Training Courses

Search Results for "information security" – Page 11

test pro

About this Course

This course prepares you for the Microsoft Certification Exam AZ-203. By the end of this course, you will be able to Develop Azure IaaS computer solution, Develop Azure PaaS computer solution, Develop for Azure storage, Implement Azure security, Monitor, troubleshoot and optimize solutions, as well as Connect to and consumer Azure and third-party services.

You will become proficient in developing apps and services, using Azure tools and technologies. Cloud Technologies are a great skill to learn, and having these skills will assist in becoming or adding to your skillset as a Cloud Architect, Cloud DBA, Cloud Admin and many more.

This On-Demand Class Includes:

  • EXPERT INSTRUCTOR-LED TRAINING: Finest instructors in the IT industry with a minimum of 15 years, real-world experience and are subject matter experts in their fields
  • VISUAL DEMONSTRATIONS & MULTIMEDIA PRESENTATIONS: Instructor-led demonstrations and visual presentations that allow students to develop their skills based on real world scenarios explained by the instructor.
  • QUIZZES & EXAM SIMULATORS: Custom practice exams prepare you more effectively than the traditional exam preps on the market. Practice quizzes after each module ensures confidence on the topic before proceeding.
  • SOCIAL LEARNING & NETWORKING: World class Learning Management System (LMS) which allows you to interact and collaborate with other students, form study groups, engage in discussions, rate different courses and stay up to date with all the latest industry knowledge.
  • FLASH CARDS & EDUCATIONAL GAMES: Every Student learns differently. That is why we provide Flash Cards and Education Games throughout our courses. Allowing students to train in ways that keep them engaged and focused.

SDAINT: Introduction to SD-Access and DNA Center

DNA Center and SD-Access offer Cisco’s next-generation programmable digital network to help automate common network access security features and streamline the redundant, complex configuration required to allow different groups of users access to the network infrastructure. This 2-day network security training course allows network administrators to quickly allow differentiated access for end users on the network while allowing the network to react automatically to day zero and other types of attacks. Students who enroll in this course should have a basic understanding of Cisco CCNA Routing & Switching, of Software Defined Networks, and have experience with Cisco IOS, IOS XE, and CLI. Find additional course information below.

Prerequisites

The knowledge and skills that a learner should have before attending this course are as follows:

  • Knowledge level equivalent to Cisco CCNA Routing & Switching
  • Basic knowledge of Software Defined Networks
  • Basic knowledge and experience with Cisco IOS, IOS XE and CLI

Course Objectives

Upon completing this course, the learner will be able to meet these overall objectives:

  • Know and understand Cisco’s SD-Access concepts, features, benefits, terminology and the way this approach innovates common administrative tasks on today’s networks.
  • Differentiate and explain each of the building blocks of SD-Access Solution
  • Explain the concept of “Fabric” and the different node types that conform it (Fabric Edge Nodes, Control Plane Nodes, Border Nodes)
  • Describe the role of LISP in Control Plane and VXLAN in Data Plane for SD-Access Solution
  • Understand the role of DNA Center as solution orchestrator and Intelligent GUI
  • Be familiar with workflow approach in DNA Center and its 4 Steps: Design, Policy, Provision and Assurance

Who Should Attend

The primary audience for this course is as follows:

  • Anyone interested in knowing about DNA Center and SD-Access
  • Personnel involved in SD-Access Design and Implementation
  • Network Operations team with SD-Access solution
  • Network admin staff that deal with User Access
  • Channel Partner SEs and other sales support
  • Network Access Control administration
  • Network Administrators
  • Network Architects
  • Network Engineers

