CHECK POINT |
CHECK POINT CERTIFIED SECURITY MASTER (CCSM) R77.30 |
CHECK POINT MANAGED SECURITY EXPERT (CCMSE) |
CISCO |
IMPLEMENTING CISCO SECURE ACCESS CONTROL SYSTEM V5.2 |
IMPLEMENTING CISCO IOS NETWORK SECURITY (IINS) 3.0 |
IMPLEMENTING CISCO SECURE ACCESS SOLUTIONS (SISAS) 1.0 |
IMPLEMENTING CISCO EDGE NETWORK SECURITY SOLUTIONS (SENSS) 1.0 |
IMPLEMENTING CISCO SECURE MOBILITY SOLUTIONS (SIMOS) 1.0 |
IMPLEMENTING CISCO THREAT CONTROL SOLUTIONS (SITCS) 1.5 |
CLOUD SECURITY ALLIANCE |
CLOUD SECURITY ALLIANCE |
CCSK PLUS |
COMPTIA |
COMPTIA ADVANCED SECURITY PRACTITIONER (CASP) (CAS-003) |
COMPTIA Cybersecurity Analyst (CySA+) |
CWNP |
CWSP - CERTIFIED WIRELESS SECURITY PROFESSIONAL |
EC-Council |
CERTIFIED INCIDENT HANDLER (ECIH) |
CERTIFIED SECURITY ANALYST (ECSA) V9 |
EC-COUNCIL INFORMATION SECURITY MANAGEMENT (EISM) |
DISASTER RECOVERY PROFESSIONAL (EDRP) |
LICENSED PENETRATION TESTER (LPT) |
COMPUTER HACKING FORENSICS INVESTIGATOR (CHFI) |
CERTIFIED CHIEF INFORMATION SECURITY OFFICER (CCISO) |
CERTIFIED SECURITY SPECIALIST (ECSS) |
CERTIFIED INCIDENT HANDLER (ECIH) |
CERTIFIED ENCRYPTION SPECIALIST (ECES) |
CAST 611V3 ADVANCED PENETRATION TESTING |
ADVANCED MOBILE FORENSICS AND SECURITY (CAST 612) |
ISACA |
CRISC EXAM REVIEW |
CGEIT EXAM REVIEW |
CISM EXAM REVIEW |
CISA EXAM REVIEW |
COBIT 5 FOUNDATION |
COBIT 5 IMPLEMENTATION |
COBIT 5 ASSESSOR |
IMPLEMENTING NIST CYBERSECURITY FRAMEWORK USING COBIT 5 |
COBIT 5 ASSESSOR FOR SECURITY |
ISC(2) |
(ISC)2 TRAINING FOR CAP |
(ISC)2 TRAINING FOR CCFP |
(ISC)2 TRAINING FOR CCSP |
(ISC)2 TRAINING FOR CISSP |
(ISC)2 TRAINING FOR HCISPP |
(ISC)2 TRAINING FOR CISSP-ISSAP |
(ISC)2 TRAINING FOR CISSP-ISSEP |
(ISC)2 TRAINING FOR CISSP-ISSMP |
(ISC)2 TRAINING FOR SSCP |
JUNIPER |
JUNOS SECURITY (JSEC) |
JUNOS SPACE-SECURITY DIRECTOR (JS-SD) |
ATTACK PREVENTION WITH JUNIPER NETWORKS FIREWALLS (APJF) |
ATTACK PREVENTION WITH JUNIPER NETWORKS FIREWALLS (APJF) |
ATTACK PREVENTION WITH JUNIPER NETWORKS FIREWALLS (APJF) |
ADVANCED JUNOS SECURITY (AJSEC) |
IMPLEMENTING JUNIPER NETWORKS SECURE ANALYTICS (IJSA) |
CONFIGURING STEEL-BELTED RADIUS CARRIER (CSBR) |
INTEGRATING JUNIPER NETWORKS FIREWALL/IPSEC VPN PRODUCTS INTO HIGH-PERFORMANCE NETWORKS (IFVH) |
CONFIGURING JUNIPER NETWORKS FIREWALL/IPSEC VPN PRODUCTS (CJFV) |
CONFIGURING JUNIPER NETWORKS FIREWALL/IPSEC VPN PRODUCTS (CJFV) |
MCAFEE |
MCAFEE ENDPOINT SECURITY 10.X ADMINISTRATION |
MCAFEE ENDPOINT SECURITY UPGRADE |
MCAFEE ADVANCED THREAT DETECTION ADMINISTRATION |
MCAFEE VIRUSSCAN AND EPOLICY ORCHESTRATOR ADMINISTRATION |
MCAFEE NETWORK SECURITY PLATFORM ADMINISTRATION |
MCAFEE HOST INTRUSION PREVENTION SYSTEM ADMINISTRATION |
MCAFEE DATA LOSS PREVENTION ENDPOINT ADMINISTRATION |
SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM) ADMINISTRATION |
MICROSOFT |
