AMAZON WEB SERVICES
|
SECURITY
OPERATIONS ON AWS
|
AWS SECURITY
FUNDAMENTALS
|
ADVANCED ARCHITECTING ON AWS
|
EXAM READINESS WORKSHOP: AWS CERTIFIED SOLUTIONS ARCHITECT - PROFESSIONAL
|
DEVELOPING ON AWS
|
APPLE |
MAC INTEGRATION BASICS 10.11
|
MAC INTEGRATION BASICS 10.12
|
AVAYA
|
IP OFFICE BASIC
INTEGRATION AND CONFIGURATION (7720C)
|
INTRODUCTION TO
SESSION INITIATION PROTOCOL (SIP) V2.0
|
MERIDIAN 1 OPTION
11C INSTALLATION, MAINTENANCE, AND DATABASE - COMMUNICATION SERVER 1000
RELEASE 5.5
|
STACKABLE ERS AND
VSP INSTALLATION, CONFIGURATION, AND MAINTENANCE
|
AVAYA
COMMUNICATION SERVER 1000 DIALING PLAN DESIGN AND IP PEER NETWORKING
|
ERS 8800/8600
INSTALLATION AND CONFIGURATION
|
BROCADE |
BROCADE PROFESSIONAL IP ADMINISTRATOR (BPIPA 200)
|
NETWORK INDUSTRY PROTOCOLS (NIP 200)
|
CHECK POINT
|
CHECK POINT CERTIFIED SECURITY ADMINISTRATOR (CCSA) R77.30
|
SECURITY ENGINEERING (CHECK POINT CERTIFIED SECURITY EXPERT (CCSE)
R77.30)
|
THREAT PREVENTION
|
SECURE WEB GATEWAY
|
MDSM WITH VSX (MULTI-DOMAIN SECURITY MANAGEMENT WITH VIRTUAL SYSTEM
EXTENSION)
|
CHECK POINT CERTIFIED SECURITY MASTER (CCSM) R77.30
|
CHECK POINT CERTIFIED SECURITY ADMINISTRATOR (CCSA) R80
|
CHECK POINT MANAGED SECURITY EXPERT (CCMSE)
|
CISCO
|
INTERCONNECTING
CISCO NETWORKING DEVICES, PART 1 (ICND1) 2.0
|
INTRODUCING CISCO
DATA CENTER NETWORKING (DCICN) 1.0
|
MANAGING
INDUSTRIAL NETWORKS FOR MANUFACTURING WITH CISCO TECHNOLOGIES (IMINS2) 1.0
|
IMPLEMENTING
CISCO NETWORK SECURITY (IINS) 3.0
|
IMPLEMENTING
CISCO WIRELESS NETWORK FUNDAMENTALS (WIFUND) 1.0
|
IMPLEMENTING
CISCO IP ROUTING (ROUTE) 2.0
|
IMPLEMENTING
CISCO IP SWITCHED NETWORKS (SWITCH)
2.0
|
IMPLEMENTING
CISCO SECURE ACCESS SOLUTIONS (SISAS)
1.0
|
IMPLEMENTING
CISCO EDGE NETWORK SECURITY SOLUTIONS (SENSS) 1.0
|
IMPLEMENTING
CISCO SECURE MOBILITY SOLUTIONS (SIMOS) 1.0
|
DESIGNING CISCO
WIRELESS ENTERPRISE NETWORKS (WIDESIGN) 1.0
|
DEPLOYING CISCO
WIRELESS ENTERPRISE NETWORKS (WIDEPLOY) 1.0
|
TROUBLESHOOTING
CISCO WIRELESS ENTERPRISE NETWORKS (WITSHOOT) 1.0
|
SECURING CISCO
WIRELESS ENTERPRISE NETWORKS (WISECURE) 1.0
|
SECURING CISCO
NETWORKS WITH THREAT DETECTION AND ANALYSIS (SCYBER) 1
|
DESIGNING WITH
CISCO NETWORK PROGRAMMABILITY V2.0
|
DESIGNING WITH
CISCO NETWORK PROGRAMMABILITY FOR ACI V1.1
|
IMPLEMENTING
CISCO NETWORK PROGRAMMABILITY V2.0
|
IMPLEMENTING
CISCO NETWORK PROGRAMMABILITY FOR ACI V1.1
|
INTERCONNECTING CISCO
NETWORKING DEVICES, PART 1 (ICND1) 3.0
|
IMPLEMENTING CISCO SECURE ACCESS CONTROL SYSTEM V5.2 |
DESIGNING FOR CISCO INTERNETWORK SOLUTIONS (DESGN) V3.0 |
IMPLEMENTING CISCO THREAT CONTROL SOLUTIONS (SITCS) 1.5
|
SUPPORTING CISCO DATA CENTER SYSTEM DEVICES (DCTECH)
|
UNDERSTANDING CISCO CYBERSECURITY FUNDAMENTALS (SECFND)
|
IMPLEMENTING CISCO CYBERSECURITY OPERATIONS (SECOPS)
|
INTERCONNECTING CISCO NETWORKING DEVICES: ACCELERATED (CCNAX) 3.0
