Security Courses


20744 Securing Windows Server 2016

This course teaches attendees how they can enhance the security of the IT infrastructure that they administer. It begins by emphasizing the importance of assuming that network breaches have occurred already, and then teaches attendees how to protect administrative credentials and rights to ensure that administrators can perform only the tasks that they need to when they need to. This course also details how attendees can mitigate malware threats, identify security issues by using auditing and the Advanced Threat Analysis feature in Windows Server® 2016, secure their virtualization platform, and use new deployment options, such as Nano server and containers to enhance security. The course also explains how attendees can help protect access to files by using encryption and dynamic access control, and how they can enhance their network’s security.

Read More

20745 Implementing a Software-Defined Data Center

This course explains how to implement and manage virtualization infrastructure in a software-defined data centre by using System Center 2016 Virtual Machine Manager. The course also describes how to monitor the infrastructure by using System Center Operations Manager and protect it by using Data Protection Manager. The main focus of this course is on managing Hyper-V® virtualization infrastructure in Windows Server® 2016, although the course also covers other virtualization platforms that can be managed by using Virtual Machine Manager 2016.

Read More

40367: Security Fundamentals

This course helps you build an understanding of these topics: Security Layers, Operating System Security, Network Security, and Security Software.

Read More

Certified Chief Information Security Officer (CCISO)

The Certified Chief Information Security Officer (CCISO) program is the first of its kind training and certification program aimed at producing top-level Information Security Executives. The program does not focus solely on technical knowledge but on the application of information security management principles from an executive management point of view. The CCISO aims to bridge the gap between the executive management knowledge that CISOs need and the technical knowledge that many aspiring CISOs have. This can be a crucial gap as a practitioner endeavours to move from mid-management to upper, executive management roles. Much of this is traditionally learned as on the job training, but the CCISO Training Program can be the key to a successful transition to the highest ranks of information security management.

Read More

Certified Ethical Hacking and Countermeasures (CEH)

This program is the core of the most desired information security training system any information security professional will ever want to be in. The CEH is the first part of a three (3) part EC-Council Information Security Track which helps you master hacking technologies. You will become a hacker, but an ethical one!

Read More

Certified Information Security Manager (CISM)

This CISM exam preparation course is designed to prepare professionals for the exam. This certification is an audit professional certification sponsored by the Information Systems Audit and Control Association (ISACA®). A CISM Certification is offered to professionals who prove their exceptional skill and judgment in IS audit, control and security profession in the CISM Exam. The course focuses on the key points covered in the latest CISM Review Manual and includes class lectures, group discussions/activities, exam practice and answer debriefs. The course is intended for individuals with familiarity with and experience in information security management.

Read More

Certified Information Systems Auditor (CISA)

This exam preparation course is designed to prepare professionals for the Certified Information Systems Auditor™ (CISA) exam. The course focuses on the key points covered in the CISA Review Manual 26th Edition and includes class lectures, group discussions, exam practice and answer debriefs. The course is intended for individuals with familiarity with and experience in information systems auditing, control or security. The CISA designation is a globally recognized certification for IS audit control, assurance and security professionals. Being CISA certified showcases your audit experience, skills and knowledge, and demonstrates you are capable to assess vulnerabilities, report on compliance and institute controls within the enterprise.

Read More

Certified Information Systems Security Professional (CISSP®)

The CISSP® certification is the ideal credential for those with proven deep technical and managerial competence, skills, experience, and credibility to design, engineer, implement, and manage their overall information security program to protect organizations from growing sophisticated attacks. Backed by (ISC)²®, the globally recognized, not-for-profit organization dedicated to advancing the information security field, the CISSP® was the first credential in the field of information security to meet the stringent requirements of ISO/IEC Standard 17024. Not only is the CISSP® an objective measure of excellence, but also a globally recognized standard of achievement.

Read More

Certified Network Defender (CND)

This course is a vendor-neutral, hands-on, instructor-led comprehensive network security certification training program. It is a skills-based, lab intensive program based on a job-task analysis and cybersecurity education framework presented by the National Initiative of Cybersecurity Education (NICE). The course has also been mapped to global job roles and responsibilities and the Department of Defense (DoD) job roles for system/network administrators. The course is designed and developed after extensive market research and surveys.

