Training Courses

Search Results for "cyber security "

SC-100: Microsoft Cybersecurity Architect On-Demand

About On-Demand Learning

TechSherpas 365’s On-Demand courses provide you with access to Microsoft official courseware materials and hands-on labs, empowering you to learn at your own pace. On-Demand allows you to design your training around your schedule, budget, and individual learning needs.

On-Demand Learning is a perfect solution for students who are unable to attend traditional instructor-led training due to schedule constraints. You receive the same materials and labs as an instructor-led course, with the added convenience of flexible scheduling and a lower price tag.

This On-Demand Course Includes:

  • Microsoft Official Courseware License with Lifetime Access (and automatic version updates)
  • Access to Hands-on Labs for 180 days
  • Access to 3 hours of Instructor Time (upon request):
    • One-on-one live instructor time geared towards your specific needs
    • Scheduled in 1-hour increments

ABOUT THIS COURSE

This course prepares students with the background to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance (GRC), security operations (SecOps), and data and applications. Students will also learn how to design and architect solutions using zero trust principles and specify security requirements for cloud infrastructure in different service models (SaaS, PaaS, IaaS).

Audience Profile

IT professionals with advanced experience and knowledge in a wide range of security engineering areas, including identity and access, platform protection, security operations, securing data, and securing applications. They should also have experience with hybrid and cloud implementations.

Job role: Solution Architect

Preparation for exam: SC-100

Features: none

Skills gained

  • Design a Zero Trust strategy and architecture
  • Evaluate Governance Risk Compliance (GRC) technical strategies and security operations strategies
  • Design security for infrastructure
  • Design a strategy for data and applications

Prerequisites

Before attending this course, students must have:

  • Advanced experience and knowledge in identity and access, platform protection, security operations, securing data and securing applications.
  • Experience with hybrid and cloud implementations.

 

SC-100: Microsoft Cybersecurity Architect

This course prepares students with the background to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance (GRC), security operations (SecOps), and data and applications. Students will also learn how to design and architect solutions using zero trust principles and specify security requirements for cloud infrastructure in different service models (SaaS, PaaS, IaaS).

Audience Profile

IT professionals with advanced experience and knowledge in a wide range of security engineering areas, including identity and access, platform protection, security operations, securing data, and securing applications. They should also have experience with hybrid and cloud implementations.

Job role: Solution Architect

Preparation for exam: SC-100

Features: none

Skills gained

  • Design a Zero Trust strategy and architecture
  • Evaluate Governance Risk Compliance (GRC) technical strategies and security operations strategies
  • Design security for infrastructure
  • Design a strategy for data and applications

Prerequisites

Before attending this course, students must have:

  • Advanced experience and knowledge in identity and access, platform protection, security operations, securing data and securing applications.
  • Experience with hybrid and cloud implementations.

 

CompTIA Cybersecurity Analyst (CySA+) Certification On-Demand

About On-Demand Learning

TechSherpas 365’s On-Demand courses provide you with access to official courseware materials and hands-on labs, empowering you to learn at your own pace. On-Demand allows you to design your training around your schedule, budget, and individual learning needs.

On-Demand Learning is a perfect solution for students who are unable to attend traditional instructor-led training due to schedule constraints. You receive the same materials and labs as an instructor-led course, with the added convenience of flexible scheduling and a lower price tag.

This On-Demand Course Includes:

  • Official Courseware License with Lifetime Access (and automatic version updates)
  • Access to Hands-on Labs
  • Access to 3 hours of Instructor Time (upon request):
    • One-on-one live instructor time geared towards your specific needs
    • Scheduled in 1-hour increments

The course introduces tools and tactics to manage cybersecurity risks, identify various types of common threats, evaluate the organization’s security, collect and analyze cybersecurity intelligence, and handle incidents as they occur.

Pre-requisite(s):

CompTIA Security+ Certification

Audience:

This course is designed primarily for cybersecurity practitioners who perform job functions related to protecting information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. This course focuses on the knowledge, ability, and skills necessary to provide for the defense of those information systems in a cybersecurity context, including protection, detection, analysis, investigation, and response processes. In addition, the course ensures that all members of an IT team—everyone from help desk staff to the Chief Information Officer—understand their role in these security processes.

