| CHECK POINT |
CHECK POINT CERTIFIED SECURITY MASTER (CCSM) R77.30 |
| CHECK POINT MANAGED SECURITY EXPERT (CCMSE) |
| CISCO |
IMPLEMENTING CISCO SECURE ACCESS CONTROL SYSTEM V5.2 |
| IMPLEMENTING CISCO IOS NETWORK SECURITY (IINS) 3.0 |
| IMPLEMENTING CISCO SECURE ACCESS SOLUTIONS (SISAS) 1.0 |
| IMPLEMENTING CISCO EDGE NETWORK SECURITY SOLUTIONS (SENSS) 1.0 |
| IMPLEMENTING CISCO SECURE MOBILITY SOLUTIONS (SIMOS) 1.0 |
| IMPLEMENTING CISCO THREAT CONTROL SOLUTIONS (SITCS) 1.5 |
| CLOUD SECURITY ALLIANCE |
CLOUD SECURITY ALLIANCE |
| CCSK PLUS |
| COMPTIA |
COMPTIA ADVANCED SECURITY PRACTITIONER (CASP) (CAS-003) |
| COMPTIA Cybersecurity Analyst (CySA+) |
| CWNP |
CWSP - CERTIFIED WIRELESS SECURITY PROFESSIONAL |
| EC-Council |
CERTIFIED INCIDENT HANDLER (ECIH) |
| CERTIFIED SECURITY ANALYST (ECSA) V9 |
| EC-COUNCIL INFORMATION SECURITY MANAGEMENT (EISM) |
| DISASTER RECOVERY PROFESSIONAL (EDRP) |
| LICENSED PENETRATION TESTER (LPT) |
| COMPUTER HACKING FORENSICS INVESTIGATOR (CHFI) |
| CERTIFIED CHIEF INFORMATION SECURITY OFFICER (CCISO) |
| CERTIFIED SECURITY SPECIALIST (ECSS) |
| CERTIFIED INCIDENT HANDLER (ECIH) |
| CERTIFIED ENCRYPTION SPECIALIST (ECES) |
| CAST 611V3 ADVANCED PENETRATION TESTING |
| ADVANCED MOBILE FORENSICS AND SECURITY (CAST 612) |
| ISACA |
CRISC EXAM REVIEW |
| CGEIT EXAM REVIEW |
| CISM EXAM REVIEW |
| CISA EXAM REVIEW |
| COBIT 5 FOUNDATION |
| COBIT 5 IMPLEMENTATION |
| COBIT 5 ASSESSOR |
| IMPLEMENTING NIST CYBERSECURITY FRAMEWORK USING COBIT 5 |
| COBIT 5 ASSESSOR FOR SECURITY |
| ISC(2) |
(ISC)2 TRAINING FOR CAP |
| (ISC)2 TRAINING FOR CCFP |
| (ISC)2 TRAINING FOR CCSP |
| (ISC)2 TRAINING FOR CISSP |
| (ISC)2 TRAINING FOR HCISPP |
| (ISC)2 TRAINING FOR CISSP-ISSAP |
| (ISC)2 TRAINING FOR CISSP-ISSEP |
| (ISC)2 TRAINING FOR CISSP-ISSMP |
| (ISC)2 TRAINING FOR SSCP |
| JUNIPER |
JUNOS SECURITY (JSEC) |
| JUNOS SPACE-SECURITY DIRECTOR (JS-SD) |
| ATTACK PREVENTION WITH JUNIPER NETWORKS FIREWALLS (APJF) |
| ATTACK PREVENTION WITH JUNIPER NETWORKS FIREWALLS (APJF) |
| ATTACK PREVENTION WITH JUNIPER NETWORKS FIREWALLS (APJF) |
| ADVANCED JUNOS SECURITY (AJSEC) |
| IMPLEMENTING JUNIPER NETWORKS SECURE ANALYTICS (IJSA) |
| CONFIGURING STEEL-BELTED RADIUS CARRIER (CSBR) |
| INTEGRATING JUNIPER NETWORKS FIREWALL/IPSEC VPN PRODUCTS INTO HIGH-PERFORMANCE NETWORKS (IFVH) |
| CONFIGURING JUNIPER NETWORKS FIREWALL/IPSEC VPN PRODUCTS (CJFV) |
| CONFIGURING JUNIPER NETWORKS FIREWALL/IPSEC VPN PRODUCTS (CJFV) |
| MCAFEE |
MCAFEE ENDPOINT SECURITY 10.X ADMINISTRATION |
| MCAFEE ENDPOINT SECURITY UPGRADE |
| MCAFEE ADVANCED THREAT DETECTION ADMINISTRATION |
| MCAFEE VIRUSSCAN AND EPOLICY ORCHESTRATOR ADMINISTRATION |
| MCAFEE NETWORK SECURITY PLATFORM ADMINISTRATION |
| MCAFEE HOST INTRUSION PREVENTION SYSTEM ADMINISTRATION |
| MCAFEE DATA LOSS PREVENTION ENDPOINT ADMINISTRATION |
| SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM) ADMINISTRATION |
