Training Courses

Search Results for "information security" – Page 16

System Operations on AWS

This course is designed to teach those in a systems administrator or Development Operations (DevOps) role how to create automatable and repeatable deployments of networks and systems on the AWS platform. The course covers the specific AWS features and tools related to configuration and deployment, in addition to best practices for configuring and deploying systems.

Who should attend

This course is intended for:

  • System administrators and operators who are operating in the AWS Cloud
  • Informational technology workers who want to increase their system operations knowledge.

Prerequisites

We recommend that attendees of this course have the following prerequisites:

  • Successfully completed the AWS Technical Essentials course
  • Background in either software development or systems administration
  • Proficiency in maintaining operating systems at the command line, such as shell scripting in Linux environments or cmd/PowerShell in Windows
  • Basic knowledge of networking protocols (TCP/IP, HTTP)

Course Objectives

In this course, you will learn how to:

  • Recognize the AWS services that support the different phases of Operational Excellence, a Well-Architected Framework pillar.
  • Manage access to AWS resources using AWS Accounts and Organizations and AWS Identity and Access Management (IAM).
  • Maintain an inventory of in-use AWS resources using AWS services such as AWS Systems Manager, AWS CloudTrail, and AWS Config.
  • Develop a resource deployment strategy utilizing metadata tags, Amazon Machine Images, and Control tower to deploy and maintain an AWS cloud environment.
  • Automate resource deployment using AWS services such as AWS CloudFormation and AWS Service Catalog.
  • Use AWS services to manage AWS resources through SysOps lifecycle processes such as deployments and patches.
  • Configure a highly available cloud environment that leverages AWS services such as Amazon Route 53 and Elastic Load Balancing to route traffic for optimal latency and performance.
  • Configure AWS Auto Scaling and Amazon Elastic Compute Cloud auto scaling to scale your cloud environment based on demand.
  • Use Amazon CloudWatch and associated features such as alarms, dashboards, and widgets to monitor your cloud environment.
  • Manage permissions and track activity in your cloud environment using AWS services such as AWS CloudTrail and AWS Config.
  • Deploy your resources to an Amazon Virtual Private Cloud (Amazon VPC), establish necessary connectivity to your Amazon VPC, and protect your resources from disruptions of service.
  • State the purpose, benefits, and appropriate use cases for mountable storage in your AWS cloud environment.
  • Explain the operational characteristics of object storage in the AWS cloud, including Amazon Simple Storage Service (Amazon S3) and Amazon S3 Glacier.
  • Build a comprehensive costing model to help gather, optimize, and predict your cloud costs using services such as AWS Cost Explorer and the AWS Cost & Usage Report.

Privacy Policy | Terms & Conditions

In General TechSherpas (“ittraining365.com/blog”) owns and operate this Website.  This document governs your relationship with ittraining365.com/blog (“Website”). Access to and use of this Website and the products and services available through this Website (collectively, the “Services”) are subject to the following terms, conditions and notices (the “Terms of Service”). By using the Services, you are […]

CIHE: Certified Incident Handling Engineer

About this Cybersecurity Training Course

The Certified Incident Handling Engineer Cybersecurity Training Course is designed to help Incident Handlers, System Administrators, and any General Security Engineers understand how to plan, create and utilize their systems in order to prevent, detect and respond to attacks.

In this in depth training, students will learn step-by-step approaches used by hackers globally, the latest attack vectors and how to safeguard against them, Incident Handling procedures (including developing the process from start to finish and establishing your Incident Handling team), strategies for each type of attack, recovering from attacks and much more.

Furthermore, students will enjoy numerous hands-on laboratory exercises that focus on topics, such as reconnaissance, vulnerability assessments using Nessus, network sniffing, web application manipulation, malware and using Netcat plus several additional scenarios for both Windows and Linux systems.

