Facebook

Courses

We found 49 courses available for you
See

CCSP (Certified Cloud Security Professional) Exam Prep | eLearning Bundle

All Levels

Technology professionals who understand cloud-specific security are in high demand. …

What you'll learn
Understand legal frameworks and guidelines that affect cloud services.
Recognize the fundamentals of data privacy regulatory/legislative mandates
Assess risks, vulnerability, threats, and attacks in the cloud environment.
Evaluate the design and plan for cloud infrastructure security controls.
Evaluate what is necessary to manage security operations.
Understand what operational controls and standards to implement.
Describe the types of cloud deployment models in the types of “as a service” cloud models currently available today.
Identify key terminology, and associated definitions related to cloud technology. Be able to establish a common terminology for use with in your team or workgroup.
Build a business case for cloud adoption and be able to determine with business units the benefits of the cloud and cloud migration strategies.

CISSP (Certified Information Systems Security Professional) Exam Prep

Intermediate

Best CISSP Certification Prep Course Online Overview Passing CISSP requires …

What you'll learn
Understand and apply fundamental concepts and methods related to the fields of information technology and security.
Align overall organizational operational goals with security functions and implementations.
Understand how to protect assets of the organization as they go through their lifecycle.
Understand the concepts, principles, structures, and standards used to design, implement, monitor, and secure operating systems, equipment, networks, applications, and those controls used to enforce various levels of confidentiality, integrity, and availability.
Implement system security through the application of security design principals and the application of appropriate security control mitigations for vulnerabilities present in common information system types and architectures.
Understand the importance of cryptography and the security services it can provide in today’s digital and information age.
Understand the impact of physical security elements on information system security and apply secure design principals to evaluate or recommend appropriate physical security protections.
Understand the elements that comprise communication and network security coupled with a thorough description of how the communication and network systems function.
List the concepts and architecture that define the associated technology and implementation systems and protocols at Open Systems Interconnection (OSI) model layers 1–7.
Identify standard terms for applying physical and logical access controls to environments related to their security practice.
Appraise various access control models to meet business security requirements.
Name primary methods for designing and validating test and audit strategies that support business requirements.
Enhance and optimize an organization’s operational function and capacity by applying and utilizing appropriate security controls and countermeasures.
Recognize risks to an organization’s operational endeavors, and assess specific threats, vulnerabilities, and controls.
Understand the System Lifecycle (SLC) and the Software Development Lifecycle (SDLC) and how to apply security to it, and identify which security control(s) are appropriate for the development environment, and assess the effectiveness of software security.

CISM eLearning

17 Lessons
Intermediate

Course Description: Prepare to obtain the Certified Information Security Manager® …

What you'll learn
Establish and/or maintain an information security governance framework and supporting processes to ensure that the information security strategy is aligned with organizational goals and objectives.
Manage information risk to an acceptable level based on risk appetite to meet organizational goals and objectives.
Develop and maintain an information security program that identifies, manages and protects the organization’s assets while aligning to information security strategy and business goals, thereby supporting an effective security posture.
Plan, establish and manage the capability to detect, investigate, respond to and recover from information security incidents to minimize business impact.

CISA eLearning

48 Lessons
Intermediate

CISA certification is designed for entry-level to mid-career technology professionals …

What you'll learn
Gain a better understanding of IS audit and assurance guidelines and standards.
Develop a working knowledge of the five domains of CISA.

Cisco CCNP Data Center: DCCOR eLearning

Intermediate

Course Description: The Implementing and Operating Cisco Data Center Core …

What you'll learn
Implement routing and switching protocols in data center environment
Implement overlay networks in data center
Introduce high-level Cisco Application Centric Infrastructure (Cisco ACI) concepts and Cisco Virtual Machine manager (VMM) domain integration
Describe Cisco Cloud Service and deployment models
Implement Fibre Channel fabric
Implement Fibre Channel over Ethernet (FCoE) unified fabric
Implement security features in data center
Implement software management and infrastructure monitoring
Implement Cisco UCS Fabric Interconnect and Server abstraction
Implement SAN connectivity for Cisco UCS
Describe Cisco HyperFlex infrastructure concepts and benefits
Implement Cisco automation and scripting tools in data center
Evaluate automation and orchestration technologies

