AMAZON WEB SERVICES |
SECURITY OPERATIONS ON AWS
|
AWS SECURITY FUNDAMENTALS
|
MIGRATING TO AWS
|
SYSTEMS OPERATIONS ON AWS
|
DEVOPS ENGINEERING ON AWS
|
DEVELOPING ON AWS
|
ARCHITECTING ON AWS
|
ADVANCED ARCHITECTING ON AWS
|
EXAM READINESS WORKSHOP: AWS CERTIFIED SOLUTIONS ARCHITECT - PROFESSIONAL
|
EXAM READINESS WORKSHOP: AWS CERTIFIED SOLUTIONS ARCHITECT - ASSOCIATE
|
APPLE |
MAC INTEGRATION BASICS 10.11
|
MACOS SUPPORT ESSENTIALS 10.12 (SIERRA 101)
|
MACOS SUPPORT ESSENTIALS 10.11 (EL CAPITAN 101)
|
MAC INTEGRATION BASICS 10.12
|
APPLE SERVICE FUNDAMENTALS
|
APPLE CERTIFIED MAC TECHNICIAN (ACMT)
|
APPLE CERTIFIED IOS TECHNICIAN (ACIT)
|
AVAYA |
IP OFFICE BASIC INTEGRATION AND CONFIGURATION (7720C)
|
INTRODUCTION TO SESSION INITIATION PROTOCOL (SIP) V2.0
|
MERIDIAN 1 OPTION 11C INSTALLATION, MAINTENANCE, AND DATABASE - COMMUNICATION SERVER 1000 RELEASE 5.5
|
STACKABLE ERS AND VSP INSTALLATION, CONFIGURATION, AND MAINTENANCE
|
AVAYA COMMUNICATION SERVER 1000 DIALING PLAN DESIGN AND IP PEER NETWORKING
|
ERS 8800/8600 INSTALLATION AND CONFIGURATION
|
BROCADE |
BROCADE PROFESSIONAL IP ADMINISTRATOR (BPIPA 200)
|
NETWORK INDUSTRY PROTOCOLS (NIP 200)
|
CHECK POINT |
CHECK POINT CERTIFIED SECURITY ADMINISTRATOR (CCSA) R77.30
|
CHECK POINT CERTIFIED SECURITY ADMINISTRATOR (CCSA) R80
|
SECURITY ENGINEERING (CHECK POINT CERTIFIED SECURITY EXPERT (CCSE) R77.30)
|
THREAT PREVENTION
|
SECURE WEB GATEWAY
|
MDSM WITH VSX (MULTI-DOMAIN SECURITY MANAGEMENT WITH VIRTUAL SYSTEM EXTENSION)
|
CHECK POINT CERTIFIED SECURITY MASTER (CCSM) R77.30
|
CHECK POINT MANAGED SECURITY EXPERT (CCMSE)
|
CISCO |
SECURING CISCO NETWORKS WITH THREAT DETECTION AND ANALYSIS (SCYBER) 1
|
INTERCONNECTING CISCO NETWORKING DEVICES, PART 1 (ICND1) 3.0
|
DESIGNING WITH CISCO NETWORK PROGRAMMABILITY V2.0
|
DESIGNING WITH CISCO NETWORK PROGRAMMABILITY FOR ACI V1.10
|
IMPLEMENTING CISCO NETWORK PROGRAMMABILITY V2.0
|
IMPLEMENTING CISCO NETWORK PROGRAMMABILITY FOR ACI V1.1
|
IMPLEMENTING CISCO SECURE MOBILITY SOLUTIONS (SIMOS) 1.0
|
IMPLEMENTING CISCO SECURE ACCESS CONTROL SYSTEM V5.2 |
DESIGNING FOR CISCO INTERNETWORK SOLUTIONS (DESGN) V3.0
|
DESIGNING THE CISCO CLOUD (CLDDES) 1.0 |
AUTOMATING THE CISCO ENTERPRISE CLOUD (CLDAUT) 1.0 |
IMPLEMENTING CISCO THREAT CONTROL SOLUTIONS (SITCS) 1.5
|
DEPLOYING CISCO WIRELESS ENTERPRISE NETWORKS (WIDEPLOY) 1.0 |
SECURING CISCO WIRELESS ENTERPRISE NETWORKS (WISECURE) 1.0 |
MANAGING INDUSTRIAL NETWORKS FOR MANUFACTURING WITH CISCO TECHNOLOGIES (IMINS2) 1.3 |
SUPPORTING CISCO DATA CENTER SYSTEM DEVICES (DCTECH) 2.0 |
DESIGNING CISCO WIRELESS ENTERPRISE NETWORKS (WIDESIGN) 1.0 |
IMPLEMENTING CISCO WIRELESS NETWORK FUNDAMENTALS (WIFUND) 1.0 |
IMPLEMENTING CISCO NETWORK SECURITY (IINS) 3.0 |
INTERCONNECTING CISCO NETWORKING DEVICES, PART 2 (ICND2) 3.0 |
INTERCONNECTING CISCO NETWORKING DEVICES: ACCELERATED (CCNAX) 3.0 |
DESIGNING CISCO NETWORK SERVICE ARCHITECTURES (ARCH) 3.0 |
TROUBLESHOOTING AND MAINTAINING CISCO IP NETWORKS (TSHOOT) 2.0 |
IMPLEMENTING CISCO IP SWITCHED NETWORKS (SWITCH) 2.0 |
IMPLEMENTING CISCO IP ROUTING (ROUTE) 2.0 |
UNDERSTANDING CISCO CLOUD FUNDAMENTALS (CLDFND) 1.0 |
INTRODUCING CISCO CLOUD ADMINISTRATION (CLDADM) 1.0 |
IMPLEMENTING AND TROUBLESHOOTING THE CISCO CLOUD INFRASTRUCTURE (CLDINF) 1.0 |
INTRODUCING CISCO DATA CENTER NETWORKING (DCICN) 6.0 |
INTRODUCING CISCO DATA CENTER NETWORKING TECHNOLOGIES (DCICT) 6.0 |
IMPLEMENTING CISCO DATA CENTER UNIFIED COMPUTING (DCUCI) V6.0 |
IMPLEMENTING CISCO DATA CENTER INFRASTRUCTURE (DCII) V6.0 |
