Filter by Topic
Filter by Vendor
C)PTE – Certified Penetration Testing Engineer eLearning
Course Description: The C)PTE exam covers a broad base of …
C)PEH – Certified Professional Ethical Hacker eLearning
Course Description: To protect an information system you need to …
What you'll learn
Upon completion, the Certified Professional Ethical Hacker candidate will be able to competently take the C)PEH exam.
AZ-700: Designing and Implementing Microsoft Azure Networking Solutions
Course Description: This course covers the process of designing, implementing, …
What you'll learn
Azure Virtual Networks
Design and Implement Hybrid Networking
Design and implement Azure ExpressRoute
Load balancing non-HTTP(S) traffic in Azure
Load balancing HTTP(S) traffic in Azure
Design and implement network security
Design and implement private access to Azure Services
AZ-400: Designing and Implementing Microsoft DevOps Solutions
Course Description: This course provides the knowledge and skills to …
What you'll learn
Plan for the transformation with shared goals and timelines
Select a project and identify project metrics and Key Performance Indicators (KPI’s)
Create a team and agile organizational structure
Design a tool integration strategy
Design a license management strategy (e.g. Azure DevOps and GitHub users)
Design a strategy for end-to-end traceability from work items to working software
Design an authentication and access strategy
Design a strategy for integrating on-premises and cloud resources
Describe the benefits of using Source Control
Describe Azure Repos and GitHub
Migrate from TFVC to Git
Manage code quality including technical debt SonarCloud, and other tooling solutions
Build organizational knowledge on code quality
Explain how to structure Git repos
Describe Git branching workflows
Leverage pull requests for collaboration and code reviews
Leverage Git hooks for automation
Use Git to foster inner source across the organization
Explain the role of Azure Pipelines and its components
Configure Agents for use in Azure Pipelines
Explain why continuous integration matters
Implement continuous integration using Azure Pipelines
Define Site Reliability Engineering
Design processes to measure end-user satisfaction and analyze user feedback
Design processes to automate application analytics
Manage alerts and reduce meaningless and non-actionable alerts
Carry out blameless retrospectives and create a just culture
Define an infrastructure and configuration strategy and appropriate toolset for a release pipeline and application infrastructure
Implement compliance and security in your application infrastructure
Describe the potential challenges with integrating open-source software
Inspect open-source software packages for security and license compliance
Manage organizational security and compliance policies
Integrate license and vulnerability scans into build and deployment pipelines
Configure build pipelines to access package security and license ratings
Certified Encryption Specialist | ECES eLearning
Course Description The EC-Council Certified Encryption Specialist (ECES) program introduces …
What you'll learn
Types of Encryption Standards and their differences
How to select the best standard for your organization
How to enhance your pen-testing knowledge in encryption
Correct and incorrect deployment of encryption technologies
Common mistakes made in implementing encryption technologies
Best practices when implementing encryption technologies
C)SP – Certified Security Principles eLearning
Course Description Security Principles are your first line of defense, …
CyberSec First Responder® (CFR)
Course Description This course covers network defense and incident response …
What you'll learn
Compare and contrast various threats and classify threat profile
Explain the purpose and use of attack tools and technique
Explain the purpose and use of post exploitation tools and tactic
Explain the purpose and use of social engineering tactic
Given a scenario, perform ongoing threat landscape research and use data to prepare for incident
Explain the purpose and characteristics of various data source Given a scenario, use appropriate tools to analyze log
Given a scenario, use regular expressions to parse log files and locate meaningful data
Given a scenario, use Windows tools to analyze incidents
Given a scenario, use Linux-based tools to analyze incidents
Summarize methods and tools used for malware analysis
Given a scenario, analyze common indicators of potential compromise
Explain the importance of best practices in preparation for incident response
Given a scenario, execute incident response process
Explain the importance of concepts that are unique to forensic analysis
Explain general mitigation methods and devices
Six Sigma Green Belt
Instructor-Led Vendor: PECB Quality Management What You’ll Learn This training …
What you'll learn
Learn the fundamental principles of process improvement
Manage projects using the familiar DMAIC methodology
Leverage the GRES methodology for problem-solving
Apply basic statistical analyses when appropriate to support improvement efforts
Learn how to verify process improvements by using statistical and common sense methods
Facilitate Green Belt process improvement projects
Learn how to shift processes, reduce variation, stabilize processes, and improve their capabilities