Training Courses

Search Results for "information security" – Page 5

CompTIA Cybersecurity Analyst (CySA+) Certification

Learn about the duties of cybersecurity analysts who are responsible for monitoring and detecting security incidents in information systems and networks and for executing a proper response to such incidents. Depending on the size of the organization, this individual may act alone or may be a member of a cybersecurity incident response team (CSIRT).

Gain the tools and tactics to manage cybersecurity risks, identify various types of common threats, evaluate an organization’s security, collect and analyze cybersecurity intelligence, and handle incidents as they occur. This is a comprehensive approach to security aimed toward those on the front lines of defense.

This course is designed to assist students in preparing for the CompTIACySA+ – Cybersecurity Analyst+ (CS0-002) certification exam.

WHO SHOULD ATTEND?

  • IT Security Analyst
  • Security Operations Center (SOC) Analyst
  • Vulnerability Analyst
  • Cybersecurity Specialist
  • Threat Intelligence Analyst
  • Security Engineer

WHAT YOU’LL LEARN

  • Explain the Importance of Security Controls and Security Intelligence
  • Utilize Threat Data and Intelligence
  • Analyze Security Monitoring Data
  • Collect and Query Security Monitoring Data
  • Utilize Digital Forensics and Indicator Analysis Techniques
  • Apply Incident Response Procedures
  • Apply Risk Mitigation and Security Frameworks
  • Perform Vulnerability Management
  • Apply Security Solutions for Infrastructure Management
  • Understand Data Privacy and Protection
  • Apply Security Solutions for Software Assurance
  • Apply Security Solutions for Cloud and Automation

PREREQUISITES

To ensure your success in this course, you should meet the following requirements:

  • At least two years (recommended) of experience in computer network security technology or a related field.
  • The ability to recognize information security vulnerabilities and threats in the context of risk management.
  • Foundation-level operational skills with some of the common operating systems for computing environments.
  • Foundational knowledge of the concepts and operational framework of common assurance safeguards in computing environments. Safeguards include, but are not limited to, basic authentication and authorization, resource permissions, and anti-malware mechanisms.
  • Foundation-level understanding of some of the common concepts for network environments, such as routing and switching.
  • Foundational knowledge of major TCP/IP networking protocols including, but not limited to, TCP, IP, UDP, DNS, HTTP, ARP, ICMP, and DHCP.
  • Foundational knowledge of the concepts and operational framework of common assurance safeguards in network environments. Safeguards include, but are not limited to, firewalls, intrusion prevention systems, and VPNs.

SCOR: Implementing and Operating Cisco Security Core Technologies

In this course, Implementing and Operating Cisco Security Core Technologies (SCOR), students will master the skills and technologies needed to implement core Cisco security solutions to provide advanced threat protection against cybersecurity attacks. Students will learn security for networks, cloud and content, endpoint protection, secure network access, visibility and enforcements. They will get extensive hands-on experience deploying Cisco Firepower Next-Generation Firewall and Cisco ASA Firewall; configuring access control policies, mail policies, and 802.1X Authentication; and more. Students will also get introductory practice on Cisco Stealthwatch Enterprise and Cisco Stealthwatch Cloud threat detection features.

This course will help you prepare to take the Implementing and Operating Cisco Security Core Technologies (350-701 SCOR) exam. It also helps you prepare for the CCNP Security and CCIE Security certifications and for senior-level security roles featuring Cisco security solutions.

Prerequisites

The knowledge and skills that the learner should have before attending this course are as follows:

  • Skills and knowledge equivalent to those learned in Implementing and Administering Cisco Solutions (CCNA) v1.0 course
  • Familiarity with Ethernet and TCP/IP networking
  • Working knowledge of the Windows operating system
  • Working knowledge of Cisco IOS networking and concepts
  • Familiarity with basics of networking security concepts

Course Objectives

Upon completing this course, the learner will be able to meet these overall objectives:

