| AMAZON WEB SERVICES |
SECURITY OPERATIONS ON AWS |
| AWS SECURITY FUNDAMENTALS |
| BROCADE |
NETWORK INDUSTRY PROTOCOLS (NIP 200) |
| BROCADE PROFESSIONAL IP ADMINISTRATOR (BPIPA 200) |
| CHECK POINT |
CHECK POINT CERTIFIED SECURITY ADMINISTRATOR (CCSA) R77.30 |
| SECURITY ENGINEERING (CHECK POINT CERTIFIED SECURITY EXPERT (CCSE) R77.30) |
| THREAT PREVENTION |
| SECURE WEB GATEWAY |
| MDSM WITH VSX (MULTI-DOMAIN SECURITY MANAGEMENT WITH VIRTUAL SYSTEM EXTENSION) |
| CHECK POINT CERTIFIED SECURITY MASTER (CCSM) R77.30 |
| CHECK POINT CERTIFIED SECURITY ADMINISTRATOR (CCSA) R80 |
| CHECK POINT MANAGED SECURITY EXPERT (CCMSE) |
| CISCO |
IMPLEMENTING CISCO SECURE ACCESS CONTROL SYSTEM V5.2 |
| IMPLEMENTING CISCO IOS NETWORK SECURITY (IINS) 3.0 |
| IMPLEMENTING CISCO SECURE ACCESS SOLUTIONS (SISAS) 1.0 |
| IMPLEMENTING CISCO EDGE NETWORK SECURITY SOLUTIONS (SENSS) 1.0 |
| IMPLEMENTING CISCO SECURE MOBILITY SOLUTIONS (SIMOS) 1.0 |
| SECURING CISCO NETWORKS WITH THREAT DETECTION AND ANALYSIS (SCYBER) 1 |
| UNDERSTANDING CISCO CYBERSECURITY FUNDAMENTALS (SECFND) |
| IMPLEMENTING CISCO CYBERSECURITY OPERATIONS (SECOPS) |
| IMPLEMENTING CISCO THREAT CONTROL SOLUTIONS (SITCS) 1.5 |
| CompTIA |
COMPTIA ADVANCED SECURITY PRACTITIONER (CASP) (CAS-003) |
| COMPTIA SECURITY+ SY0-501 – APPROVED ONLY FOR THOSE CERTIFIED IN SY0-401 AND EARLIER |
| COMPTIA CYBERSECURITY ANALYST (CySA+) (CS0-001) |
| COMPTIA PENTEST+ (PT0-001) |
| CWNP |
CWSP – CERTIFIED WIRELESS SECURITY PROFESSIONAL |
| EC-COUNCIL |
CERTIFIED ETHICAL HACKER (CEH) V9 |
| CERTIFIED SECURITY ANALYST (ECSA) V9 |
| DISASTER RECOVERY PROFESSIONAL (EDRP) |
| LICENSED PENETRATION TESTER (LPT) |
| COMPUTER HACKING FORENSICS INVESTIGATOR (CHFI) |
| CERTIFIED CHIEF INFORMATION SECURITY OFFICER (CCISO) |
| CERTIFIED SECURITY SPECIALIST (ECSS) |
| CERTIFIED INCIDENT HANDLER (ECIH) |
| CERTIFIED ENCRYPTION SPECIALIST (ECES) |
| CERTIFIED NETWORK DEFENDER (CND) |
| CERTIFIED NETWORK DEFENSE ARCHITECT (CNDA) |
| EC-COUNCIL INFORMATION SECURITY MANAGEMENT (EISM) |
| CAST 611V3 ADVANCED PENETRATION TESTING |
| CAST 616 SECURING WINDOWS INFRASTRUCTURE |
| ADVANCED MOBILE FORENSICS AND SECURITY (CAST 612) |
| CAST 613 HACKING AND HARDENING CORPORATE WEB APP/WEB SITE |
| CAST 614 ADVANCED NETWORK DEFENSE |
| EMC |
VMAX3 Security Concepts |
| ENCASE |
ENCASE V7 FORENSICS AND ENTERPRISE FUNDAMENTALS |
| ENCASE® V7 COMPUTER FORENSICS I |
| INCIDENT INVESTIGATION |
| HOST INTRUSION METHODOLOGY AND INVESTIGATION |