| MICROSOFT |
SECURITY FUNDAMENTALS |
| SECURING WINDOWS SERVER 2016 |
| OFFENSIVE SECURITY |
PENETRATION TESTING WITH KALI LINUX |
| ADVANCED WINDOWS EXPLOITATION |
| OFFENSIVE SECURITY WIRELESS ATTACKS (WIFU) |
| CRACKING THE PERIMETER (CTP) |
| ADVANCED WEB ATTACKS AND EXPLOITATION |
| METASPLOIT UNLEASHED |
| OFFENSIVE SECURITY PENETRATION TESTING LAB |
| PALO ALTO |
FIREWALL ESSENTIALS 8.0: CONFIGURATION AND MANAGEMENT (EDU-210) |
| PANORAMA 8.0: MANAGE MULTIPLE FIREWALLS (EDU-221) |
| FIREWALL 8.0: DEBUG AND TROUBLESHOOT (EDU-311) |
| FIREWALL 7.1: INSTALL, CONFIGURE, AND MANAGE (EDU-201) |
| FIREWALL 7.1: CONFIGURE EXTENDED FEATURES (EDU-205) |
| PANORAMA 7.1: MANAGE MULTIPLE FIREWALLS (EDU-221) |
| FIREWALL 7.1: MANAGE CYBERTHREATS (EDU-231) |
| FIREWALL 7.1: DEBUG AND TROUBLESHOOT (EDU-311) |
| TRAPS 3.4: DEPLOY AND OPTIMIZE (EDU-285) |
| TRAPS 3.4: INSTALL, CONFIGURE AND MANAGE (EDU-281) |
| RIVERBED |
WAN200 OPTIMIZATION ESSENTIALS |
| WAN310 OPTIMIZING ENTERPRISE APPLICATIONS AND PROTOCOLSWAN200 OPTIMIZATION ESSENTIALS |
| WAN350 IMPLEMENTING ENTERPRISE OPTIMIZATION ARCHITECTURES |
| NPM200 PERFORMANCE MONITORING ESSENTIALS |
| RIVERBED APM200 APPLICATION PERFORMANCE MONITORING ESSENTIALS |
| RIVERBED RCPE-APPV APPLICATION VISIBILITY |
| HCB200 HYPER-CONVERGED BRANCH ESSENTIALS |
| SABSA |
SABSA FOUNDATION MODULES (F1 & F2) |
| MODULE A1 – ADVANCED SABSA RISK ASSURANCE & GOVERNANCE |
| MODULE A3 – ADVANCED SABSA ARCHITECTURE & DESIGN |
| SANS |
NETWARS - TOURNAMENT |
| NETWARS: CONTINUOUS |
| AUD507: AUDITING & MONITORING NETWORKS, PERIMETERS & SYSTEMS |
| AUD480: TOP 4 MITIGATION STRATEGIES: IMPLEMENTING & AUDITINGENTING AND AUDITING THE CRITICAL SECURITY CONTROLS - IN-DEPTH |
| AUD566: IMPLEMAUD440: CRITICAL SECURITY CONTROLS: PLANNING, IMPLEMENTING AND AUDITING |
| AUD440: CRITICAL SECURITY CONTROLS: PLANNING, IMPLEMENTING AND AUDITING |
| FOR408: WINDOWS FORENSIC ANALYSIS |
| FOR508: ADVANCED DIGITAL FORENSICS, INCIDENT RESPONSE, AND THREAT HUNTING |
| FOR518: MAC FORENSIC ANALYSIS |
| FOR578: CYBER THREAT INTELLIGENCE |
| FOR526: MEMORY FORENSICS IN-DEPTH |
| FOR572: ADVANCED NETWORK FORENSICS AND ANALYSIS |
| FOR585: ADVANCED SMARTPHONE FORENSICS |
| FOR610: REVERSE-ENGINEERING MALWARE: MALWARE ANALYSIS TOOLS AND TECHNIQUES |
| ICS515: ICS ACTIVE DEFENSE AND INCIDENT RESPONSE |
| ICS410: ICS/SCADA SECURITY ESSENTIALS |
| ICS456: ESSENTIALS FOR NERC CRITICAL INFRASTRUCTURE PROTECTION |
| MGT415: A PRACTICAL INTRODUCTION TO RISK ASSESSMENT |
| MGT414: SANS TRAINING PROGRAM FOR THE CISSP® CERTIFICATION EXAM |
| MGT433: SECURING THE HUMAN: HOW TO BUILD, MAINTAIN AND MEASURE A HIGH-IMPACT AWARENESS PROGRAM |
| MGT512: SANS SECURITY LEADERSHIP ESSENTIALS FOR MANAGERS WITH KNOWLEDGE COMPRESSION |
| MGT514: IT SECURITY STRATEGIC PLANNING, POLICY AND LEADERSHIP |
| MGT535: INCIDENT RESPONSE TEAM MANAGEMENT |
| LEG523: LAW OF DATA SECURITY AND INVESTIGATIONS |