  • Describe information security concepts and strategies within the network
  • Describe common TCP/IP, network application, and endpoint attacks
  • Describe how various network security technologies work together to guard against attacks
  • Implement access control on Cisco ASA appliance and Cisco Firepower Next-Generation Firewall
  • Describe and implement basic email content security features and functions provided by Cisco Email Security Appliance
  • Describe and implement web content security features and functions provided by Cisco Web Security Appliance
  • Describe Cisco Umbrella security capabilities, deployment models, policy management, and Investigate console
  • Introduce VPNs and describe cryptography solutions and algorithms
  • Describe Cisco secure site-to-site connectivity solutions and explain how to deploy Cisco IOS VTI-based point-to-point IPsec VPNs, and point-to-point IPsec VPN on the Cisco ASA and Cisco FirePower NGFW
  • Describe and deploy Cisco secure remote access connectivity solutions and describe how to configure 802.1X and EAP authentication
  • Provide basic understanding of endpoint security and describe AMP for Endpoints architecture and basic features
  • Examine various defenses on Cisco devices that protect the control and management plane
  • Configure and verify Cisco IOS Software Layer 2 and Layer 3 Data Plane Controls
  • Describe Cisco Stealthwatch Enterprise and Stealthwatch Cloud solutions
  • Describe basics of cloud computing and common cloud attacks and how to secure cloud environment

Who Should Attend?

The primary audience for this course is as follows:

  • Security Engineer
  • Network Engineer
  • Network Designer
  • Network Administrator
  • Systems Engineer
  • Consulting Systems Engineer
  • Technical Solutions Architect
  • Cisco Integrators/Partners
  • Network Manager
  • Cisco integrators and partners

AZ-500: Microsoft Azure Security Technologies

This course provides IT Security Professionals with the knowledge and skills needed to implement security controls, maintain an organization’s security posture, and identify and remediate security vulnerabilities. This course includes security for identity and access, platform protection, data and applications, and security operations.

Audience Profile

This course is for Azure Security Engineers who are planning to take the associated certification exam, or who are performing security tasks in their day-to-day job. This course would also be helpful to an engineer that wants to specialize in providing security for Azure-based digital platforms and play an integral role in protecting an organization’s data.

Job role: Security Engineer

Preparation for exam: AZ-500

Features: none

Skills gained

  • Implement enterprise governance strategies including role-based access control, Azure policies, and resource locks.
  • Implement an Azure AD infrastructure including users, groups, and multi-factor authentication.
  • Implement Azure AD Identity Protection including risk policies, conditional access, and access reviews.
  • Implement Azure AD Privileged Identity Management including Azure AD roles and Azure resources.
  • Implement Azure AD Connect including authentication methods and on-premises directory synchronization.
  • Implement perimeter security strategies including Azure Firewall.
  • Implement network security strategies including Network Security Groups and Application Security Groups.
  • Implement host security strategies including endpoint protection, remote access management, update management, and disk encryption.
  • Implement container security strategies including Azure Container Instances, Azure Container Registry, and Azure Kubernetes.
  • Implement Azure Key Vault including certificates, keys, and secretes.
  • Implement application security strategies including app registration, managed identities, and service endpoints.
  • Implement storage security strategies including shared access signatures, blob retention policies, and Azure Files authentication.
  • Implement database security strategies including authentication, data classification, dynamic data masking, and always encrypted.
  • Implement Azure Monitor including connected sources, log analytics, and alerts.
  • Implement Azure Security Center including policies, recommendations, and just in time virtual machine access.
  • Implement Azure Sentinel including workbooks, incidents, and playbooks.

Prerequisites

Successful learners will have prior knowledge and understanding of:

  • Security best practices and industry security requirements such as defense in

depth, least privileged access, role-based access control, multi-factor authentication,

shared responsibility, and zero trust model.

  • Be familiar with security protocols such as Virtual Private Networks (VPN), Internet

Security Protocol (IPSec), Secure Socket Layer (SSL), disk and data encryption methods.

  • Have some experience deploying Azure workloads. This course does not cover the basics

of Azure administration, instead the course content builds on that knowledge by adding

security specific information.

  • Have experience with Windows and Linux operating systems and scripting languages.

Course labs may use PowerShell and the CLI.

Prerequisite courses (or equivalent knowledge and hands-on experience):

CompTIA Advanced Security Practitioner (CASP+) Certification On-Demand

In this course, you’ll get the advanced skills you need to design and create secure solutions across complex business environments.

Your expert instructor will provide you with technical knowledge and skills required to conceptualise, engineer, integrate and implement secure solutions across complex environments to support a resilient enterprise.

You’ll also learn:

  • Enterprise Security, including operations and architecture concepts, techniques, and requirements
  • Risk analysis and cyber defence anticipation
  • Mobile and small form factor devices’ security
  • Software vulnerability
  • How to integrate cloud and virtualisation technologies into a secure enterprise architecture
  • Cryptographic techniques, such as Blockchain- Cryptocurrency and Mobile device encryption

WHO SHOULD ATTEND?