SDWOTS: Cisco SD-WAN Operations, Troubleshooting, and Best Practices

This five-day course covers the new deployment, options and features of version 20.x  Cisco Software-Defined WAN (SD-WAN). SD-WAN is an overlay architecture that overcomes the biggest drawbacks of traditional WAN. Students will learn how to design, configure and operate a Cisco SD-WAN utilizing any transport (MPLS, Broadband, LTE, VSAT etc.). Candidates will discuss and build an SD-WAN environment starting from Day 0 provisioning and will also be able to provide troubleshooting, management, policy control and application visibility across the enterprise network. This hands-on Course covers the Cisco SD-WAN product and contains extensive labs to reinforce the knowledge learned

Prerequisites

The knowledge and skills that a learner should have before attending this course are as follows:

  • Familiarity with WAN Networks

Course Objectives

Upon completing this course, the learner will be able to meet these overall objectives:

  • Describe how to deploy SD-WAN
  • Configure SD-WAN environment
  • Deploy Plug and Play / Zero-Touch Provisioning
  • Implement SD-WAN Security
  • Configure SD-WAN Policies
  • Deploy, maintain and troubleshoot cEdge devices
  • Operate SD-WAN Devices and software
  • Troubleshoot SD-WAN environment

Who Should Attend

The primary audience for this course is as follows:

  • Engineering and Planning team evaluating WAN evolution
  • Personnel involved in SD WAN Design, Implementation and Operation
  • Network Operations team with SD WAN solution
  • Cisco partners who sell and support SD WAN solutions

CVFE: Certified Virtualization Forensics Examiner – Ultimate Combo

Course Overview

This course takes two enormously challenging areas facing IT security professionals today: incident response and virtualization and attempts to meld these together.  Forensics is at the heart of incident response, and therefore this training will focus on how to gather evidence relating to an incident – the what, when, where, who and why of an incident – within today’s common virtual environments.   Additionally, the course will take a deep dive into the virtual infrastructure, and contrast the various virtual entities against their physical counterparts.  This will allow a clear demonstration of the forensically-relevant differences between the virtual and physical environments.  The course uses a lab-centric, scenario-based approach to demonstrate how to forensically examine relevant components of a virtual infrastructure for specific use cases.

Course Objectives

Participants will be able to apply forensically-sound best practice techniques against virtual infrastructure entities in the following use case scenarios:

• Identifying direct evidence of a crime

• Attributing evidence to specific suspects

• Confirming (or negating) suspect alibis

• Confirming (or negating) suspect statements

• Determining (or negating) suspect intent

• Identifying sources

• Authenticating documents

Key Data

Course Name: Certified Virtualization Forensics Examiner

Duration: 5 Days

Language: English

Format

Instructor Led Training

Instructor Led Online Training

Prerequisites:

Must have a Digital or Computer Forensics

Certification or equivalent knowledge

Student Materials:

Student Workbook

Student Lab Guide

Certification Exams:

Certified Virtualization Forensics Examiner

CEUs: 40

Who Should Attend?

Virtual infrastructure specialists

(Architects, engineers,

Administrators), Forensic investigators Forensic investigators

Upon Completion

Students will:

Have knowledge to perform virtualization forensic examinations.

Have knowledge to accurately report on their findings from examinations

Be ready to sit for the C)VFE Exam

Exam Information

The Certified Virtualization Forensics Examiner exam is taken online through Mile2’s Assessment and Certification System (“MACS”), which is accessible on your mile2.com account. The exam will take 2 hours and consist of 100 multiple choice questions. The cost is $500 USD and must be purchased from Mile2.com.

Outline

Module 1 – Digital Forensics – the what, where, when, how and why

Module 2 – Virtual Infrastructure

Module 3 – Forensic Investigation Process

Module 4 – VI Forensics Scenario 1: Identifying direct evidence of a crime

Module 5 – VI Forensics Scenario 2: Attributing Evidence to Specific Requests

Module 6 – VI Forensics Scenario 3: Confirming (or negating) suspect alibis

Module 7 – VI Forensics Scenario 4: Confirming (or negating) suspect statements

Module 8 – VI Forensics Scenario 5: Determining (or negating) suspect intent

Module 9 –  VI Forensics Scenario 6: Identifying sources

Module 10 – VI Forensics Scenario 7: Authenticating documents

Module 11 – Putting it all together – Course Summary

CVE: Certified Virtualization Engineer – Ultimate Combo

Course Overview

This fast paced, high energy, hands-on course provides not only the foundation needed for a top performing software defined datacenter, it also provides the latest in virtualization and cloud technologies which gives the engineer or administrator the knowledge and skills needed to design and manage the datacenter for tomorrow’s needs. This course will cover everything from design, installation, configuration, best practices, performance monitoring, and just about everything in between!