|
INTERCONNECTING CISCO NETWORKING DEVICES, PART 2 (ICND2) 3.0
|
DESIGNING CISCO NETWORK SERVICE ARCHITECTURES (ARCH) 3.0
|
IMPLEMENTING CISCO DATA CENTER UNIFIED COMPUTING (DCUCI) 6.0
|
Add IMPLEMENTING CISCO DATA CENTER INFRASTRUCTURE (DCII) 6.0
|
INTRODUCING CISCO DATA CENTER NETWORKING TECHNOLOGIES (DCICT) 6.0
|
IMPLEMENTING CISCO DATA CENTER VIRTUALIZATION AND AUTOMATION (DCVAI) 6.0
|
DESIGNING CISCO DATA CENTER INFRASTRUCTURE (DCID) 6.0
|
TROUBLESHOOTING CISCO DATA CENTER INFRASTRUCTURE (DCIT) 6.0
|
BUILDING CISCO SERVICE PROVIDER NEXT GENERATION NETWORKS, PART 2 (SPNGN2) 1.2
|
BUILDING CISCO SERVICE PROVIDER NEXT GENERATION NETWORKS, PART 1 (SPNGN1) 1.2
|
CITRIX |
CXM-302 DESIGN, DEPLOY AND MANAGE ENTERPRISE MOBILITY WITH XENMOBILE 9.0
|
CXD-210: CITRIX XENAPP AND XENDESKTOP ADMINISTRATION
|
CXD-310: CITRIX XENAPP AND XENDESKTOP ADVANCED ADMINISTRATION
|
CXD-400 DESIGNING APP AND DESKTOP SOLUTIONS WITH CITRIX XENAPP AND XENDESKTOP
|
CNS-220: CITRIX NETSCALER ESSENTIALS AND TRAFFIC MANAGEMENT
|
CNS-222: CITRIX NETSCALER ESSENTIALS AND UNIFIED GATEWAY
|
CNS-219: CITRIX NETSCALER TRAFFIC MANAGEMENT
|
CNS-221: CITRIX NETSCALER UNIFIED GATEWAY
|
NETSCALER SD-WAN
|
CNS-320: CITRIX NETSCALER ADVANCED TOPICS – SECURITY, MANAGEMENT, AND OPTIMIZATION
|
CXM-303 DEPLOYING ENTERPRISE MOBILITY SOLUTIONS WITH CITRIX XENMOBILE
|
CLOUDERA |
CLOUDERA’S APACHE HADOOP
|
CLOUD SECURITY ALLIANCE
|
CCSK FOUNDATION
|
CCSK PLUS
|
COMPTIA
|
COMPTIA
CLOUD+ (CV0-002)
|
COMPTIA ADVANCED
SECURITY PRACTITIONER (CASP) (CAS-003)
|
COMPTIA NETWORK+ (N10-007) APPROVED ONLY FOR THOSE CERTIFIED IN N10-006 AND EARLIER
|
COMPTIA
SECURITY+ (SY0-501)
|
COMPTIA SERVER+
(SK0-004)
|
COMPTIA CYBERSECURITY ANALYST (CySA+) (CS0-001) |
COMPTIA PENTEST+ (PT0-001) |
CWNP
|
CWTS - CERTIFIED WIRELESS TECHNOLOGY SPECIALIST
|
CWNA - CERTIFIED WIRELESS NETWORK ADMINISTRATOR
|
CWSP - CERTIFIED WIRELESS SECURITY PROFESSIONAL
|
CWDP – CERTIFIED WIRELESS DESIGN PROFESSIONAL
|
CWAP - CERTIFIED WIRELESS ANALYSIS PROFESSIONAL
|
DELL
|
Introduction to Dell PS Series Storage Arrays
|
Dell Storage Networking Configuration
|
Dell FS8600 NAS Installation and Configuration
|
Dell Networking Planning
|
Dell Networking Installation and Configuration
|
Dell Networking Interoperability
|
Dell Networking Fundamentals-Routing
|
Dell Networking Fundamentals - Switching
|
Dell Networking Data Center Advanced Features & Administration
|
Dell Networking Campus Design, Advanced Features and Configuration
|
Dell Networking Fast Track from Cisco to Dell OS 9
|
Dell Campus Networking N-Series Features & Basic Administration
|
Dell Networking Data Center Overview & Basic Administration
|
EC-COUNCIL
|
CERTIFIED SECURITY ANALYST
(ECSA) V9
|
NETWORK SECURITY
ADMINISTRATOR (ENSA)
|
DISASTER RECOVERY PROFESSIONAL
(EDRP)
|
LICENSED PENETRATION TESTER
(LPT)
|
