Software Application Security Courses
Learning Tree's Software Application Security Courses offer a range of specialized training, from Microsoft 365 Security Administration to web application and AWS security. Learners can gain practical experience in SecDevOps, secure software development, and security engineering, as well as prepare for various industry certifications. These courses provide the necessary skills and knowledge to build secure applications, protect users and organizations, and maintain compliance in the ever-evolving cybersecurity landscape.
-
CertNexus
CertNexus CyberSAFE Training: Avoid phishing, social engineering, viruses, ransomware & malware.
SAFE 5 AGILIST, SAFE, SAFE 5, CYBERSECURITY FOUNDATIONS, CYBER SECURITY FOUNDATION, CYBER, CYBER SECURITY FOUNDATIONS, CYBERSECURITY FOUNDATION, CYBERSECURITY INTRO, CYBERSECURITY INTRODUCTION, CYBER SECURITY INTRO, CYBER SECURITY INTRODUCTION, cybersecurity, cyber safety, cyber awareness, data security, network security, internet security, cloud security, cyber threats, cyber risks, computer security, mobile device security, vulnerability, breach, cyber hygiene, cyber education, cyber training, CA certification, cyber defense, cyber protection, cyber best practices, cyber resilience, cyber readiness, cyber preparedness, cyber incident response, cyber incident management, cyber incident handling, cyber incident investigation, cyber incident reporting, cyber incident recovery, cyber incident prevention, cyber incident mitigation, cyber incident detection, cyber incident analysis, cyber incident assessment, cyber incident notification, cyber incident communication, cyber incident escalation, cyber incident remediation, cyber incident resolution, cyber incident tracking, cyber incident monitoring, cyber incident logging, cyber incident auditing, cyber incident compliance, cyber incident regulation, cyber incident legislation, cyber incident policy, cyber incident procedure, cyber incident guideline, cyber incident standard, cyber incident framework, cyber incident model, cyber incident taxonomy, cyber incident ontology, cyber incident database, cyber incident repository, cyber incident archive, cyber incident history, cyber incident trend, cyber incident statistic, cyber incident research, cyber incident survey, cyber incident case study, cyber incident scenario, cyber incident simulation, cyber incident exercise, cyber incident drill, cyber incident test, cyber incident evaluation, cyber incident improvement, cyber incident innovation, cyber incident collaboration, cyber incident coordination, cyber incident partnership, cyber incident sharing, cyber incident exchange, cyber incident forum, cyber incident conference, cyber incident workshop, cyber incident seminar, cyber incident training. cybersecutiy, cyber safty, cyber awarenes, data secutiy, network secutiy, internet secutiy, cloud secutiy, cyber threts, cyber riks, computer secutiy, mobile device secutiy, vulnarability, breech, cyber hiegene, cyber educatin, cyber traning, CA certificatin, cyber defnce, cyber protectin, cyber best practises, cyber resilence, cyber rediness, cyber preparednes, cyber incident responce, cyber incident managment, cyber incident handeling, cyber incident investgation, cyber incident repoting, cyber incident recovry, cyber incident prevntion, cyber incident migitation, cyber incident detction, cyber incident analsis, cyber incident assesment, cyber incident notifcation, cyber incident comunicatin, cyber incident esclation, cyber incident remidiation, cyber incident reslution, cyber incident traking, cyber incident montoring, cyber incident loging, cyber incident audting, cyber incident complience, cyber incident regulaton, cyber incident legislaton, cyber incident polcy, cyber incident procedur, cyber incident
FoundationLess than a dayOnline or In-classStarts from $265 -
CompTIA
This CompTIA PenTest+® course introduces the general concept and methodologies related to penetration testing & preps you for the PT0-002 exam.
CompTIA PenTest+, certification exam, penetration testing, methodology, simulated pen test, U.S. DoD Directive 8140/8570.01, CSSP Analyst, CSSP Incident Responder, CSSP Auditor, CSSP Infrastructure Support, training, course, concepts, reinforce, fictitious company, pass, prepare, general concepts, methodologies, . CompTIA Pentest, certification, exam, pen testing, methodology, simulated pentest, CSSP Analyst, CSSP Incident Responder, CSSP Auditor, CSSP Infrastructure Support, training, course, concepts, reinforce, fictitious company, pass, prepare, general concepts, methodologies, .
Intermediate5 daysOnline or In-classStarts from $2,667 -
Learning Tree
This identity & access management course will teach you to protect your IT resources. Learn Single Sign-On, PKI, Federated Identity Management & more!
Identity management, access management, IAM, IdM, single sign-on, SSO, public key infrastructure, PKI, federated identity management, FIM, security, Windows operating system, course 468, {course 468}, identity managment, access managment, IdM, PK infrastructure, federated identity managment
Intermediate4 daysOnline or In-classStarts from $3,285 -
CertNexus
Get certified in CyberSec First Response with CertNexus. Learn to detect, analyze, and respond to network threats for the new CFR-410 exam.