IMPLEMENTING CISCO DATA CENTER VIRTUALIZATION AND AUTOMATION (DCVAI) V6.0 |
TROUBLESHOOTING CISCO DATA CENTER INFRASTRUCTURE (DCIT) V6.0 |
UNDERSTANDING CISCO CYBERSECURITY FUNDAMENTALS (SECFND) |
IMPLEMENTING CISCO CYBERSECURITY OPERATIONS (SECOPS) |
IMPLEMENTING CISCO EDGE NETWORK SECURITY SOLUTIONS (SENSS) 1.0 |
IMPLEMENTING CISCO SECURE ACCESS SOLUTIONS (SISAS) 1.0 |
BUILDING CISCO SERVICE PROVIDER NEXT GENERATION NETWORKS, PART 2 (SPNGN2) 1.2 |
BUILDING CISCO SERVICE PROVIDER NEXT GENERATION NETWORKS, PART 1 (SPNGN1) 1.2 |
CITRIX |
CXM-302 DESIGN, DEPLOY AND MANAGE ENTERPRISE MOBILITY WITH XENMOBILE 9.0
|
CXD-210: CITRIX XENAPP AND XENDESKTOP ADMINISTRATION
|
CXD-310: CITRIX XENAPP AND XENDESKTOP ADVANCED ADMINISTRATION
|
CXD-400 DESIGNING APP AND DESKTOP SOLUTIONS WITH CITRIX XENAPP AND XENDESKTOP
|
CNS-220: CITRIX NETSCALER ESSENTIALS AND TRAFFIC MANAGEMENT
|
CNS-222: CITRIX NETSCALER ESSENTIALS AND UNIFIED GATEWAY
|
CNS-219: CITRIX NETSCALER TRAFFIC MANAGEMENT
|
CNS-221: CITRIX NETSCALER UNIFIED GATEWAY
|
NETSCALER SD-WAN
|
CNS-320: CITRIX NETSCALER ADVANCED TOPICS – SECURITY, MANAGEMENT, AND OPTIMIZATION
|
CXM-303 DEPLOYING ENTERPRISE MOBILITY SOLUTIONS WITH CITRIX XENMOBILE
|
CLOUDERA |
CLOUDERA’S APACHE HADOOP
|
Cloud Security Alliance |
CCSK FOUNDATION
|
CCSK PLUS
|
COMPTIA |
COMPTIA ADVANCED SECURITY PRACTITIONER (CASP) (CAS-003)
|
COMPTIA NETWORK+ (N10-007)
|
COMPTIA SECURITY+ (SY0-501)
|
COMPTIA A+ 901/902 – APPROVED ONLY FOR THOSE CERTIFIED IN A+ 801/802 AND EARLIER
|
COMPTIA SERVER+ (SK0-004)
|
COMPTIA LINUX+ (LX0-103/LX0-104)
|
COMPTIA CYBERSECURITY ANALYST (CySA+) (CS0-001) |
COMPTIA CLOUD+ (CV0-002) |
COMPTIA PENTEST+ (PT0-001) |
CWNP |
CWTS - CERTIFIED WIRELESS TECHNOLOGY SPECIALIST
|
CWNA - CERTIFIED WIRELESS NETWORK ADMINISTRATOR
|
CWSP - CERTIFIED WIRELESS SECURITY PROFESSIONAL
|
CWDP – CERTIFIED WIRELESS DESIGN PROFESSIONAL
|
CWAP - CERTIFIED WIRELESS ANALYSIS PROFESSIONAL
|
DELL |
Dell SC Series Installation and Configuration
|
Introduction to Dell PS Series Storage Arrays
|
Dell PS Series Storage Admin and Data Protection Tools
|
Integrating vSphere with Dell PS Series Storage
|
Dell SC Storage Center Administration and Management
|
Dell PS Series vSphere Integration
|
Dell Storage Networking Configuration
|
Dell Networking Planning
|
Dell Networking Installation and Configuration
|
Dell Networking Interoperability
|
Dell Networking Fundamentals-Routing
|
Dell Networking Fundamentals - Switching
|
Dell Networking Data Center Advanced Features & Administration
|
Dell Networking Campus Design, Advanced Features and Configuration
|
Dell Networking Fast Track from Cisco to Dell OS 9
|
Dell Campus Networking N-Series Features & Basic Administration
|
Dell Networking Data Center Overview & Basic Administration
|
Dell OpenManage Essentials Administration
|
Optimizing and Managing Dell PowerEdge Blade Server Solutions
|
Optimizing and Managing Dell PowerEdge Server Solutions
|
EC-COUNCIL |
CERTIFIED ETHICAL HACKER (CEH) V9
|
CERTIFIED SECURITY ANALYST (ECSA) V9
|
NETWORK SECURITY ADMINISTRATOR (ENSA)
|
DISASTER RECOVERY PROFESSIONAL (EDRP)
|
LICENSED PENETRATION TESTER (LPT)
|
COMPUTER HACKING FORENSICS INVESTIGATOR (CHFI)
|
CERTIFIED CHIEF INFORMATION SECURITY OFFICER (CCISO)
|
CERTIFIED SECURITY SPECIALIST (ECSS)
|
CERTIFIED INCIDENT HANDLER (ECIH)
|
CERTIFIED ENCRYPTION SPECIALIST (ECES)
|
CERTIFIED VOIP PROFESSIONAL (ECVP)
|
EC-COUNCIL INFORMATION SECURITY MANAGEMENT (EISM) |
CAST 611V3 ADVANCED PENETRATION TESTING |
CAST 616 SECURING WINDOWS INFRASTRUCTURE |