COMPUTER HACKING FORENSICS
INVESTIGATOR (CHFI)
|
CERTIFIED CHIEF INFORMATION
SECURITY OFFICER (CCISO)
|
CERTIFIED ETHICAL HACKER
(CEH) V9
|
CERTIFIED SECURITY SPECIALIST
(ECSS)
|
CERTIFIED INCIDENT HANDLER
(ECIH)
|
CERTIFIED ENCRYPTION
SPECIALIST (ECES)
|
EC-COUNCIL INFORMATION SECURITY MANAGEMENT (EISM)
|
CERTIFIED NETWORK DEFENDER (CND)
|
CERTIFIED NETWORK DEFENSE ARCHITECT (CNDA)
|
CAST 611V3 ADVANCED PENETRATION TESTING
|
CAST 616 SECURING WINDOWS INFRASTRUCTURE
|
CAST 613 HACKING AND HARDENING CORPORATE WEB APP/WEB SITE
|
CAST 614 ADVANCED NETWORK DEFENSE
|
EMC
|
Avamar Integration and Performance Management
|
Avamar Management |
Backup Recovery Solutions – Avamar to Data Domain Integration |
Celerra NS Series Installation and Maintenance |
Celerra Unified QuickStart: Basic Implementation Using Provisioning Wizards |
Celerra Unified QuickStart: NS-120 Hardware Overview & Installation |
Celerra Unified QuickStart: Installation and Configuration Using CSA |
Celerra Unified QuickStart: NS-480 Hardware Overview & Installation |
Celerra Unified QuickStart: Product Installation and Configuration Overview |
Celerra Unified QuickStart: NX4 Hardware Overview & Installation |
Celerra Unified QuickStart: Provisioning for FCConnected Hosts |
Centera Fundamentals |
Centera Hardware Configurations |
Centera Installation and Maintenance |
Centera Software Configurations |
CLARiiON CX3 Installation Differences |
CLARiiON Foundations |
CLARiiON Hardware |
CLARiiON Installation and Maintenance |
Cloud Infrastructure Planning and Design |
Cloud Services Planning and Design |
Connectivity Protocols |
Data Domain System Administration |
EMC Availability Infrastructure Solutions And Design |
EMC Storage Integration with Oracle Best Practices |
EMC Storage Integration with Microsoft Exchange Best Practices |
VCE Vblock Systems Administration and Management |
VMAX Family Installation and Maintenance |
ViPR SRM Advanced Reporting |
Storage Performance Fundamentals |
Isilon Infrastructure Solutions |
SAN Management |
Networker Installation, Configuration and Administration |
Isilon Solution Design |
Isilon Initial Configuration |
VMAX3 Security Concepts |
Centera Tools and Installation |
ENCASE
|
ENCASE V7 FORENSICS AND ENTERPRISE FUNDAMENTALS
|
ENCASE® V7 COMPUTER FORENSICS I
|
INCIDENT INVESTIGATION
|
ENCASE® CYBERSECURITY AND ANALYTICS V5
|
ENCASE® ADVANCED COMPUTER FORENSICS
|
ENCASE® V7 COMPUTER FORENSICS II
|
HOST INTRUSION METHODOLOGY AND INVESTIGATION
|
GOOGLE |
GOOGLE CLOUD PLATFORM FUNDAMENTALS: CORE INFRASTRUCTURE
|
ARCHITECTING WITH GOOGLE CLOUD PLATFORM: INFRASTRUCTURE
|
GOOGLE CLOUD PLATFORM FOR SYSTEMS OPERATIONS PROFESSIONALS
|
GOOGLE CLOUD FUNDAMENTALS: BIG DATA & MACHINE LEARNING
|
DATA ENGINEERING ON GOOGLE CLOUD PLATFORM
|
G SUITE ADMINISTRATOR FUNDAMENTALS
|
