Security Courses


10997: Office 365 Administration and Troubleshooting

This is a course that targets the needs of information technology (IT) professionals who take part in administering, configuring, troubleshooting, and operating Office 365® services, including its identities, dependencies, requirements, and supporting technologies. This course focuses on skills required to administer and troubleshoot Office 365 tenant and key services of Office 365, such as Exchange Online, SharePoint® Online and Skype® for Business. It also covers security and compliance features of Office 365.

Read More

20744 Securing Windows Server 2016

This course teaches attendees how they can enhance the security of the IT infrastructure that they administer. It begins by emphasizing the importance of assuming that network breaches have occurred already, and then teaches attendees how to protect administrative credentials and rights to ensure that administrators can perform only the tasks that they need to when they need to. This course also details how attendees can mitigate malware threats, identify security issues by using auditing and the Advanced Threat Analysis feature in Windows Server® 2016, secure their virtualization platform, and use new deployment options, such as Nano server and containers to enhance security. The course also explains how attendees can help protect access to files by using encryption and dynamic access control, and how they can enhance their network’s security.

Read More

20745 Implementing a Software-Defined Data Center

This course explains how to implement and manage virtualization infrastructure in a software-defined data centre by using System Center 2016 Virtual Machine Manager. The course also describes how to monitor the infrastructure by using System Center Operations Manager and protect it by using Data Protection Manager. The main focus of this course is on managing Hyper-V® virtualization infrastructure in Windows Server® 2016, although the course also covers other virtualization platforms that can be managed by using Virtual Machine Manager 2016.

Read More

40367: Security Fundamentals

This course helps you build an understanding of these topics: Security Layers, Operating System Security, Network Security, and Security Software.

Read More

Certified Chief Information Security Officer (CCISO)

The Certified Chief Information Security Officer (CCISO) program is the first of its kind training and certification program aimed at producing top-level Information Security Executives. The program does not focus solely on technical knowledge but on the application of information security management principles from an executive management point of view. The CCISO aims to bridge the gap between the executive management knowledge that CISOs need and the technical knowledge that many aspiring CISOs have. This can be a crucial gap as a practitioner endeavours to move from mid-management to upper, executive management roles. Much of this is traditionally learned as on the job training, but the CCISO Training Program can be the key to a successful transition to the highest ranks of information security management.

Read More

Certified Ethical Hacking (C|EH) v10

This program is the most desired information security training program any information security professional will ever want to be in. To master the hacking technologies, participants will need to become one, but an ethical one! This accredited course provides advanced hacking tools and techniques used by hackers and information security professionals alike to break into an organization. As we put it, “To beat a hacker, participants need to think like a hacker”. NOTE: It is also the first part of a three (3) part EC-Council Information Security Track which helps participants master hacking technologies.

Read More

Certified Information Security Manager (CISM)

This CISM exam preparation course is designed to prepare professionals for the exam. This certification is an audit professional certification sponsored by the Information Systems Audit and Control Association (ISACA®). A CISM Certification is offered to professionals who prove their exceptional skill and judgment in IS audit, control and security profession in the CISM Exam. The course focuses on the key points covered in the latest CISM Review Manual and includes class lectures, group discussions/activities, exam practice and answer debriefs. The course is intended for individuals with familiarity with and experience in information security management.

Read More

Certified Information Systems Auditor (CISA)

This exam preparation course is designed to prepare professionals for the Certified Information Systems Auditor™ (CISA) exam. The course focuses on the key points covered in the CISA Review Manual 26th Edition and includes class lectures, group discussions, exam practice and answer debriefs. The course is intended for individuals with familiarity with and experience in information systems auditing, control or security. The CISA designation is a globally recognized certification for IS audit control, assurance and security professionals. Being CISA certified showcases your audit experience, skills and knowledge, and demonstrates you are capable to assess vulnerabilities, report on compliance and institute controls within the enterprise.

Read More

Certified Information Systems Security Professional (CISSP®)

The CISSP® certification is the ideal credential for those with proven deep technical and managerial competence, skills, experience, and credibility to design, engineer, implement, and manage their overall information security program to protect organizations from growing sophisticated attacks. Backed by (ISC)²®, the globally recognized, not-for-profit organization dedicated to advancing the information security field, the CISSP® was the first credential in the field of information security to meet the stringent requirements of ISO/IEC Standard 17024. Not only is the CISSP® an objective measure of excellence, but also a globally recognized standard of achievement.