CyberSec, First Responder, Certification, Training, IT Professionals, analyze threats, secure networks, problem-solving, protect, detect, respond, knowledge, practical skills, recover, attacks, thwart, potential threats, CFR Certification Exam, U.S. DoD Directive 8140/8570.01, CSSP Analyst, CSSP Infrastructure Support, CSSP Incident Responder, CSSP Auditor, CyberSecur, First Respondor, Certificat, Trainning, IT Profesionals, threat analysis, network security, problem solving, protection, detection, response, knowlege, practical skils, attaks, thward, potencial threats.
Intermediate5 daysOnline or In-classStarts from $2,667 -
EC-Council
CYBRScore Ethical Hacking Essentials Labs include 22 hands-on labs to prepare you to exploit networks to discover how to protect your system from attackers.
Ethical hacking, hacking techniques, Internet, skilled professionals, hands-on labs, exploit networks, attacker, protect system, ethical hacker, learning objectives, Certified Ethical Hacker, certification, Course 2031, ethical hack, hack techniques, internet hacking, skilled professionals, hands on labs, network exploit, ethical hacker certification, course 2031
FoundationMulti-WeekStarts from $190 -
Learning Tree
Detect security vulnerabilities in web-based apps, networks & systems with CYBRScore's 19 hands-on labs on tools & techniques.
security, techniques, Internet, professionals, vulnerability, assessment, management, labs, hands-on, detect, exploit, web-based, applications, networks, computer systems, Windows, Linux, OS, mitigation, countermeasures, learning objectives, National Cybersecurity Workforce Framework, NIST SP-800-181, course content, Vulnerability Assessment Analyst, Course 589 securty, techniqes, internt, profssionals, vulnurability, asesment, managment, lab, hnds-on, detct, explot, web-basd, applcations, netwroks, computr systms, Winows, Linx, operatig system, mitgation, countremeasures, learning objctives, Nationl Cybersecurity Workforce Framewrk, NIST SP-800-181, coure cntent, Vulnerability Asessment Analyst, Coure 589
FoundationMulti-WeekStarts from $125 -
Learning Tree
CYBRScore Pentesting & Network Exploitation Labs include 4 hands-on labs on reconnaissance, scanning, enumeration, exploitation & pillaging for 802.3 networks.
Penetration testing, network exploitation, security techniques, reconnaissance, scanning, enumeration, exploitation, pillaging, 802.3 networks, hands-on labs, Course 537, pentesting, exploition, reconaissance, scannning, ennumeration, pillageing.
FoundationMulti-WeekStarts from $125 -
Learning Tree
CYBRScore Digital Media Forensics Essentials Labs include 19 hands-on labs that provide an introduction to media collection, imaging and analysis.
Digital forensics, computer forensics, cyber forensics, forensic investigation, media analysis, media collection, imaging, security techniques, internet security, digital evidence, forensic labs, forensic tools, forensic software, forensic techniques, digital investigation, cyber investigation, forensic analysis, forensic imaging, forensic examination, media forensics, computer investigation, digital media analysis, digital media collection, digital media imaging, internet forensics, cyber security, digital security. Digital forensiks, computer forensiks, cyber forensiks, forensic investagation, media anaylsis, media colection, imageing, security tecniques, internet secutiry, digital evdence, forensic lab, forensic tool, forensic sofware, forensic tecniques, digital investagation, cyber investagation, forensic anaylsis, forensic imageing, forensic examinasion, media forensix, computer investagation, digital media anaylsis, digital media colection, digital media imageing, internet forensic, cyber secutiry.
FoundationMulti-WeekStarts from $125 -
EC-Council
Get CEH certified with our training course! Learn to protect your network with hands-on labs and tools. Pass the EC-Council CEH v12 exam.
CEH training, CEH v12, EC-Council, Certified Ethical Hacker, network security, tools and techniques, hands-on labs, real-life scenarios, CEH Certification Exam, U.S. DoD Directive 8140/8570.01, CSSP Analyst, CSSP Infrastructure Support, CSSP Auditor, CSSP Incident Responder, CEH traning, Certified Ethical Haker, network secirity, tools and tecnhiques, hands-on lab, real-life scenarious, CEH Certificaton Exam, CSSP Analist, CSSP Infrastrucutre Support, CSSP Auditer, CSSP Incident Responser.
Intermediate5 daysOnline or In-classStarts from $3,413 -
EC-Council
Learn a holistic approach to organizational threat intelligence in this course. Build effective defenses against future attacks.
Certified Threat Intelligence Analyst, C|TIA, training program, organizational threat intelligence, business risks, internal threats, external threats, known threats, unknown threats, holistic approach, method-driven course, effective threat intelligence, future threats, attacks, mitigate, identify, secure, concepts, organizations, EC Council, Certified Threat Intelligance Analyst, CTIA, C-TIA, Certified Threat Intelligence Anaylst
Advanced3 daysOnline or In-classStarts from $2,727 -
Learning Tree
Learn to defend your organization from cyber attacks and protect your data with our course on securing communications and information.