Read More

Certified Secure Computer User (CSCU)

The purpose of this training program is to provide students with the necessary knowledge and skills to protect their information assets. This class will immerse students into an interactive environment where they will acquire fundamental understanding of various computer and network security threats such as identity theft, credit card fraud, online banking phishing scams, virus and backdoors, emails hoaxes, sex offenders lurking online, loss of confidential information, hacking attacks and social engineering. More importantly, the skills learnt from the class will not only help the students to identify these threats but also to mitigate them effectively.

Read More

CompTIA Security+

This is the primary course candidates will need to take if your job responsibilities include securing network services, devices, and traffic in your organization. In this course, attendees will build on their knowledge of and professional experience with security fundamentals, networks, and organizational security as they acquire the specific skills required to implement basic security services on any type of computer network. They will also implement and monitor security on networks, applications, and operating systems, and respond to security breaches.

Read More

CompTIA Social Media Security Professional

This certification attests to an individual's knowledge of social networking channels and the risks these pose on the security posture of an organization. SMSP professionals have the skills necessary to anticipate attacks and guard sensitive information from social media hackers, and, in the event of a breach, have tools to quickly respond to security incidents. SMSPs have proven competency to help guide organization's social media personnel security policy. Thus they are the organization's first line of defense from social media security attacks.

Read More

Computer Hacking Forensics Investigator (CHFI) v9

Computer Hacking Forensic Investigation is a comprehensive course covering major forensic investigation scenarios that enables students to acquire necessary hands-on experience on various forensic investigation techniques and standard forensic tools necessary to successfully carry out computer forensic investigation leading to the prosecution of perpetrators. It covers all the relevant knowledge-bases and skills to meets with regulatory compliance standards such as ISO 27001, PCI DSS, SOX, HIPPA, etc. In addition, it also aims at elevating the knowledge, understanding, and skill levels of cybersecurity and forensics practitioners.

Read More

Implementing Advanced Cisco Unified Wireless Security (IAUWS)

The goal of this course is to provide participants with information and practice activities which will prepare them to secure their wireless networks from security threats via appropriate security policies and best practices. This is ensured through the proper implementation of security standards and proper configuration of security components, and to integrate the wireless network with the existing wired security infrastructure.

Read More

Implementing Cisco Edge Network Security Solutions (SENSS)

The goal of this course is to prepare security engineers with the knowledge and hands-on experience to prepare them to configure Cisco® perimeter edge security solutions utilizing Cisco® Switches, Cisco® Routers, and Cisco® Adaptive Security Appliance (ASA) Firewalls. Additionally, it is designed to provide participants with foundational knowledge and the capabilities to implement and managed security on Cisco® ASA firewalls, Cisco® Routers with the firewall feature set, and Cisco® Switches. The participants will gain hands-on experience with configuring various perimeter security solutions for mitigating outside threats and securing network zones. At the end of the course, participants will be able to reduce the risk to their IT infrastructures and applications using Cisco® Switches, Cisco® ASA, and Router security appliance feature and provide detailed operations support for these products.

Read More

Implementing Cisco Network Security (IINS)

This course focuses on security principles and technologies, using Cisco security products to provide hands-on examples. Using instructor-led discussions, extensive hands-on lab exercises, and supplemental materials, the course allows learners to understand common security concepts, and deploy basic security techniques utilizing a variety of popular security appliances within a real-life network infrastructure. Overall, this is a very valuable experience for Cisco students.

Read More

MS-100T03: Microsoft 365 Identity Management

In this course, participants will learn about the Microsoft® 365 Identity Management, which includes topics such as how to manage user security groups and licenses for cloud identities, and how to plan and implement identity synchronization, federated identities, applications, and external access.

Read More

MS-101T01: Microsoft 365 Security Management

In this course, participants will learn about Microsoft® 365 Security Management, which includes topics such as how to manage security metrics, how to enable Azure® AD Identity Protection, how to configure Microsoft 365 security services and user Microsoft 365 Threat Intelligence.

Read More

MS-101T02: Microsoft 365 Compliance Management

In this course, participants will learn about Microsoft® 365 Compliance Management, which includes topics such as data retention and data loss prevention solutions in Microsoft 365, archiving and retention in Microsoft 365, implementing and managing data governance, and managing search and investigations.