Graduates of the Certified Incident Handling Engineer training obtain real world security knowledge that enables them to recognize vulnerabilities, exploit system weaknesses and help safeguard against threats. This Cybersecurity Training Course covers the same objectives as the SANS Security 504 training and prepares students for the GCIH and CIHE certifications. 

Prerequisites

  • A minimum of 12 months experience in networking technologies
  • Sound knowledge of TCP/IP
  • Knowledge of Microsoft packages
  • Basic Knowledge of Linux is essential 

Cybersecurity Training Course Objective

Upon completion of the Certified Incident Handling Engineer Cybersecurity Training Course, students will be able to confidently undertake the CIHE certification examination (recommended). Students will enjoy an in-depth Cybersecurity Training Course that is continuously updated to maintain and incorporate the ever changing security world. This Cybersecurity Training Course offers up-to-date proprietary laboratories that have been researched and developed by leading security professionals from around the world.

CSWAE: Certified Secure Web Application Engineer

About this Cybersecurity Training Course

The Certified Secure Web Application Engineer Cybersecurity Training Course is designed to equip students with the knowledge and tools needed to identify and defend against security vulnerabilities in software applications. Students will put theory to practice by completing real world labs that include testing applications for software vulnerabilities, identifying weaknesses in design through architecture risks analysis and threat modeling, conducting secure code reviews and more.

On the final day of training, students will complete a real world hacking exercise on a live web application.

These secure coding skills are in desperate need today because the internet is one of the most dangerous places to do business; there are countless cases of valuable information being stolen from businesses because there was a vulnerability in their web applications. When programmers don’t understand the principles of secure coding, doors are open to those who do.

Prerequisites

  • Proficiency in web app programming in a language of your choice

 Target Student:

The Certified Secure Web Application Engineer Certification Cybersecurity Training Course is designed for those have a background in web application development and want to have the skill set to make their applications secure. While not required, we recommend being familiar with general cyber security topics, including those taught in our C)ISSO: Information Systems Security Officer Cybersecurity Training Course. 

Cybersecurity Training Course Objective

Students will have knowledge to:

  • Perform web application penetration testing to expose vulnerabilities.
  • Design & implement controls to defend against application vulnerabilities.
  • Integrate security best practices into the software development lifecycle
  • Be ready to sit for the C)SWAE certification exam.

CPEH: Certified Professional Ethical Hacker

Exams Included:

  • Certified Professional Ethical Hacker Exam

About TechSherpas Boot Camps

TechSherpas boot camps are geared towards providing students with the necessary skills and knowledge to not only pass the Certification exams, but to also excel in their IT career paths. All of our boot camps are all-inclusive and include benefits such as:

  • 100% Test Pass Guarantee
  • All Cybersecurity Training Course materials, practice exams and official certification exams
  • Onsite Pearson Vue Testing Center
  • Hands-on instruction by a certified instructor
  • Lunch provided each day (in-classroom delivery only)
  • Airfare, lodging and transportation packages available

About this Cybersecurity Training Course:

The Certified Professional Ethical Hacker Cybersecurity Training Course is the foundational training for the line of penetration testing Cybersecurity Training Courses.

The CPEH certification training enables students to understand the importance of vulnerability assessments by providing industry knowledge and skills in Vulnerability Assessment. In doing so, the CPEH student is able to understand how malware and destructive viruses function. In addition, the CPEH Cybersecurity Training Course helps students learn how to implement counter response and preventative measures when it comes to a network hack.

The CPEH Cybersecurity Training Course provides in-depth Labs that focus on both open source and commercial based tools with industry best practices. These hands on labs emulate real world hacking scenarios and equips the candidate to asses your companys security posture, help implement controls to better secure your companies network infrastructure and how to combat against hackers and/or viruses, etc.

Prerequisites

  • 12 months of IT security experience
  • 12 months of Network

Cybersecurity Training Course Objectives:

Upon completion, the Certified Professional Ethical Hacker candidate will be able to competently take the CPEH exam.

