CHECK
POINT
|
CHECK POINT CERTIFIED SECURITY MASTER (CCSM) R77.30
|
CHECK POINT MANAGED SECURITY EXPERT (CCMSE)
|
CISCO
|
IMPLEMENTING CISCO SECURE ACCESS CONTROL SYSTEM V5.2
|
IMPLEMENTING CISCO IOS NETWORK SECURITY (IINS) 3.0
|
IMPLEMENTING CISCO SECURE ACCESS SOLUTIONS (SISAS) 1.0
|
IMPLEMENTING CISCO EDGE NETWORK SECURITY SOLUTIONS (SENSS) 1.0
|
IMPLEMENTING CISCO SECURE MOBILITY SOLUTIONS (SIMOS) 1.0
|
IMPLEMENTING CISCO THREAT CONTROL SOLUTIONS (SITCS) 1.5
|
CLOUD SECURITY ALLIANCE
|
CCSK FOUNDATION
|
CCSK PLUS
|
COMPTIA
|
COMPTIA ADVANCED SECURITY PRACTITIONER (CASP) (CAS-003)
|
COMPTIA PENTEST+ (PT0-001) |
CWNP
|
CWSP - CERTIFIED WIRELESS SECURITY PROFESSIONAL
|
EC-Council
|
CERTIFIED INCIDENT HANDLER (ECIH)
|
CERTIFIED SECURITY ANALYST (ECSA) V9
|
EC-COUNCIL INFORMATION SECURITY MANAGEMENT (EISM)
|
DISASTER RECOVERY PROFESSIONAL (EDRP)
|
LICENSED PENETRATION TESTER (LPT)
|
COMPUTER HACKING FORENSICS INVESTIGATOR (CHFI)
|
CERTIFIED CHIEF INFORMATION SECURITY OFFICER (CCISO)
|
CERTIFIED SECURITY SPECIALIST (ECSS)
|
CERTIFIED INCIDENT HANDLER (ECIH)
|
CERTIFIED ENCRYPTION SPECIALIST (ECES)
|
CAST 611V3 ADVANCED PENETRATION TESTING
|
ADVANCED MOBILE FORENSICS AND SECURITY (CAST 612)
|
CAST 616 SECURING WINDOWS INFRASTRUCTURE
|
CAST 613 HACKING AND HARDENING CORPORATE WEB APP/WEB SITE
|
CAST 614 Advanced Network Defense
|
ISACA
|
CRISC EXAM REVIEW
|
CGEIT EXAM REVIEW
|
CISM EXAM REVIEW
|
CISA EXAM REVIEW
|
COBIT 5 FOUNDATION
|
COBIT 5 IMPLEMENTATION
|
COBIT 5 ASSESSOR
|
IMPLEMENTING NIST CYBERSECURITY FRAMEWORK USING COBIT 5
|
COBIT 5 ASSESSOR FOR SECURITY
|
ISC(2)
|
(ISC)2 TRAINING FOR CAP
|
(ISC)2 TRAINING FOR CCFP
|
(ISC)2 TRAINING FOR CCSP
|
(ISC)2 TRAINING FOR CISSP
|
(ISC)2 TRAINING FOR HCISPP
|
(ISC)2 TRAINING FOR CISSP-ISSAP
|
(ISC)2 TRAINING FOR CISSP-ISSEP
|
(ISC)2 TRAINING FOR CISSP-ISSMP
|
(ISC)2 TRAINING FOR SSCP
|
JUNIPER
|
JUNOS SECURITY (JSEC)
|
JUNOS SPACE-SECURITY DIRECTOR (JS-SD)
|
ATTACK PREVENTION WITH JUNIPER NETWORKS FIREWALLS (APJF)
|
INTRODUCTION TO THE JUNOS OPERATING SYSTEM (IJOS)
|
JUNIPER NETWORKS DESIGN-SECURITY (JND-SEC)
|
ADVANCED JUNOS SECURITY (AJSEC)
|
IMPLEMENTING JUNIPER NETWORKS SECURE ANALYTICS (IJSA)
|
CONFIGURING STEEL-BELTED RADIUS CARRIER (CSBR)
|
INTEGRATING JUNIPER NETWORKS FIREWALL/IPSEC VPN PRODUCTS INTO HIGH-PERFORMANCE NETWORKS (IFVH)
|
CONFIGURING JUNIPER NETWORKS FIREWALL/IPSEC VPN PRODUCTS (CJFV)
|
JNCIE SECURITY BOOTCAMP (JNCIE-SEC)
|
MCAFEE |
MCAFEE ENDPOINT SECURITY 10.X ADMINISTRATION
|
MCAFEE ENDPOINT SECURITY UPGRADE
|
MCAFEE ADVANCED THREAT DETECTION ADMINISTRATION
|
MCAFEE VIRUSSCAN AND EPOLICY ORCHESTRATOR ADMINISTRATION
|
MCAFEE NETWORK SECURITY PLATFORM ADMINISTRATION
|
MCAFEE HOST INTRUSION PREVENTION SYSTEM ADMINISTRATION
|
MCAFEE DATA LOSS PREVENTION ENDPOINT ADMINISTRATION
|
SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM) ADMINISTRATION
|
MICROSOFT
|
SECURITY FUNDAMENTALS
|
SECURING WINDOWS SERVER 2016
|
OFFENSIVE SECURITY
|
PENETRATION TESTING WITH KALI LINUX
|
ADVANCED WINDOWS EXPLOITATION
|
OFFENSIVE SECURITY WIRELESS ATTACKS (WIFU)
|
CRACKING THE PERIMETER (CTP)
|
ADVANCED WEB ATTACKS AND EXPLOITATION
|
METASPLOIT UNLEASHED
|
OFFENSIVE SECURITY PENETRATION TESTING LAB
|
PALO ALTO |
FIREWALL ESSENTIALS 8.0: CONFIGURATION AND MANAGEMENT (EDU-210) |
PANORAMA 8.0: MANAGE MULTIPLE FIREWALLS (EDU-221) |
FIREWALL 8.0: DEBUG AND TROUBLESHOOT (EDU-311) |
FIREWALL 7.1: INSTALL, CONFIGURE, AND MANAGE (EDU-201) |
FIREWALL 7.1: CONFIGURE EXTENDED FEATURES (EDU-205) |
PANORAMA 7.1: MANAGE MULTIPLE FIREWALLS (EDU-221) |
FIREWALL 7.1: MANAGE CYBERTHREATS (EDU-231) |
FIREWALL 7.1: DEBUG AND TROUBLESHOOT (EDU-311) |
TRAPS 3.4: DEPLOY AND OPTIMIZE (EDU-285) |
TRAPS 3.4: INSTALL, CONFIGURE AND MANAGE (EDU-281) |
RIVERBED |
WAN200 OPTIMIZATION ESSENTIALS
|
WAN310 OPTIMIZING ENTERPRISE APPLICATIONS AND PROTOCOLS
|
WAN350 IMPLEMENTING ENTERPRISE OPTIMIZATION ARCHITECTURES
|
NPM200 PERFORMANCE MONITORING ESSENTIALS
|
RIVERBED APM200 APPLICATION PERFORMANCE MONITORING ESSENTIALS
|
RIVERBED RCPE-APPV APPLICATION VISIBILITY
|
HCB200 HYPER-CONVERGED BRANCH ESSENTIALS
|
SABSA
|
SABSA FOUNDATION MODULES (F1 & F2)
|
MODULE A1 – ADVANCED SABSA RISK ASSURANCE & GOVERNANCE
|
MODULE A3 – ADVANCED SABSA ARCHITECTURE & DESIGN
|
SANS
|
NETWARS - TOURNAMENT
|
NETWARS: CONTINUOUS
|
AUD507: AUDITING & MONITORING NETWORKS, PERIMETERS & SYSTEMS
|
AUD480: TOP 4 MITIGATION STRATEGIES: IMPLEMENTING & AUDITINGENTING AND AUDITING THE CRITICAL SECURITY CONTROLS - IN-DEPTH
|
AUD566: IMPLEMAUD440: CRITICAL SECURITY CONTROLS: PLANNING, IMPLEMENTING AND AUDITING
|
AUD440: CRITICAL SECURITY CONTROLS: PLANNING, IMPLEMENTING AND AUDITING
|
FOR408: WINDOWS FORENSIC ANALYSIS
|
FOR508: ADVANCED DIGITAL FORENSICS, INCIDENT RESPONSE, AND THREAT HUNTING
|
FOR518: MAC FORENSIC ANALYSIS
|
FOR578: CYBER THREAT INTELLIGENCE
|
FOR526: MEMORY FORENSICS IN-DEPTH
|
FOR572: ADVANCED NETWORK FORENSICS AND ANALYSIS
|
FOR585: ADVANCED SMARTPHONE FORENSICS
|
FOR610: REVERSE-ENGINEERING MALWARE: MALWARE ANALYSIS TOOLS AND TECHNIQUES
|
ICS515: ICS ACTIVE DEFENSE AND INCIDENT RESPONSE
|
ICS410: ICS/SCADA SECURITY ESSENTIALS
|
ICS456: ESSENTIALS FOR NERC CRITICAL INFRASTRUCTURE PROTECTION
|
MGT415: A PRACTICAL INTRODUCTION TO RISK ASSESSMENT
|
MGT414: SANS TRAINING PROGRAM FOR THE CISSP® CERTIFICATION EXAM
|
MGT433: SECURING THE HUMAN: HOW TO BUILD, MAINTAIN AND MEASURE A HIGH-IMPACT AWARENESS PROGRAM
|
MGT512: SANS SECURITY LEADERSHIP ESSENTIALS FOR MANAGERS WITH KNOWLEDGE COMPRESSION
|
MGT514: IT SECURITY STRATEGIC PLANNING, POLICY AND LEADERSHIP
|
MGT535: INCIDENT RESPONSE TEAM MANAGEMENT
|
LEG523: LAW OF DATA SECURITY AND INVESTIGATIONS