GOOGLE CLOUD PLATFORM FUNDAMENTALS FOR AWS PROFESSIONALS
|
HP
|
Designing HP Data Center and Cloud Solutions, Rev. 15.11
|
Designing HPE Data Center and Cloud Solutions, Rev. 16.11 |
Delta - Designing HPE Data Center and Cloud Solutions, Rev. 16.11 |
Creating HPE Software-defined Networks, Rev. 15.41 |
Building HP FlexFabric Data Centers, Rev. 14.41 |
Architecting HP FlexNetwork Solutions, Rev 14.21 |
Deploying HP FlexNetwork Core Technologies, Rev 14.31 |
HPE ArcSight Master ASE Preparation Course |
ArcSight ESM 6.5 Advanced Administrator |
ArcSight ESM 6.5 Advanced Analyst |
ArcSight Logger - 6.0 Administration and Operations |
Dynamic Application Testing with HP WebInspect 10.3 |
HP Fortify Static Code Analyzer / Software Security Center 4.2 |
HP/ARUBA
|
ADVANCED
TROUBLESHOOTING
|
AIRWAVE WIRELESS
MANAGEMENT SUITE INSTALLATION, CONFIGURATION & USE
|
ARUBA INSTANT
ACCESS POINTS (IAP)
|
CLEARPASS
ESSENTIALS
|
HP ONLY - ARUBA
MOBILITY BOOT CAMP
|
IMC ESSENTIALS
FOR NETWORK ADMINISTRATORS
|
IMPLEMENTING
ARUBA WLAN
|
MIGRATING FROM
CISCO TO HP FLEXNETWORKS
|
MOBILITY ACCESS
SWITCH
|
SCALABLE WLAN
DESIGN & IMPLEMENTATION (SWDI)
|
SOLUTIONS PART 1
|
IBM
|
IBM Security QRadar SIEM 7.2 Administration and Configuration
|
IBM Security QRadar SIEM Foundations |
IBM Security Directory Server 6.3.1 System Administration |
IBM Security Identity Manager 6.0 Basic Administration |
IBM Security QRadar Incident Forensics Configuration and Usage |
Web Application Security Fundamentals |
IBM Security Access Manager for Enterprise Single Sign-On 8.2.1 Administration |
IBM Security Access Manager for Mobile 8.0 |
IBM Security Access Manager for Web |
IBM Security Privileged Identity Manager Fundamentals |
IBM Endpoint Manager 9.2 Security and Compliance Fundamentals |
IBM Security QRadar Advanced Topics |
IBM Security AppScan Standard Fundamentals |
AIX Network Installation Manager (NIM): Concepts and Configuration |
ISACA
|
COBIT 5 ASSESSOR FOR SECURITY
|
CRISC EXAM REVIEW
|
CYBERSECURITY FUNDAMENTALS
|
CSX PRACTITIONER:
IDENTIFICATION AND PROTECTION
|
CSX PRACTITIONER: RESPOND AND
RECOVER
|
CSX PRACTITIONER BOOT CAMP
|
CSX PRACTITIONER: DETECTION
|
Real World Application of RMF for DoD IT
|
CISA EXAM REVIEW
|
ISC(2)
|
(ISC)2 TRAINING FOR CCFP
|
(ISC)2 TRAINING FOR CCSP
|
(ISC)2 TRAINING FOR CISSP
|
(ISC)2 TRAINING FOR CISSP-ISSAP
|
(ISC)2 TRAINING FOR CISSP-ISSEP
|
(ISC)2 TRAINING FOR CISSP-ISSMP
|
(ISC)2 TRAINING FOR SSCP
|
JUNIPER
|
ADVANCED DATA CENTER SWITCHING (ADCX)
|
JUNIPER NETWORKS DESIGN FUNDAMENTALS (JNDF)
|
ADVANCED JUNIPER NETWORKS VPN
IMPLEMENTATIONS (AJVI)
|
ADVANCED JUNOS ENTERPRISE ROUTING
(AJER)
|
ADVANCED JUNOS ENTERPRISE ROUTING
TROUBLESHOOTING (AJERT)
|
ADVANCED JUNOS ENTERPRISE SECURITY
TROUBLESHOOTING (AJEST)
|
ADVANCED JUNOS ENTERPRISE
SWITCHING (AJEX)
|
ADVANCED JUNOS SECURITY (AJSEC)
|
ADVANCED JUNOS SERVICE PROVIDER