CAST 612 ADVANCED MOBILE FORENSICS AND SECURITY |
CAST 613 HACKING AND HARDENING CORPORATE WEB APP/WEB SITE |
CAST 614 ADVANCED NETWORK DEFENSE |
CERTIFIED NETWORK DEFENDER (CND) |
CERTIFIED NETWORK DEFENSE ARCHITECT (CNDA) |
EMC |
AVAMAR INTEGRATION AND PERFORMANCE MANAGEMENT
|
AVAMAR MANAGEMENT
|
BACKUP RECOVERY SOLUTIONS – AVAMAR TO DATA DOMAIN INTEGRATION
|
BACKUP RECOVERY SOLUTIONS – MICROSOFT EXCHANGE INTEGRATION
|
BACKUP RECOVERY SOLUTIONS – MICROSOFT SHAREPOINT INTEGRATION
|
BACKUP RECOVERY SOLUTIONS – NDMP INTEGRATION
|
BACKUP RECOVERY SOLUTIONS – NETWORKER TO AVAMAR INTEGRATION
|
BACKUP RECOVERY SOLUTIONS – NETWORKER TO DATA DOMAIN INTEGRATION
|
BACKUP RECOVERY SOLUTIONS – ORACLE INTEGRATION
|
BACKUP RECOVERY SOLUTIONS – VMWARE INTEGRATION
|
BUSINESS CONTINUITY SOLUTIONS DESIGNER (BCSD) FOR RECOVERPOINT
|
BUSINESS CONTINUITY SOLUTIONS DESIGNER (BCSD) FOR VPLEX
|
CELERRA NS SERIES INSTALLATION AND MAINTENANCE
|
CELERRA UNIFIED QUICKSTART: BASIC MANAGEMENT OVERVIEW
|
CELERRA UNIFIED QUICKSTART: INSTALLATION AND CONFIGURATION USING CSA
|
CELERRA UNIFIED QUICKSTART: NS-120 HARDWARE OVERVIEW & INSTALLATION
|
CELERRA UNIFIED QUICKSTART: NS-480 HARDWARE OVERVIEW & INSTALLATION
|
CELERRA UNIFIED QUICKSTART: NX4 HARDWARE OVERVIEW & INSTALLATION
|
CELERRA UNIFIED QUICKSTART: PRODUCT INSTALLATION AND CONFIGURATION OVERVIEW
|
CELERRA UNIFIED QUICKSTART: PROVISIONING FOR FCCONNECTED HOSTS
|
CENTERA FUNDAMENTALS
|
CENTERA HARDWARE CONFIGURATIONS
|
CENTERA INSTALLATION AND MAINTENANCE
|
CENTERA TOOLS AND INSTALLATION
|
CENTERA UNIVERSAL ACCESS
|
CENTERA UPGRADES AND MAINTENANCE
|
CLARIION BASIC MANAGEMENT
|
CLARIION CX3 INSTALLATION DIFFERENCES
|
CLARIION FOUNDATIONS
|
CLARIION HARDWARE
|
CLARIION INSTALLATION AND MAINTENANCE
|
CLOUD INFRASTRUCTURE PLANNING AND DESIGN
|
CLOUD SERVICES PLANNING AND DESIGN
|
CONNECTIVITY PROTOCOLS
|
EMC AVAILABILITY INFRASTRUCTURE SOLUTIONS AND DESIGN
|
EMC BACKUP RECOVERY INFRASTRUCTURE SOLUTIONS
|
EMC BACKUP RECOVERY SOLUTIONS DESIGN
|
ISILON FUNDAMENTALS
|
ISILON HARDWARE BASICS AND GUIDELINES
|
ISILON HARDWARE INSTALLATION
|
ISILON HARDWARE MAINTENANCE
|
ISILON INFRASTRUCTURE SOLUTIONS
|
ISILON INITIAL CONFIGURATION
|
ISILON SOLUTION DESIGN
|
NETWORKER INSTALLATION, CONFIGURATION AND ADMINISTRATION
|
RECOVERPOINT FUNDAMENTALS
|
SAN MANAGEMENT
|
VMAX FAMILY INSTALLATION AND MAINTENANCE
|
VMAX1 AND VMAX2 HARDWARE FUNDAMENTALS
|
VMAX3 - UNISPHERE FOR VMAX IMPLEMENTATION AND MANAGEMENT
|
VMAX3 CONFIGURATION MANAGEMENT
|
VMAX3 FUNDAMENTALS
|
VMAX3 HARDWARE FUNDAMENTALS
|
VMAX3 SECURITY CONCEPTS
|
VNX APPLICATION PROTECTION SUITE FUNDAMENTALS
|
VNX BASIC HARDWARE MAINTENANCE
|
VNX HARDWARE FUNDAMENTALS
|
VNX INSTALLATION AND INITIAL CONFIGURATION
|
XTREMIO HARDWARE FUNDAMENTALS
|
ENCASE |
DIGITAL MEDIA – ACQUISITION AND TRIAGE
|
ENCASE V7 FORENSICS AND ENTERPRISE FUNDAMENTALS
|
ENCASE® V7 COMPUTER FORENSICS I
|
INCIDENT INVESTIGATION
|
ENCASE® ENTERPRISE EXAMINATIONS
|
ENCASE® EXAMINATIONS OF THE MACINTOSH OPERATING SYSTEMS
|
HOST INTRUSION METHODOLOGY AND INVESTIGATION
|
ENCASE® CYBERSECURITY AND ANALYTICS V5
|
ENCASE® EXAMINATION OF NTFS
|
ENCASE® ADVANCED INTERNET EXAMINATIONS
|
ENCASE® ADVANCED COMPUTER FORENSICS
|
GOOGLE |
GOOGLE CLOUD PLATFORM FUNDAMENTALS: CORE INFRASTRUCTURE
|
ARCHITECTING WITH GOOGLE CLOUD PLATFORM: INFRASTRUCTURE
|
GOOGLE CLOUD PLATFORM FOR SYSTEMS OPERATIONS PROFESSIONALS
|
GOOGLE CLOUD FUNDAMENTALS: BIG DATA & MACHINE LEARNING
|
DATA ENGINEERING ON GOOGLE CLOUD PLATFORM
|
G SUITE ADMINISTRATOR FUNDAMENTALS
|