SECURITY FUNDAMENTALS |
SECURING WINDOWS SERVER 2016 |
OFFENSIVE SECURITY |
PENETRATION TESTING WITH KALI LINUX |
ADVANCED WINDOWS EXPLOITATION |
OFFENSIVE SECURITY WIRELESS ATTACKS (WIFU) |
CRACKING THE PERIMETER (CTP) |
ADVANCED WEB ATTACKS AND EXPLOITATION |
METASPLOIT UNLEASHED |
OFFENSIVE SECURITY PENETRATION TESTING LAB |
PALO ALTO |
FIREWALL ESSENTIALS 8.0: CONFIGURATION AND MANAGEMENT (EDU-210) |
PANORAMA 8.0: MANAGE MULTIPLE FIREWALLS (EDU-221) |
FIREWALL 8.0: DEBUG AND TROUBLESHOOT (EDU-311) |
FIREWALL 7.1: INSTALL, CONFIGURE, AND MANAGE (EDU-201) |
FIREWALL 7.1: CONFIGURE EXTENDED FEATURES (EDU-205) |
PANORAMA 7.1: MANAGE MULTIPLE FIREWALLS (EDU-221) |
FIREWALL 7.1: MANAGE CYBERTHREATS (EDU-231) |
FIREWALL 7.1: DEBUG AND TROUBLESHOOT (EDU-311) |
TRAPS 3.4: DEPLOY AND OPTIMIZE (EDU-285) |
TRAPS 3.4: INSTALL, CONFIGURE AND MANAGE (EDU-281) |
RIVERBED |
WAN200 OPTIMIZATION ESSENTIALS |
WAN310 OPTIMIZING ENTERPRISE APPLICATIONS AND PROTOCOLSWAN200 OPTIMIZATION ESSENTIALS |
WAN350 IMPLEMENTING ENTERPRISE OPTIMIZATION ARCHITECTURES |
NPM200 PERFORMANCE MONITORING ESSENTIALS |
RIVERBED APM200 APPLICATION PERFORMANCE MONITORING ESSENTIALS |
RIVERBED RCPE-APPV APPLICATION VISIBILITY |
HCB200 HYPER-CONVERGED BRANCH ESSENTIALS |
SABSA |
SABSA FOUNDATION MODULES (F1 & F2) |
MODULE A1 – ADVANCED SABSA RISK ASSURANCE & GOVERNANCE |
MODULE A3 – ADVANCED SABSA ARCHITECTURE & DESIGN |
SANS |
NETWARS - TOURNAMENT |
NETWARS: CONTINUOUS |
AUD507: AUDITING & MONITORING NETWORKS, PERIMETERS & SYSTEMS |
AUD480: TOP 4 MITIGATION STRATEGIES: IMPLEMENTING & AUDITINGENTING AND AUDITING THE CRITICAL SECURITY CONTROLS - IN-DEPTH |
AUD566: IMPLEMAUD440: CRITICAL SECURITY CONTROLS: PLANNING, IMPLEMENTING AND AUDITING |
AUD440: CRITICAL SECURITY CONTROLS: PLANNING, IMPLEMENTING AND AUDITING |
FOR408: WINDOWS FORENSIC ANALYSIS |
FOR508: ADVANCED DIGITAL FORENSICS, INCIDENT RESPONSE, AND THREAT HUNTING |
FOR518: MAC FORENSIC ANALYSIS |
FOR578: CYBER THREAT INTELLIGENCE |
FOR526: MEMORY FORENSICS IN-DEPTH |
FOR572: ADVANCED NETWORK FORENSICS AND ANALYSIS |
FOR585: ADVANCED SMARTPHONE FORENSICS |
FOR610: REVERSE-ENGINEERING MALWARE: MALWARE ANALYSIS TOOLS AND TECHNIQUES |
ICS515: ICS ACTIVE DEFENSE AND INCIDENT RESPONSE |
ICS410: ICS/SCADA SECURITY ESSENTIALS |
ICS456: ESSENTIALS FOR NERC CRITICAL INFRASTRUCTURE PROTECTION |
MGT415: A PRACTICAL INTRODUCTION TO RISK ASSESSMENT |
MGT414: SANS TRAINING PROGRAM FOR THE CISSP® CERTIFICATION EXAM |
MGT433: SECURING THE HUMAN: HOW TO BUILD, MAINTAIN AND MEASURE A HIGH-IMPACT AWARENESS PROGRAM |
MGT512: SANS SECURITY LEADERSHIP ESSENTIALS FOR MANAGERS WITH KNOWLEDGE COMPRESSION |
MGT514: IT SECURITY STRATEGIC PLANNING, POLICY AND LEADERSHIP |
MGT535: INCIDENT RESPONSE TEAM MANAGEMENT |
LEG523: LAW OF DATA SECURITY AND INVESTIGATIONS |