Defending the Perimeter from Cyber Attacks Training, security principles, secure firewalls, Virtual Private Network VPN , network perimeter, malicious attacks, confidentiality, integrity, availability, communications, data, TCP/IP, client server architecture, cyber attaks, secutiry, firewals, virtual privet network, malitious attaks, confidenciality, integrety, availibility, commuinications, TCP IP, client-server architecure
Intermediate4 daysOnline or In-classStarts from $3,285 -
Learning Tree
This Cyber Security Risk Assessment Training course teaches how to protect your organization by employing a standards-based risk management process.
cybersecurity training, risk assessment, security assessment, compliance assessment, risk management, security posture, laws and regulations, cybersecurity requirements, organizational security, standards-based risk management, cyber security training, risk asessment, compliance asessment, security postur
Foundation4 daysOnline or In-classStarts from $3,285 -
EC-Council
Attend this EC-Council CHFI Certification course to get prepped to successfully pass the EC-Council EC0-312-49.
CHFI, Computer Hacking Forensic Investigator, certification, training, v10, digital forensic, evidence analysis, cyber forensic, exam, U.S. DoD Directive, CSSP Incident Responder, CSSP Infrastructure Support, searching, seizing, chain-of-custody, acquisition, preservation, analysis, reporting, tools, theories, in-demand, EC-Council, primary, skills, experts CHF certification Computer Hacking Forensics Investigator digital forensics cyber forensics DoD Directive 8140/8570.01 CSSP Incident Responder CSSP Infrastructure Support
Intermediate5 daysOnline or In-classStarts from $2,525 -
EC-Council
Get certified in ECIH with EC-Council's course. Learn to handle security incidents & pass the exam. Includes voucher.
EC-Council, Certified Incident Handler, ECIH, training, computer security, incidents, information system, incident response, principles, techniques, threats, policies, voucher, Learning Tree, certification prep, EC Council, Incident Handler, ECHI, trainning, computer secutiry, insidents, information sistem, incident reponse, priciples, technics, threts, policys, vauvher, Lerning Tree, sertification prep.
Intermediate3 daysOnline or In-classStarts from $1,000 -
CompTIA
This CASP+® Training course prepares you for the CASP+ exam certifying your knowledge and skills in enterprise security and risk management.
ADVANCED SECURITY PRACTITIONER, ADVANCED CYBERSECURITY PRACTITIONER, ADVAN, ADVANCED CYBER SECURITY PRACTITIONER, CompTIA CASP+, training, certification, exam, enterprise security, risk management, research, analysis, computing, communications, business disciplines, DoD Directive 8140/8570.01, Technical IAT Level-III, Management IAM Level-II, Information Assurance Security Architect/Engineer IASAE Level-I, Level-II, CompTIA CASP, enterprise secutiry, risk managment, communictions, information assurance, architec, enginear.
Advanced5 daysOnline or In-classStarts from $2,667 -
CompTIA
This official CompTIA CySA+® certification training preps you to successfully pass the CS0-002 exam & be ready to meet advanced persistent threats head on.
CompTIA CySA+, certification, training, cybersecurity analyst, APTs, exam, CS0-002, Network+, CASP, skills, analytical approach, network security, tools, techniques, threats, U.S. DoD Directive 8140/8570.01, Technical IAT Level-II, CSSP Analyst, CSSP Infrastructure Support, CSSP Incident Responder, CSSP Auditor, CompTIA CySA, CySA+ certification, cybersecurity analyst training, APTs head on, CySA+ exam, Network+ certification, CASP certification, cybersecurity analyst skills, network security tools, U.S. DoD Directive 8140/8570.01 Technical IAT Level 2.
Intermediate5 daysOnline or In-classStarts from $2,667 -
Learning Tree
In this Vulnerability Assessment course, you learn how to create a network security vulnerability assessment checklist to prevent network exploitation.
Vulnerability Assessment, Training, Protecting, Organization, Security, Breaches, Risk, Enterprise, Network, Checklist, Exposed, Infrastructure, Server, Desktop, Reports, Configure, Scanners, Detect, Exposure, Prevent, Exploitation, Mis-spellings Vulnerabilty, Assesment, Trainning, Protectin, Organiztion, Securty, Braches, Risks, Enterprize, Netwrok, Checklst, Exposd, Infrastucture, Serer, Desktp, Reprots, Configre, Vunerability, Scaners, Detct, Exposur, Prvent, Exploatation.
Intermediate4 daysOnline or In-classStarts from $3,285 -
Learning Tree
In this NIST Compliance Checklist course, learn to assess your regulatory environment, & select & implement a successful risk management framework.
NIST compliance, compliance checklist, cyber security posture, risk assessment, risk management, risk management framework, organizational cyber security, cyber security failures, cyber security risk management, security readiness, NIST, NIST complience, NIST compiance, compliance cheklist, cyber security postur, risk assesment, risk mangement, mangement framework, organizational security, cyber security risk mangement, secuirty readiness
Foundation1 dayTeam Training -
Learning Tree
In this NIST training course (Cybersecurity Framework), US government employees will learn how to meet all cyber laws & regulations in their agency.
NIST, cybersecurity, framework, training, US Government, risk assessment, risk management, protect, organization, losses, laws, regulations, agencies, attendees, course notes, workbook, workshops, source document, download, free of charge, cyberscurity, frmaework, traiing, govrenment, assesment, mangement, orginization, reglations, attendies.