This course is designed for IT professionals in the cybersecurity industry whose primary job responsibility is to secure complex enterprise environments. The target student should have real-world experience with the technical administration of these enterprise environments.

This course is also designed for students who are seeking the CompTIA® Advanced Security Practitioner (CASP®) certification and who want to prepare for Exam CAS-004. Students seeking CASP certification should have at least 10 years of experience in IT management, with at least 5 years of hands-on technical security experience.

WHAT YOU’LL LEARN

  • Support IT governance in the enterprise with an emphasis on managing risk
  • Leverage collaboration tools and technology to support enterprise security
  • Use research and analysis to secure the enterprise
  • Integrate advanced authentication and authorization techniques
  • Implement cryptographic techniques
  • Implement security controls for hosts
  • Implement security controls for mobile devices
  • Implement network security
  • Implement security in the systems and software development lifecycle
  • Integrate hosts, storage, networks, applications, virtual environments, and cloud technologies in a secure enterprise architecture
  • Conduct security assessments
  • Respond to and recover from security incidents

PREREQUISITES

To be fit for this advanced course, you should have at least a foundational knowledge of information security. This includes, but is not limited to:

• Knowledge of identity and access management (IAM) concepts and common implementations, such as authentication factors and directory services.
• Knowledge of cryptographic concepts and common implementations, such as Secure Sockets Layer/Transport Layer Security (SSL/TLS) and public key infrastructure (PKI).
• Knowledge of computer networking concepts and implementations, such as the TCP/IP model and configuration of routers and switches.
• Knowledge of common security technologies used to safeguard the enterprise, such as anti-malware solutions, firewalls, and VPNs.

This CompTIA CASP: Advanced Security Practitioner On-Demand Course includes:

  • EXPERT INSTRUCTOR-LED TRAINING: Finest instructors in the IT industry with a minimum of 15 years, real-world experience and are subject matter experts in their fields
  • VISUAL DEMONSTRATIONS & MULTIMEDIA PRESENTATIONS: Instructor-led demonstrations and visual presentations that allow students to develop their skills based on real world scenarios explained by the instructor.
  • QUIZZES & EXAM SIMULATORS: Custom practice exams prepare you more effectively than the traditional exam preps on the market. Practice quizzes after each module ensures confidence on the topic before proceeding.
  • SOCIAL LEARNING & NETWORKING: World class Learning Management System (LMS) which allows you to interact and collaborate with other students, form study groups, engage in discussions, rate different courses and stay up to date with all the latest industry knowledge.
  • FLASH CARDS & EDUCATIONAL GAMES: Every Student learns differently. That is why we provide Flash Cards and Education Games throughout our courses. Allowing students to train in ways that keep them engaged and focused.

Choose the On-Demand Package that best fits your learning and certification needs:

Standard Package Premium Package
  • Includes digital license for official vendor courseware
  • 1-year access to instructor lecture video (based on availability)
  • 1-year access to hands-on exercises, labs, games and practice tests*
  • Email Help Desk Support
  • *Practice tests and/or labs may not be available for certain courses
  • Standard Package plus:
  • Premium Certification Prep Package:
    • Lifetime License to premium online test simulator
    • Official Exam Voucher
  • 3 hours of Instructor Time:
    • One-on-one live instructor time geared towards your specific needs
    • Scheduled in 1-hour increments
$995 $1695

CompTIA CSA+: Cybersecurity Analyst On-Demand

Course Duration: 17 hours 54 minutes

This CompTIA CSA+: Cybersecurity Analyst On-Demand Course includes:

  • EXPERT INSTRUCTOR-LED TRAINING: Finest instructors in the IT industry with a minimum of 15 years, real-world experience and are subject matter experts in their fields
  • VISUAL DEMONSTRATIONS & MULTIMEDIA PRESENTATIONS: Instructor-led demonstrations and visual presentations that allow students to develop their skills based on real world scenarios explained by the instructor.
  • QUIZZES & EXAM SIMULATORS: Custom practice exams prepare you more effectively than the traditional exam preps on the market. Practice quizzes after each module ensures confidence on the topic before proceeding.
  • SOCIAL LEARNING & NETWORKING: World class Learning Management System (LMS) which allows you to interact and collaborate with other students, form study groups, engage in discussions, rate different courses and stay up to date with all the latest industry knowledge.
  • FLASH CARDS & EDUCATIONAL GAMES: Every Student learns differently. That is why we provide Flash Cards and Education Games throughout our courses. Allowing students to train in ways that keep them engaged and focused.