ROUTING (AJSPR)
|
ADVANCED JUNOS ENTERPRISE
SWITCHING USING ENHANCED LAYER 2 SOFTWARE (AJEX-ELS)
|
ADVANCED JUNOS SERVICE PROVIDER
TROUBLESHOOTING (AJSPT)
|
ATTACK PREVENTION WITH JUNIPER
NETWORKS FIREWALLS (APJF)
|
INTEGRATING JUNIPER NETWORKS
FIREWALL/IPSEC VPN PRODUCTS INTO HIGH-PERFORMANCE NETWORKS (IFVH)
|
JUNOS ENTERPRISE SWITCHING (JEX)
|
JUNOS ENTERPRISE SWITCHING USING
ELS (JEX-ELS)
|
JUNOS INTERMEDIATE ROUTING (JIR)
|
JUNOS MULTICAST ROUTING (JMR)
|
JUNIPER NETWORKS DESIGN-WAN
(JND-WAN)
|
CONFIGURING JUNIPER NETWORKS
FIREWALL/IPSEC VPN PRODUCTS (CJFV)
|
JUNOS EDGE SECURITY SERVICES
(JESS)
|
JNCIE SECURITY BOOTCAMP
(JNCIE-SEC)
|
JNCIE SERVICE PROVIDER BOOTCAMP
(JNCIE-SP)
|
JUNIPER NETWORKS DESIGN - DATA
CENTER (JND-DC)
|
JUNOS SECURITY (JSEC)
|
NETWORK AUTOMATION USING CONTRAIL
CLOUD (NACC)
|
JUNOS SERVICE PROVIDER SWITCHING
(JSPX)
|
NETWORKING FUNDAMENTALS
|
WLAN FUNDAMENTALS
|
JNCIE ENTERPRISE BOOTCAMP (JNCIE-ENT)
|
INTRODUCTION TO THE JUNOS OPERATING SYSTEM (IJOS)
|
JUNOS CLASS OF SERVICE (JCOS)
|
CONFIGURING STEEL-BELTED RADIUS CARRIER (CSBR)
|
JUNIPER NETWORKS DESIGN-SECURITY (JND-SEC)
|
JUNOS SPACE-SECURITY DIRECTOR (JS-SD)
|
IMPLEMENTING JUNIPER NETWORKS SECURE ANALYTICS (IJSA)
|
NETWORK AUTOMATION IN THE WAN (NA-WAN)
|
JUNOS LAYER 3 VPNS (JL3V)
|
JUNOS LAYER 2 VPNS (JL2V)
|
JUNOS MPLS FUNDAMENTALS (JMF)
|
JUNOS TROUBLESHOOTING IN THE NOC (JTNOC)
|
JUNOS SUBSCRIBER MANAGEMENT (JSM)
|
JUNOS AUTOMATION (JAUT)
|
LINUX
|
Linux Kernel Debugging and Security
|
Penetration Testing with Linux Tools
|
Advanced Linux System Administration and Networking
|
Software Defined Networking with OpenDaylight
|
Linux Networking and Administration
|
Linux Security Fundamentals
|
Software Defined Networking Fundamentals
|
MCAFEE |
MCAFEE ENDPOINT SECURITY 10.X ADMINISTRATION
|
MCAFEE ENDPOINT SECURITY UPGRADE
|
MCAFEE ADVANCED THREAT DETECTION ADMINISTRATION
|
MCAFEE VIRUSSCAN AND EPOLICY ORCHESTRATOR ADMINISTRATION
|
MCAFEE NETWORK SECURITY PLATFORM ADMINISTRATION
|
MCAFEE HOST INTRUSION PREVENTION SYSTEM ADMINISTRATION
|
MCAFEE DATA LOSS PREVENTION ENDPOINT ADMINISTRATION
|
SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM) ADMINISTRATION
|
MICROSOFT
|
NETWORKING FUNDAMENTALS
|
SECURITY FUNDAMENTALS
|
INSTALLING AND CONFIGURING WINDOWS SERVER® 2012
|
WINDOWS SERVER ADMINISTRATION FUNDAMENTALS
|
NETWORKING WITH WINDOWS SERVER 2016
|
IDENTITY WITH WINDOWS SERVER 2016
|
ADMINISTERING WINDOWS SERVER 2012
|
CONFIGURING ADVANCED WINDOWS SERVER 2012 SERVICES
|
DESIGNING AND IMPLEMENTING A SERVER INFRASTRUCTURE
|
IMPLEMENTING AN ADVANCED SERVER INFRASTRUCTURE
|
DEVELOPING MICROSOFT AZURE SOLUTIONS
|
IMPLEMENTING MICROSOFT AZURE INFRASTRUCTURE SOLUTIONS
|
ADMINISTERING MICROSOFT SQL SERVER DATABASES
|
DESIGNING A DATA SOLUTION WITH MICROSOFT SQL SERVER
|
