Filter by Topic
Filter by Vendor
CyberSec First Responder® (CFR)
Course Description This course covers network defense and incident response …
What you'll learn
Compare and contrast various threats and classify threat profile
Explain the purpose and use of attack tools and technique
Explain the purpose and use of post exploitation tools and tactic
Explain the purpose and use of social engineering tactic
Given a scenario, perform ongoing threat landscape research and use data to prepare for incident
Explain the purpose and characteristics of various data source Given a scenario, use appropriate tools to analyze log
Given a scenario, use regular expressions to parse log files and locate meaningful data
Given a scenario, use Windows tools to analyze incidents
Given a scenario, use Linux-based tools to analyze incidents
Summarize methods and tools used for malware analysis
Given a scenario, analyze common indicators of potential compromise
Explain the importance of best practices in preparation for incident response
Given a scenario, execute incident response process
Explain the importance of concepts that are unique to forensic analysis
Explain general mitigation methods and devices
Six Sigma Yellow Belt
Six Sigma Yellow Belt training enables you to learn about …
What you'll learn
Understand the basic concepts of Six Sigma Yellow Belt
Acknowledge the value of Six Sigma to an organization
Understand the Six Sigma Yellow Belt tools and techniques used to improve processes, customer satisfaction and efficiency
ISO/IEC 27005 Lead Risk Manager
Master the Systematic Approach To Risk Management With ISO 27005 …
What you'll learn
Master the concepts, approaches, methods and techniques that enable an effective risk management process based on ISO/IEC 27005
Acknowledge the correlation between Information Security risk management and security controls
Learn how to interpret the requirements of ISO/IEC 27001 in Information Security Risk Management
Acquire the competence and skills to effectively advise organizations on Information Security Risk Management best practices
Acquire the knowledge necessary for the implementation, management and maintenance of an ongoing risk management program
ISO/IEC 27032 Lead Cybersecurity Manager
Course Description This PECB ISO/IEC 27032 Lead Cybersecurity Manager certification …
What you'll learn
Acquire comprehensive knowledge on the elements and operations of a Cybersecurity Program in conformance with ISO/IEC 27032 and NIST Cybersecurity framework
Acknowledge the correlation between ISO 27032, NIST Cybersecurity framework and other standards and operating frameworks
Master the concepts, approaches, standards, methods and techniques used to effectively set up, implement, and manage a Cybersecurity program within an organization
Learn how to interpret the guidelines of ISO/IEC 27032 in the specific context of an organization
Master the necessary expertise to plan, implement, manage, control and maintain a Cybersecurity Program as specified in ISO/IEC 27032 and NIST Cybersecurity framework
Acquire the necessary expertise to advise an organization on the best practices for managing Cybersecurity
Snowflake Data Engineer Training
Course Description This 3-day role-specific course covers the Snowflake key …
What you'll learn
Overview of Snowflake key features and architecture
Performance and cost optimization techniques using caching and high performing functions
Learn different UI and application methods of accessing Snowflake
Use the capabilities and best practices for working with semi-structured data in Snowflake Load, unload data sets and best practices
Tune queries and performance using advanced techniques such as data clustering and materialized views
Develop application for Snowflake including using comprehensive ANSI standard SQL support
Leveraging Snowflake SQL extensibility features such as time travel capabilities, user-defined functions and stored procedures
Snowflake Data Analyst Training
Course Description This 2-day role specific course covers how to …
What you'll learn
Overview of Snowflake key features & architecture
Perform advanced and high-performing data analytic tasks
Load and work with new datasets
Review key SQL extensibility features
Query and inspect data using SQL core constructs
Employ best practices for working with semi-structured data
Discuss query caching performance capabilities
Visualizing data outside of Snowflake
Snowflake Data Science Training
Course Description This 3-day class is ideal for Snowflake users …
What you'll learn
Collect and access data from Snowflake Data Marketplace and other sources
Manage and architect data lakes and real time streams
Employ Snowflake best practices for developing or querying semi-structured and other data types
Work with supervised and unsupervised machine learning models using some of the most relevant open source framework and libraries
Formulate data science and machine learning workflow and data pipelines
Manage and deploy machine learning models at scale with APIs
Visualize and collaborate on machine learning results
Snowflake Advanced Training
Course Description This 3-day course covers advanced Data Movement, Performance, …
What you'll learn
Evaluate Snowflakes advanced architectural concepts
Employ strategies and best practices for agile development
Discuss Snowflakes various ingestions methods for streaming data
Develop a methodology for performance tuning
Design a comprehensive program for ensuring user, network & data security
Share data in or outside of your organization securely