Facebook

Courses

We found 522 courses available for you
See

Certified Network Defender | CND eLearning

20 Lessons
All Levels

Course Description The program prepares network administrators how to identify …

Certified Penetration Testing Professional | CPENT eLearning

14 Lessons
24 hours
All Levels

Course Description EC-Council’s Certified Penetration Tester (CPENT) program is all …

Certified Chief Information Security Officer | CCISO eLearning

16 Lessons
All Levels

Course Description CCISO Certification is an industry-leading program that recognizes …

What you'll learn
Domain 1: Governance and Risk Management
Domain 2: Information Security Controls, Compliance, and Audit Management
Domain 3: Security Program Management & Operations
Domain 4: Information Security Core Competencies
Domain 5: Strategic Planning, Finance, Procurement and Vendor Management

Computer Hacking Forensic Investigator | CHFI eLearning

16 Lessons
24 hours
All Levels

Course Description The Computer Hacking Forensic Investigator (CHFI) course delivers …

What you'll learn
Establish threat intelligence and key learning points to support pro-active profiling and scenario modeling
Perform anti-forensic methods detection
Perform post-intrusion analysis of electronic and digital media to determine the who, where, what, when, and how the intrusion occurred
Extract and analyze of logs from various devices like proxy, firewall, IPS, IDS, Desktop, laptop, servers, SIM tool, router, firewall, switches AD server, DHCP logs, Access Control Logs & conclude as part of investigation process.
Identify & check the possible source / incident origin.
Recover deleted files and partitions in Windows, Mac OS X, and Linux
Conduct reverse engineering for known and suspected malware files
Collect data using forensic technology methods in accordance with evidence handling procedures, including collection of hard copy and electronic documents

Understanding Cisco Cybersecurity Fundamentals (SECFND) eLearning

Intermediate

Course Description: The Understanding Cisco Cybersecurity Fundamentals (SECFND) course gives …

What you'll learn
Describe network operations and attacks, basic cryptography concepts, and network infrastructure device operations
Describe basic Windows and Linux OS operations, common network applications and attacks, endpoint attacks, and network and endpoint security solutions
Describe security data collection and monitoring, and the common threat models that security operations organizations can reference when performing cybersecurity analysis

Designing Cisco Data Center Infrastructure (DCID) eLearning

Intermediate

Course Description: The Designing Cisco Data Center Infrastructure (DCID) v7.0 …

What you'll learn
Choose the appropriate components and design a scalable, reliable, and intelligent data center
Design data center network connectivity, including Layer 2 switching and Layer 3 forwarding
Design virtual port channel (vPC), Virtual Extensible LAN (VXLAN), and Cisco Overlay Transport Virtualization (OTV) in customer scenarios
Describe management options in the LAN
Describe hardware virtualization and Fabric Extender (FEX) technologies, including data center infrastructure management and automation options
Design a data center storage network, including Redundant Array of Independent Disks (RAID) options, Hyperconvergence, Fibre Channel and Fibre Channel over Ethernet (FCoE)
Describe the Cisco UCS C-Series and B-Series servers and distinguish among system-integrated stack solutions and management options for Cisco UCS domains
Design authentication, authorization, and accounting (AAA), role-based access control (RBAC) and resource parameters for a Cisco UCS domain, including resource pools and policies

Understanding Cisco Data Center Foundations (DCFNDU) eLearning

Intermediate

Course Description: The Understanding Cisco Data Center Foundations (DCFNDU) v1.1 …

What you'll learn
Describe the foundations of data center networking
Describe Cisco Nexus products and explain the basic Cisco NX-OS functionalities and tools
Describe Layer 3 first-hop redundancy
Describe Cisco Fabric Extender (FEX) connectivity
Describe Ethernet port channels and virtual port channels (vPCs)
Introduce switch virtualization, machine virtualization, and describe network virtualization
Compare storage connectivity options in the data center
Describe Fibre Channel communication between the initiator server and the target storage
Describe Fibre Channel zone types and their uses
Describe N-Port Virtualization (NPV) and N-Port Identifier Virtualization (NPIV)
Describe data center Ethernet enhancements that provide a lossless fabric
Describe Fibre Channel over Ethernet (FCoE)
Describe data center server connectivity
Describe Cisco UCS Manager
Describe the purpose and advantages of APIs
Describe Cisco ACI
Describe the basic concepts of cloud computing

Introducing Automation for Cisco Solutions (CSAU) eLearning

Intermediate

Course Description: The Introducing Automation for Cisco Solutions (CSAU) v1.0 …

What you'll learn
Articulate the role network automation and programmability play in the context of end-to-end network management and operations
Define and differentiate between waterfall and agile software development methodologies
Interpret and troubleshoot Python scripts with fundamental programming constructs built for network automation use cases
Describe how DevOps principles, tools, and pipelines can be applied to network operations
Understand the role of network automation development environments and associated technologies such as Python virtual environments, Vagrant, and Docker
Understand and construct HTTP-based API calls to network devices
Articulate the differences among and common use cases for XML, JSON, YAML, and Protobuf
Construct and interpret Python scripts using the Python requests module to automate devices that have HTTP-based APIs
Understand the role YANG plays in network automation
Understand that a number of tools exist to simplify working with YANG models
Describe the functionality of RESTCONF and NETCONF and the differences between them
Construct Ansible playbooks to configure network devices and retrieve operational state data from them
Build Jinja2 templates and YAML data structures to generate desired state configurations
🚀 Get Up to 33% OFF on Top Courses + FREE e-learning subscription (worth $1595)
This is default text for notification bar