Choose the On-Demand Package that best fits your learning and certification needs:

Standard Package Premium Package
  • Includes digital license for official vendor courseware
  • 1-year access to instructor lecture video (based on availability)
  • 1-year access to hands-on exercises, labs, games and practice tests*
  • Email Help Desk Support
  • *Practice tests and/or labs may not be available for certain courses
  • Standard Package plus:
  • Premium Certification Prep Package:
    • Lifetime License to premium online test simulator
    • Official Exam Voucher
  • 3 hours of Instructor Time:
    • One-on-one live instructor time geared towards your specific needs
    • Scheduled in 1-hour increments
$995 $1595

CompTIA Security+ Certification On-Demand

In this course you’ll learn how to troubleshoot security events and incidents, and operate within applicable policies, laws, and regulations.

Provide infrastructure, application, information, and operational security by identifying and mitigating risks. CompTIA’s Security+ is a vendor neutral certification developed with input from industry, government, academia and front-line practitioners.

You’ll learn about the following CompTIA Security+ topics:

  • Attacks, Threats, and Vulnerabilities
  • Architecture and Design
  • Implementation
  • Operations and Incident Response
  • Governance, Risk, and Compliance

This course supports a certification that is a DoD Approved 8570 Baseline Certification and meets DoD 8140/8570 training requirements.

WHO SHOULD ATTEND?

  • Network Administrators
  • Cybersecurity Associates
  • IT personnel interested in pursuing a career in cybersecurity

WHAT YOU’LL LEARN

  • Compare Security Roles and Security Controls
  • Explain Threat Actors and Threat Intelligence
  • Perform Security Assessments
  • Identify Social Engineering and Malware
  • Summarize Basic Cryptographic Concepts
  • Implement Public Key Infrastructure
  • Implement Authentication Controls
  • Implement Identity and Account Management Controls
  • Implement Secure Network Designs
  • Implement Network Security Appliances
  • Implement Secure Network Protocols
  • Implement Host Security Solutions
  • Implement Secure Mobile Solutions
  • Summarize Secure Application Concepts
  • Implement Secure Cloud Solutions
  • Explain Data Privacy and Protection Concepts
  • Perform Incident Response
  • Explain Digital Forensics
  • Summarize Risk Management Concepts
  • Implement Cybersecurity Resilience
  • Explain Physical Security

PREREQUISITES

This course assumes basic knowledge of using and maintaining individual workstations.

Attendees should be CompTIA A+ certified (or have equivalent experience) and CompTIA Network+ certified (or have equivalent experience) with 2-3 years networking experience.

 

This CompTIA Security+ On-Demand Course includes:

  • EXPERT INSTRUCTOR-LED TRAINING: Finest instructors in the IT industry with a minimum of 15 years, real-world experience and are subject matter experts in their fields
  • VISUAL DEMONSTRATIONS & MULTIMEDIA PRESENTATIONS: Instructor-led demonstrations and visual presentations that allow students to develop their skills based on real world scenarios explained by the instructor.
  • QUIZZES & EXAM SIMULATORS: Custom practice exams prepare you more effectively than the traditional exam preps on the market. Practice quizzes after each module ensures confidence on the topic before proceeding.
  • SOCIAL LEARNING & NETWORKING: World class Learning Management System (LMS) which allows you to interact and collaborate with other students, form study groups, engage in discussions, rate different courses and stay up to date with all the latest industry knowledge.
  • FLASH CARDS & EDUCATIONAL GAMES: Every Student learns differently. That is why we provide Flash Cards and Education Games throughout our courses. Allowing students to train in ways that keep them engaged and focused.

Choose the On-Demand Package that best fits your learning and certification needs:

Standard Package Premium Package
  • Includes digital license for official vendor courseware
  • 1-year access to instructor lecture video (based on availability)
  • 1-year access to hands-on exercises, labs, games and practice tests*
  • Email Help Desk Support
  • *Practice tests and/or labs may not be available for certain courses
  • Standard Package plus:
  • Premium Certification Prep Package:
    • Lifetime License to premium online test simulator
    • Official Exam Voucher
  • 3 hours of Instructor Time:
    • One-on-one live instructor time geared towards your specific needs
    • Scheduled in 1-hour increments
$995 $1595

CISRM: Certified Information Systems Risk Manager – Ultimate Combo

OVERVIEW

Course Includes:

  • Individual Course Access
  • Course Video
  • E-Workbook
  • E-Prep & Lab Guide
  • Exam
  • 2 Week Cyber Range
  • 1 Year Exam Voucher

