What you'll learn
Upon completion, the Certified Penetration Testing Consultant, C)PTC, candidate will have solid knowledge of testing and reporting procedures which will prepare them for upper management roles within a cybersecurity system.
They will be able to competently take the C)PTC exam.

C)PTE – Certified Penetration Testing Engineer eLearning

28 Lessons
40 hours
Intermediate

Course Description: The C)PTE exam covers a broad base of …

C)PEH – Certified Professional Ethical Hacker eLearning

17 Lessons
40 hours
Intermediate

Course Description: To protect an information system you need to …

What you'll learn
Upon completion, the Certified Professional Ethical Hacker candidate will be able to competently take the C)PEH exam.

AZ-700: Designing and Implementing Microsoft Azure Networking Solutions

69 Lessons
24 hours
Intermediate

Course Description: This course covers the process of designing, implementing, …

What you'll learn
Azure Virtual Networks
Design and Implement Hybrid Networking
Design and implement Azure ExpressRoute
Load balancing non-HTTP(S) traffic in Azure
Load balancing HTTP(S) traffic in Azure
Design and implement network security
Design and implement private access to Azure Services

AZ-400: Designing and Implementing Microsoft DevOps Solutions

207 Lessons
40 hours
Intermediate

Course Description: This course provides the knowledge and skills to …

What you'll learn
Plan for the transformation with shared goals and timelines
Select a project and identify project metrics and Key Performance Indicators (KPI’s)
Create a team and agile organizational structure
Design a tool integration strategy
Design a license management strategy (e.g. Azure DevOps and GitHub users)
Design a strategy for end-to-end traceability from work items to working software
Design an authentication and access strategy
Design a strategy for integrating on-premises and cloud resources
Describe the benefits of using Source Control
Describe Azure Repos and GitHub
Migrate from TFVC to Git
Manage code quality including technical debt SonarCloud, and other tooling solutions
Build organizational knowledge on code quality
Explain how to structure Git repos
Describe Git branching workflows
Leverage pull requests for collaboration and code reviews
Leverage Git hooks for automation
Use Git to foster inner source across the organization
Explain the role of Azure Pipelines and its components
Configure Agents for use in Azure Pipelines
Explain why continuous integration matters
Implement continuous integration using Azure Pipelines
Define Site Reliability Engineering
Design processes to measure end-user satisfaction and analyze user feedback
Design processes to automate application analytics
Manage alerts and reduce meaningless and non-actionable alerts
Carry out blameless retrospectives and create a just culture
Define an infrastructure and configuration strategy and appropriate toolset for a release pipeline and application infrastructure
Implement compliance and security in your application infrastructure
Describe the potential challenges with integrating open-source software
Inspect open-source software packages for security and license compliance
Manage organizational security and compliance policies
Integrate license and vulnerability scans into build and deployment pipelines
Configure build pipelines to access package security and license ratings