Intermediate4 daysOnline or In-classStarts from $3,285 -
Learning Tree
This Cyber Security Success Factors course provides an introduction to the 4 pillars of cyber security. Examine real cyber attacks & their countermeasures.
cyber security, security training, success factors, network security, cyber attacks, countermeasures, passwords, data integrity, digital signatures, confidentiality, encryption, network authentication, open source tools, cybersecurity, secure network, cyber security training, cyber security success, network passwords, digital security, secure data, cyber security countermeasures, network authentication tools, cyber security encryption, cybersecurity training, cybersecurity success factors, cyber attack countermeasures, cybersecurity tools, data encryption, network security training, cyber security authentication, cyber security confidentiality, cyber security integrity, cybersecurity countermeasures, cybersecurity authentication, cybersecurity encryption, cybersecurity confidentiality, cybersecurity integrity, cyber security open source, cyberscurity, cypersecurity, cybersceurity, cybersecutiry, cybersecurity, cybersucurity.
Foundation1 dayTeam Training -
Learning Tree
Learn cybersecurity for managers, members of the board and senior executives to understand, assess, and take a proactive posture in cyber security.
cyber security, training, managers, boardroom, executives, risk assessment, management frameworks, security gaps, liability, certification objectives, United States Department of Defence, DoD, Information Assurance, potential security gaps, ciber security, traning, mangers, bordroom, executivs, risk asessment, managment frameworks, secuity gaps, certifcation objectives, Unitd States Departmnt of Defense, DOD, Information Assuranc, potentail security gaps
IntermediateLess than a dayTeam Training -
Learning Tree
In this Penetration Testing course, you will learn to discover weaknesses in your own network by using the mindset and methods of a hacker.
Penetration Testing, Pen Testing, Ethical Hacking, Network Security, Cybersecurity, Vulnerability Assessment, Exploitation Techniques, Risk Reduction, Antivirus Evasion, Operating System Compromise, Network Weaknesses, Countermeasures, Hacker Mindset, Security Testing, Enterprise Security, Defensive Techniques, Cyber Defense, Security Auditing, Intrusion Testing, Security Assessment. Penatration Testing, Penitration Testing, Pentration Testing, Ethical Haking, Network Secutiry, Cyber Secutiry, Vulnerability Assesment, Exploitation Techniqes, Risk Redution, Antivirus Eavsion, Operating System Compromize, Network Weakneses, Counter Measures, Haker Mindset, Security Testng, Entrprise Security, Defensive Techniqes, Cyber Defence, Security Auditing, Intrusion Testng, Security Asessment.
Intermediate4 daysOnline or In-classStarts from $3,285 -
ISACA
The cloud audit certification training teaches the essential principles needed to successfully obtain the Certificate of Cloud Auditing Knowledge (CCAK).
Cloud Audit, Cloud Computing Systems, Certificate of Cloud Auditing Knowledge, CCAK, Cloud Security Alliance, ISACA, IT Audit, Security, Cybersecurity, Risk, Privacy, Governance, Cloud Security, Auditing, Certification Training Clod Audit Cloud Computng Systems Certificat of Cloud Auditing Knowledge CCAK Certification Cloud Securty IT Audt Cyber-security Privcy Governace
Intermediate2 daysOnline or In-classStarts from $2,447 -
(ISC)²®
The CCSP Training and Certification course teaches the knowledge & skills needed to pass the certification & become a Certified Cloud Security Professional.
ISC ², certified cloud security professional, CCSP, training, certification, security professionals, data security, cloud infrastructure security, information security, secure data centers, cloud environments, cloud-based data access, cloud security solutions, detecting security incidents, responding to security incidents, cloud computing technologies, Microsoft Azure, security practices, physical infrastructure, cloud resource access control, protection of sensitive data, load balancers, security operations centers, SOC, cloud environment security, CCSP exam, industry standard, cloud security expertise, U.S. DoD Directive 8140/8570.01, Technical IAT Level-III, Information Assurance Security Architect/Engineer IASAE Level-III. CCSP certification cloud security professional certification cloud security training cloud security course cloud computing security cloud security expert cloud security solutioncloud security practicecloud security infrastructure cloud security incidents
Intermediate5 daysOnline or In-classStarts from $3,812 -
Microsoft
Get certified in Microsoft Azure Security with Learning Tree's AZ-500 course. Enhance your IT security skills and protect your organization's data.