WINDOWS OPERATING SYSTEM AND WINDOWS SERVER FUNDAMENTALS
|
WINDOWS SERVER 2012: TECHNICAL OVERVIEW
|
SECURING WINDOWS SERVER 2016
|
WINDOWS SERVER 2012 TRAINING: NETWORKING
|
WINDOWS SERVER 2012: IDENTITY AND ACCESS
|
WINDOWS SERVER 2012: STORAGE
|
DEVELOPING MICROSOFT SQL SERVER DATABASES
|
DESIGNING DATABASE SOLUTIONS FOR SQL SERVER
|
NOVELL
|
DEPLOYING OPEN
ENTERPRISE SERVER 11 FOR LINUX (COURSE 8727)
|
OPEN ENTERPRISE SERVER
11 ADMINISTRATION (COURSE 3119)
|
SUSE LINUX
ENTERPRISE SERVER 10: NETWORKING SERVICES [COURSE 3074]
|
SUSE LINUX
ENTERPRISE SERVER 10: SECURITY [COURSE 3075]
|
NETIQ EDIRECTORY
DESIGN AND IMPLEMENTATION: EDIRECTORY 8.8 [COURSE 3067]
|
NOVELL OPEN ENTERPRISE
SERVER FOR NETWARE ADMINISTRATION [COURSE 3081]
|
NOVELL OPEN
ENTERPRISE SERVER FOR NETWARE ADVANCED ADMINISTRATION [COURSE 3082]
|
UPGRADING TO
NOVELL OPEN ENTERPRISE SERVER FOR NETWARE [COURSE 3083]
|
FILE MANAGEMENT
SUITE EDIRECTORY (COURSE 8720)
|
FILE MANAGEMENT
SUITE - ACTIVE DIRECTORY (COURSE 8721)
|
ZENWORKS
CONFIGURATION MANAGEMENT ADMINISTRATION (COURSE 3120)
|
SECURING WINDOWS
WORKSTATIONS USING ZENWORKS ENDPOINT SECURITY MANAGEMENT 11.X (COURSE 8520)
|
OFFENSIVE SECURITY
|
PENETRATION TESTING WITH
KALI LINUX
|
ADVANCED WINDOWS
EXPLOITATION
|
OFFENSIVE
SECURITY WIRELESS ATTACKS (WIFU)
|
CRACKING THE
PERIMETER (CTP)
|
ADVANCED WEB
ATTACKS AND EXPLOITATION
|
METASPLOIT
UNLEASHED
|
OFFENSIVE
SECURITY PENETRATION TESTING LAB
|
Oracle
|
Oracle 12c Security Administration
|
ORACLE DATABASE 12C: MANAGING SECURITY |
USER SECURITY AND AUDITING IN ORACLE DATABASE 12C |
ORACLE DATABASE 11G: INTRODUCTION TO DATABASE SECURITY AND SOLUTIONS |
ORACLE DATABASE 11G: DATABASE SECURITY |
ORACLE DATABASE 11G: BASIC USER AND STRONG AUTHENTICATION |
ORACLE DATABASE 11G: ENTERPRISE USER SECURITY AND PROXY AUTHENTICATION |
ORACLE DATABASE 11G: PRIVILEGES, ROLES, AND APPLICATION CONTEXTS |
ORACLE DATABASE 11G: ORACLE NET SERVICES AND LISTENER SECURITY |
ORACLE DATABASE 11G: FIREWALLS, ORACLE CONNECTION MANAGER, AND SQL*PLUS SECURITY |
ORACLE DATABASE 11G RELEASE 2: STORAGE STRUCTURES AND USER SECURITY |
ORACLE SOA SUITE 11G: SOA SECURITY AND ADOPTION PLANNING |
PALO ALTO |
FIREWALL ESSENTIALS 8.0: CONFIGURATION AND MANAGEMENT (EDU-210) |
PANORAMA 8.0: MANAGE MULTIPLE FIREWALLS (EDU-221) |
FIREWALL 8.0: DEBUG AND TROUBLESHOOT (EDU-311) |
FIREWALL 7.1: INSTALL, CONFIGURE, AND MANAGE (EDU-201) |
FIREWALL 7.1: CONFIGURE EXTENDED FEATURES (EDU-205) |
PANORAMA 7.1: MANAGE MULTIPLE FIREWALLS (EDU-221) |
FIREWALL 7.1: MANAGE CYBERTHREATS (EDU-231) |
FIREWALL 7.1: DEBUG AND TROUBLESHOOT (EDU-311) |
TRAPS 3.4: DEPLOY AND OPTIMIZE (EDU-285) |
TRAPS 3.4: INSTALL, CONFIGURE AND MANAGE (EDU-281) |
FIREWALL ESSENTIALS 8.0: CONFIGURATION AND MANAGEMENT (EDU-110) |
RED
HAT
|
RED HAT SYSTEM ADMINISTRATION I (RH124)
|
RED HAT SYSTEM ADMINISTRATION II (RH134)
|