Course Objectives

You will learn:

  • Latest technologies in virtualization and cloud infrastructures
  • Foundational concepts in virtualization and cloud technologies
  • Designing your infrastructure for today and tomorrow
  • How to install ESXi
  • How to configure the virtual network with performance and security in mind
  • How to configure storage with performance and security in mind
  • How vCLI and PowerCLI can help do the job faster
  • When to make use of advanced features such as DRS, DPM, Distributed Switches, Fault Tolerance and other key features
  • How Multipathing to storage devices works and when it should be used
  • How vMotion and SvMotion functions
  • Hot to perform backups and what 3rd party tools work best
  • How vVols can make a difference in your datacenter

Key Data

Course Name: Certified Virtualization Engineer

Duration: 5 Days

Language: English

Format

Instructor Led Training

Instructor Led Online Training

Prerequisites:

Network+ Certification or Equivalent Knowledge

Two Years’ Experience with Microsoft or Linux Servers

Basic Virtualization/Cloud Knowledge

Student Materials:

Student Workbook – 700+ Pages

Student Lab Guide – 300+ Pages

Certification Exams:

Certified Virtualization Engineer

CEUs: 40

Who Should Attend?

Virtualization and Cloud Administrators and Engineers, Virtualization and Cloud Security Engineers, System Administrators and Engineers

Upon Completion

Students will:

  • Have learned the pros, cons, best practices, and skills of virtualization.
  • Be able to design, secure, deploy, and manage virtual machines.
  • Be ready to sit for the C)VE exam.

Exam Information

The Certified Virtualization Engineer exam is taken online through Mile2’s Assessment and Certification System (“MACS”), which is accessible on your mile2.com account. The exam will take 2 hours and consist of 100 multiple choice questions. The cost is $500 USD and must be purchased from Mile2.com.

 

 

 

CSWAE: Certified Secure Web Application Engineer – Ultimate Combo

Course Overview

Organizations and governments fall victim to internet based attacks every day. In many cases, web attacks could be thwarted but hackers, organized criminal gangs, and foreign agents are able to exploit weaknesses in web applications. The Secure Web programmer knows how to identify, mitigate and defend against all attacks through designing and building systems that are resistant to failure. The secure web application developer knows how to develop web applications that aren’t subject to common vulnerabilities, and how to test and validate that their applications are secure, reliable and resistant to attack. The vendor neutral Certified Secure Web Application Engineer certification provides the developer with a thorough and broad understanding of secure application concepts, principles and standards. The student will be able to design, develop and test web applications that will provide reliable web services that meet functional business requirements and satisfy compliance and assurance needs.

The Certified Secure Web Application Engineer course is delivered by high level OWASP experts and students can expect to obtain real world security knowledge that enables them to recognize vulnerabilities, exploit system weaknesses and help safeguard against application threats.

Key Data

Course Name: Certified Secure Web Application Engineer

Duration: 5 days

Format:

Instructor-led

Live Virtual Training

Prerequisites:

  • A minimum of 24 months’ experience in software technologies & security
  • Sound knowledge of networking
  • At least one coding Language
  • Linux understanding
  • Open shell

Student Materials:

  • Student Workbook
  • Student Lab Guide
  • Exam prep guide

Certification Exam:

Mile2’s CSWAE- Certified Secure Web Application Engineer

CPEs: 32 Hours

Who Should Attend?

