Filter by Topic
Filter by Vendor
IT Risk Fundamentals eLearning
Course Description The IT Risk Certificate Online Course is an online …
PECB Certified ISO 31000 Risk Manager eLearning Training Course
Course Description As the world is moving faster than ever, …
What you'll learn
Understand the risk management concepts, approaches, methods, and techniques
Learn how to establish a risk management framework in the context of an organization
Learn how to apply the ISO 31000 risk management process in an organization
Understand the basic approaches, methods, and practices used to integrate risk management in an organization
PECB Certified ISO/IEC 27001 Lead Auditor eLearning Training Course
Course Description As the world is moving faster than ever, …
What you'll learn
Understand the operations of an Information Security Management System based on ISO/IEC 27001
Acknowledge the correlation between ISO/IEC 27001, ISO/IEC 27002, and other standards and regulatory frameworks
Understand an auditor’s role to plan, lead, and follow-up on a management system audit in accordance with ISO 19011
Learn how to lead an audit and audit team
Learn how to interpret the requirements of ISO/IEC 27001 in the context of an ISMS audit
Acquire the competencies of an auditor to plan an audit, lead an audit, draft reports, and follow-up on an audit in compliance with ISO 19011
PECB Certified ISO/IEC 27001 Lead Implementer eLearning Training Course
Course Description As the world is moving faster than ever, …
What you'll learn
Gain a comprehensive understanding of the concepts, approaches, methods, and techniques used for the implementation and effective management of an ISMS
Acknowledge the correlation between ISO/IEC 27001, ISO/IEC 27002, and other standards and regulatory frameworks
Understand the operation of an information security management system and its processes based on ISO/IEC 27001
Learn how to interpret and implement the requirements of ISO/ IEC 27001 in the specific context of an organization
Acquire the necessary knowledge to support an organization in effectively planning, implementing, managing, monitoring, and maintaining an ISMS
C)SP – Certified Security Principles eLearning
Course Description Security Principles are your first line of defense, …
CyberSec First Responder® (CFR)
Course Description This course covers network defense and incident response …
What you'll learn
Compare and contrast various threats and classify threat profile
Explain the purpose and use of attack tools and technique
Explain the purpose and use of post exploitation tools and tactic
Explain the purpose and use of social engineering tactic
Given a scenario, perform ongoing threat landscape research and use data to prepare for incident
Explain the purpose and characteristics of various data source Given a scenario, use appropriate tools to analyze log
Given a scenario, use regular expressions to parse log files and locate meaningful data
Given a scenario, use Windows tools to analyze incidents
Given a scenario, use Linux-based tools to analyze incidents
Summarize methods and tools used for malware analysis
Given a scenario, analyze common indicators of potential compromise
Explain the importance of best practices in preparation for incident response
Given a scenario, execute incident response process
Explain the importance of concepts that are unique to forensic analysis
Explain general mitigation methods and devices
GIAC Security Leadership (GSLC)
Course Description The GIAC Security Leadership (GSLC) certification validates a …
Six Sigma Green Belt
Instructor-Led Vendor: PECB Quality Management What You’ll Learn This training …
What you'll learn
Learn the fundamental principles of process improvement
Manage projects using the familiar DMAIC methodology
Leverage the GRES methodology for problem-solving
Apply basic statistical analyses when appropriate to support improvement efforts
Learn how to verify process improvements by using statistical and common sense methods
Facilitate Green Belt process improvement projects
Learn how to shift processes, reduce variation, stabilize processes, and improve their capabilities