CyberSec First Responder: Threat Detection and Response (Exam CFR-210) Series (Logical Operations)
Course 01 - Assessing Information Security Risk
Course 02 - Analyzing the Threat Landscape
Course 03 - Analyzing Reconnaissance Threats to Computing and Network Environments
Course 04 - Analyzing Attacks on Computing and Network Environments
Course 05 - Analyzing Post-Attack Techniques
Course 06 - Evaluating the Organization’s Security Posture
Course 07 - Collecting Cybersecurity Intelligence
Course 08 - Analyzing Log Data
Course 09 - Performing Active Asset and Network Analysis
Course 10 - Responding to Cybersecurity Incidents
Course 11 - Investigating Cybersecurity Incidents
Certified Wireless Network Administrator (CWNA) Series
Course 01 - Overview of Wireless Communications
Course 02 - Fundamentals of RF
Course 03 - Components and Measurements of RF
Course 04 - RF Signal and Antenna Concepts
Course 05 - IEEE 802.11
Course 06 - Spread Spectrum Technologies
Course 07 - WLAN Topologies
Course 08 - Wi-Fi Access
Course 09 - MAC Architecture
Course 10 - WLAN Architecture
Course 11 - WLAN Deployment
Course 12 - Troubleshooting
Course 13 - Security
Course 14 - Types of Wireless Attacks
Course 15 - Fundamentals of Site Surveys
Course 16 - Site Survey Tools
Course 17 - PoE
Course 18 - High Throughput (HT)
Course 19 - Very High Throughput (VHT)
Course 20 - BYOD
Certified Wireless Security Professional (CWSP) Series
Course 01 - WLAN Security Overview
Course 02 - Legacy Security
Course 03 - Encryption Ciphers and Methods
Course 04 - 802.11 Authentication Methods
Course 05 - Dynamic Encryption Key Generation
Course 06 - SOHO 802.11 Security
Course 07 - Fast Secure Roaming
Course 08 - Wireless Security Risks
Course 09 - Wireless LAN Security Auditing
Course 10 - Wireless Security Monitoring
Course 11 - VPNs, Remote Access and Guest Access Services
Course 12 - WLAN Security Infrastructure
Course 13 - Wireless Security Policies
Certified Information Systems Auditor (CISA) Series
Course 01 - The Process of Auditing Information Systems
Course 02 - Governance and Management of IT
Course 03 - Information Systems Acquisition, Development and Implementation
Course 04 - Information Systems Operations, Maintenance and Support
Course 05 - Protection of Information Assets
Certified Information Security Manager (CISM) Series
Course 01 - Information Security Governance
Course 02 - Information Risk Management
Course 03 - Information Security Program Development
Course 04 - Information Security Incident Management
Certified Information Systems Security Officer (CISSO) Series*
*This entire course series is to be taken with CISSP for full certification exam prep
Course 01 - Risk Management
Course 02 - Security Management
Course 03 - Authentication
Course 04 - Access Control
Course 05 - Security Models
Course 06 - Operations Security
Course 07 - Symmetric Cryptography and Hashing
Course 08 - Asymmetric Cryptography and PKI
Course 09 - Network Connections
Course 10 - Network Protocols and Devices
Course 11 - Telephony, VPNs and Wireless
Course 12 - Security Architecture
Course 13 - Software Development Security
Course 14 - Database Security and System Development
Course 15 - Malware and Software Attacks
Course 16 - Business Continuity
Course 17 - Disaster Recovery
Course 18 - Incident Management, Law, and Ethics
Course 19 - Physical
Certified Information Systems Security Professional (CISSP) Series*
*This entire course series is to be taken with CISSO for full certification exam prep
Course 01 - Security and Risk Management
Course 02 - Asset Security
Course 03 - Security Engineering
Course 04 - Communication and Network Security
Course 05 - Identity and Access Management
Course 06 - Security Assessment and Testing
Course 07 - Security Operations
Course 08 - Software Development Security
Shon Harris Certified Information Systems Security Professional (CISSP) Series
Course 01 - Information Security and Risk Management
Course 02 - Access Control
Course 03 - Cryptography
Course 04 - Physical Security
Course 05 - Security Architecture and Design
Course 06 - Law, Investigation and Ethics
Course 07 - Telecommunications and Networking
Course 08 - Business Continuity
Course 09 - Application Security
Course 10 - Operations Security
Certified Healthcare Information Systems Security Practitioner (CHISSP) Series
Course 01 - The Healthcare Industry
Course 02 - The Healthcare Regulatory Environment
Course 03 - Privacy and Security in Healthcare
Course 04 - Information Governance and Risk Management
Course 05 - Information Risk Assessment
Course 06 - Third-Party Risk Management
Certified Disaster Recovery Engineer (CDRE) Series
Course 01 - Welcome to Disaster Recovery Training
Course 02 - Business Impact Analysis