  • Coders
  • Web Application Engineers
  • IS Managers
  • Application Engineers
  • Developers
  • Programmers

Upon Completion

Upon completion, Certified Secure Web Application Engineer students will be able to establish industry acceptable auditing standards with current best practices and policies. Students will also be prepared to competently take the C)SWAE exam

Exam Information

The Certified Secure Web Application Engineer exam is taken online through Mile2’s Assessment and Certification System (“MACS”), which is accessible on your mile2.com account. The exam will take 2 hours and consist of 100 multiple choice questions. The cost is $500 USD and must be purchased from Mile2.com.

Course Content

Module 1: Web Application Security

Module 2: OWASP TOP 10

Module 3: Threat Modeling & Risk Management

Module 4: Application Mapping

Module 5: Authentication and Authorisation attacks

Module 6: Session Management attacks

Module 7: Application Logic attacks

Module 8: Data Validation

Module 9: AJAX attacks

Module 10: Code Review and Security Testing

Module 11: Web Application Penetration Testing

Module 12: Secure SDLC

Module 13: Cryptography

Lab Content

Module 1 – Environment Setup and Architecture

Module 2 – OWASP TOP 10 2013

Module 3 – Threat Modeling

Module 04 – Application Mapping & Analysis

Module 5 – Authentication and Authorization attacks

Module 06 – Session Management attacks
Module 9 – AJAX Security

Module 10 – Code Review and Security Testing

Lab 10-1 – Code Review

Lab 10-2 Security Test Scripts

Lab 10-3 Writing Java Secure Code

Annex 11: Alternatives Labs

Lab 11-1: WebGoat & Webscarab

Lab 11-2: WebGoat – Cross Site Request Forgery (CSRF)

Lab 11-3: Missing Function Level Access Control

Lab 11-4: Perform Forced Browsing Attacks

CPSH: Certified Powershell Hacker – Ultimate Combo

Course Overview

This course is an intense few days covering the keys to hacking with PowerShell. We know that most companies have an Active Directory infrastructure that manages authentication and authorization to most devices and objects within the organization. Many use PowerShell to speed up and simplify management, which only makes sense. Did you know that a large percentage of hacks over the last year included PowerShell based attacks? Well they did, which is why we spend 4 days learning how to hack like the pros using nothing but what is already available to us in Windows or now in open source code on Mac and Linux! The course is based on real world implementations of a windows infrastructure along with real world penetration testing techniques. You will leave with a real strong skill set to help test your windows environment like never before. An attendee will also walk away with a strong skill set on how to help prevent these attacks from happening in the first place!

Here are just a few things you will take away from this course:

  • Detailed Lab Manual
  • VMs for performing labs on your own
  • New ideas on testing your own AD infrastructure
  • Attacks you can use immediately
  • How to secure against PowerShell attacks

Key Data

Course Title: Certified PowerShell Hacker

Duration: 4 Days

Class Format Options: Prerequisites:

General Understanding of Pen Testing

General Understanding of Active Directory

General Understanding of scripting and programming

Student Materials:CPEs: 32

Who Should Attend?

  • Penetration Testers
  • Microsoft Administrators
  • Security Administrators
  • Active Directory Administrators
  • Anyone looking to learn more about security

Upon Completion

Upon completion, the Certified PowerShell Hacker candidate will be able to competently take the CPSH exam.

Exam Information

The Certified PowerShell Hacker exam is taken online through Mile2’s Assessment and Certification System (“MACS”), which is accessible on your mile2.com account. The exam will take 2 hours and consists of 100 multiple choice questions. The cost is $500 USD and must be purchased from Mile2.com.