Read More

MS-101T03: Microsoft 365 Device Management

This course introduces participants to the world of Microsoft® 365 device management – from establishing Microsoft Intune to enrolling devices to Intune, to monitoring the devices, to controlling what users can do from the enrolled devices by using conditional access policies. If candidates are already managing devices by using a traditional device management tool such as Configuration Manager, they will be interested to know how you can seamlessly move to modern management, in which devices are managed by Intune, and how they can benefit from new device management capabilities, such as compliance, conditional access, and Windows® Autopilot to deploy new devices from the cloud.

Read More

MS-200T01: Understanding the Modern Messaging Infrastructure

In this course, participants will learn about the architecture of the modern messaging infrastructure with Microsoft® Exchange Server and Exchange Online and how to deploy messaging in different scenarios and organizations. They will be guided through the initial deployment process and introduced to the messaging management tools. They will also learn how to create and manage different types of recipients, and how to create and manage Exchange Server mailbox databases, which serve as storage locations for all messaging data. Finally, participants will be introduced to messaging infrastructure organizational settings, such as how to manage authentication for your messaging environment, how to configure quotas for users in the organization, and how to configure organization sharing with the federation.

Read More

MS-200T02: Managing Client Access and Mail Flow

In this course, participants will learn how Microsoft® Exchange Server provides access to user mailboxes for many different clients. As all messaging clients access Exchange Server mailboxes through client access services, they will also examine how to plan, configure, and manage client access services in Exchange Server. Secondly, participants will also learn how to manage mobile devices. This course also describes the planning and configuring message transport in an Exchange Server organization. Thirdly, they will learn how to plan, configure and manage transport services to provide efficient communication between Exchange Servers, Exchange Online, and other mail servers on the Internet. Finally, they will also learn how to troubleshoot transport services when issues occur in different scenarios so that they can provide their organization with a healthy and reliable messaging infrastructure.

Read More

MS-200T03: Managing Messaging High Availability and Disaster Recovery

In this course, participants will learn about the traditional and modern solutions for messaging high availability and disaster recovery. They will be introduced to each solution and learn when to use one solution over another. They will also learn how to plan deployment, and how to perform the actual implementation.

Read More

MS-201T01: Defining a Hybrid Messaging Strategy

This course introduces participants to the world of hybrid messaging. They will learn how to deploy a hybrid environment for their Exchange organization and how to migrate mailboxes to Microsoft® Exchange Online. Candidates will begin by examining available mailbox migration options and then focus on planning for a hybrid deployment. Finally, they will also learn how to implement and troubleshoot a hybrid deployment.

Read More

MS-201T02: Managing Messaging Security, Hygiene, and Compliance

In this course, participants will learn about the different messaging-related security and compliance service configurations and settings with Microsoft® Exchange Server and Exchange Online. They will begin by examining the fundamentals of message hygiene with Exchange Online Protection and Exchange Advanced Threat Protection, as well as connection and spam filtering with Exchange. They will then examine messaging compliance solutions, such as retention and data loss prevention policies, as well as audit log investigations and eDiscovery search mechanisms from the messaging compliance perspective. Then they will learn how to plan a proper deployment and how to perform the basic implementation process for each solution. Finally, participants will conclude the course by examining how to manage permissions that are assigned to user and admin roles.

Read More

MS-900T01: Microsoft 365 Fundamentals

This course provides foundational knowledge on the considerations and benefits of adopting cloud services and the Software as a Service (SaaS) cloud model, with a specific focus on Microsoft® 365 cloud service offerings. Participants will begin by learning about cloud fundamentals, including an overview of cloud computing and specifically Microsoft cloud services. They will be introduced to Microsoft Azure®, and they will examine the differences between Microsoft 365 and Office 365. Then they will perform an in-depth review of Microsoft 365, including a comparison of Microsoft on-premises services versus Microsoft 365 cloud services, a review of enterprise mobility in Microsoft 365, and an analysis of how Microsoft 365 services provide collaboration. The course then analyzes how security, compliance, privacy, and trust are handled in Microsoft 365, and it concludes with a review of Microsoft 365 subscriptions, licenses, billing, and support.

Read More