Target Student:

  • Information System Owners
  • Security Officers
  • Ethical Hackers
  • Information Owners
  • Penetration Testers
  • System Owner and Managers
  • Cybersecurity Engineers

CDFE: Certified Digital Forensics Examiner

About this Cybersecurity Training Course

Digital Forensics is the investigation and recovery of data contained in digital devices. This data is often the subject of investigations in litigation, proof of guilt, and corrective action in an organization. When the time comes that you need to investigate your organization, will you have the skill set necessary to gather the digital data that you need? The Certified Digital Forensics Examiner Cybersecurity Training Course will benefit organizations, individuals, government offices, and law enforcement agencies in performing these investigations and reporting their findings.

To illustrate, lets say an employee needs to be terminated for a violation of computer usage rules. To do so the organization must furnish an irrefutable burden of proof based on digital evidence. If not irrefutable, an attorney knowledgeable about Digital Forensics could have the case thrown out of court. Government and investigative agencies need proper training to succeed in cases like the above as well as those including acts of fraud, computer misuse, illegal pornography, counterfeiting, and so forth. A C)DFE is aptly prepared to handle these types of situations.

Prerequisites

  • C)SS: Security Sentinel
  • C)ISSO: Information Systems
  • Security Officer
  • Or equivalent experience 

Target Student:

  • Forensic Auditor
  • IT Auditor
  • Law Enforcement
  • Internal Auditor 

Cybersecurity Training Course Objective

Upon completion, students will:

  • Have knowledge to perform digital forensic examinations
  • Have knowledge to accurately report on their findings from examinations
  • Be ready to sit for the C)DFE Exam

CPTE: Certified Penetration Testing Engineer

Exams Included:

  • Certified Penetration Testing Engineer Exam

About TechSherpas Boot Camps

TechSherpas boot camps are geared towards providing students with the necessary skills and knowledge to not only pass the Certification exams, but to also excel in their IT career paths. All of our boot camps are all-inclusive and include benefits such as:

  • 100% Test Pass Guarantee
  • All Cybersecurity Training Course materials, practice exams and official certification exams
  • Onsite Pearson Vue Testing Center
  • Hands-on instruction by a certified instructor
  • Lunch provided each day (in-classroom delivery only)

About this Cybersecurity Training Course

Certified Penetration Testing Engineer certification Cybersecurity Training Course is built firmly upon proven, hands-on, Penetration Testing methodologies utilized by our international group of vulnerability consultants.

The CPTE presents information based on the 5 Key Elements of Pen Testing; Information Gathering, Scanning, Enumeration, Exploitation and Reporting. The latest vulnerabilities will be discovered using these tried and true techniques. This Cybersecurity Training Course also enhances the business skills needed to identify protection opportunities, justify testing activities and optimize security controls to reduce risk associated to working with the internet. Besides utilizing ethical hacking methodologies, be prepared to learn penetration testing using advanced persistent threat techniques.

The CPTE was developed around principles and behaviors used to combat malicious hackers and focuses on professional penetration testing rather than €œethical hacking€. With this in mind, the CPTE certification Cybersecurity Training Course is an up-grade to the EC-Council CEH! 

Prerequisites

  • A minimum of 12 months experience in networking technologies
  • Sound knowledge of TCP/IP
  • Knowledge of Microsoft packages
  • Network+, Microsoft, Security+
  • Basic Knowledge of Linux is essential 

Target Student:

  • Pen Testers
  • Ethical Hackers
  • Network Auditors
  • Cybersecurity Professionals
  • Vulnerability Assessors
  • Cybersecurity 

Cybersecurity Training Course Objective

Upon completion, Certified Penetration Testing Engineer students will be able to establish industry acceptable auditing standards with current best practices and policies. Students will also be prepared to competently take the C)PTE exam.

