Facebook

Courses

We found 72 courses available for you
See

CISSP (Certified Information Systems Security Professional) Exam Prep

Intermediate

Best CISSP Certification Prep Course Online Overview Passing CISSP requires …

What you'll learn
Understand and apply fundamental concepts and methods related to the fields of information technology and security.
Align overall organizational operational goals with security functions and implementations.
Understand how to protect assets of the organization as they go through their lifecycle.
Understand the concepts, principles, structures, and standards used to design, implement, monitor, and secure operating systems, equipment, networks, applications, and those controls used to enforce various levels of confidentiality, integrity, and availability.
Implement system security through the application of security design principals and the application of appropriate security control mitigations for vulnerabilities present in common information system types and architectures.
Understand the importance of cryptography and the security services it can provide in today’s digital and information age.
Understand the impact of physical security elements on information system security and apply secure design principals to evaluate or recommend appropriate physical security protections.
Understand the elements that comprise communication and network security coupled with a thorough description of how the communication and network systems function.
List the concepts and architecture that define the associated technology and implementation systems and protocols at Open Systems Interconnection (OSI) model layers 1–7.
Identify standard terms for applying physical and logical access controls to environments related to their security practice.
Appraise various access control models to meet business security requirements.
Name primary methods for designing and validating test and audit strategies that support business requirements.
Enhance and optimize an organization’s operational function and capacity by applying and utilizing appropriate security controls and countermeasures.
Recognize risks to an organization’s operational endeavors, and assess specific threats, vulnerabilities, and controls.
Understand the System Lifecycle (SLC) and the Software Development Lifecycle (SDLC) and how to apply security to it, and identify which security control(s) are appropriate for the development environment, and assess the effectiveness of software security.

CISM eLearning

17 Lessons
Intermediate

Course Description: Prepare to obtain the Certified Information Security Manager® …

What you'll learn
Establish and/or maintain an information security governance framework and supporting processes to ensure that the information security strategy is aligned with organizational goals and objectives.
Manage information risk to an acceptable level based on risk appetite to meet organizational goals and objectives.
Develop and maintain an information security program that identifies, manages and protects the organization’s assets while aligning to information security strategy and business goals, thereby supporting an effective security posture.
Plan, establish and manage the capability to detect, investigate, respond to and recover from information security incidents to minimize business impact.

CISA eLearning

48 Lessons
Intermediate

CISA certification is designed for entry-level to mid-career technology professionals …

What you'll learn
Gain a better understanding of IS audit and assurance guidelines and standards.
Develop a working knowledge of the five domains of CISA.

Cisco CCNP Data Center: DCCOR eLearning

Intermediate

Course Description: The Implementing and Operating Cisco Data Center Core …

What you'll learn
Implement routing and switching protocols in data center environment
Implement overlay networks in data center
Introduce high-level Cisco Application Centric Infrastructure (Cisco ACI) concepts and Cisco Virtual Machine manager (VMM) domain integration
Describe Cisco Cloud Service and deployment models
Implement Fibre Channel fabric
Implement Fibre Channel over Ethernet (FCoE) unified fabric
Implement security features in data center
Implement software management and infrastructure monitoring
Implement Cisco UCS Fabric Interconnect and Server abstraction
Implement SAN connectivity for Cisco UCS
Describe Cisco HyperFlex infrastructure concepts and benefits
Implement Cisco automation and scripting tools in data center
Evaluate automation and orchestration technologies

Cisco CCNP Data Center: DCIT eLearning

Intermediate

Course Description: The Troubleshooting Cisco Data Center Infrastructure (DCIT) v7.0 …

What you'll learn
Describe how to troubleshoot the data center network, troubleshooting tools and methodologies available from the CLI that are used to identify and resolve issues in a Cisco data center network architecture
Identify and resolve issues that are related to: VLANs and private VLANs; port channels and virtual port channels; Overlay Transport Virtualization (OTV); and Virtual Extensible LAN
Describe troubleshooting of routing protocols such as OSPF, EIGRP, PIM, and LAN security features
Identify and resolve issues that are related to a single device
Identify and resolve issues that are related to Fibre Channel interface operation
Identify and resolve Fibre Channel switching issues when the Cisco NX-OS Software is used in switched mode, and in NPV mode
Identify and resolve issues that are related to Fibre Channel over Ethernet and FCoE Initialization Protocol (FIP), including FCoE performance
Describe Cisco UCS architecture, initial setup, tools, and service aids
Describe Cisco UCS configuration, Cisco UCS B-Series Blade Server operation and troubleshoot related issues
Describe LAN, SAN, and Fibre Channel operations, including in-depth troubleshooting procedures
Describe Cisco Integrated Management Controller (IMC) tools for validating performance and facilitating data-gathering activities for Cisco UCS C-Series server troubleshooting, and the troubleshooting approach for hardware and firmware failures
Define the proper procedures for configuring LAN and SAN connectivity, avoiding issues with the VIC, troubleshooting connectivity issues and Cisco UCS C-Series server integration with Cisco UCS Manager
Identify the tools, protocols, and methods to effectively troubleshoot Cisco ACI
Describe how to troubleshoot automation, scripting tools, and programmability