| ENCASE® CYBERSECURITY AND ANALYTICS V5 |
| ENCASE® ADVANCED COMPUTER FORENSICS |
| HP |
HPE ArcSight Master ASE Preparation Course |
| ArcSight ESM 6.5 Advanced Administrator |
| ArcSight ESM 6.5 Advanced Analyst |
| ArcSight Logger - 6.0 Administration and Operations |
| Dynamic Application Testing with HP WebInspect 10.3 |
| HP Fortify Static Code Analyzer / Software Security Center 4.2 |
| IBM |
IBM Security QRadar SIEM 7.2 Administration and Configuration |
| IBM Security QRadar SIEM Foundations |
| IBM Security Directory Server 6.3.1 System Administration |
| IBM Security Identity Manager 6.0 Basic Administration |
| IBM Security QRadar Incident Forensics Configuration and Usage |
| Web Application Security Fundamentals |
| IBM Security Access Manager for Enterprise Single Sign-On 8.2.1 Administration |
| IBM Security Access Manager for Mobile 8.0 |
| IBM Security Access Manager for Web |
| IBM Security Privileged Identity Manager Fundamentals |
| IBM Endpoint Manager 9.2 Security and Compliance Fundamentals |
| IBM Security QRadar Advanced Topics |
| IBM Security AppScan Standard Fundamentals |
| ISACA |
COBIT 5 ASSESSOR FOR SECURITY |
| CRISC EXAM REVIEW |
| CYBERSECURITY FUNDAMENTALS |
| CSX PRACTITIONER: IDENTIFICATION AND PROTECTION |
| CSX PRACTITIONER: RESPOND AND RECOVER |
| CSX PRACTITIONER BOOT CAMP |
| CSX PRACTITIONER: DETECTION |
| CISM EXAM REVIEW |
| CISA EXAM REVIEW
|
| ISC(2) |
(ISC)2 TRAINING FOR CAP |
| (ISC)2 TRAINING FOR CCFP |
| (ISC)2 TRAINING FOR CCSP |
| (ISC)2 TRAINING FOR CISSP |
| (ISC)2 TRAINING FOR HCISPP |
| (ISC)2 TRAINING FOR CISSP-ISSAP |
| (ISC)2 TRAINING FOR CISSP-ISSEP |
| (ISC)2 TRAINING FOR CISSP-ISSMP |
| (ISC)2 TRAINING FOR SSCP |
| JUNIPER |
ADVANCED JUNOS SECURITY (AJSEC) |
| ATTACK PREVENTION WITH JUNIPER NETWORKS FIREWALLS (APJF) |
| CONFIGURING JUNIPER NETWORKS FIREWALL/IPSEC VPN PRODUCTS (CJFV) |
| INTEGRATING JUNIPER NETWORKS FIREWALL/IPSEC VPN PRODUCTS INTO HIGH-PERFORMANCE NETWORKS (IFVH) |
| JNCIE SECURITY BOOTCAMP (JNCIE-SEC) |
| JUNOS SECURITY (JSEC) |
| JUNOS SPACE-SECURITY DIRECTOR (JS-SD) |
| JUNIPER NETWORKS DESIGN-SECURITY (JND-SEC) |
| IMPLEMENTING JUNIPER NETWORKS SECURE ANALYTICS (IJSA) |
| CONFIGURING STEEL-BELTED RADIUS CARRIER (CSBR) |
| LINUX |
Linux Kernel Debugging and Security |
| Linux Security Fundamentals |
| Penetration Testing with Linux Tools |
| MCAFEE |
MCAFEE ENDPOINT SECURITY 10.X ADMINISTRATION
|
|
MCAFEE ENDPOINT SECURITY UPGRADE
|
|