GOOGLE CLOUD PLATFORM FUNDAMENTALS FOR AWS PROFESSIONALS
|
HP |
DESIGNING HP DATA CENTER AND CLOUD SOLUTIONS, REV. 15.11
|
DESIGNING HPE DATA CENTER AND CLOUD SOLUTIONS, REV. 16.11
|
DELTA - DESIGNING HPE DATA CENTER AND CLOUD SOLUTIONS, REV. 16.11
|
CREATING HPE SOFTWARE-DEFINED NETWORKS, REV. 15.41
|
BUILDING HP FLEXFABRIC DATA CENTERS, REV. 14.41
|
ARCHITECTING HP FLEXNETWORK SOLUTIONS, REV 14.21
|
DEPLOYING HP FLEXNETWORK CORE TECHNOLOGIES, REV 14.31
|
HP-UX SECURITY I
|
HP INTEGRITY VIRTUAL MACHINES V4.3 ADMINISTRATION
|
HP-UX LOGICAL VOLUME MANAGER
|
HP INTEGRITY VM V6 AND HP-UX VPARS V6 ADMINISTRATION
|
HP-UX PERFORMANCE AND TUNING
|
HP SERVICEGUARD I
|
HP SYSTEMS INSIGHT MANAGER
|
HPE ARCSIGHT MASTER ASE PREPARATION COURSE
|
ARCSIGHT ESM 6.5 ADVANCED ADMINISTRATOR
|
ARCSIGHT ESM 6.5 ADVANCED ANALYST
|
ARCSIGHT LOGGER - 6.0 ADMINISTRATION AND OPERATIONS
|
DYNAMIC APPLICATION TESTING WITH HP WEBINSPECT 10.3
|
HP FORTIFY STATIC CODE ANALYZER / SOFTWARE SECURITY CENTER 4.2
|
HP/ARUBA |
MOBILE FIRST NETWORK DESIGN
|
AIRWAVE WIRELESS MANAGEMENT SUITE INSTALLATION, CONFIGURATION AND USE (AICU) 8.2
|
ADVANCED TROUBLESHOOTING (ATS)
|
IMPLEMENTING ARUBA WLAN (IAW) 8
|
IMPLEMENTING ARUBA WLAN (IAW) 6.4
|
ARUBA MOBILITY BOOT CAMP 6.4
|
CLEARPASS ESSENTIALS (CPE) 6.5
|
SCALABLE WLAN DESIGN AND IMPLEMENTATION (SWDI) 6.4
|
IBM |
SOFTLAYER FUNDAMENTALS
|
IBM SECURITY QRADAR SIEM 7.2 ADMINISTRATION AND CONFIGURATION
|
IBM SECURITY QRADAR SIEM FOUNDATIONS
|
IBM SECURITY DIRECTORY SERVER 6.3.1 SYSTEM ADMINISTRATION
|
IBM SECURITY IDENTITY MANAGER 6.0 BASIC ADMINISTRATION
|
IBM SECURITY QRADAR INCIDENT FORENSICS CONFIGURATION AND USAGE
|
WEB APPLICATION SECURITY FUNDAMENTALS
|
IBM SECURITY ACCESS MANAGER FOR ENTERPRISE SINGLE SIGN-ON 8.2.1 ADMINISTRATION
|
IBM SECURITY ACCESS MANAGER FOR MOBILE 8.0
|
IBM SECURITY ACCESS MANAGER FOR WEB
|
IBM SECURITY PRIVILEGED IDENTITY MANAGER FUNDAMENTALS
|
IBM ENDPOINT MANAGER 9.2 SECURITY AND COMPLIANCE FUNDAMENTALS
|
IBM SECURITY QRADAR ADVANCED TOPICS
|
IBM SECURITY APPSCAN STANDARD FUNDAMENTALS
|
LINUX BASIC AND INSTALLATION
|
INTRODUCTION TO IBM I FOR NEW USERS
|
LINUX SYSTEM ADMINISTRATION I: IMPLEMENTATION
|
LINUX ON POWER PERFORMANCE
|
ISACA |
COBIT 5 ASSESSOR FOR SECURITY
|
CISM EXAM REVIEW
|
CRISC EXAM REVIEW
|
CYBERSECURITY FUNDAMENTALS
|
CSX PRACTITIONER: IDENTIFICATION AND PROTECTION
|
CSX PRACTITIONER: RESPOND AND RECOVER
|
CSX PRACTITIONER BOOT CAMP
|
CSX PRACTITIONER: DETECTION
|
CISA EXAM REVIEW
|
ISC(2) |
(ISC)2TRAINING FOR CCFP
|
(ISC)2TRAINING FOR CISSP
|
(ISC)2TRAINING FOR HCISPP
|
(ISC)2TRAINING FOR CISSP-ISSAP
|
(ISC)2TRAINING FOR SSCP
|
JUNIPER |
ADVANCED DATA CENTER SWITCHING (ADCX)
|
JUNIPER NETWORKS DESIGN FUNDAMENTALS (JNDF)
|
ADVANCED JUNIPER NETWORKS VPN IMPLEMENTATIONS (AJVI)
|
ADVANCED JUNOS ENTERPRISE ROUTING (AJER)
|
ADVANCED JUNOS ENTERPRISE ROUTING TROUBLESHOOTING (AJERT)
|
ADVANCED JUNOS ENTERPRISE SECURITY TROUBLESHOOTING (AJEST)
|
ADVANCED JUNOS ENTERPRISE SWITCHING (AJEX)
|
ADVANCED JUNOS SECURITY (AJSEC)
|
ADVANCED JUNOS SERVICE PROVIDER ROUTING (AJSPR)
|
ADVANCED JUNOS ENTERPRISE SWITCHING USING ENHANCED LAYER 2 SOFTWARE (AJEX-ELS)
|
ADVANCED JUNOS SERVICE PROVIDER TROUBLESHOOTING (AJSPT)
|
ATTACK PREVENTION WITH JUNIPER NETWORKS FIREWALLS (APJF)
|
INTEGRATING JUNIPER NETWORKS FIREWALL/IPSEC VPN PRODUCTS INTO HIGH-PERFORMANCE NETWORKS (IFVH)
|
JUNOS ENTERPRISE SWITCHING (JEX)
|
JUNOS ENTERPRISE SWITCHING USING ELS (JEX-ELS)
|
JUNOS INTERMEDIATE ROUTING (JIR)
|
JUNOS MULTICAST ROUTING (JMR)
|
JUNIPER NETWORKS DESIGN-WAN (JND-WAN)