Cisco CCNP Security: SVPN eLearning

Intermediate

Course Description: The Implementing Secure Solutions with Virtual Private Networks …

What you'll learn
Introduce site-to-site VPN options available on Cisco routers and firewalls
Introduce remote access VPN options available on Cisco routers and firewalls
Review site-to-site and remote access VPN design options
Review troubleshooting processes for various VPN options available on Cisco routers and firewalls

Cisco CCNP Security: SISE eLearning

Intermediate

Course Description: The Implementing and Configuring Cisco Identity Services Engine …

What you'll learn
Describe Cisco ISE deployments, including core deployment components and how they interact to create a cohesive security architecture. Describe the advantages of such a deployment and how each Cisco ISE capability contributes to these advantages
Describe concepts and configure components related to 802.1x and MAC Authentication Bypass (MAB) authentication, identity management, and certificate services
Describe how Cisco ISE policy sets are used to implement authentication and authorization, and how to leverage this capability to meet the needs of your organization
Describe third-party Network Access Devices (NADs), Cisco TrustSec, and Easy Connect
Describe and configure web authentication, processes, operation, and guest services, including guest access components and various guest access scenarios
Describe and configure Cisco ISE profiling services, and understand how to monitor these services to enhance your situational awareness about network-connected endpoints. Describe best practices for deploying this profiler service in your specific environment
Describe BYOD challenges, solutions, processes, and portals. Configure a BYOD solution, and describe the relationship between BYOD processes and their related configuration components. Describe and configure various certificates related to a BYOD solution
Describe the value of the My Devices portal and how to configure this portal
Describe endpoint compliance, compliance components, posture agents, posture deployment and licensing, and the posture service in Cisco ISE
Describe and configure TACACS+ device administration using Cisco ISE, including command sets, profiles, and policy sets. Understand the role of TACACS+ within the authentication, authorization, and accounting (AAA) framework and the differences between the RADIUS and TACACS+ protocols
Migrate TACACS+ functionality from Cisco Secure Access Control Server (Cisco Secure ACS) to Cisco ISE, using a migration tool

Cisco CCNP Security: SCOR eLearning

Intermediate

Course Description: The Implementing and Operating Cisco Security Core Technologies …

What you'll learn
Describe information security concepts and strategies within the network
Describe common TCP/IP, network application, and endpoint attacks
Describe how various network security technologies work together to guard against attacks
Implement access control on Cisco ASA appliance and Cisco Firepower Next-Generation Firewall
Describe and implement basic email content security features and functions provided by Cisco Email Security Appliance
Describe and implement web content security features and functions provided by Cisco Web Security Appliance
Describe Cisco Umbrella security capabilities, deployment models, policy management, and Investigate console
Introduce VPNs and describe cryptography solutions and algorithms
Describe Cisco secure site-to-site connectivity solutions and explain how to deploy Cisco IOS Virtual Tunnel Interface (VTI)-based point-to-point IPsec VPNs, and point-to-point IPsec VPN on the Cisco ASA and Cisco Firepower Next-Generation Firewall (NGFW)
Describe and deploy Cisco secure remote access connectivity solutions and describe how to configure 802.1x and Extensible Authentication Protocol (EAP) authentication
Provide basic understanding of endpoint security and describe Advanced Malware Protection (AMP) for Endpoints architecture and basic features
Examine various defenses on Cisco devices that protect the control and management plane
Configure and verify Cisco IOS Software Layer 2 and Layer 3 data plane controls
Describe Cisco Stealthwatch Enterprise and Stealthwatch Cloud solutions
Describe basics of cloud computing and common cloud attacks and how to secure cloud environment