MCAFEE ADVANCED THREAT DETECTION ADMINISTRATION
|
|
MCAFEE VIRUSSCAN AND EPOLICY ORCHESTRATOR ADMINISTRATION
|
|
MCAFEE NETWORK SECURITY PLATFORM ADMINISTRATION
|
|
MCAFEE HOST INTRUSION PREVENTION SYSTEM ADMINISTRATION
|
|
MCAFEE DATA LOSS PREVENTION ENDPOINT ADMINISTRATION
|
|
SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM) ADMINISTRATION
|
| MICROSOFT |
SECURITY FUNDAMENTALS |
| SECURING WINDOWS SERVER 2016 |
| NOVELL |
SECURING WINDOWS WORKSTATIONS USING ZENWORKS ENDPOINT SECURITY MANAGEMENT 11.X (COURSE 8520) |
| SUSE LINUX ENTERPRISE SERVER 10: SECURITY [COURSE 3075] |
| OFFENSIVE SECURITY |
PENETRATION TESTING WITH KALI LINUX |
| ADVANCED WINDOWS EXPLOITATION |
| OFFENSIVE SECURITY WIRELESS ATTACKS (WIFU) |
| CRACKING THE PERIMETER (CTP) |
| ADVANCED WEB ATTACKS AND EXPLOITATION |
| METASPLOIT UNLEASHED |
| OFFENSIVE SECURITY PENETRATION TESTING LAB |
| Oracle |
Oracle 12c Security Administration |
| ORACLE DATABASE 12C: MANAGING SECURITY |
| USER SECURITY AND AUDITING IN ORACLE DATABASE 12C |
| ORACLE DATABASE 11G: DATABASE SECURITY |
| ORACLE DATABASE 11G: BASIC USER AND STRONG AUTHENTICATION |
| ORACLE DATABASE 11G: ENTERPRISE USER SECURITY AND PROXY AUTHENTICATION |
| ORACLE DATABASE 11G: PRIVILEGES, ROLES, AND APPLICATION CONTEXTS |
| ORACLE DATABASE 11G: ENCRYPTION CONCEPTS |
| ORACLE DATABASE 11G: TRANSPARENT DATA ENCRYPTION |
| ORACLE SOA SUITE 11G: SOA SECURITY AND ADOPTION PLANNING |
| ORACLE DATABASE 11G RELEASE 2: STORAGE STRUCTURES AND USER SECURITY |
| ORACLE DATABASE 11G RELEASE 2: ORACLE PARTITIONING AND SECURITY FEATURES |
| ORACLE DATABASE 11G: FIREWALLS, ORACLE CONNECTION MANAGER, AND SQL*PLUS SECURITY |
| ORACLE DATABASE 11G: ORACLE NET SERVICES AND LISTENER SECURITY
|
| PALO ALTO |
FIREWALL ESSENTIALS 8.0: CONFIGURATION AND MANAGEMENT (EDU-210) |
| PANORAMA 8.0: MANAGE MULTIPLE FIREWALLS (EDU-221) |
| FIREWALL 8.0: DEBUG AND TROUBLESHOOT (EDU-311) |
| FIREWALL 7.1: INSTALL, CONFIGURE, AND MANAGE (EDU-201) |
| FIREWALL 7.1: CONFIGURE EXTENDED FEATURES (EDU-205) |
| PANORAMA 7.1: MANAGE MULTIPLE FIREWALLS (EDU-221) |
| FIREWALL 7.1: MANAGE CYBERTHREATS (EDU-231) |
| FIREWALL 7.1: DEBUG AND TROUBLESHOOT (EDU-311) |
| TRAPS 3.4: DEPLOY AND OPTIMIZE (EDU-285) |
| TRAPS 3.4: INSTALL, CONFIGURE AND MANAGE (EDU-281) |
| FIREWALL ESSENTIALS 8.0: CONFIGURATION AND MANAGEMENT (EDU-110) |
| RED HAT |
RED HAT SERVER HARDENING (RH413) |
| RED HAT SYSTEM ADMINISTRATION I (RH124) |
| RED HAT SYSTEM ADMINISTRATION II (RH134) |