|
CONFIGURING JUNIPER NETWORKS FIREWALL/IPSEC VPN PRODUCTS (CJFV)
|
JUNOS EDGE SECURITY SERVICES (JESS)
|
JUNOS SECURITY (JSEC)
|
NETWORK AUTOMATION USING CONTRAIL CLOUD (NACC)
|
JUNOS SERVICE PROVIDER SWITCHING (JSPX)
|
NETWORKING FUNDAMENTALS
|
WLAN FUNDAMENTALS
|
JNCIE ENTERPRISE BOOTCAMP (JNCIE-ENT) |
INTRODUCTION TO THE JUNOS OPERATING SYSTEM (IJOS) |
JUNOS CLASS OF SERVICE (JCOS) |
JNCIE SERVICE PROVIDER BOOTCAMP (JNCIE-SP) |
CONFIGURING STEEL-BELTED RADIUS CARRIER (CSBR) |
JUNIPER NETWORKS DESIGN - DATA CENTER (JND-DC) |
JUNIPER NETWORKS DESIGN-SECURITY (JND-SEC) |
JUNOS SPACE-SECURITY DIRECTOR (JS-SD) |
IMPLEMENTING JUNIPER NETWORKS SECURE ANALYTICS (IJSA) |
NETWORK AUTOMATION IN THE WAN (NA-WAN) |
JUNOS EDGE SECURITY SERVICES (JESS) |
JNCIE SECURITY BOOTCAMP (JNCIE-SEC) |
JUNOS LAYER 3 VPNS (JL3V) |
JUNOS LAYER 2 VPNS (JL2V) |
JUNOS MPLS FUNDAMENTALS (JMF) |
JUNOS TROUBLESHOOTING IN THE NOC (JTNOC) |
JUNOS SUBSCRIBER MANAGEMENT (JSM) |
JUNOS AUTOMATION (JAUT) |
LINUX |
LINUX SECURITY
|
LINUX SYSTEM ADMINISTRATION
|
MASTERING THE LINUX COMMAND LINE
|
INTRODUCTION TO VMWARE ESXI
|
SOFTWARE DEFINED NETWORKING WITH OPENDAYLIGHT
|
ADVANCED LINUX SYSTEM ADMINISTRATION AND NETWORKING
|
ESSENTIALS OF SYSTEM ADMINISTRATION
|
PENETRATION TESTING WITH LINUX TOOLS
|
LINUX IN THE REAL WORLD
|
CENTOS SYSTEM ADMINISTRATOR PREP
|
LINUX ESSENTIALS
|
PUPPET FUNDAMENTALS
|
COMPLIANCE BASICS FOR DEVELOPERS
|
SOFTWARE DEFINED NETWORKING WITH OPENDAYLIGHT
|
OPEN SOURCE VIRTUALIZATION
|
LINUX ENTERPRISE AUTOMATION
|
ESSENTIALS OF OPENSTACK ADMINISTRATION
|
LINUX SECURITY
|
HIGH AVAILABILITY LINUX ARCHITECTURE
|
LINUX PERFORMANCE TUNING
|
LINUX SYSTEM ADMINISTRATION
|
ADVANCED LINUX SYSTEM ADMINISTRATION AND NETWORKING
|
INTRODUCTION TO LINUX, OPEN SOURCE DEVELOPMENT, AND GIT
|
INSIDE ANDROID: AN INTRO TO ANDROID INTERNALS
|
OPTIMIZING LINUX DEVICE DRIVERS FOR POWER EFFICIENCY
|
LINUX KERNEL DEBUGGING AND SECURITY
|
INTRODUCTION TO LINUX
|
INTRODUCTION TO CLOUD INFRASTRUCTURE TECHNOLOGIES
|
LINUX NETWORKING AND ADMINISTRATION
|
LINUX SECURITY FUNDAMENTALS
|
OPENSTACK ADMINISTRATION FUNDAMENTALS
|
SOFTWARE DEFINED NETWORKING FUNDAMENTALS
|
FUNDAMENTALS OF LINUX
|
MCAFEE |
MCAFEE ENDPOINT SECURITY 10.X ADMINISTRATION
|
MCAFEE ENDPOINT SECURITY UPGRADE
|
MCAFEE ADVANCED THREAT DETECTION ADMINISTRATION
|
MCAFEE VIRUSSCAN AND EPOLICY ORCHESTRATOR ADMINISTRATION
|
MCAFEE NETWORK SECURITY PLATFORM ADMINISTRATION
|
MCAFEE HOST INTRUSION PREVENTION SYSTEM ADMINISTRATION
|
MCAFEE DATA LOSS PREVENTION ENDPOINT ADMINISTRATION
|
SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM) ADMINISTRATION
|
MICROSOFT |
INSTALLING AND CONFIGURING WINDOWS 10
|
DEPLOYING AND MANAGING WINDOWS 10 USING ENTERPRISE SERVICES
|
INSTALLING AND CONFIGURING WINDOWS® 7 CLIENT
|
TROUBLESHOOTING AND SUPPORTING WINDOWS® 7 IN THE ENTERPRISE
|
PLANNING AND MANAGING WINDOWS® 7 DESKTOP DEPLOYMENTS AND ENVIRONMENTS
|
DEPLOYING WINDOWS DESKTOPS AND ENTERPRISE APPLICATIONS
|
SUPPORTING AND TROUBLESHOOTING WINDOWS 10
|
NETWORKING FUNDAMENTALS
|
SECURITY FUNDAMENTALS
|
CONFIGURING WINDOWS® 8.1
|
SUPPORTING WINDOWS® 8.1
|
WINDOWS SERVER ADMINISTRATION FUNDAMENTALS
|
INSTALLATION, STORAGE, AND COMPUTE WITH WINDOWS SERVER 2016
|
NETWORKING WITH WINDOWS SERVER 2016
|
IDENTITY WITH WINDOWS SERVER 2016
|
INSTALLING AND CONFIGURING WINDOWS SERVER 2012
|
ADMINISTERING WINDOWS SERVER 2012
|
CONFIGURING ADVANCED WINDOWS SERVER 2012 SERVICES
|
DESIGNING AND IMPLEMENTING A SERVER INFRASTRUCTURE
|
IMPLEMENTING AN ADVANCED SERVER INFRASTRUCTURE