Read More

Certified Network Defender (CND)

This course is a vendor-neutral, hands-on, instructor-led comprehensive network security certification training program. It is a skills-based, lab intensive program based on a job-task analysis and cybersecurity education framework presented by the National Initiative of Cybersecurity Education (NICE). The course has also been mapped to global job roles and responsibilities and the Department of Defense (DoD) job roles for system/network administrators. The course is designed and developed after extensive market research and surveys.

Read More

Certified Secure Computer User (CSCU)

The purpose of this training program is to provide individuals with the necessary knowledge and skills to protect their information assets. This class will immerse participants into an interactive environment where they will acquire a fundamental understanding of various computer and network security threats such as identity theft, credit card fraud, online banking phishing scams, viruses and backdoors, email hoaxes, sex offenders lurking online, loss of confidential information, hacking attacks and social engineering. More importantly, the skills learned from the class helps them take the necessary steps to mitigate their security exposure.

Read More

CompTIA IT Fundamentals (ITF+)

This course is an introduction to basic IT knowledge and skills that help professionals decide if a career in IT is right for them. It also helps organizations prepare non-technical teams for digital transformation. This course will help participants to learn some of the basic principles and techniques of providing PC, mobile, applications, and network support. Participants will also learn to install software, establish basic network connectivity and identify/prevent basic security risks. Further, this course will cover the areas of troubleshooting theory and preventative maintenance of devices. It will also prepare participants to take the certification exam which is the essential qualification for beginning a career in IT Support.

Read More

CompTIA Security+

This is the primary course candidates will need to take if your job responsibilities include securing network services, devices, and traffic in your organization. In this course, attendees will build on their knowledge of and professional experience with security fundamentals, networks, and organizational security as they acquire the specific skills required to implement basic security services on any type of computer network. They will also implement and monitor security on networks, applications, and operating systems, and respond to security breaches.

Read More

Computer Hacking Forensics Investigator (CHFI) v9

This is a comprehensive course, covering major forensic investigation scenarios, that enables participants to acquire necessary hands-on experience on various forensic investigation techniques and standard forensic tools necessary to successfully carry out computer forensic investigation leading to the prosecution of perpetrators. It covers all the relevant knowledge-bases and skills to meet with regulatory compliance standards such as ISO 27001, PCI DSS, SOX, HIPPA, etc. In addition, it also aims at elevating the knowledge, understanding, and skill levels of cybersecurity and forensic practitioners.

Read More

FortiGate Infrastructure

In this course, participants will learn how to use advanced FortiGate® networking and security. They will cover topics such as the features commonly applied in a complex or larger enterprise or MSSP networks. These features are Advanced Routing, Transparent Mode, Redundant Infrastructure, Site-to-Site IPsec VPN, Single Sign-On (SSO), Web Proxy and Diagnostics. NOTE: This course is the second part of a two-course series that covers the skills needed to prepare for the certification exam.

Read More

FortiGate Security

In this course, participants will learn how to use basic FortiGate® features, including security profiles. They will use interactive labs to explore topics such as Firewall Policies, Security Fabric, User Authentication, SSL VPN, Dial-Up IPsec VPN and How to Protect Their Network Using Security Profiles such as IPS, Antivirus, Web Filtering and Application Control. These administration fundamentals will provide participants with a solid understanding of how to implement basic network security. NOTE: This course is the first part of a two-course series that covers the skills needed to prepare for the certification exam.

Read More

Fundamentals of Linux

This course provides participants with a thorough introduction to using Linux™ from the command line. All the essential shell and basic operating system commands are taught, enabling participants to start utilising the power of the Linux operating system.

Read More

Implementing Advanced Cisco Unified Wireless Security (IAUWS)

This course is designed to provide participants with the information necessary to secure their wireless network from security threats via appropriate security policies and best practices, as well as ensure the proper implementation of security standards and proper configuration of security components. The course reinforces the instruction by providing participants with hands-on labs to ensure they thoroughly understand how to secure a wireless network.

Read More

Implementing and Administering Cisco Solutions (CCNA)

This course teaches participants a broad range of fundamental knowledge necessary for all IT careers. Through a combination of lecture, hands-on labs, and self-study, they will learn how to install, operate, configure, and verify basic IPv4 and IPv6 networks. The course covers configuring network components such as switches, routers, and wireless LAN controllers; managing network devices; and identifying basic security threats. The course also gives participants a foundation in network programmability, automation, and software-defined networking. This course helps participants prepare to take the Cisco® certification exam.