| RHCSA RAPID TRACK COURSE (RH199) |
| RED HAT SYSTEM ADMINISTRATION III (RH254) |
| RHCE CERTIFICATION LAB |
|
RED HAT SECURITY: Linux in Physical, Virtual, and Cloud (RH415)
|
|
RIVERBED
|
NPM200 NETWORK PERFORMANCE MANAGEMENT ESSENTIALS
|
|
TRANSACTION ANALYZER
|
|
APPRESPONSE
|
|
WAN310 OPTIMIZING ENTERPRISE APPLICATIONS AND PROTOCOLS
|
|
WAN350 IMPLEMENTING ENTERPRISE OPTIMIZATION ARCHITECTURES
|
| SABSA |
SABSA FOUNDATION MODULES (F1 & F2) |
| MODULE A1 – ADVANCED SABSA RISK ASSURANCE & GOVERNANCE |
| MODULE A3 – ADVANCED SABSA ARCHITECTURE & DESIGN |
| SANS |
NETWARS - CORE TOURNAMENT |
| NETWARS: CONTINUOUS |
| AUD566: IMPLEMENTING AND AUDITING THE CRITICAL SECURITY CONTROLS - IN-DEPTH |
| AUD507: AUDITING & MONITORING NETWORKS, PERIMETERS & SYSTEMS |
| AUD440: CRITICAL SECURITY CONTROLS: PLANNING, IMPLEMENTING AND AUDITING |
| AUD480: TOP 4 MITIGATION STRATEGIES: IMPLEMENTING & AUDITING |
| FOR408: WINDOWS FORENSIC ANALYSIS |
| FOR508: ADVANCED DIGITAL FORENSICS, INCIDENT RESPONSE, AND THREAT HUNTING |
| FOR518: MAC FORENSIC ANALYSIS |
| FOR526: MEMORY FORENSICS IN-DEPTH |
| FOR572: ADVANCED NETWORK FORENSICS AND ANALYSIS |
| FOR578: CYBER THREAT INTELLIGENCE |
| FOR585: ADVANCED SMARTPHONE FORENSICS |
| FOR610: REVERSE-ENGINEERING MALWARE: MALWARE ANALYSIS TOOLS AND TECHNIQUES |
| MGT414: SANS +S TRAINING PROGRAM FOR THE CISSP® CERTIFICATION EXAM |
| MGT415: A PRACTICAL INTRODUCTION TO RISK ASSESSMENT |
| MGT433: SECURING THE HUMAN: HOW TO BUILD, MAINTAIN AND MEASURE A HIGH-IMPACT AWARENESS PROGRAM |
| MGT512: SANS SECURITY LEADERSHIP ESSENTIALS FOR MANAGERS WITH KNOWLEDGE COMPRESSION |
| MGT514: IT SECURITY STRATEGIC PLANNING, POLICY AND LEADERSHIP |
| MGT535: INCIDENT RESPONSE TEAM MANAGEMENT |
| LEG523: LAW OF DATA SECURITY AND INVESTIGATIONS |
| SEC301: INTRO TO INFORMATION SECURITY |
| SEC401: SECURITY ESSENTIALS BOOTCAMP STYLE |
| SEC440: CRITICAL SECURITY CONTROLS: PLANNING, IMPLEMENTING AND AUDITING |
| SEC480: TOP 4 MITIGATION STRATEGIES: IMPLEMENTING & AUDITING |
| SEC501: ADVANCED SECURITY ESSENTIALS - ENTERPRISE DEFENDER |
| SEC502: PERIMETER PROTECTION IN-DEPTH |
| SEC503: INTRUSION DETECTION IN-DEPTH |
| SEC504: HACKER TOOLS, TECHNIQUES, EXPLOITS AND INCIDENT HANDLING |
| SEC511: CONTINUOUS MONITORING AND SECURITY OPERATIONS |
| SEC505: SECURING WINDOWS WITH THE CRITICAL SECURITY CONTROLS |
| SEC524: CLOUD SECURITY FUNDAMENTALS |
| SEC542: WEB APP PENETRATION TESTING AND ETHICAL HACKING |
| SEC546: IPV6 ESSENTIALS |