10961: Automating Administration with Windows PowerShell

About this Microsoft Windows Server 2012 Training Course

This Microsoft Windows Server 2012 Training Course provides students with the fundamental knowledge and skills to use Windows PowerShell for administering and automating administration of Windows servers. This Microsoft Windows Server 2012 Training Course provides students the skills to identify and build the command they require to perform a specific task. In addition, students learn how to build scripts to accomplish advanced tasks such as automating repetitive tasks and generating reports. This Microsoft Windows Server 2012 Training Course provides prerequisite skills supporting a broad range of Microsoft products, including Windows Server, Windows Client, Microsoft Exchange Server, Microsoft SharePoint Server, Microsoft SQL Server, System Center, and more. In keeping with that goal, this Microsoft Windows Server 2012 Training Course will not focus on any one of those products, although Windows Server, which is the common platform for all of those products, will serve as the example for the techniques this Microsoft Windows Server 2012 Training Course teaches.

 

Audience Profile

This Microsoft Windows Server 2012 Training Course is intended for IT Professionals who are already experienced in general Windows Server and Windows Client administration, and who want to learn more about using Windows PowerShell for administration. No prior experience with any version of Windows PowerShell, or any scripting language, is assumed. This Microsoft Windows Server 2012 Training Course is also suitable for IT Professionals already experienced in server administration, including Exchange Server, SharePoint Server, SQL Server, System Center, and others.

 

Prerequisites

Before attending this Microsoft Windows Server 2012 Training Course, students must have:

  • Experience with Windows networking technologies and implementation.
  • Experience with Windows Server administration, maintenance, and troubleshooting.
  • Experience with Windows Client administration, maintenance, and troubleshooting
  • Students who attend this training can meet the prerequisites by obtaining equivalent knowledge and skills through practical experience as a Windows system administrator. No prerequisite Microsoft Windows Server 2012 Training Courses are required.

 

At Microsoft Windows Server 2012 Training Course Completion

After completing this Microsoft Windows Server 2012 Training Course, students will be able to:

  • Describe the functionality of Windows PowerShell and use it to run and find basic commands.
  • Identify and run cmdlets for server administration.
  • Work with Windows PowerShell pipeline.
  • Describe the techniques Windows PowerShell pipeline uses.
  • Use PSProviders and PSDrives to work with other forms of storage.
  • Query system information by using WMI and CIM.
  • Work with variables, arrays, and hash tables.
  • Write basic scripts in Windows PowerShell.
  • Write advanced scripts in Windows PowerShell.
  • Administer remote computers.
  • Use background jobs and scheduled jobs.
  • Use advanced Windows PowerShell techniques.

10967: Fundamentals of a Windows Server Infrastructure

About this Microsoft Windows Server 2012 Training Course

Learn the fundamental knowledge and skills that you need to build a Windows Server infrastructure with Windows Server 2012.

This five day Microsoft Windows Server 2012 Training Course provides the networking, security, and system administration information that you need to implement a Windows Server infrastructure. It covers the basics of installation and configuration, storage, network infrastructure, network components, network protocols, server roles, Active Directory Domain Services (AD DS), Group Policy, IT security, server security, network security, security software, monitoring server performance, and maintaining a Windows Server.

This Microsoft Windows Server 2012 Training Course includes the foundational level knowledge to prepare students to start a career or cross train in Microsoft Windows Server technologies.

 Audience Profile

Students for this Microsoft Windows Server 2012 Training Course are just starting their Information Technology (IT) careers or want to change careers into Windows Server technologies. This fundamental knowledge and skills can be used by home computer users, small business owners, academic students, information workers, technical managers, help desk technicians, or students who want to cross train from another technology.

This Microsoft Windows Server 2012 Training Course is a first step in preparing for a job in IT or as prerequisite training before you start the Microsoft Certified System Administrator (MCSA) training and certification path.