AZ-500, AZ500, AZ-50, AZ-500T, 8530AZ-500, AZ-500, AZ500, AZ, 500, Microsoft Azure, security controls, organization security, security posture, security vulnerabilities, identity and access, platform protection, data security, application security, security operations, security best practices, defence in depth, least privileged access, role-based access control, multi-factor authentication, shared responsibility, zero trust model, security protocols, Virtual Private Networks, VPN, Internet Security Protocol, IPSec, Secure Socket Layer, SSL, disk encryption, data encryption, Azure workloads, Azure administration, Windows operating system, Linux operating system, scripting languages, PowerShell, CLI, Azure Security Engineers, certification exam, digital platforms, data protection. Microsoft Azur secutiry controls secutiry posture secutiry vulnerabilities identitiy and access data securtiy applicaiton security secutiry best practices defence in deapth least priviledged access role-based access contorl multi-factor athentication shared responsibilty zero trust modle Virtual Private Network VPN Internet Secutiry Protocol IPSec Secure Sockect Layer SSL disk encrption data encrption Azur workloads Azur administration Windows operating systme Linux operating systme scrpting languages PowerShel Azur Security Enginers certificaiton exam digial platforms data proteciton
Intermediate4 daysOnline or In-classStarts from $3,285 -
Microsoft
Learn about security, compliance, and identity concepts with Microsoft solutions. Perfect for SC-900 exam prep.
sc900, Microsoft Security, Compliance, Identity, Fundamentals, Training, SC-900, networking, cloud computing, IT, Microsoft Azure, Microsoft 365, exam objective domain, end-to-end solution, Microsoft Securty, Complience, Identty, Fundamentls, Traning, SC900, networing, clooud computng, IT, Micrsoft Azur, Micrsoft 365.
Foundation1 dayOnline or In-classStarts from $900 -
Microsoft
Prepare for the SC-200 exam with this course for Security Operations professionals people who work in a Security Operations job role.
sc200, Microsoft Security Operations Analyst Training, investigate, respond, hunt, threats, Microsoft Azure Sentinel, Azure Defender, Microsoft 365 Defender, mitigate, cyber threats, technologies, configure, Kusto Query Language, KQL, detection, analysis, reporting, security operations role, exam SC-200, Mircosoft, Azzure, Defendar, Kusto Query Langauge, securty operations, exam SC200
Intermediate4 daysOnline or In-classStarts from $3,285 -
Microsoft
This course includes identity content for Azure AD, enterprise application registration, conditional access, identity governance, and other identity tools.
SC300, Microsoft Identity and Access Administrator, Azure AD, identity and access management, secure authentication, authorization access, enterprise applications, seamless experiences, self-service management, adaptive access, governance, troubleshoot, monitor, report, hybrid identity solutions, identity governance, strategic identity projects
Intermediate4 daysOnline or In-classStarts from $3,285 -
Microsoft
This course helps learners prepare for the Microsoft Information Protection Administrator exam (SC-400).
SC400, SC-400, Microsoft Information Protection Administrator, data governance, information protection, data loss prevention policies, sensitive information types, sensitivity labels, data retention policies, Office 365 message encryption, exam preparation, SC-400, Microsoft 365, data security, data privacy, compliance, data classification, encryption, data leakage prevention, data protection policies, data protection regulations, data protection standards, information security, information governance, information management, information security policies, information security standards, information security regulations, information protection policies, information protection regulations, information protection standards, data security policies, data security regulations, data security standards, data privacy policies, data privacy regulations, data privacy standards, compliance policies, compliance regulations, compliance standards. Microsoft Information Protektion Administrator data goverment data loss preventation policiesensitive information tipesensitivity labledata retention polocieOffice 365 massage encryption SC400 Microsoft 365 deployment data secutiry data priavcy complience data clasification data encryptoin data leakage preventation data protection polociedata protection regulationdata protection standardinformation secutiry information goverment information managment information secutiry polocieinformation secutiry standardinformation secutiry regulationinformation protection polocieinformation protection regulationinformation protection standarddata secutiry polociedata secutiry regulationdata secutiry standarddata priavcy polociedata priavcy regulationdata priavcy standardcomplience polociecomplience regulationcomplience standards
Intermediate4 daysOnline or In-classStarts from $3,285 -
CompTIA
This CompTIA Cloud+® certification training will prepare you to pass the CompTIA Cloud+ CV0-003 exam and earn the corresponding certification.
CompTIA Cloud+ Certification, Cloud+ CV0-003 exam, cloud technologies, workload migrations, cloud vendors, automation, orchestration, cybersecurity, U.S. DoD Directive 8140/8570.01, IAM Level-I, CSSP Analyst, CSSP Infrastructure Support, cloud security, cloud solutions, cloud deployments, cloud implementation, cloud management, cloud training, cloud computing. CompTIA Cloud Certification, Cloud+ CV0-003, cloud tecnologies, work load migrations, cloud venders, automatoin, orcestration, cyber security, US DoD Directive 8140/8570.01, IAM Level 1, CSSP Analyst, CSSP Infrastructure support, cloud securty, cloud solutinos, cloud deplyoments, cloud implimentation, cloud managment, cloud traning, cloud computting.
Foundation5 daysOnline or In-classStarts from $3,370 -
ISACA
This CDPSE training course provides enterprises the ability to identify technologists who can keep the organization compliant efficiently and cost-effectively.
CDPSE, privacy requirements, privacy controls, technology platforms, products, processes, legal professionals, compliance, IT professionals, data breaches, technical privacy solutions, software engineer, domain architect, security engineer, privacy solutions architect, project manager, data scientist, privacy analyst, privacy manager. CDPCE privicy privace privasy privasy controls technolgy platforms privcy solutions architect data scientest privcy analyst
Intermediate3 daysOnline or In-classStarts from $2,727 -
IAPP
Learn IAPP's Information Privacy Professional/U.S. Government (CIPP/US) certification program.