Outline

Module 0 – Course Introduction

Module 1 – Introduction to PowerShell

Module 2 – Introduction to Active Directory and Kerberos

Module 3 – Pen Testing Methodology Revisited

Module 4 – Information Gathering and Enumeration

Module 5 – Privilege Escalation

Module 6 – Lateral Movements and Abusing Trust

Module 7 – Persistence and Bypassing Defenses

Module 8 – Defending Against PowerShell Attacks

Sales Representative

Sales Representative (IT Training Services) SOC Code:       414011 Level:              Associate (1-3 years) Category:        Exempt-Full Time (5/80, 4/10 and 9/80 schedule options) Job Location:  Tampa, FL Click here to apply Job Description TechSherpas 365 has an opening for a Sales Representative to join our growing team.  This person will work closely with nationwide government agencies to […]

Microsoft Certified: Azure Developer Associate On-Demand (AZ-203/204)

About this Course

This course prepares you for the Microsoft Certification Exam AZ-203. By the end of this course, you will be able to Develop Azure IaaS computer solution, Develop Azure PaaS computer solution, Develop for Azure storage, Implement Azure security, Monitor, troubleshoot and optimize solutions, as well as Connect to and consumer Azure and third-party services.

You will become proficient in developing apps and services, using Azure tools and technologies. Cloud Technologies are a great skill to learn, and having these skills will assist in becoming or adding to your skillset as a Cloud Architect, Cloud DBA, Cloud Admin and many more.

This On-Demand Class Includes:

  • EXPERT INSTRUCTOR-LED TRAINING: Finest instructors in the IT industry with a minimum of 15 years, real-world experience and are subject matter experts in their fields
  • VISUAL DEMONSTRATIONS & MULTIMEDIA PRESENTATIONS: Instructor-led demonstrations and visual presentations that allow students to develop their skills based on real world scenarios explained by the instructor.
  • QUIZZES & EXAM SIMULATORS: Custom practice exams prepare you more effectively than the traditional exam preps on the market. Practice quizzes after each module ensures confidence on the topic before proceeding.
  • SOCIAL LEARNING & NETWORKING: World class Learning Management System (LMS) which allows you to interact and collaborate with other students, form study groups, engage in discussions, rate different courses and stay up to date with all the latest industry knowledge.
  • FLASH CARDS & EDUCATIONAL GAMES: Every Student learns differently. That is why we provide Flash Cards and Education Games throughout our courses. Allowing students to train in ways that keep them engaged and focused.

Choose the On-Demand Package that best fits your learning and certification needs:

Standard Package Premium Package
  • Includes Digital Courseware
  • 12 months access to training video
  • 12 months access to exercises
  • 12 months access to exam simulators and games
  • Email Help Desk Support (48 hour or less response time)
  • Standard Package plus:
  • Certification Prep:
    • 12 months access to additional online test prep/exam simulation
    • Official Exam voucher
  • 3 hours of Instructor Time:
    • One on one live instructor time geared towards your specific needs
    • Scheduled in 1-hour increments
$795 $1295

DP-300: Administering Relational Databases on Microsoft Azure

This course provides students with the knowledge and skills to administer a SQL Server database infrastructure for cloud, on-premises and hybrid relational databases and who work with the Microsoft PaaS relational database offerings. Additionally, it will be of use to individuals who develop applications that deliver content from SQL-based relational databases.

Audience Profile

The audience for this course is data professionals managing data and databases who want to learn about administering the data platform technologies that are available on Microsoft Azure. This course is also valuable for data architects and application developers who need to understand what technologies are available for the data platform with Azure and how to work with those technologies through applications.

Job role: Database Administrator

Preparation for exam: DP-300

Features: none

Skills gained

  • Plan, deploy and configure Azure SQL offerings
  • Monitor database performance and tune a database and queries for optimum performance
  • Plan and configure a High Availability Solution

Prerequisites

Successful Azure Database Administrators start this role with professional experience in database management and technical knowledge of cloud technologies.

Specifically:

  • Working with, maintaining, and developing with SQL Server
  • Experience with Azure, such as deploying and managing resources

At a minimum, you should know the information in the following online training before attending the course: