CHECK
POINT
|
CHECK POINT CERTIFIED SECURITY ADMINISTRATOR
(CCSA) R77.30
|
SECURITY ENGINEERING (CHECK POINT CERTIFIED
SECURITY EXPERT (CCSE) R77.30)
|
THREAT PREVENTION
|
SECURE WEB GATEWAY
|
MDSM WITH VSX (MULTI-DOMAIN SECURITY
MANAGEMENT WITH VIRTUAL SYSTEM EXTENSION)
|
CHECK POINT CERTIFIED SECURITY MASTER (CCSM)
R77.30
|
CHECK POINT CERTIFIED SECURITY ADMINISTRATOR (CCSA) R80
|
CHECK POINT MANAGED SECURITY EXPERT (CCMSE)
|
Cloud Security Alliance
|
CCSK FOUNDATION
|
CCSK PLUS
|
CWNP
|
CWSP - CERTIFIED WIRELESS SECURITY PROFESSIONAL
|
EC-COUNCIL
|
DISASTER RECOVERY PROFESSIONAL (EDRP)
|
LICENSED PENETRATION TESTER (LPT)
|
CERTIFIED CHIEF INFORMATION SECURITY
OFFICER (CCISO)
|
EC-COUNCIL INFORMATION SECURITY MANAGEMENT (EISM) |
ENCASE
|
ENCASE V7 FORENSICS AND ENTERPRISE
FUNDAMENTALS
|
ENCASE® V7 COMPUTER FORENSICS I
|
INCIDENT INVESTIGATION
|
ENCASE® CYBERSECURITY AND ANALYTICS V5
|
ENCASE® ADVANCED COMPUTER FORENSICS
|
HOST INTRUSION METHODOLOGY AND
INVESTIGATION
|
HP
|
HPE ArcSight Master ASE Preparation Course
|
ArcSight ESM 6.5 Advanced Administrator
|
ArcSight ESM 6.5 Advanced Analyst
|
ArcSight Logger - 6.0 Administration and Operations
|
Dynamic Application Testing with HP WebInspect 10.3
|
HP Fortify Static Code Analyzer / Software Security Center 4.2
|
IBM
|
IBM Security QRadar SIEM 7.2 Administration and Configuration
|
IBM Security QRadar SIEM Foundations
|
IBM Security QRadar Incident Forensics Configuration and Usage
|
Web Application Security Fundamentals
|
IBM Security Access Manager for Enterprise Single Sign-On 8.2.1 Administration
|
IBM Security Access Manager for Mobile 8.0
|
IBM Security Access Manager for Web
|
IBM Security Privileged Identity Manager Fundamentals
|
IBM Endpoint Manager 9.2 Security and Compliance Fundamentals
|
IBM Security QRadar Advanced Topics
|
IBM Security AppScan Standard Fundamentals
|
ISACA
|
CISM EXAM REVIEW
|
CRISC EXAM REVIEW
|
CISA EXAM REVIEW
|
CGEIT Exam Review
|
ISC(2)
|
(ISC)2 TRAINING FOR CAP
|
(ISC)2 TRAINING FOR CISSP
|
(ISC)2 TRAINING FOR SSCP
|
(ISC)2 TRAINING FOR
CISSP-ISSAP
|
(ISC)2 TRAINING FOR HCISPP
|
(ISC)2 TRAINING
FOR CISSP-ISSEP
|
(ISC)2 TRAINING FOR CCSP
|
LINUX
|
Linux Kernel Debugging and Security
|
Linux Security Fundamentals |
Penetration Testing with Linux Tools |
Oracle |
Oracle 12c Security Administration |
ORACLE DATABASE 12C: MANAGING SECURITY
|
USER SECURITY AND AUDITING IN ORACLE DATABASE 12C
|
ORACLE DATABASE 11G: DATABASE SECURITY
|
ORACLE DATABASE 11G: BASIC USER AND STRONG AUTHENTICATION
|
ORACLE DATABASE 11G: ENTERPRISE USER SECURITY AND PROXY AUTHENTICATION
|
ORACLE DATABASE 11G: PRIVILEGES, ROLES, AND APPLICATION CONTEXTS
|
ORACLE DATABASE 11G: ORACLE NET SERVICES AND LISTENER SECURITY
|
ORACLE DATABASE 11G: FIREWALLS, ORACLE CONNECTION MANAGER, AND SQL*PLUS SECURITY
|
ORACLE DATABASE 11G RELEASE 2: STORAGE STRUCTURES AND USER SECURITY
|
SABSA
|
MODULE A1 – ADVANCED SABSA RISK ASSURANCE & GOVERNANCE
|
MODULE A3 – ADVANCED SABSA ARCHITECTURE & DESIGN
|
SANS
|
FOR578: CYBER THREAT INTELLIGENCE
|
ICS410: ICS/SCADA SECURITY ESSENTIALS
|
ICS515: ICS ACTIVE DEFENSE AND
INCIDENT RESPONSE
|
ICS456: ESSENTIALS FOR NERC CRITICAL INFRASTRUCTURE PROTECTION
|
MGT305: TECHNICAL COMMUNICATION AND
PRESENTATION SKILLS FOR SECURITY PROFESSIONALS
|
MGT405: CRITICAL INFRASTRUCTURE
PROTECTION
|
MGT414: SANS +S TRAINING PROGRAM FOR
THE CISSP® CERTIFICATION EXAM
|
MGT415: A PRACTICAL INTRODUCTION TO
RISK ASSESSMENT
|
MGT433: SECURING THE HUMAN: HOW TO
BUILD, MAINTAIN AND MEASURE A HIGH-IMPACT AWARENESS PROGRAM
|
MGT512: SANS SECURITY LEADERSHIP
ESSENTIALS FOR MANAGERS WITH KNOWLEDGE COMPRESSION
|
MGT514: IT SECURITY STRATEGIC
PLANNING, POLICY AND LEADERSHIP
|
MGT525: IT PROJECT MANAGEMENT,
EFFECTIVE COMMUNICATION, AND PMP® EXAM PREP
|
MGT535: INCIDENT RESPONSE TEAM
MANAGEMENT
|
SEC440: CRITICAL SECURITY CONTROLS:
PLANNING, IMPLEMENTING AND AUDITING
|
SEC480: TOP 4 MITIGATION STRATEGIES:
IMPLEMENTING & AUDITING
|
SEC501: ADVANCED SECURITY ESSENTIALS -
ENTERPRISE DEFENDER
|
SEC504: HACKER TOOLS, TECHNIQUES,
EXPLOITS AND INCIDENT HANDLING
|
SEC546: IPV6 ESSENTIALS
|
SEC550: ACTIVE DEFENSE, OFFENSIVE
COUNTERMEASURES AND CYBER DECEPTION
|
SEC566: IMPLEMENTING AND AUDITING THE
CRITICAL SECURITY CONTROLS - IN-DEPTH
|