| SEC550: ACTIVE DEFENSE, OFFENSIVE COUNTERMEASURES AND CYBER DECEPTION |
| SEC560: NETWORK PENETRATION TESTING AND ETHICAL HACKING |
| SEC561: INTENSE HANDS-ON PEN TESTING SKILL DEVELOPMENT (WITH SANS NETWARS) |
| SEC562: CYBERCITY HANDS-ON KINETIC CYBER RANGE EXERCISE |
| SEC566: IMPLEMENTING AND AUDITING THE CRITICAL SECURITY CONTROLS - IN-DEPTH |
| SEC567: SOCIAL ENGINEERING FOR PENETRATION TESTERS |
| SEC575: MOBILE DEVICE SECURITY AND ETHICAL HACKING |
| SEC579: VIRTUALIZATION AND PRIVATE CLOUD SECURITY |
| SEC580: METASPLOIT KUNG FU FOR ENTERPRISE PEN TESTING |
| SEC617: WIRELESS ETHICAL HACKING, PENETRATION TESTING, AND DEFENSES |
| SEC642: ADVANCED WEB APP PENETRATION TESTING AND ETHICAL HACKING |
| SEC660: ADVANCED PENETRATION TESTING, EXPLOIT WRITING, AND ETHICAL HACKING |
| SEC760: ADVANCED EXPLOIT DEVELOPMENT FOR PENETRATION TESTERS |
| MGT535: INCIDENT RESPONSE TEAM MANAGEMENT |
| MGT405: CRITICAL INFRASTRUCTURE PROTECTION |
| ICS515: ICS ACTIVE DEFENSE AND INCIDENT RESPONSE |
| ICS456: ESSENTIALS FOR NERC CRITICAL INFRASTRUCTURE PROTECTION |
| ICS410: ICS/SCADA SECURITY ESSENTIALS |
|
SYMANTEC
|
ADMINISTRATION OF SYMANTEC VIP (MARCH 2017) |
|
ADMINISTRATION OF SYMANTEC IT MANAGEMENT SUITE 8.0
|
|
ADMINISTRATION OF DATA LOSS PREVENTION 14.5
|
|
ADMINISTRATION OF SYMANTEC CYBER SECURITY SERVICES (MAY 2016) |
|
ADMINISTRATION OF SYMANTEC ADVANCED THREAT PROTECTION 2.0.2 |
|
ADMINISTRATION OF SYMANTEC ENDPOINT PROTECTION 14
|
|
ADMINISTRATION OF SYMANTEC DATA CENTER SECURITY - SERVER ADVANCED 6.7
|
|
VALIDATION AND ID PROTECTION (VIP) SERVICE R1
|
|
IT MANAGEMENT SUITE 8.0 FUNDAMENTALS
|
|
IT MANAGEMENT SUITE 8.0 MODULES
|
|
CLIENT MANAGEMENT SUITE 7.6 ADMINISTRATION
|
|
CLIENT MANAGEMENT SUITE 7.6 IMPLEMENTER |
|
ASSET MANAGEMENT SUITE 7.5 ADMINISTRATION |
|
DATA LOSS PREVENTION 14.5: ADMINISTRATION – MUST COMPLETE ALL MODULES FOR CEUS
|
|
DATA LOSS PREVENTION 14.5: DIFFERENCES
|
|
CSS ADMIN R1 – MUST COMPLETE ALL MODULES FOR CEUS
|
|
SYMANTEC DATA CENTER SECURITY – SERVER ADVANCED 6.7 ADMINISTRATION – MUST COMPLETE ALL MODULES FOR CEUS
|
|
ADVANCED THREAT PROTECTION 2.X: INCIDENT RESPONSE – MUST COMPLETE ALL MODULES FOR CEUS
|
|
SYMANTEC ENDPOINT PROTECTION 12.1.X ADMINISTRATION
|
|
SYMANTEC ENDPOINT PROTECTION 12.1 MAINTAIN AND TROUBLESHOOT
|
|
EMAIL SECURITY SERVICES AND WEB SECURITY SERVICE: ADMINISTRATION
|
|
ENDPOINT PROTECTION 14: CONFIGURE AND PROTECT
|
|
ENDPOINT PROTECTION 14: DIFFERENCES
|
|
ENDPOINT PROTECTION 14: MIGRATION AND UPGRADES
|