Certified Information Privacy Professional, CIPP/US, government privacy laws, privacy program development, privacy compliance, auditing, records management, agency reporting obligations, IAPP, ANSI-accredited, Information Privacy Professional, U.S. Government, certification program, examination prep course, timed practice test, review, exam blueprint, test takers, Privacy Certification Handbook 2018, regulations, policies, public sector, private sector, key concepts, instructor, potential, Certified Information Pirvacy Professional, CIPP/USA, CIPP/USG, governement privacy laws, privcy program development, privary compliance, auditing, records managment, agnecy reporting obligations, IAPP, ANSI-credited, Information Pirvacy Professional, U.S. Government, certification program, examination prep course, timed practice test, reveiw, exam blueprint, test takers, Privacy Certification Handbok 2018, regualtions, polices, public sector, private sector, key concepts, insturctor, potentail.
Foundation2 daysOnline or In-classStarts from $2,447 -
IAPP
Get Certified Information Privacy Technologist Training based on IAPP's CIPT/US certification program.
Certified Information Privacy Technologist, CIPT, privacy, data protection, IT products, IT services, development, engineering, deployment, auditing, information and communication technologies, systems, IAPP, ANSI-accredited, certification, CIPT/US, tech pros, securing data privacy, examination prep course, Information Privacy Professional, key concepts, timed practice test, review, exam blueprint, potential test takers, Privacy Certification Handbook 2018, Certified Information Privacy Technoligist, CIPT certification, privcy, data protecion, IT producs, IT servces, developement, engeneering, deploymnet, auditting, informaton and communicatin technologies, systms, IAPP, ANSI-acredited, certificatoin, CIPT/US, tec pros, securig data privcy, examinaton prep course, Informaton Privacy Professioal, key concpts, timed practce test, revew, exam blueprit, potentail test takers, Privacy Certifcation Handbok 2018.
Foundation2 daysOnline or In-classStarts from $2,447 -
ASPE
Learn how zero trust security solves typical security issues, and how to implement it in your environment.
zero trust security, trust model, security approach, technical implementation, federal agencies, physical access, connectivity, remote work, authentication, authorization, user access, application security, container networking, transaction-level controls, access rules, well-defined transaction. zero trsut security trsut model technial implementation fderal agenciephsyical accesconectivity authentification authorisation aplication security container network transation-level controlaccess rulse
Foundation3 daysOnline or In-classStarts from $2,285 -
ISACA
Get certified with our CISA training course! Covers all 5 domains on the exam, meets DoD Directive 8140/8570.01 requirements.
CISA (CERTIFIED INFORMATION SYSTEMS AUDITOR), CERTIFIED INFORMATION SYSTEMS AUDITOR), CISA CERTIFIED INFORMATION SYSTEMS AUDITOR, ISACA, CISA, information systems, auditing, control, information security, IT governance, management of IT, acquisition, development, implementation, operations, maintenance, support, protection, information assets, certification, exam, U.S. DoD Directive 8140/8570.01, Technical IAT Level-III, CSSP Auditor, training, course, domains, requirements, passing, ICSA, CISCO, ISAC, CIZA, CIZO, IT governance and management of IP, acquisition, development and implimentation.
Intermediate4 daysOnline or In-classStarts from $2,772 -
EC-Council
This CCISO Certification course from EC-Council focuses on applying information security management principles & preps you to pass the CCISO exam.
CCISO, Certified CISO, EC-Council, information security, executive management, CISM Certification Exam, ISACA, U.S. DoD Directive 8140/8570.01, IAM Level-II, IAM Level-III, CSSP Manager, training, certification, principles, technical knowledge, aspiring CISO, seasoned professionals, developing, maintaining, successful information security program, top-level, executives, knowledge transfer, critical areas, CCISO, Certifid CISO, EC-Council, information secutiry, exective management, CISM Certifcation Exam, ISACA, U.S. DoD Directive 8140/8570.01, IAM Level-2, IAM Level-3, CSSP Manger, traning, certifcation, princples, technical knowlege, aspiring CISo, sasoned professionals, developping, maintaing, succesful information secuity program, top-level, executivs, knowlege transfer, critcal areas.
Advanced5 daysOnline or In-classStarts from $2,860 -
ISACA
This official ISACA CGEIT certification course preps you for the exam & provides you with in-depth coverage of the CGEIT Framework & its implementation.
CGEIT certification, governance of enterprise IT, IT resources, benefits realization, risk optimization, senior managers, CIOs, compliance, IS professionals, IT governance, manage risk, ITcontribution, certification prep, exam candidate information guide, ISACA certification prep training, CGEIT certifcation, governance of enterprise IT, IT resorces, benfits realization, risk optimiztion, senior manegers, CIO's, complience, IS profesionals, IT goverance, manage risck, IT-relatd contribution, certifcation prep, exam candiate information guid, ISACA certifcation prep trainng.