Cisco CCNP Data Center: DCIT eLearning

Intermediate

Course Description: The Troubleshooting Cisco Data Center Infrastructure (DCIT) v7.0 …

What you'll learn
Describe how to troubleshoot the data center network, troubleshooting tools and methodologies available from the CLI that are used to identify and resolve issues in a Cisco data center network architecture
Identify and resolve issues that are related to: VLANs and private VLANs; port channels and virtual port channels; Overlay Transport Virtualization (OTV); and Virtual Extensible LAN
Describe troubleshooting of routing protocols such as OSPF, EIGRP, PIM, and LAN security features
Identify and resolve issues that are related to a single device
Identify and resolve issues that are related to Fibre Channel interface operation
Identify and resolve Fibre Channel switching issues when the Cisco NX-OS Software is used in switched mode, and in NPV mode
Identify and resolve issues that are related to Fibre Channel over Ethernet and FCoE Initialization Protocol (FIP), including FCoE performance
Describe Cisco UCS architecture, initial setup, tools, and service aids
Describe Cisco UCS configuration, Cisco UCS B-Series Blade Server operation and troubleshoot related issues
Describe LAN, SAN, and Fibre Channel operations, including in-depth troubleshooting procedures
Describe Cisco Integrated Management Controller (IMC) tools for validating performance and facilitating data-gathering activities for Cisco UCS C-Series server troubleshooting, and the troubleshooting approach for hardware and firmware failures
Define the proper procedures for configuring LAN and SAN connectivity, avoiding issues with the VIC, troubleshooting connectivity issues and Cisco UCS C-Series server integration with Cisco UCS Manager
Identify the tools, protocols, and methods to effectively troubleshoot Cisco ACI
Describe how to troubleshoot automation, scripting tools, and programmability

Cisco CCNP Security: SVPN eLearning

Intermediate

Course Description: The Implementing Secure Solutions with Virtual Private Networks …

What you'll learn
Introduce site-to-site VPN options available on Cisco routers and firewalls
Introduce remote access VPN options available on Cisco routers and firewalls
Review site-to-site and remote access VPN design options
Review troubleshooting processes for various VPN options available on Cisco routers and firewalls

Cisco CCNP Security: SISE eLearning

Intermediate

Course Description: The Implementing and Configuring Cisco Identity Services Engine …

What you'll learn
Describe Cisco ISE deployments, including core deployment components and how they interact to create a cohesive security architecture. Describe the advantages of such a deployment and how each Cisco ISE capability contributes to these advantages
Describe concepts and configure components related to 802.1x and MAC Authentication Bypass (MAB) authentication, identity management, and certificate services
Describe how Cisco ISE policy sets are used to implement authentication and authorization, and how to leverage this capability to meet the needs of your organization
Describe third-party Network Access Devices (NADs), Cisco TrustSec, and Easy Connect
Describe and configure web authentication, processes, operation, and guest services, including guest access components and various guest access scenarios
Describe and configure Cisco ISE profiling services, and understand how to monitor these services to enhance your situational awareness about network-connected endpoints. Describe best practices for deploying this profiler service in your specific environment
Describe BYOD challenges, solutions, processes, and portals. Configure a BYOD solution, and describe the relationship between BYOD processes and their related configuration components. Describe and configure various certificates related to a BYOD solution
Describe the value of the My Devices portal and how to configure this portal
Describe endpoint compliance, compliance components, posture agents, posture deployment and licensing, and the posture service in Cisco ISE
Describe and configure TACACS+ device administration using Cisco ISE, including command sets, profiles, and policy sets. Understand the role of TACACS+ within the authentication, authorization, and accounting (AAA) framework and the differences between the RADIUS and TACACS+ protocols
Migrate TACACS+ functionality from Cisco Secure Access Control Server (Cisco Secure ACS) to Cisco ISE, using a migration tool