Filter by Topic
Filter by Vendor
C)PEH – Certified Professional Ethical Hacker eLearning
Course Description: To protect an information system you need to …
What you'll learn
Upon completion, the Certified Professional Ethical Hacker candidate will be able to competently take the C)PEH exam.
AZ-400: Designing and Implementing Microsoft DevOps Solutions
Course Description: This course provides the knowledge and skills to …
What you'll learn
Plan for the transformation with shared goals and timelines
Select a project and identify project metrics and Key Performance Indicators (KPI’s)
Create a team and agile organizational structure
Design a tool integration strategy
Design a license management strategy (e.g. Azure DevOps and GitHub users)
Design a strategy for end-to-end traceability from work items to working software
Design an authentication and access strategy
Design a strategy for integrating on-premises and cloud resources
Describe the benefits of using Source Control
Describe Azure Repos and GitHub
Migrate from TFVC to Git
Manage code quality including technical debt SonarCloud, and other tooling solutions
Build organizational knowledge on code quality
Explain how to structure Git repos
Describe Git branching workflows
Leverage pull requests for collaboration and code reviews
Leverage Git hooks for automation
Use Git to foster inner source across the organization
Explain the role of Azure Pipelines and its components
Configure Agents for use in Azure Pipelines
Explain why continuous integration matters
Implement continuous integration using Azure Pipelines
Define Site Reliability Engineering
Design processes to measure end-user satisfaction and analyze user feedback
Design processes to automate application analytics
Manage alerts and reduce meaningless and non-actionable alerts
Carry out blameless retrospectives and create a just culture
Define an infrastructure and configuration strategy and appropriate toolset for a release pipeline and application infrastructure
Implement compliance and security in your application infrastructure
Describe the potential challenges with integrating open-source software
Inspect open-source software packages for security and license compliance
Manage organizational security and compliance policies
Integrate license and vulnerability scans into build and deployment pipelines
Configure build pipelines to access package security and license ratings
Certified Encryption Specialist | ECES eLearning
Course Description The EC-Council Certified Encryption Specialist (ECES) program introduces …
What you'll learn
Types of Encryption Standards and their differences
How to select the best standard for your organization
How to enhance your pen-testing knowledge in encryption
Correct and incorrect deployment of encryption technologies
Common mistakes made in implementing encryption technologies
Best practices when implementing encryption technologies
C)SP – Certified Security Principles eLearning
Course Description Security Principles are your first line of defense, …
CyberSec First Responder® (CFR)
Course Description This course covers network defense and incident response …
What you'll learn
Compare and contrast various threats and classify threat profile
Explain the purpose and use of attack tools and technique
Explain the purpose and use of post exploitation tools and tactic
Explain the purpose and use of social engineering tactic
Given a scenario, perform ongoing threat landscape research and use data to prepare for incident
Explain the purpose and characteristics of various data source Given a scenario, use appropriate tools to analyze log
Given a scenario, use regular expressions to parse log files and locate meaningful data
Given a scenario, use Windows tools to analyze incidents
Given a scenario, use Linux-based tools to analyze incidents
Summarize methods and tools used for malware analysis
Given a scenario, analyze common indicators of potential compromise
Explain the importance of best practices in preparation for incident response
Given a scenario, execute incident response process
Explain the importance of concepts that are unique to forensic analysis
Explain general mitigation methods and devices
Six Sigma Yellow Belt
Six Sigma Yellow Belt training enables you to learn about …
What you'll learn
Understand the basic concepts of Six Sigma Yellow Belt
Acknowledge the value of Six Sigma to an organization
Understand the Six Sigma Yellow Belt tools and techniques used to improve processes, customer satisfaction and efficiency
ISO/IEC 27005 Lead Risk Manager
Master the Systematic Approach To Risk Management With ISO 27005 …
What you'll learn
Master the concepts, approaches, methods and techniques that enable an effective risk management process based on ISO/IEC 27005
Acknowledge the correlation between Information Security risk management and security controls
Learn how to interpret the requirements of ISO/IEC 27001 in Information Security Risk Management
Acquire the competence and skills to effectively advise organizations on Information Security Risk Management best practices
Acquire the knowledge necessary for the implementation, management and maintenance of an ongoing risk management program
ISO/IEC 27032 Lead Cybersecurity Manager
Course Description This PECB ISO/IEC 27032 Lead Cybersecurity Manager certification …
What you'll learn
Acquire comprehensive knowledge on the elements and operations of a Cybersecurity Program in conformance with ISO/IEC 27032 and NIST Cybersecurity framework
Acknowledge the correlation between ISO 27032, NIST Cybersecurity framework and other standards and operating frameworks
Master the concepts, approaches, standards, methods and techniques used to effectively set up, implement, and manage a Cybersecurity program within an organization
Learn how to interpret the guidelines of ISO/IEC 27032 in the specific context of an organization
Master the necessary expertise to plan, implement, manage, control and maintain a Cybersecurity Program as specified in ISO/IEC 27032 and NIST Cybersecurity framework
Acquire the necessary expertise to advise an organization on the best practices for managing Cybersecurity