Course 03 - Risk Analysis
Course 04 - BDP Strategies
Course 05 - IT Recovery Strategies
Course 06 - Implementation Phase
Course 07 - Testing and Exercise
Course 08 - Maintenance and Updating
Course 09 - Execution Phase
Certified Digital Forensics Examiner (CDFE) Series
Course 01 - Introduction
Course 02 - Computer Forensic Incidents
Course 03 - Investigation Process
Course 04 - Disk Storage Concepts
Course 05 - Digital Acquisition & Analysis
Course 06 - Forensic Examination Protocols
Course 07 - Digital Evidence Protocols
Course 08 - CFI Theory
Course 09 - Digital Evidence Presentation
Course 10 - Computer Forensic Laboratory Protocols
Course 11 - Computer Forensic Processing
Course 12 - Digital Forensics Reporting
Course 13 - Specialized Artifact Recovery
Course 14 - e-Discovery and ESI
Course 15 - Cell Phone Forensics
Course 16 - USB Forensics
Course 17 - Incident Handling
Course 18 - PDA Forensics
Course 19 - Investigating Harassment
Certified Incident Handling Engineer (CIHE) Series
Course 01 - Course Introduction
Course 02 - Threats, Vulnerabilities and Exploits
Course 03 - IH Preparation
Course 04 - Request Tracker for Incident Handling
Course 05 - Preliminary Response
Course 06 - Identification and Initial Response
Course 07 - Sysinternals
Course 08 - Containment
Course 09 - Eradication
Course 10 - Follow-up
Course 11 - Recovery
Course 12 - Virtualization Security
Course 13 - Malware Incident Handling
Ethical Hacker Series
*This entire course series is to be taken with CPEH for full certification exam prep
Course 01 - Overview
Course 02 - Reconnaissance
Course 03 - Protocols
Course 04 - Windows Hacking
Course 05 - Attacking Web Technologies
Course 06 - Pen Testing Wireless Networks
Certified Professional Ethical Hacker (CPEH) Series
*This entire course series is to be taken with Ethical Hacker for full certification exam prep
Course 01 - Security Fundamentals
Course 02 - Access Controls
Course 03 - Protocols
Course 04 - Cryptography
Course 05 - Why Vulnerability Assessments?
Course 06 - Vulnerability Tools of the Trade
Course 07 - Output Analysis and Reports
Course 08 - Reconnaisance, Enumeration and Scanning
Course 09 - Gaining Access
Course 10 - Maintaining Access
Course 11 - Covering Tracks
Course 12 - Malware
Course 13 - Buffer Overflows
Course 14 - Password Cracking
Security Analyst
Course 01 - Security Analyst and the Threat Landscape
Course 02 - Policies, Procedures, and Risk
Course 03 - Auditing, Vulnerability, and Pen Testing
Course 04 - Methodologies, Guidelines, and Pen Test Results
|
Certified Penetration Testing Consultant (CPTC) Series
Course 01 - Packet Capturing
Course 02 - Layer 2 Attacks
Course 03 - Layer 3 Attacks on Cisco Based Infrastructures
Course 04 - Pivoting and Relays
Course 05 - IPv6 Attacks
Course 06 - VPN Attacks
Course 07 - Defeating SSL
Course 08 - IDS/IPS Evasion
Certified Penetration Testing Engineer (CPTE) Series
Course 01 - Logistics of Pen Testing
Course 02 - Linux Fundamentals
Course 03 - Information Gathering
Course 04 - Detecting Live Systems
Course 05 - Enumeration
Course 06 - Vulnerability Assessments
Course 07 - Malware Goes Undercover
Course 08 - Windows Hacking
Course 09 - Hacking UNIX/Linux
Course 10 - Advanced Exploitation Techniques
Course 11 - Pen Testing Wireless Networks
Course 12 - Networks, Sniffing and IDS
Course 13 - Injecting the Database
Course 14 - Attacking Web Technologies
Course 15 - Project Documentation
Certified Secure Web Application Engineer (CSWAE) Series
Course 01 - Web Application Security
Course 02 - Secure SDLC
Course 03 - OWASP TOP 10
Course 04 - Risk Management
Course 05 - Threat Modeling
Course 06 - Authentication and Authorization Attacks
Course 07 - Session Management
Course 08 - Security Architecture
Course 09 - Input Validation and Data Sanitization
Course 10 - AJAX Security
Course 11 - Insecurity Code Discovery and Mitigation
Course 12 - Application Mapping
Course 13 - Cryptography
Course 14 - Testing Methodologies
Certified Security Leadership Officer (CSLO) Series
Course 01 - Security Management
Course 02 - Risk Management
Course 03 - Encryption
Course 04 - Information Security - Access Control Concepts
Course 05 - Incident Handling and Evidence
Course 06 - Operations Security
Course 07 - Knowing Network Security
Certified Security Sentinel (CSS) Series
Course 01 - Basic Security
Course 02 - User Awareness
Course 03 - Implementing Countermeasures
Course 04 - Certified Security Sentinel
Course 05 - Using the Internet at Work
Course 06 - Accessing the Company's Network Through Your Assigned Computer
Course 07 - Accessing the Corporate Network Remotely
Course 08 - Social Engineering
Course 09 - Understanding and Manipulating our Target
Course 10 - Researching Our Target