At Microsoft Windows Server 2012 Training Course Completion

After completing this Microsoft Windows Server 2012 Training Course, students will be able to:

  • Perform a local media-based installation of Windows Server 2012.
  • Select appropriate storage technologies and configure storage on a Windows Server.
  • Describe fundamental network components and terminology so you can select an appropriate network component.
  • Implement a network by selecting network hardware components and technologies and determine the appropriate network hardware and wiring components for a given situation.
  • Describe the protocols and services within the Transmission Control Protocol/Internet Protocol (TCP/IP) suite of protocols and implement IPv4 within a Windows Server environment.
  • Describe and implement server roles.
  • Implement and configure an Active Directory Domain Service (AD DS) forest.
  • Describe the concept of defense-in-depth and determine how to implement this approach with Windows Server.
  • Identify the security features in Windows Server that help to provide defense-in-depth.
  • Identify the network-related security features in Windows Server to mitigate security threats to your network.
  • Identify and implement additional software components to enhance your organizations security.
  • Monitor a server to determine the performance level.
  • Identify the Windows Server tools available to maintain and troubleshoot Windows Server.

10969: Active Directory Services with Windows Server

About this Microsoft Windows Server 2012 Training Course

Get hands-on instruction and practice administering Active Directory technologies in Windows Server 2012 and Windows Server 2012 R2 in this 5-day Microsoft Official Microsoft Windows Server 2012 Training Course. You will learn the skills you need to better manage and protect data access and information, simplify deployment and management of your identity infrastructure, and provide more secure access to data from virtually anywhere. You will learn how to configure some of the key features in Active Directory such as Active Directory Domain Services, Group Policy, Dynamic Access Control, Work Folders, Workplace Join, Certificate Services, Rights Management Services and Federation Services, as well as integrating your on premise environment with cloud based technologies such as Windows Azure Active Directory. As part of the learning experience, you will perform hands-on exercises in a virtual lab environment. NOTE: This Microsoft Windows Server 2012 Training Course is based on Windows Server 2012 and Windows Server 2012 R2. This Microsoft Windows Server 2012 Training Course is designed for experienced IT professionals who support medium to large enterprises and have fundamental knowledge and experience administering Active Directory.

 Audience Profile

This Microsoft Windows Server 2012 Training Course is intended for Information Technology (IT) professionals who have Active Directory Domain Services (AD DS) experience and are looking for a single Microsoft Windows Server 2012 Training Course that will further develop knowledge and skills using Access and Information Protection technologies in Windows Server 2012 and Windows Server 2012 R2. This would typically include:

  • AD DS administrators who are looking to further develop skills in the latest Access and Information Protection technologies with Windows Server 2012 and Windows Server 2012 R2.
  • System or Infrastructure administrators with general AD DS experience and knowledge who are looking to build upon that core knowledge and cross-train into advanced Active Directory technologies in Windows Server 2012 and Windows Server 2012 R2
  • IT Professionals who have taken the 10967A: Fundamentals of a Windows Server Infrastructure Microsoft Windows Server 2012 Training Course and are looking to build upon that Active Directory knowledge.

At Microsoft Windows Server 2012 Training Course Completion

After completing this Microsoft Windows Server 2012 Training Course, students will be able to:

  • Understand available solutions for identity management and be able to address scenarios with appropriate solutions.
  • Deploy and administer AD DS in Windows Server 2012.
  • Secure AD DS deployment.
  • Monitor, troubleshoot and establish business continuity for AD DS services.
  • Implement AD DS sites, configure and manage replication
  • Implement and manage GPOs.
  • Manage user settings with GPOs.
  • Secure and provision data access using technologies such as Dynamic Access Control, Work Folders and Workplace Join
  • Implement certification authority (CA) hierarchy with AD CS and how to manage CAs.
  • Implement certificates.
  • Implement and manage AD RMS.
  • Implement and administer AD FS.
  • Implement Windows Azure Active Directory.
  • Implement and administer Active Directory Lightweight Directory Services (AD LDS).