|
CORE SOLUTIONS OF MICROSOFT EXCHANGE SERVER 2013
|
ADVANCED SOLUTIONS OF MICROSOFT EXCHANGE SERVER 2013
|
DEPLOYING ENTERPRISE VOICE WITH SKYPE FOR BUSINESS 2015
|
ADMINISTERING MICROSOFT EXCHANGE SERVER 2016
|
CORE SOLUTIONS OF SKYPE FOR BUSINESS 2015
|
DESIGNING AND DEPLOYING MICROSOFT EXCHANGE SERVER 2016
|
SERVER VIRTUALIZATION WITH WINDOWS SERVER HYPER-V AND SYSTEM CENTER
|
ADMINISTERING SYSTEM CENTER CONFIGURATION MANAGER AND INTUNE
|
MONITORING AND OPERATING A PRIVATE CLOUD
|
CONFIGURING AND DEPLOYING A PRIVATE CLOUD
|
ENABLING AND MANAGING OFFICE 365
|
ADMINISTERING A SQL DATABASE INFRASTRUCTURE
|
DEVELOPING MICROSOFT AZURE SOLUTIONS
|
IMPLEMENTING MICROSOFT AZURE INFRASTRUCTURE SOLUTIONS
|
SECURING WINDOWS SERVER 2016
|
DESIGNING AND IMPLEMENTING CLOUD DATA PLATFORM SOLUTIONS
|
DEPLOYING VOICE WORKLOADS FOR SKYPE FOR BUSINESS ONLINE AND SERVER 2015
|
DESIGNING A DATA SOLUTION WITH MICROSOFT SQL SERVER
|
VIRTUALIZING ENTERPRISE DESKTOPS AND APPS
|
WINDOWS SERVER 2012: TECHNICAL OVERVIEW
|
WINDOWS 10 FEATURES FOR A MOBILE WORKFORCE
|
WINDOWS SERVER 2012 TRAINING: NETWORKING
|
WINDOWS SERVER 2012: IDENTITY AND ACCESS
|
WINDOWS SERVER 2012: STORAGE
|
DEVELOPING MICROSOFT SQL SERVER DATABASES
|
DESIGNING DATABASE SOLUTIONS FOR SQL SERVER
|
NOVELL |
SERVICE DESK: SERVICE MANAGEMENT (COURSE 8522)
|
SECURING WINDOWS WORKSTATIONS USING ZENWORKS ENDPOINT SECURITY MANAGEMENT 11.X (COURSE 8520)
|
OFFENSIVE SECURITY |
PENETRATION TESTINGWITH KALI LINUX
|
ADVANCED WINDOWS EXPLOITATION
|
OFFENSIVE SECURITY WIRELESS ATTACKS (WIFU)
|
CRACKING THE PERIMETER (CTP)
|
ADVANCED WEB ATTACKS AND EXPLOITATION
|
METASPLOIT UNLEASHED
|
OFFENSIVE SECURITY PENETRATIONTESTING LAB
|
ORACLE |
ORACLE 12C SECURITY ADMINISTRATION
|
ORACLE DATABASE 12C: MANAGING SECURITY
|
USER SECURITY AND AUDITING IN ORACLE DATABASE 12C
|
ORACLE DATABASE 11G: INTRODUCTION TO DATABASE SECURITY AND SOLUTIONS
|
ORACLE DATABASE 11G: DATABASE SECURITY
|
ORACLE DATABASE 11G: BASIC USER AND STRONG AUTHENTICATION
|
ORACLE DATABASE 11G: ENTERPRISE USER SECURITY AND PROXY AUTHENTICATION
|
ORACLE DATABASE 11G: PRIVILEGES, ROLES, AND APPLICATION CONTEXTS
|
ORACLE DATABASE 11G: ORACLE NET SERVICES AND LISTENER SECURITY
|
ORACLE DATABASE 11G: FIREWALLS, ORACLE CONNECTION MANAGER, AND SQL*PLUS SECURITY
|
ORACLE DATABASE 11G RELEASE 2: ORACLE PARTITIONING AND SECURITY FEATURES
|
ORACLE DATABASE 11G RELEASE 2: STORAGE STRUCTURES AND USER SECURITY
|
PALO ALTO |
FIREWALL ESSENTIALS 8.0: CONFIGURATION AND MANAGEMENT (EDU-210) |
PANORAMA 8.0: MANAGE MULTIPLE FIREWALLS (EDU-221) |
FIREWALL 8.0: DEBUG AND TROUBLESHOOT (EDU-311) |
FIREWALL 7.1: INSTALL, CONFIGURE, AND MANAGE (EDU-201) |
FIREWALL 7.1: CONFIGURE EXTENDED FEATURES (EDU-205) |
PANORAMA 7.1: MANAGE MULTIPLE FIREWALLS (EDU-221) |
FIREWALL 7.1: MANAGE CYBERTHREATS (EDU-231) |
FIREWALL 7.1: DEBUG AND TROUBLESHOOT (EDU-311) |
TRAPS 3.4: DEPLOY AND OPTIMIZE (EDU-285) |
TRAPS 3.4: INSTALL, CONFIGURE AND MANAGE (EDU-281) |
FIREWALL ESSENTIALS 8.0: CONFIGURATION AND MANAGEMENT (EDU-110) |
RED HAT |
RED HAT SERVER HARDENING (RH413)
|
RED HAT ENTERPRISE LINUX DIAGNOSTICS AND TROUBLESHOOTING (RH342)
|
RED HAT SYSTEM ADMINISTRATION I (RH124)
|
RED HAT SYSTEM ADMINISTRATION II (RH134)
|
RHCSA RAPID TRACK COURSE (RH199)
|
RED HAT OPENSTACK ADMINISTRATION I (CL110)
|
RED HAT OPENSTACK ADMINISTRATION II (CL210)
|
RED HAT SYSTEM ADMINISTRATION III (RH254)
|
RHCE CERTIFICATION LAB
|
RED HAT OPENSTACK SYSTEM ADMINISTRATION III (CL310)
|
RED HAT CLOUDFORMS HYBRID CLOUD MANAGEMENT (CL220)
|