| SEC301: INTRO TO INFORMATION SECURITY |
| SEC401: SECURITY ESSENTIALS BOOTCAMP STYLE |
| SEC440: CRITICAL SECURITY CONTROLS: PLANNING, IMPLEMENTING AND AUDITING |
| SEC480: TOP 4 MITIGATION STRATEGIES: IMPLEMENTING & AUDITING |
| SEC501: ADVANCED SECURITY ESSENTIALS - ENTERPRISE DEFENDER |
| SEC502: PERIMETER PROTECTION IN-DEPTH |
| SEC503: INTRUSION DETECTION IN-DEPTH |
| SEC504: HACKER TOOLS, TECHNIQUES, EXPLOITS AND INCIDENT HANDLING |
| SEC505: SECURING WINDOWS WITH THE CRITICAL SECURITY CONTROLS |
| SEC506: SECURING LINUX/UNIX |
| SEC511: CONTINUOUS MONITORING AND SECURITY OPERATIONS |
| SEC524: CLOUD SECURITY FUNDAMENTALS |
| SEC542: WEB APP PENETRATION TESTING AND ETHICAL HACKING |
| SEC546: IPV6 ESSENTIALS |
| SEC550: ACTIVE DEFENSE, OFFENSIVE COUNTERMEASURES AND CYBER DECEPTION |
| SEC560: NETWORK PENETRATION TESTING AND ETHICAL HACKING |
| SEC561: INTENSE HANDS-ON PEN TESTING SKILL DEVELOPMENT (WITH SANS NETWARS) |
| SEC562: CYBERCITY HANDS-ON KINETIC CYBER RANGE EXERCISE |
| SEC566: IMPLEMENTING AND AUDITING THE CRITICAL SECURITY CONTROLS - IN-DEPTH |
| SEC575: MOBILE DEVICE SECURITY AND ETHICAL HACKING |
| SEC579: VIRTUALIZATION AND PRIVATE CLOUD SECURITY |
| SEC580: METASPLOIT KUNG FU FOR ENTERPRISE PEN TESTING |
| SEC617: WIRELESS ETHICAL HACKING, PENETRATION TESTING, AND DEFENSES |
| SEC642: ADVANCED WEB APP PENETRATION TESTING AND ETHICAL HACKING |
| SEC660: ADVANCED PENETRATION TESTING, EXPLOIT WRITING, AND ETHICAL HACKING |
| SEC760: ADVANCED EXPLOIT DEVELOPMENT FOR PENETRATION TESTERS |
| SYMANTEC |
ADMINISTRATION OF SYMANTEC VIP (MARCH 2017) |
| ADMINISTRATION OF SYMANTEC IT MANAGEMENT SUITE 8.0 |
| ADMINISTRATION OF DATA LOSS PREVENTION 14.5 |
| ADMINISTRATION OF SYMANTEC CYBER SECURITY SERVICES (MAY 2016) |
| ADMINISTRATION OF SYMANTEC ADVANCED THREAT PROTECTION 2.0.2 |
| ADMINISTRATION OF SYMANTEC ENDPOINT PROTECTION 14 |
| ADMINISTRATION OF SYMANTEC DATA CENTER SECURITY - SERVER ADVANCED 6.7 |
| VALIDATION AND ID PROTECTION (VIP) SERVICE R1 |
| IT MANAGEMENT SUITE 8.0 FUNDAMENTALS |
| IT MANAGEMENT SUITE 8.0 MODULES |
| CLIENT MANAGEMENT SUITE 7.6 ADMINISTRATION |
| CLIENT MANAGEMENT SUITE 7.6 IMPLEMENTER |
| ASSET MANAGEMENT SUITE 7.5 ADMINISTRATION |
| DATA LOSS PREVENTION 14.5: ADMINISTRATION – MUST COMPLETE ALL MODULES FOR CEUS |
| DATA LOSS PREVENTION 14.5: DIFFERENCES |
| CSS ADMIN R1 – MUST COMPLETE ALL MODULES FOR CEUS |
| SYMANTEC DATA CENTER SECURITY – SERVER ADVANCED 6.7 ADMINISTRATION – MUST COMPLETE ALL MODULES FOR CEUS |
| ADVANCED THREAT PROTECTION 2.X: INCIDENT RESPONSE – MUST COMPLETE ALL MODULES FOR CEUS |
| SYMANTEC ENDPOINT PROTECTION 12.1.X ADMINISTRATION |
| SYMANTEC ENDPOINT PROTECTION 12.1 MAINTAIN AND TROUBLESHOOT |
| EMAIL SECURITY SERVICES AND WEB SECURITY SERVICE: ADMINISTRATION |
| ENDPOINT PROTECTION 14: CONFIGURE AND PROTECT |
| ENDPOINT PROTECTION 14: DIFFERENCES |
| ENDPOINT PROTECTION 14: MIGRATION AND UPGRADES |