RHCSA RAPID TRACK COURSE (RH199)
|
RED HAT OPENSTACK ADMINISTRATION I (CL110)
|
RED HAT OPENSTACK ADMINISTRATION II (CL210)
|
RED HAT SYSTEM ADMINISTRATION III (RH254)
|
RHCE CERTIFICATION LAB
|
RED HAT OPENSTACK SYSTEM ADMINISTRATION III (CL310)
|
RED HAT CLOUDFORMS HYBRID CLOUD MANAGEMENT (CL220)
|
RED HAT SERVER HARDENING
|
RED HAT HIGH AVAILABILITY CLUSTERING (RH436)
|
RED HAT SECURITY: Linux in Physical, Virtual, and Cloud (RH415)
|
RIVERBED |
WAN200 OPTIMIZATION ESSENTIALS
|
HCB200 HYPER-CONVERGED BRANCH ESSENTIALS
|
NPM200 PERFORMANCE MONITORING ESSENTIALS
|
APPRESPONSE
|
TRANSACTION ANALYZER
|
RIVERBED APM200 APPLICATION PERFORMANCE MONITORING ESSENTIALS
|
RIVERBED RCPE-APPV APPLICATION VISIBILITY
|
NOS200 NETWORK PLANNING AND CONFIGURATION MANAGEMENT
|
WAN310 OPTIMIZING ENTERPRISE APPLICATIONS AND PROTOCOLS
|
WAN350 IMPLEMENTING ENTERPRISE OPTIMIZATION ARCHITECTURES
|
SABSA
|
SABSA FOUNDATION MODULES (F1 & F2)
|
MODULE A1 – ADVANCED SABSA RISK ASSURANCE & GOVERNANCE
|
MODULE A3 – ADVANCED SABSA ARCHITECTURE & DESIGN
|
SANS
|
NETWARS -
TOURNAMENT
|
NETWARS:
CONTINUOUS
|
AUD507: AUDITING
& MONITORING NETWORKS, PERIMETERS & SYSTEMS
|
AUD566:
IMPLEMENTING AND AUDITING THE CRITICAL SECURITY CONTROLS - IN-DEPTH
|
AUD440: CRITICAL
SECURITY CONTROLS: PLANNING, IMPLEMENTING AND AUDITING
|
AUD480: TOP 4
MITIGATION STRATEGIES: IMPLEMENTING & AUDITING
|
FOR408: WINDOWS FORENSIC ANALYSIS
|
FOR508: ADVANCED DIGITAL FORENSICS, INCIDENT RESPONSE, AND THREAT HUNTING
|
FOR518: MAC FORENSIC ANALYSIS
|
FOR526: MEMORY FORENSICS IN-DEPTH
|
FOR572: ADVANCED
NETWORK FORENSICS AND ANALYSIS
|
FOR578: CYBER
THREAT INTELLIGENCE
|
FOR585: ADVANCED SMARTPHONE FORENSICS
|
ICS515: ICS
ACTIVE DEFENSE AND INCIDENT RESPONSE
|
ICS410: ICS/SCADA
SECURITY ESSENTIALS
|
ICS456:
ESSENTIALS FOR NERC CRITICAL INFRASTRUCTURE PROTECTION
|
MGT414: SANS +S
TRAINING PROGRAM FOR THE CISSP® CERTIFICATION EXAM
|
MGT415: A
PRACTICAL INTRODUCTION TO RISK ASSESSMENT
|
MGT433: SECURING
THE HUMAN: HOW TO BUILD, MAINTAIN AND MEASURE A HIGH-IMPACT AWARENESS PROGRAM
|
MGT512: SANS
SECURITY LEADERSHIP ESSENTIALS FOR MANAGERS WITH KNOWLEDGE COMPRESSION
|
MGT514: IT
SECURITY STRATEGIC PLANNING, POLICY AND LEADERSHIP
|
MGT535: INCIDENT RESPONSE TEAM MANAGEMENT
|
LEG523: LAW OF
DATA SECURITY AND INVESTIGATIONS
|
SEC301: INTRO TO
INFORMATION SECURITY
|
SEC401: SECURITY ESSENTIALS
BOOTCAMP STYLE
|
SEC440: CRITICAL SECURITY
CONTROLS: PLANNING, IMPLEMENTING AND AUDITING
|
SEC480: TOP 4 MITIGATION
STRATEGIES: IMPLEMENTING & AUDITING
|
SEC501: ADVANCED SECURITY
ESSENTIALS - ENTERPRISE DEFENDER
|
SEC502: PERIMETER PROTECTION
IN-DEPTH
|
SEC503: INTRUSION
DETECTION IN-DEPTH
|
SEC504: HACKER
TOOLS, TECHNIQUES, EXPLOITS AND INCIDENT HANDLING
|
SEC506: SECURING LINUX/UNIX
|
SEC511:
CONTINUOUS MONITORING AND SECURITY OPERATIONS
|
SEC524: CLOUD
SECURITY FUNDAMENTALS