Prerequisites:

A minimum of 1 year of Information Systems

Student Materials:

  • Student Workbook
  • Student Workbook
  • Key Security Concepts & Definitions Book

Certification Exams

Certified Virtual Desktop Engineer

CEUs: 24

The vendor-neutral Certified Information Systems Risk Manager certification is designed for IT and IS professionals who are involved with risk identification, assessment & evaluation, risk response, risk monitoring, IS control design & implementation as well as IS control monitoring & maintenance. The Certified Information Systems Risk Manager training will enable professionals to elevate their understanding in identifying and evaluating entity-specific risk but also aid them in assessing risks associated to enterprise business objectives by equipping the practitioner to design, implement, monitor and maintain risk-based, efficient and effective IS controls. The Certified Information Systems Risk Manager covers 5 critical subjects; Risk Identification Assessment and Evaluation, Risk Response, Risk Monitoring, IS Control Design and Implementation and IS Control Monitoring & Maintenance.

CSP+: Certified Security Principles

COURSE OVERVIEW
Mile2’s Certified Security Principles+ course provides the skills necessary to apply and implement technical knowledge of security concepts in today’s security environment. Students will gain an in‐depth knowledge of systems security, access control, network infrastructure, assessments and audits, cryptography and organizational security across all vendor products. These skills have become increasingly important, as additional safeguards such as intrusion detection systems, physical access control and multi‐factor authentication become standard methods of protection. Students are given real world scenarios to reinforce the material covered and will learn how to apply the concepts to their daily operations.

COURSE OBJECTIVES
• Identify the fundamental concepts of computer security.
• Identify security threats and vulnerabilities.
• Manage data, application, and host security.
• Implement network security.
• Identify and implement access control and account management security measures.
• Manage certificates.
• Identify and implement compliance and operational security measures.
• Manage risk.
• Troubleshoot and manage security incidents.
• Plan for business continuity and disaster recovery.

UPON COMPLETION

Upon completion, the Certified Security Principles+ candidate will not only be able to competently take the CSP+ exam but will also understand basic cyber security knowledge to keep companies’ IP and IT infrastructure safe.

EXAM INFORMATION

The Certified Security Principles+ exam is taken online through Mile2’s Assessment and Certification System (“MACS”), which is accessible on your mile2.com account. The exam will take 2 hours and consist of 100 multiple choice questions. The cost is $400 USD and must be purchased from Mile2.com.

CCSO: Certified Cloud Security Officer

About this course

Are you ready for the cloud?  The cloud has everyone up in arms when discussing security!  The benefits of the Cloud are great; however, many companies have concerns about adopting a cloud architecture due to the inherent security risks of adding this additional architectural layer.  This course will provide for you what you do not find in other classes!  The combination of knowledge tailored around the 6 domains in the C)CSO examination along with implementing cloud security, auditing and compliance. This is all managed by a unique delivery of the C)CSO domains along with the hands on labs needed to truly understand what is happening to your data at all the layers of the cloud stack. This is a relevant course which introduces many technologies used in the cloud from implementing a vRealize cloud to using a new key management solution from various vendors.

 

Prerequisites

Recommended minimum one-year experience with virtualization technology or equivalent knowledge.  General understanding of cloud architectures.  Minimum one-year experience with general security.

 

Target Student:

Virtualization Administrators, Cloud Administrators, CIO, Virtualization and Cloud Auditors, Virtualization and Cloud Compliance Officers, anyone that needs a general understanding of security in the Cloud, those seeking the CCSP Certification.

 

Course Objective

Upon completion, the Certified Cloud Security Officer candidate will not only be able to competently take the C)CSO exam but will also understand basic cloud security knowledge to keep companies’ IP and IT infrastructure safe.

  • Gain the knowledge needed to pass the Certified Cloud Security Officer Exam
  • Fully understand Cloud Security from a real-world view point.
  • Receive the hands-on experience needed to implement Cloud Security with VMware vRealize, VMware vSphere, Amazon AWS, Microsoft Azure and other products generally used in cloud implementations.
  • Have a general working knowledge on what to audit in a cloud architecture.
  • Know hands-on methods of auditing a cloud environment from a best practices Security view point.
  • Understand how compliance is viewed and dealt with in the cloud.

7 DON’Ts for Your Computer Security

We have recently written several articles revolving around cyber-, IT and computer security. While certain aspects of these topics are more complex (you can find information on further training and certifications we provide here), here are a few simple things to keep in mind, some DON’Ts as in things that you should better not do […]