Read More

Implementing and Operating Cisco Security Core Technologies

In this course, participants will master the skills and technologies needed to implement core Cisco® security solutions. These solutions provide advanced threat protection against cybersecurity attacks. They will learn security for networks, cloud and content, endpoint protection, secure network access, visibility and enforcement. They will also get extensive hands-on experience deploying Cisco Firepower Next-Generation Firewall and Cisco ASA Firewall; configuring access control policies, mail policies, and 802.1X Authentication; and more. They will also get introductory practice on Cisco Stealthwatch Enterprise and Cisco Stealthwatch Cloud threat detection features. This course will also help participants prepare to take the certification exam.

Read More

Implementing Cisco Edge Network Security Solutions (SENSS)

This course provides participants with the foundational knowledge and the capabilities to implement and manage security on Cisco® Adaptive Security Appliance (ASA) firewalls, Cisco Routers with the firewall feature set, and Cisco Switches. Participants will gain hands-on experience with configuring various perimeter security solutions for mitigating outside threats and securing network zones. At the end of the course, they will be able to reduce the risk to their IT infrastructures and applications using Cisco Switches, Cisco ASA, and Router security appliance feature and provide detailed operations support for these products.

Read More

MD-100T00: Windows 10

In this course, participants will learn how to support and configure Windows 10 desktops in an organizational environment. They will develop skills that include learning how to install, customize, and update Windows® 10 operating systems (OS). Participants will also learn how to manage storage, files, and devices as well as how to configure network connectivity for Windows 10. Finally, they will learn how to secure the Windows 10 OS and protect the data on the device, and how to manage and troubleshoot Windows 10. NOTE: This course is a compilation of the following four courses — MD-100T01: Installing Windows 10, MD-100T02: Configuring Windows 10, MD-100T03: Protecting Windows 10 and MD-100T04: Maintaining Windows 10. Clients have the option of updating their knowledge in one go with this course or doing so in four stages with the four aforementioned courses.

Read More

MD-100T03: Protecting Windows 10

In this course, participants will learn how to secure the Windows® 10 OS and protect the data on the device. They will be introduced to common methods used for authentication and access control as well. This course will teach participants how to configure file and folder permissions and creating security policies. They will also be introduced to the different types of external threats and how to leverage features like encryption and firewalls, as well as tools like Windows Defender. NOTE: Clients can take this course on its own or take the MD-100T00: Windows 10 course which is a combination of the following courses — MD-100T01: Installing Windows 10, MD-100T02: Configuring Windows 10, MD-100T03: Protecting Windows 10 and MD-100T04: Maintaining Windows 10.

Read More

MS-100T03: Microsoft 365 Identity Management

In this course, participants will learn about the Microsoft® 365 Identity Management, which includes topics such as how to manage user security groups and licenses for cloud identities, and how to plan and implement identity synchronization, federated identities, applications, and external access.

Read More

MS-101T00: Microsoft 365 Mobility and Security

This course covers three central elements of Microsoft® 365 enterprise administration – Microsoft 365 security management, Microsoft 365 compliance management, and Microsoft 365 device management. Participants will learn about Microsoft 365 Security Management, which includes topics such as how to manage security metrics, how to enable Azure® AD Identity Protection, how to configure Microsoft 365 security services and user Microsoft 365 Threat Intelligence. They will then learn about Microsoft 365 Compliance Management, which includes topics such as data retention and data loss prevention solutions in Microsoft 365, archiving and retention in Microsoft 365, implementing and managing data governance, and managing search and investigations. Lastly, this course will conclude with introducing participants to the world of Microsoft 365 device management – from establishing Microsoft Intune to enrolling devices to Intune, monitoring the devices, and controlling what users can do from the enrolled devices by using conditional access policies.

Read More

MS-101T01: Microsoft 365 Security Management

In this course, participants will learn about Microsoft® 365 Security Management, which includes topics such as how to manage security metrics, how to enable Azure® AD Identity Protection, how to configure Microsoft 365 security services and user Microsoft 365 Threat Intelligence.

Read More

MS-101T02: Microsoft 365 Compliance Management

In this course, participants will learn about Microsoft® 365 Compliance Management, which includes topics such as data retention and data loss prevention solutions in Microsoft 365, archiving and retention in Microsoft 365, implementing and managing data governance, and managing search and investigations.

Read More

MS-101T03: Microsoft 365 Device Management

This course introduces participants to the world of Microsoft® 365 device management – from establishing Microsoft Intune to enrolling devices to Intune, to monitoring the devices, to controlling what users can do from the enrolled devices by using conditional access policies. If candidates are already managing devices by using a traditional device management tool such as Configuration Manager, they will be interested to know how you can seamlessly move to modern management, in which devices are managed by Intune, and how they can benefit from new device management capabilities, such as compliance, conditional access, and Windows® Autopilot to deploy new devices from the cloud.