Intermediate4 daysOnline or In-classStarts from $2,772 -
ISACA
This official ISACA CRISC training course helps you prepare for the certification exam & provides you with in-depth coverage of the four CRISC domains.
ISACA, certification, CRISC, risk identification, IT risk assessment, risk response, mitigation, risk and control monitoring, reporting, enterprise risk management, IT professional, risk and control professional, business analyst, project manager, compliance professional, defend, protect, future-proof, exam, experience, IS control, prep course, exam candidate information guide, rules, deadlines, exam dates, CRIC, CISRC, ISACCA, risk managment, IT risk asessment, risk responce, mitigiation, control monitering, enterprize risk managment, IT profesional, risk and controle profesional, buisness analyst, project maneger, compliance profesional, defened, protec, futur-proof, exam candidate information guid, exam day ruls, exam dat, deadlin, IS controll.
Intermediate4 daysOnline or In-classStarts from $2,772 -
ISACA
In this course, you will gain the knowledge needed to successfully pass the certification exam and become a CISM, ISACA Certified Information Security Manager.
CISM, Certified Information Security Manager, certification exam, security governance, risk management, compliance, security program development, security incident management, CAP Certification Exam, U.S. DoD Directive 8140/8570.01, IAM, Level-I, Level-II, CISIM, CISM certification, information security manager, security managment, security incident managment
Intermediate4 daysOnline or In-classStarts from $2,772 -
(ISC)²®
This CISSP® Training and Certification prep course provides in-depth training in the (ISC)²® curriculum that will help prepare you to pass your CISSP exam.
CISSP TRAINING AND CERTIFICATION PREP (WITH EXAM VOUCHER), CISSP, CISSP TRAINING AND CERTIFICATION PREP, CISSP, training, certification, prep course, security, risk, assets, framework, communication, networks, software development, U.S. DoD Directive 8140/8570.01, Technical IAT Level-III, Information Assurance Security Architect/Engineer IASAE Level-I, Information Assurance Security Architect/Engineer IASAE Level-II, Management IAM Level-II, Management IAM Level-III, CISPP, CISP, CISS, training and certifcation, secutiry, asssets, communciation, netwroks, software developemnt
Intermediate5 daysOnline or In-classStarts from $3,812 -
(ISC)²®
This CGRC® training and certification course prepares you for the CGRC exam plus risk management frameworks.
CGRC, Certified in Governance, Risk and Compliance, CAP, Certified Authorization Professional, information security, risk management, authorization, legal requirements, regulatory requirements, IAM, U.S. DoD Directive 8140/8570.01, certification, training, practitioner, modules, prerequisites, delivery, exam, advocate, mission, operations, security risk management, , CGRC® with registered trademark symbol , Certified in Governance Risk and Complience, Certified Authorisation Professional, information secutiry, risk managment, authroization, legal requriements, regulatory requriements, U.S. DoD Directive 8140/8570.01 Management IAM Level-I, U.S. DoD Directive 8140/8570.01 Management IAM Level-II.
Foundation5 daysOnline or In-classStarts from $3,440 -
(ISC)²®
This SSCP® training and certification course prepares you to pass the exam and become a Systems Security Certified Practitioner.
SSCP, SSC, SSCPT, SSCP, certification, course, exam, systems security, Access Controls, Security Operations, Administration, Incident Response, Cryptography, Network Security, DoD Directive 8140/8570.01, Technical IAT Level-I, Technical IAT Level-II, CSSP Infrastructure, official ISC, pass, practitioner, in-depth coverage, skills, concepts, U.S. DoD, requirements, IT, become, prepared, training SSCP certification SSCP certifcation, SSCP certifacation, SSCP certificiation Cryptography Cryptograpy, Cryptograhpy, Cryptograhpy DoD Directive 8140/8570.01 DoD Directive 8140/8570.1, DoD Directive 8140/8570.01 Technical, DoD Directive 8140/8570.1 Technical Technical IAT Level-I Technical IAT Level 1, Technical IAT Level-I, Technical IAT Level 1 Technical IAT Level-II Technical IAT Level 2, Technical IAT Level-II, Technical IAT Level 2 CSSP Infrastructure CSSP Infrastucture, CSSP Infrastrucure, CSSP Infrastracture
Foundation5 daysOnline or In-classStarts from $3,812 -
CMMC
The Cybersecurity Maturity Model Certification (CMMC) Training Course prepares students for the Cyber-AB Certified CMMC Professional (CCP) certification.
