Facebook

Courses

We found 288 courses available for you
See

C)PTE – Certified Penetration Testing Engineer eLearning

28 Lessons
40 hours
Intermediate

Course Description: The C)PTE exam covers a broad base of …

C)PEH – Certified Professional Ethical Hacker eLearning

17 Lessons
40 hours
Intermediate

Course Description: To protect an information system you need to …

What you'll learn
Upon completion, the Certified Professional Ethical Hacker candidate will be able to competently take the C)PEH exam.

AZ-700: Designing and Implementing Microsoft Azure Networking Solutions

69 Lessons
24 hours
Intermediate

Course Description: This course covers the process of designing, implementing, …

What you'll learn
Azure Virtual Networks
Design and Implement Hybrid Networking
Design and implement Azure ExpressRoute
Load balancing non-HTTP(S) traffic in Azure
Load balancing HTTP(S) traffic in Azure
Design and implement network security
Design and implement private access to Azure Services

AZ-400: Designing and Implementing Microsoft DevOps Solutions

207 Lessons
40 hours
Intermediate

Course Description: This course provides the knowledge and skills to …

What you'll learn
Plan for the transformation with shared goals and timelines
Select a project and identify project metrics and Key Performance Indicators (KPI’s)
Create a team and agile organizational structure
Design a tool integration strategy
Design a license management strategy (e.g. Azure DevOps and GitHub users)
Design a strategy for end-to-end traceability from work items to working software
Design an authentication and access strategy
Design a strategy for integrating on-premises and cloud resources
Describe the benefits of using Source Control
Describe Azure Repos and GitHub
Migrate from TFVC to Git
Manage code quality including technical debt SonarCloud, and other tooling solutions
Build organizational knowledge on code quality
Explain how to structure Git repos
Describe Git branching workflows
Leverage pull requests for collaboration and code reviews
Leverage Git hooks for automation
Use Git to foster inner source across the organization
Explain the role of Azure Pipelines and its components
Configure Agents for use in Azure Pipelines
Explain why continuous integration matters
Implement continuous integration using Azure Pipelines
Define Site Reliability Engineering
Design processes to measure end-user satisfaction and analyze user feedback
Design processes to automate application analytics
Manage alerts and reduce meaningless and non-actionable alerts
Carry out blameless retrospectives and create a just culture
Define an infrastructure and configuration strategy and appropriate toolset for a release pipeline and application infrastructure
Implement compliance and security in your application infrastructure
Describe the potential challenges with integrating open-source software
Inspect open-source software packages for security and license compliance
Manage organizational security and compliance policies
Integrate license and vulnerability scans into build and deployment pipelines
Configure build pipelines to access package security and license ratings

Certified Encryption Specialist | ECES eLearning

5 Lessons
24 hours
Intermediate

Course Description The EC-Council Certified Encryption Specialist (ECES) program introduces …

What you'll learn
Types of Encryption Standards and their differences
How to select the best standard for your organization
How to enhance your pen-testing knowledge in encryption
Correct and incorrect deployment of encryption technologies
Common mistakes made in implementing encryption technologies
Best practices when implementing encryption technologies

C)SP – Certified Security Principles eLearning

11 Lessons
40 hours
Intermediate

Course Description Security Principles are your first line of defense, …

CyberSec First Responder® (CFR)

41 Lessons
40 hours
Intermediate

Course Description This course covers network defense and incident response …

What you'll learn
Compare and contrast various threats and classify threat profile
Explain the purpose and use of attack tools and technique
Explain the purpose and use of post exploitation tools and tactic
Explain the purpose and use of social engineering tactic
Given a scenario, perform ongoing threat landscape research and use data to prepare for incident
Explain the purpose and characteristics of various data source Given a scenario, use appropriate tools to analyze log
Given a scenario, use regular expressions to parse log files and locate   meaningful data
Given a scenario, use Windows tools to analyze incidents
Given a scenario, use Linux-based tools to analyze incidents
Summarize methods and tools used for malware analysis
Given a scenario, analyze common indicators of potential compromise
Explain the importance of best practices in preparation for incident response
Given a scenario, execute incident response process
Explain the importance of concepts that are unique to forensic analysis
Explain general mitigation methods and devices

Six Sigma Green Belt

5 Lessons
40 hours
Intermediate

Instructor-Led Vendor: PECB Quality Management What You’ll Learn This training …

What you'll learn
Learn the fundamental principles of process improvement
Manage projects using the familiar DMAIC methodology
Leverage the GRES methodology for problem-solving
Apply basic statistical analyses when appropriate to support improvement efforts
Learn how to verify process improvements by using statistical and common sense methods
Facilitate Green Belt process improvement projects
Learn how to shift processes, reduce variation, stabilize processes, and improve their capabilities
🚀 Ready to Launch Your Data Analytics Career in 12 Weeks? Join Free Webinar.
This is default text for notification bar