OPENSHIFT ENTERPRISE ADMINISTRATION (DO280)
|
RED HAT GLUSTER STORAGE ADMINISTRATION (RH236)
|
RED HAT VIRTUALIZATION ADMINISTRATION (RH318)
|
RED HAT JBOSS IN DATA VIRTUALIZATION ADMINISTRATION (JB450)
|
JBOSS ENTERPRISE APPLICATION DEVELOPMENT (JB225)
|
RED HAT ENTERPRISE DEPLOYMENT AND SYSTEMS MANAGEMENT (RH401)
|
RED HAT SATELLITE 6 ADMINISTRATION (RH403)
|
RED HAT ENTERPRISE LINUX DIAGNOSTICS AND TROUBLESHOOTING
|
RED HAT SERVER HARDENING
|
RED HAT ENTERPRISE PERFORMANCE TUNING (RH442)
|
RED HAT HIGH AVAILABILITY CLUSTERING (RH436)
|
CONTAINERIZING SOFTWARE APPLICATIONS
|
JBOSS APPLICATION ADMINISTRATION I (JB248)
|
RED HAT SECURITY: Linux in Physical, Virtual, and Cloud (RH415)
|
RIVERBED |
WAN200 OPTIMIZATION ESSENTIALS
|
HCB200 HYPER-CONVERGED BRANCH ESSENTIALS
|
NPM200 PERFORMANCE MONITORING ESSENTIALS
|
APPRESPONSE
|
TRANSACTION ANALYZER
|
RIVERBED APM200 APPLICATION PERFORMANCE MONITORING ESSENTIALS
|
RIVERBED RCPE-APPV APPLICATION VISIBILITY
|
NOS200 NETWORK PLANNING AND CONFIGURATION MANAGEMENT
|
WAN310 OPTIMIZING ENTERPRISE APPLICATIONS AND PROTOCOLS
|
WAN350 IMPLEMENTING ENTERPRISE OPTIMIZATION ARCHITECTURES
|
SABSA |
SABSA FOUNDATION MODULES (F1 & F2)
|
MODULE A1 – ADVANCED SABSA RISK ASSURANCE & GOVERNANCE
|
MODULE A3 – ADVANCED SABSA ARCHITECTURE & DESIGN
|
SANS |
NETWARS - TOURNAMENT
|
NETWARS: CONTINUOUS
|
AUD507: AUDITING & MONITORING NETWORKS, PERIMETERS & SYSTEMS
|
AUD566: IMPLEMENTING AND AUDITING THE CRITICAL SECURITY CONTROLS - IN-DEPTH
|
AUD440: CRITICAL SECURITY CONTROLS: PLANNING, IMPLEMENTING AND AUDITING
|
AUD480: TOP 4 MITIGATION STRATEGIES: IMPLEMENTING & AUDITING
|
FOR408: WINDOWS FORENSIC ANALYSIS
|
FOR508: ADVANCED COMPUTER FORENSIC ANALYSIS AND INCIDENT RESPONSE
|
FOR518: MAC FORENSIC ANALYSIS
|
FOR578: CYBER THREAT INTELLIGENCE
|
FOR526: MEMORY FORENSICS IN-DEPTH
|
FOR572: ADVANCED NETWORK FORENSICS AND ANALYSIS
|
FOR585: ADVANCED SMARTPHONE AND MOBILE DEVICE FORENSICS
|
FOR610: REVERSE-ENGINEERING MALWARE: MALWARE ANALYSIS TOOLS AND TECHNIQUES
|
ICS515: ICS ACTIVE DEFENSE AND INCIDENT RESPONSE
|
ICS410: ICS/SCADA SECURITY ESSENTIALS
|
ICS456: ESSENTIALS FOR NERC CRITICAL INFRASTRUCTURE PROTECTION
|
MGT414: SANS +S TRAINING PROGRAM FOR THE CISSP® CERTIFICATION EXAM
|
MGT415: A PRACTICAL INTRODUCTION TO RISK ASSESSMENT
|
MGT433: SECURING THE HUMAN: HOW TO BUILD, MAINTAIN AND MEASURE A HIGH-IMPACT AWARENESS PROGRAM
|
MGT512: SANS SECURITY LEADERSHIP ESSENTIALS FOR MANAGERS WITH KNOWLEDGE COMPRESSION
|
MGT514: IT SECURITY STRATEGIC PLANNING, POLICY AND LEADERSHIP
|
MGT535: INCIDENT RESPONSE TEAM MANAGEMENT
|
LEG523: LAW OF DATA SECURITY AND INVESTIGATIONS
|
SEC301: INTRO TO INFORMATION SECURITY
|
SEC401: SECURITY ESSENTIALS BOOTCAMP STYLE
|
SEC440: CRITICAL SECURITY CONTROLS: PLANNING, IMPLEMENTING AND AUDITING
|
SEC480: TOP 4 MITIGATION STRATEGIES: IMPLEMENTING & AUDITING
|
SEC501: ADVANCED SECURITY ESSENTIALS - ENTERPRISE DEFENDER
|
SEC502: PERIMETER PROTECTION IN-DEPTH
|
SEC503: INTRUSION DETECTION IN-DEPTH
|
SEC504: HACKER TOOLS, TECHNIQUES, EXPLOITS AND INCIDENT HANDLING
|
SEC505: SECURING WINDOWS WITH THE CRITICAL SECURITY CONTROLS
|
SEC506: SECURING LINUX/UNIX
|
SEC511: CONTINUOUS MONITORING AND SECURITY OPERATIONS
|
SEC524: CLOUD SECURITY FUNDAMENTALS
|
SEC542: WEB APP PENETRATION TESTING AND ETHICAL HACKING
|
SEC546: IPV6 ESSENTIALS
|
SEC550: ACTIVE DEFENSE, OFFENSIVE COUNTERMEASURES AND CYBER DECEPTION
|
SEC560: NETWORK PENETRATION TESTING AND ETHICAL HACKING
|
SEC561: INTENSE HANDS-ON PEN TESTING SKILL DEVELOPMENT (WITH SANS NETWARS)