Read More

MS-200T01: Understanding the Modern Messaging Infrastructure

In this course, participants will learn about the architecture of the modern messaging infrastructure with Microsoft® Exchange Server and Exchange Online and how to deploy messaging in different scenarios and organizations. They will be guided through the initial deployment process and introduced to the messaging management tools. They will also learn how to create and manage different types of recipients, and how to create and manage Exchange Server mailbox databases, which serve as storage locations for all messaging data. Finally, participants will be introduced to messaging infrastructure organizational settings, such as how to manage authentication for your messaging environment, how to configure quotas for users in the organization, and how to configure organization sharing with the federation.

Read More

MS-200T02: Managing Client Access and Mail Flow

In this course, participants will learn how Microsoft® Exchange Server provides access to user mailboxes for many different clients. As all messaging clients access Exchange Server mailboxes through client access services, they will also examine how to plan, configure, and manage client access services in Exchange Server. Secondly, participants will also learn how to manage mobile devices. This course also describes the planning and configuring message transport in an Exchange Server organization. Thirdly, they will learn how to plan, configure and manage transport services to provide efficient communication between Exchange Servers, Exchange Online, and other mail servers on the Internet. Finally, they will also learn how to troubleshoot transport services when issues occur in different scenarios so that they can provide their organization with a healthy and reliable messaging infrastructure.

Read More

MS-200T03: Managing Messaging High Availability and Disaster Recovery

In this course, participants will learn about the traditional and modern solutions for messaging high availability and disaster recovery. They will be introduced to each solution and learn when to use one solution over another. They will also learn how to plan deployment, and how to perform the actual implementation.

Read More

MS-201T01: Defining a Hybrid Messaging Strategy

This course introduces participants to the world of hybrid messaging. They will learn how to deploy a hybrid environment for their Exchange organization and how to migrate mailboxes to Microsoft® Exchange Online. Candidates will begin by examining available mailbox migration options and then focus on planning for a hybrid deployment. Finally, they will also learn how to implement and troubleshoot a hybrid deployment.

Read More

MS-201T02: Managing Messaging Security, Hygiene, and Compliance

In this course, participants will learn about the different messaging-related security and compliance service configurations and settings with Microsoft® Exchange Server and Exchange Online. They will begin by examining the fundamentals of message hygiene with Exchange Online Protection and Exchange Advanced Threat Protection, as well as connection and spam filtering with Exchange. They will then examine messaging compliance solutions, such as retention and data loss prevention policies, as well as audit log investigations and eDiscovery search mechanisms from the messaging compliance perspective. Then they will learn how to plan a proper deployment and how to perform the basic implementation process for each solution. Finally, participants will conclude the course by examining how to manage permissions that are assigned to user and admin roles.

Read More

MS-700T00: Managing Microsoft Teams

In this course, participants will get an overview of Microsoft® Teams including Teams architecture and related Office 365® workloads. They will learn how to use Teams to facilitate teamwork and communication within their organization, both on and off-premises, on a wide range of devices — from desktops to tablets to phones — while taking advantage of all the rich functionality of Office 365 applications. They will plan and configure governance for Office 365 groups, implement security by configuring conditional access and implement compliance for Teams by using the necessary policies. They will also plan an upgrade from Skype® for Business to Microsoft Teams and learn how to create and manage teams as well as manage chat and collaboration experiences. This course concludes with managing communication in Microsoft Teams.

Read More

MS-900T01: Microsoft 365 Fundamentals

This course provides foundational knowledge on the considerations and benefits of adopting cloud services and the Software as a Service (SaaS) cloud model, with a specific focus on Microsoft® 365 cloud service offerings. Participants will begin by learning about cloud fundamentals, including an overview of cloud computing and specifically Microsoft cloud services. They will be introduced to Microsoft Azure®, and they will examine the differences between Microsoft 365 and Office 365. Then they will perform an in-depth review of Microsoft 365, including a comparison of Microsoft on-premises services versus Microsoft 365 cloud services, a review of enterprise mobility in Microsoft 365, and an analysis of how Microsoft 365 services provide collaboration. The course then analyzes how security, compliance, privacy, and trust are handled in Microsoft 365, and it concludes with a review of Microsoft 365 subscriptions, licenses, billing, and support.

Read More