Certified Vulnerability Assessor (CVA) Series
Course 01 - Why Vulnerability Assessment
Course 02 - Vulnerability Types
Course 03 - Assessing the Network
Course 04 - Assessing Web Servers & Applications
Course 05 - Assessing Remote & VPN Services
Course 06 - Vulnerability Assessment Tools of the Trade
Course 07 - Output Analysis
IS20 Controls Series
Course 01 - Inventory of Authorized and Unauthorized Devices
Course 02 - Inventory of Authorized and Unauthorized Software
Course 03 - Secure Configurations for Hardware and Software on Laptops, Workstations and Servers
Course 04 - Secure Configurations for Hardware Network Devices such as Firewalls, Routers and Switches
Course 05 - Boundary Defense
Course 06 - Maintenance, Monitoring, and Analysis of Audit Logs
Course 07 - Application Software Security
Course 08 - Controlled Use of Administrative Privileges
Course 09 - Controlled Access Based on Need to Know
Course 10 - Continuous Vulnerability Assessment and Remediation
Course 11 - Account Monitoring and Control
Course 12 - Malware Defenses
Course 13 - Limitation and Control of Network Ports, Protocols and Services
Course 14 - Wireless Device Control
Course 15 - Data Loss Prevention
Course 16 - Secure Network Engineering
Course 17 - Penetration Tests and Red Team Exercises
Course 18 - Incident Response Capability
Course 19 - Data Recovery Capability
Course 20 - Security Skills Assessment and Appropriate Training to Fill Gaps
ISCAP Series
Course 01 - Introduction to the Risk Management Framework
Course 02 - The Software Development Life Cycle
Course 03 - Categorize Information System
Course 04 - Select Security Controls
Course 05 - Implement Security Controls
Course 06 - Assess Security Controls
Course 07 - Authorize Information System
Course 08 - Monitor Security Controls
Forensic Investigator (Coming Soon)
Course 01 - Computer Forensic Basics
Course 02 - The Investigation Process
Course 03 - Hard Disks and File Systems
Course 04 - Data and Anti-Forensics
Course 05 - Operating System Forensics
Course 06 - Malware Forensics
Course 07 - Database Forensics
Course 08 - Network and Email Forensics
Forensics Investigator Advanced (Coming Soon)
Coming Soon
Security Analyst (Coming Soon)
Course 01 - Security Analyst Overview
Course 02 - Penetration Testing Overview
OWASP (Coming Soon)
Course 01 - Avoiding Hacker Tricks
Course 02 - Forgery and Phishing
Course 03 - Threats and Session Security
Course 04 - Misconfiguration and Data Encryption
OWASP Proactive Controls (Coming Soon)
Course 01 - Controls 1 through 5
Course 02 - Controls 6 through 10
CompTIA Security+ (Exam SYO-501) Certification Series
Course 01 - Identifying Security Fundamentals
Course 02 - Analyzing Risk
Course 03 - Identifying Security Threats
Course 04 - Conducting Security Assessments
Course 05 - Implementing Host and Software Security
Course 06 - Implementing Network Security
Course 07 - Managing Identity and Access
Course 08 - Implementing Cryptography
Course 09 - Implementing Operational Security
Course 10 - Addressing Security Issues
Course 11 - Ensuring Business Continuity
CompTIA Security+ Certification Series
Course 01 - Security Fundamentals
Course 02 - Identifying Security Threats and Vulnerabilities
Course 03 - Managing Data, Application, and Host Security
Course 04 - Implementing Network Security
Course 05 - Implementing Access Control, Authentication, and Account Management
Course 06 - Managing Certificates
Course 07 - Implementing Compliance and Operational Security
Course 08 - Risk Management
Course 09 - Troubleshooting and Managing Security Incidents
Course 10 - Business Continuity and Disaster Recovery Planning
CompTIA Advanced Security Practitioner (CASP) Series
Course 01 - The Enterprise Security Architecture
Course 02 - The Enterprise Security Technology
Course 03 - Enterprise Resource Technology
Course 04 - Security Design and Solutions
Course 05 - Managing Risk in Projects
Course 06 - Integrating Advanced Authentication and Authorization Techniques
Course 07 - Implementing Cryptographic Techniques
Course 08 - Integrating Hosts, Storage, Networks, and Applications in a Secure Enterprise Architecture
Course 09 - Security Research and Analysis
Course 10 - Disaster Recovery and Business Continuity
Course 11 - Responding to and Recovering from Incidents
Course 12 - Legal Issues
Course 13 - Judgment and Decision-Making
Digital Security Awareness Training for Business and Home Users Series
Course 00 - Course Overview
Course 01 - Types of Security Threats
Course 02 - Social Engineering
Course 03 - Identity Theft
Course 04 - Data Classification
Course 05 - Protecting Your Digital Information
Course 06 - Malware
Course 07 - Security from End-to-End
Course 08 - Piracy
Course 09 - Security Policies
Course 10 - Moving Forward
|