|
SEC562: CYBERCITY HANDS-ON KINETIC CYBER RANGE EXERCISE
|
SEC566: IMPLEMENTING AND AUDITING THE CRITICAL SECURITY CONTROLS - IN-DEPTH
|
SEC573: PYTHON FOR PENETRATION TESTERS
|
SEC575: MOBILE DEVICE SECURITY AND ETHICAL HACKING
|
SEC579: VIRTUALIZATION AND PRIVATE CLOUD SECURITY
|
SEC580: METASPLOIT KUNG FU FOR ENTERPRISE PEN TESTING
|
SEC617: WIRELESS ETHICAL HACKING, PENETRATION TESTING, AND DEFENSES
|
SEC642: ADVANCED WEB APP PENETRATION TESTING AND ETHICAL HACKING
|
SEC660: ADVANCED PENETRATION TESTING, EXPLOIT WRITING, AND ETHICAL HACKING
|
SEC760: ADVANCED EXPLOIT DEVELOPMENT FOR PENETRATION TESTERS
|
SYMANTEC |
ADMINISTRATION OF SYMANTEC MESSAGING GATEWAY 10.5
|
ADMINISTRATION OF SYMANTEC CONTROL COMPLIANCE SUITE 11.X
|
ADMINISTRATION OF SYMANTEC VIP (MARCH 2017)
|
ADMINISTRATION OF SYMANTEC IT MANAGEMENT SUITE 8.0
|
ADMINISTRATION OF DATA LOSS PREVENTION 14.5
|
ADMINISTRATION OF SYMANTEC CYBER SECURITY SERVICES (MAY 2016)
|
ADMINISTRATION OF SYMANTEC ADVANCED THREAT PROTECTION 2.0.2
|
ADMINISTRATION OF SYMANTEC ENDPOINT PROTECTION 14
|
ADMINISTRATION OF SYMANTEC DATA CENTER SECURITY - SERVER ADVANCED 6.7
|
SYMANTEC MESSAGING GATEWAY 10.0 – ADMINISTRATION
|
SYMANTEC MESSAGING GATEWAY 10.5 ADMINISTRATION: WHAT’S NEW IN 10.5
|
SYMANTEC CONTROL COMPLIANCE SUITE 11.0: ADMINISTRATION - MUST COMPLETE ALL MODULES FOR CEUS
|
SYMANTEC CONTROL COMPLIANCE SUITE 11.0: DIFFERENCES
|
VALIDATION AND ID PROTECTION (VIP) SERVICE R1
|
IT MANAGEMENT SUITE 8.0 FUNDAMENTALS
|
IT MANAGEMENT SUITE 8.0 MODULES
|
CLIENT MANAGEMENT SUITE 7.6 ADMINISTRATION
|
CLIENT MANAGEMENT SUITE 7.6 IMPLEMENTER
|
ASSET MANAGEMENT SUITE 7.5 ADMINISTRATION
|
DATA LOSS PREVENTION 14.5: ADMINISTRATION – MUST COMPLETE ALL MODULES FOR CEUS
|
DATA LOSS PREVENTION 14.5: DIFFERENCES
|
CSS ADMIN R1 – MUST COMPLETE ALL MODULES FOR CEUS
|
SYMANTEC DATA CENTER SECURITY – SERVER ADVANCED 6.7 ADMINISTRATION – MUST COMPLETE ALL MODULES FOR CEUS
|
ADVANCED THREAT PROTECTION 2.X: INCIDENT RESPONSE – MUST COMPLETE ALL MODULES FOR CEUS
|
SYMANTEC ENDPOINT PROTECTION 12.1.X ADMINISTRATION
|
SYMANTEC ENDPOINT PROTECTION 12.1 MAINTAIN AND TROUBLESHOOT
|
EMAIL SECURITY SERVICES AND WEB SECURITY SERVICE: ADMINISTRATION
|
ENDPOINT PROTECTION 14: CONFIGURE AND PROTECT
|
ENDPOINT PROTECTION 14: DIFFERENCES
|
ENDPOINT PROTECTION 14: MIGRATION AND UPGRADES
|
VMWARE |
VMWARE HORIZON 7: INSTALL, CONFIGURE, MANAGE [V7]
|
VMWARE HORIZON 7: TROUBLESHOOTING AND PERFORMANCE OPTIMIZATION [V7]
|
DATA CENTER VIRTUALIZATION FUNDAMENTALS [V6]
|
VSPHERE: OPTIMIZE AND SCALE [V6]
|
VMWARE VSPHERE: BOOTCAMP [V6]
|
VMWARE VSPHERE: DESIGN AND DEPLOY FAST TRACK [V6]
|
VMWARE VSPHERE: INSTALL, CONFIGURE AND MANAGE PLUS OPTIMIZE AND SCALE FAST TRACK [V6.0]
|
VCLOUD AIR FUNDAMENTALS
|
HORIZON: DESIGN AND DEPLOY [V6]
|
VMWARE NETWORK VIRTUALIZATION FUNDAMENTALS 2016
|
VMWARE NSX: INSTALL, CONFIGURE, MANAGE [V6.2]
|
VMWARE NSX FOR INTERNETWORKING EXPERTS FAST TRACK [V6.2]
|
VMWARE NSX FOR INTERNETWORKING EXPERTS FAST TRACK [V6.1]
|
VMWARE NSX TROUBLESHOOTING & OPERATIONS [V6.2]
|
VMWARE NSX: INSTALL, CONFIGURE, MANAGE PLUS TROUBLESHOOTING & OPERATIONS FAST TRACK [V6.2]
|
VMWARE NSX: DESIGN & DEPLOY [V6.2]
|
SECURITY OPERATIONS FOR THE SOFTWARE DEFINED DATA CENTER
|
VCLOUD: DESIGN BEST PRACTICES [V1.5]
|
VIEW: DESIGN BEST PRACTICES [V5.X]
|
VSPHERE: INSTALL, CONFIGURE, MANAGE [V5.5]
|
VSPHERE: FAST TRACK [V5.5]
|
VSPHERE: OPTIMIZE & SCALE [V5.5]
|
VMWARE VSPHERE: TROUBLESHOOTING WORKSHOP [V5.5]
|
VSPHERE WITH OPERATIONS MANAGEMENT: FAST TRACK [V5.1]
|