|
SEC542: WEB APP
PENETRATION TESTING AND ETHICAL HACKING
|
SEC546: IPV6
ESSENTIALS
|
SEC550: ACTIVE
DEFENSE, OFFENSIVE COUNTERMEASURES AND CYBER DECEPTION
|
SEC560: NETWORK
PENETRATION TESTING AND ETHICAL HACKING
|
SEC561: INTENSE
HANDS-ON PEN TESTING SKILL DEVELOPMENT (WITH SANS NETWARS)
|
SEC562: CYBERCITY
HANDS-ON KINETIC CYBER RANGE EXERCISE
|
SEC566:
IMPLEMENTING AND AUDITING THE CRITICAL SECURITY CONTROLS - IN-DEPTH
|
SEC573: PYTHON
FOR PENETRATION TESTERS
|
SEC575: MOBILE
DEVICE SECURITY AND ETHICAL HACKING
|
SEC579:
VIRTUALIZATION AND PRIVATE CLOUD SECURITY
|
SEC580:
METASPLOIT KUNG FU FOR ENTERPRISE PEN TESTING
|
SEC617: WIRELESS
ETHICAL HACKING, PENETRATION TESTING, AND DEFENSES
|
SEC642: ADVANCED
WEB APP PENETRATION TESTING AND ETHICAL HACKING
|
SEC660: ADVANCED
PENETRATION TESTING, EXPLOIT WRITING, AND ETHICAL HACKING
|
SEC760: ADVANCED
EXPLOIT DEVELOPMENT FOR PENETRATION TESTERS
|
SYMANTEC |
ADMINISTRATION OF SYMANTEC MESSAGING GATEWAY 10.5
|
ADMINISTRATION OF SYMANTEC CONTROL COMPLIANCE SUITE 11.X
|
ADMINISTRATION OF SYMANTEC VIP (MARCH 2017)
|
ADMINISTRATION OF SYMANTEC IT MANAGEMENT SUITE 8.0
|
ADMINISTRATION OF DATA LOSS PREVENTION 14.5
|
ADMINISTRATION OF SYMANTEC CYBER SECURITY SERVICES (MAY 2016)
|
ADMINISTRATION OF SYMANTEC ADVANCED THREAT PROTECTION 2.0.2
|
ADMINISTRATION OF SYMANTEC ENDPOINT PROTECTION 14
|
ADMINISTRATION OF SYMANTEC DATA CENTER SECURITY - SERVER ADVANCED 6.7
|
SYMANTEC MESSAGING GATEWAY 10.0 – ADMINISTRATION
|
SYMANTEC MESSAGING GATEWAY 10.5 ADMINISTRATION: WHAT’S NEW IN 10.5
|
SYMANTEC CONTROL COMPLIANCE SUITE 11.0: ADMINISTRATION - MUST COMPLETE ALL MODULES FOR CEUS
|
SYMANTEC CONTROL COMPLIANCE SUITE 11.0: DIFFERENCES
|
VALIDATION AND ID PROTECTION (VIP) SERVICE R1
|
IT MANAGEMENT SUITE 8.0 FUNDAMENTALS
|
IT MANAGEMENT SUITE 8.0 MODULES
|
CLIENT MANAGEMENT SUITE 7.6 ADMINISTRATION
|
CLIENT MANAGEMENT SUITE 7.6 IMPLEMENTER
|
ASSET MANAGEMENT SUITE 7.5 ADMINISTRATION
|
DATA LOSS PREVENTION 14.5: ADMINISTRATION – MUST COMPLETE ALL MODULES FOR CEUS
|
DATA LOSS PREVENTION 14.5: DIFFERENCES
|
CSS ADMIN R1 – MUST COMPLETE ALL MODULES FOR CEUS
|
SYMANTEC DATA CENTER SECURITY – SERVER ADVANCED 6.7 ADMINISTRATION – MUST COMPLETE ALL MODULES FOR CEUS
|
ADVANCED THREAT PROTECTION 2.X: INCIDENT RESPONSE – MUST COMPLETE ALL MODULES FOR CEUS
|
SYMANTEC ENDPOINT PROTECTION 12.1.X ADMINISTRATION
|
SYMANTEC ENDPOINT PROTECTION 12.1 MAINTAIN AND TROUBLESHOOT
|
EMAIL SECURITY SERVICES AND WEB SECURITY SERVICE: ADMINISTRATION
|
ENDPOINT PROTECTION 14: CONFIGURE AND PROTECT
|
ENDPOINT PROTECTION 14: DIFFERENCES
|
ENDPOINT PROTECTION 14: MIGRATION AND UPGRADES
|
VMWARE
|
VMWARE NSX: INSTALL,
CONFIGURE, MANAGE [V6.2]
|
VCLOUD: DESIGN BEST PRACTICES [V1.5] |
VMWARE NSX TROUBLESHOOTING AND OPERATIONS [V6.2] |
VMWARE NETWORK VIRTUALIZATION FUNDAMENTALS 2016 |