CISSP – A Certification for Cybersecurity Leaders

Looking to Excel Your Career with More Opportunities? Do you want one of the most globally recognized certifications for information security professionals? If the answer is yes, then the Certified Information Systems Security Professional (CISSP) is the cybersecurity certification for you. The typical candidate for CISSP certification has at least 5 years of recent full-time […]

Hackers: The Cybersecurity Super Heroes We Need

The limitless expansion in technological advances is a double-edged sword. Whereas we can achieve more in our daily life and handle our responsibilities with ease, we are now more vulnerable to cybercrime attacks. Whether it is your phone, computer, or tablet, we are all susceptible to becoming victimized by cybercriminals. Since the beginning of the […]

Cybersecurity Trivia Challenge

Cybersecurity Trivia Challenge – October 2020 Participate for a chance to win a Cybersecurity Certification Course Ultimate Combo package ($950 value) We’re celebrating National Cybersecurity Awareness Month all month long with a social media trivia challenge. Get in the game, test your knowledge, prove your skills, and get entered in a drawing to win a […]

Cybersecurity Threats – Phishing and Data Breaches and Hacking, OH MY!

Bigger cybersecurity risks are looming… It is only fitting that National Cybersecurity Awareness Month happens to be the same month as Halloween. Truth be told, there is nothing more terrifying than the elaborate cybersecurity risks created daily to wreak havoc on the public. According to the FBI, efforts to monitor trending scams such as Phishing, […]

CCSA: Certified Cybersecurity Analyst

Course Overview

Companies and organizations today are scrambling to keep up with protection against the latest threats. This course is going to help a candidate prepare from the ground up. Often, network architecture creates a fundamental issue when attempting to monitor. The CCSA course will analyze the entire architecture to better prepare for today’s monitoring.

Our Certified Cybersecurity Analyst courseware helps the candidate prepare an organization to create a complete end to end solution for proactively monitoring, preventing, detecting, and mitigating current threats as they arise in real time.

This course maps to the mile2 Certified Cybersecurity Analyst Exam as well as the CompTIA CySA+ CS0-001 certification exam.

Do not fool yourself, this course is far more advanced and will move at a fast pace for a well-rounded enjoyable experience. Be ready to dig deep into the details of security analysis for today’s needs!

This course assumes that you have a fairly in-depth knowledge of security principles, forensics, incident handling and some ethical hacking skills. The candidate is not required to be an expert in these areas but 2 or more years of experience is recommended.

Key Data

Course Title: Certified Cybersecurity Analyst

Duration: 5 Days

Language: English

Class Format Options:

Instructor-led classroom

Live Online Training

Prerequisites:

  • Certified Security Principles, Certified Digital Forensics Examiner, Certified Incident Handling Engineer, Certified Professional Ethical Hacker/Certified Penetration Testing Engineer or equivalent knowledge

Student Materials:

  • Student Workbook
  • Student Lab Guide
  • Student Prep Guide

Certification Exams:

  • Certified Cybersecurity Analyst
  • Covers CompTIA Cybersecurity Analyst Exam Objectives

CEUs: 40

Who Should Attend?

Security Professional, Incident Handling Professionals, Anyone working in a Security Operations Center, Forensics Experts, anyone that needs a deep understanding of proactive security analysis on networks and systems

Upon Completion

Upon completion, the Certified Cybersecurity Analyst candidate will not only be able to competently take the C)CSA exam they will also be ready to prepare an organization for proactive defense against todays hackers. The candidate will be able to setup and deploy state of the art open source and for purchase analysis tools, intrusion detection tools, syslog servers, SIEMs, along with integrating them for the entire company to find and an many cases prevent todays exploits.

Exam Information

The Certified Cybersecurity Analyst exam is taken online through Mile2’s Assessment and Certification System (“MACS”), which is accessible on your mile2.com account. The exam will take 2 hours and consist of 100 multiple choice questions. The cost is $500 USD and must be purchased from Mile2.com.

CCSA: Certified Cybersecurity Analyst – Ultimate Combo

Course Overview

Companies and organizations today are scrambling to keep up with protection against the latest threats. This course is going to help a candidate prepare from the ground up. Often, network architecture creates a fundamental issue when attempting to monitor. The CCSA course will analyze the entire architecture to better prepare for today’s monitoring.

Our Certified Cybersecurity Analyst courseware helps the candidate prepare an organization to create a complete end to end solution for proactively monitoring, preventing, detecting, and mitigating current threats as they arise in real time.

This course maps to the mile2 Certified Cybersecurity Analyst Exam as well as the CompTIA CySA+ CS0-001 certification exam.