SEC301: INTRO TO INFORMATION SECURITY |
SEC401: SECURITY ESSENTIALS BOOTCAMP STYLE |
SEC440: CRITICAL SECURITY CONTROLS: PLANNING, IMPLEMENTING AND AUDITING |
SEC480: TOP 4 MITIGATION STRATEGIES: IMPLEMENTING & AUDITING |
SEC501: ADVANCED SECURITY ESSENTIALS - ENTERPRISE DEFENDER |
SEC502: PERIMETER PROTECTION IN-DEPTH |
SEC503: INTRUSION DETECTION IN-DEPTH |
SEC504: HACKER TOOLS, TECHNIQUES, EXPLOITS AND INCIDENT HANDLING |
SEC505: SECURING WINDOWS WITH THE CRITICAL SECURITY CONTROLS |
SEC506: SECURING LINUX/UNIX |
SEC511: CONTINUOUS MONITORING AND SECURITY OPERATIONS |
SEC524: CLOUD SECURITY FUNDAMENTALS |
SEC542: WEB APP PENETRATION TESTING AND ETHICAL HACKING |
SEC546: IPV6 ESSENTIALS |
SEC550: ACTIVE DEFENSE, OFFENSIVE COUNTERMEASURES AND CYBER DECEPTION |
SEC560: NETWORK PENETRATION TESTING AND ETHICAL HACKING |
SEC561: INTENSE HANDS-ON PEN TESTING SKILL DEVELOPMENT (WITH SANS NETWARS) |
SEC562: CYBERCITY HANDS-ON KINETIC CYBER RANGE EXERCISE |
SEC566: IMPLEMENTING AND AUDITING THE CRITICAL SECURITY CONTROLS - IN-DEPTH |
SEC575: MOBILE DEVICE SECURITY AND ETHICAL HACKING |
SEC579: VIRTUALIZATION AND PRIVATE CLOUD SECURITY |
SEC580: METASPLOIT KUNG FU FOR ENTERPRISE PEN TESTING |
SEC617: WIRELESS ETHICAL HACKING, PENETRATION TESTING, AND DEFENSES |
SEC642: ADVANCED WEB APP PENETRATION TESTING AND ETHICAL HACKING |
SEC660: ADVANCED PENETRATION TESTING, EXPLOIT WRITING, AND ETHICAL HACKING |
SEC760: ADVANCED EXPLOIT DEVELOPMENT FOR PENETRATION TESTERS |
SYMANTEC |
ADMINISTRATION OF SYMANTEC VIP (MARCH 2017) |
ADMINISTRATION OF SYMANTEC IT MANAGEMENT SUITE 8.0 |
ADMINISTRATION OF DATA LOSS PREVENTION 14.5 |
ADMINISTRATION OF SYMANTEC CYBER SECURITY SERVICES (MAY 2016) |
ADMINISTRATION OF SYMANTEC ADVANCED THREAT PROTECTION 2.0.2 |
ADMINISTRATION OF SYMANTEC ENDPOINT PROTECTION 14 |
ADMINISTRATION OF SYMANTEC DATA CENTER SECURITY - SERVER ADVANCED 6.7 |
VALIDATION AND ID PROTECTION (VIP) SERVICE R1 |
IT MANAGEMENT SUITE 8.0 FUNDAMENTALS |
IT MANAGEMENT SUITE 8.0 MODULES |
CLIENT MANAGEMENT SUITE 7.6 ADMINISTRATION |
CLIENT MANAGEMENT SUITE 7.6 IMPLEMENTER |
ASSET MANAGEMENT SUITE 7.5 ADMINISTRATION |
DATA LOSS PREVENTION 14.5: ADMINISTRATION – MUST COMPLETE ALL MODULES FOR CEUS |
DATA LOSS PREVENTION 14.5: DIFFERENCES |
CSS ADMIN R1 – MUST COMPLETE ALL MODULES FOR CEUS |
SYMANTEC DATA CENTER SECURITY – SERVER ADVANCED 6.7 ADMINISTRATION – MUST COMPLETE ALL MODULES FOR CEUS |
ADVANCED THREAT PROTECTION 2.X: INCIDENT RESPONSE – MUST COMPLETE ALL MODULES FOR CEUS |
SYMANTEC ENDPOINT PROTECTION 12.1.X ADMINISTRATION |
SYMANTEC ENDPOINT PROTECTION 12.1 MAINTAIN AND TROUBLESHOOT |
EMAIL SECURITY SERVICES AND WEB SECURITY SERVICE: ADMINISTRATION |
ENDPOINT PROTECTION 14: CONFIGURE AND PROTECT |
ENDPOINT PROTECTION 14: DIFFERENCES |
ENDPOINT PROTECTION 14: MIGRATION AND UPGRADES |