|
SEC301: INTRO TO INFORMATION SECURITY
|
SEC401: SECURITY ESSENTIALS BOOTCAMP STYLE
|
SEC440: CRITICAL SECURITY CONTROLS: PLANNING, IMPLEMENTING AND AUDITING
|
SEC480: TOP 4 MITIGATION STRATEGIES: IMPLEMENTING & AUDITING
|
SEC501: ADVANCED SECURITY ESSENTIALS - ENTERPRISE DEFENDER
|
SEC502: PERIMETER PROTECTION IN-DEPTH
|
SEC503: INTRUSION DETECTION IN-DEPTH
|
SEC504: HACKER TOOLS, TECHNIQUES, EXPLOITS AND INCIDENT HANDLING
|
SEC505: SECURING WINDOWS WITH THE CRITICAL SECURITY CONTROLS
|
SEC506: SECURING LINUX/UNIX
|
SEC511: CONTINUOUS MONITORING AND SECURITY OPERATIONS
|
SEC524: CLOUD SECURITY FUNDAMENTALS
|
SEC542: WEB APP PENETRATION TESTING AND ETHICAL HACKING
|
SEC546: IPV6 ESSENTIALS
|
SEC550: ACTIVE DEFENSE, OFFENSIVE COUNTERMEASURES AND CYBER DECEPTION
|
SEC560: NETWORK PENETRATION TESTING AND ETHICAL HACKING
|
SEC561: INTENSE HANDS-ON PEN TESTING SKILL DEVELOPMENT (WITH SANS NETWARS)
|
SEC562: CYBERCITY HANDS-ON KINETIC CYBER RANGE EXERCISE
|
SEC566: IMPLEMENTING AND AUDITING THE CRITICAL SECURITY CONTROLS - IN-DEPTH
|
SEC575: MOBILE DEVICE SECURITY AND ETHICAL HACKING
|
SEC579: VIRTUALIZATION AND PRIVATE CLOUD SECURITY
|
SEC580: METASPLOIT KUNG FU FOR ENTERPRISE PEN TESTING
|
SEC617: WIRELESS ETHICAL HACKING, PENETRATION TESTING, AND DEFENSES
|
SEC642: ADVANCED WEB APP PENETRATION TESTING AND ETHICAL HACKING
|
SEC660: ADVANCED PENETRATION TESTING, EXPLOIT WRITING, AND ETHICAL HACKING
|
SEC760: ADVANCED EXPLOIT DEVELOPMENT FOR PENETRATION TESTERS
|
SYMANTEC
|
ADMINISTRATION OF SYMANTEC VIP (MARCH 2017)
|
ADMINISTRATION OF SYMANTEC IT MANAGEMENT SUITE 8.0
|
ADMINISTRATION OF DATA LOSS PREVENTION 14.5
|
ADMINISTRATION OF SYMANTEC CYBER SECURITY SERVICES (MAY 2016)
|
ADMINISTRATION OF SYMANTEC ADVANCED THREAT PROTECTION 2.0.2
|
ADMINISTRATION OF SYMANTEC ENDPOINT PROTECTION 14
|
ADMINISTRATION OF SYMANTEC DATA CENTER SECURITY - SERVER ADVANCED 6.7
|
VALIDATION AND ID PROTECTION (VIP) SERVICE R1
|
IT MANAGEMENT SUITE 8.0 FUNDAMENTALS
|
IT MANAGEMENT SUITE 8.0 MODULES
|
CLIENT MANAGEMENT SUITE 7.6 ADMINISTRATION
|
CLIENT MANAGEMENT SUITE 7.6 IMPLEMENTER
|
ASSET MANAGEMENT SUITE 7.5 ADMINISTRATION
|
DATA LOSS PREVENTION 14.5: ADMINISTRATION – MUST COMPLETE ALL MODULES FOR CEUS
|
DATA LOSS PREVENTION 14.5: DIFFERENCES
|
CSS ADMIN R1 – MUST COMPLETE ALL MODULES FOR CEUS
|
SYMANTEC DATA CENTER SECURITY – SERVER ADVANCED 6.7 ADMINISTRATION – MUST COMPLETE ALL MODULES FOR CEUS
|
ADVANCED THREAT PROTECTION 2.X: INCIDENT RESPONSE – MUST COMPLETE ALL MODULES FOR CEUS
|
SYMANTEC ENDPOINT PROTECTION 12.1.X ADMINISTRATION
|
SYMANTEC ENDPOINT PROTECTION 12.1 MAINTAIN AND TROUBLESHOOT
|
EMAIL SECURITY SERVICES AND WEB SECURITY SERVICE: ADMINISTRATION
|
ENDPOINT PROTECTION 14: CONFIGURE AND PROTECT
|
ENDPOINT PROTECTION 14: DIFFERENCES
|
ENDPOINT PROTECTION 14: MIGRATION AND UPGRADES
|