Do not fool yourself, this course is far more advanced and will move at a fast pace for a well-rounded enjoyable experience. Be ready to dig deep into the details of security analysis for today’s needs!

This course assumes that you have a fairly in-depth knowledge of security principles, forensics, incident handling and some ethical hacking skills. The candidate is not required to be an expert in these areas but 2 or more years of experience is recommended.

Key Data

Course Title: Certified Cybersecurity Analyst

Duration: 5 Days

Language: English

Class Format Options:

Instructor-led classroom

Live Online Training

Prerequisites:

  • Certified Security Principles, Certified Digital Forensics Examiner, Certified Incident Handling Engineer, Certified Professional Ethical Hacker/Certified Penetration Testing Engineer or equivalent knowledge

Student Materials:

  • Student Workbook
  • Student Lab Guide
  • Student Prep Guide

Certification Exams:

  • Certified Cybersecurity Analyst
  • Covers CompTIA Cybersecurity Analyst Exam Objectives

CEUs: 40

Who Should Attend?

Security Professional, Incident Handling Professionals, Anyone working in a Security Operations Center, Forensics Experts, anyone that needs a deep understanding of proactive security analysis on networks and systems

Upon Completion

Upon completion, the Certified Cybersecurity Analyst candidate will not only be able to competently take the C)CSA exam they will also be ready to prepare an organization for proactive defense against todays hackers. The candidate will be able to setup and deploy state of the art open source and for purchase analysis tools, intrusion detection tools, syslog servers, SIEMs, along with integrating them for the entire company to find and an many cases prevent todays exploits.

Exam Information

The Certified Cybersecurity Analyst exam is taken online through Mile2’s Assessment and Certification System (“MACS”), which is accessible on your mile2.com account. The exam will take 2 hours and consist of 100 multiple choice questions. The cost is $500 USD and must be purchased from Mile2.com.

 

CompTIA Cybersecurity Analyst (CySA+) Certification

Learn about the duties of cybersecurity analysts who are responsible for monitoring and detecting security incidents in information systems and networks and for executing a proper response to such incidents. Depending on the size of the organization, this individual may act alone or may be a member of a cybersecurity incident response team (CSIRT).

Gain the tools and tactics to manage cybersecurity risks, identify various types of common threats, evaluate an organization’s security, collect and analyze cybersecurity intelligence, and handle incidents as they occur. This is a comprehensive approach to security aimed toward those on the front lines of defense.

This course is designed to assist students in preparing for the CompTIACySA+ – Cybersecurity Analyst+ (CS0-002) certification exam.

WHO SHOULD ATTEND?

  • IT Security Analyst
  • Security Operations Center (SOC) Analyst
  • Vulnerability Analyst
  • Cybersecurity Specialist
  • Threat Intelligence Analyst
  • Security Engineer

WHAT YOU’LL LEARN

  • Explain the Importance of Security Controls and Security Intelligence
  • Utilize Threat Data and Intelligence
  • Analyze Security Monitoring Data
  • Collect and Query Security Monitoring Data
  • Utilize Digital Forensics and Indicator Analysis Techniques
  • Apply Incident Response Procedures
  • Apply Risk Mitigation and Security Frameworks
  • Perform Vulnerability Management
  • Apply Security Solutions for Infrastructure Management
  • Understand Data Privacy and Protection
  • Apply Security Solutions for Software Assurance
  • Apply Security Solutions for Cloud and Automation

PREREQUISITES

To ensure your success in this course, you should meet the following requirements:

  • At least two years (recommended) of experience in computer network security technology or a related field.
  • The ability to recognize information security vulnerabilities and threats in the context of risk management.
  • Foundation-level operational skills with some of the common operating systems for computing environments.
  • Foundational knowledge of the concepts and operational framework of common assurance safeguards in computing environments. Safeguards include, but are not limited to, basic authentication and authorization, resource permissions, and anti-malware mechanisms.
  • Foundation-level understanding of some of the common concepts for network environments, such as routing and switching.
  • Foundational knowledge of major TCP/IP networking protocols including, but not limited to, TCP, IP, UDP, DNS, HTTP, ARP, ICMP, and DHCP.
  • Foundational knowledge of the concepts and operational framework of common assurance safeguards in network environments. Safeguards include, but are not limited to, firewalls, intrusion prevention systems, and VPNs.