CMMC Certification Training, Cybersecurity Maturity Model Certification (CMMC) Training Course, CYBERSECURITY FOUNDATIONS, CYBER SECURITY FOUNDATION, CyberAB, CMMCAB, CYBER, CYBER SECURITY FOUNDATIONS, CYBERSECURITY FOUNDATION, CYBERSECURITY INTRO, CYBERSECURITY INTRODUCTION, CYBER SECURITY INTRO, CYBER SECURITY INTRODUCTION, CMMC certification, cybersecurity, maturity model, compliance, policies, plans, DoD, Cyber AB, accreditation, CCP, CMMC Professional, assessment team, lead assessor, marketplace, CCA, Certified CMMC Assessor, training, course, practices, business operations, Level requirements. Cybsersecurity Maturity Model Certification Cybersecurity Maturity Model Certfication Cybersecurity Maturiy Model Certification CMMC certiciation Cyber AB accredidation ACQ Accreditation Body CCP certificaton CMM Certified CMMC Manager CMA Certified CMMC Auditor CCN Certified CMMC Navigators
Foundation5 daysOnline or In-classStarts from $3,357 -
CMMC
This Certified CMMC Assessor Training course prepares you to become a Certified Assessor Level 1, which enables you to conduct maturity level 1 assessment.
Certified CMMC Assessor Training, CCA, Certified CMMC Assessor exam, CMMC Level assessment, workflow, efficiency, Department of Defense, DoD, cybersecurity requirements, Secretary of Defense, CMMC program, cybersecurity competency, compliance, Controlled Unclassified Information, CUI, virtual instructor-led training, virtual classrooms, real-time delivery methods, employee training, team performance. Certified CMC Assessor Training CMMC Assesor Training Certified CMMC Assesor Training CCA exam CMMC Level assessment cyber security requirementSecretary of Defence CMMC program cyber security competency Controlled Unclassified Information virtual instructor led training virtual classroom real time delivery methods
Intermediate5 daysOnline or In-classStarts from $3,357 -
CMMC
Learn about CMMC 2.0 & certification requirements in our NIST SP 800-171 course.
CMMC, NIST, Cybersecurity Maturity Model Certification, Defense Industrial Base, consultants, contractors, DoD contracting organizations, SP 800-171, Non-Federal Organizations, U.S. Federal Government, controlled unclassified information, self-attestation guidance, 3rd party assessments, CCMC, NISTA, Cybersecurity Maturity Model Certifcation, Defence Industrial Base, SP 800 171, self-attestation guidiance, 3rd party asesments.
Intermediate4 daysOnline or In-classStarts from $3,285 -
Learning Tree
This NICE Framework workshop teaches you how to apply the NICE Cybersecurity Workforce Framework to your organization's specific cybersecurity workforce needs.
cybersecurity, workforce, framework, workshop, National Initiative for Cybersecurity Education, NICE, organization, needs, interactive, instructor, advisor, environment, experience cibersecurity work force fraemwork workshp National Iniciative for Cybersecurity Education NCE organiztion experiance
Foundation1 dayTeam Training -
(ISC)²®
CYBRScore Systems Security Essentials Labs include 32 hands-on labs on risk management, network security, identity & access management & security operations.
security, risk management, network security, identity management, access management, security operations, cybersecurity, information security, data protection, threat management, vulnerability management, incident response, penetration testing, ethical hacking, cryptography, firewall, antivirus, intrusion detection, secutiry, netwrok security, identitiy management, access managemnt, cyberscurity, information secutiry, data protectio, threat managment, vulnerability managemnt, incidnt response, penatration testing, ethycal hacking, cryptograpy, firwall, antivrus, intrution detection.
FoundationMulti-WeekStarts from $190 -
Learning Tree
This course provides an introduction to fundamental cybersecurity risk management concepts and how they are applied to modern supply chains.
2014, cybersecurity, risk management, supply chain, third-party, fourth-party, critical suppliers, mitigation strategies, hardware, software, services, external sources, analyzing, treating, monitoring, cyber risk, cyber security, risk managment, suply chain, third party, fourth party, critcal suppliers, mitgation strategies, hardwear, softwear, servises, exteranl sources, analysing, treatng, monitering, ciber risk.
Intermediate2 daysOnline or In-classStarts from $2,225 -
APMG International
Learn to implement TBM & automate reporting for the federal govt. Reduce manual data entry & improve efficiency with authoritative data.
Technology Business Management, TBM, APMG Certification, Office of Management and Budget, OMB, Federal Government, authoritative data, automation, self-reporting, federal agencies, Technolgy Business Management, TBM certification, Offce of Management and Budget, OMB mandate, Federal Govrnment, authoritive data, self-reporting.
Intermediate3 daysOnline or In-classStarts from $2,745 -
Microsoft
Prepare to design and evaluate cybersecurity strategies in Zero Trust, GRC, SecOps, and data with our Microsoft Cybersecurity Architect (SC-100) course.
SC100, Microsoft, Cybersecurity, Architect, SC-100, course, design, evaluate, strategies, Zero Trust, Governance, Risk, Compliance, GRC, security operations, SecOps, data, applications, solutions, principles, specify, requirements, cloud infrastructure, SaaS, PaaS, IaaS, Microsft, Cyberscurity, Architech, SC100, coures, desing, evaulate, Startegies, Zero Trsut, Govenance, Riks, Complience, GrC, security opertions, SecOps, dta, applicatons, solutons, priniciples, specifiy, requirments, clud infrastructure, Saas, Paas, Iaas.
Advanced4 daysOnline or In-classStarts from $3,285 -
(ISC)²®
Get (ISC)² Certified in Cybersecurity (CC) for entry-level to advanced certs & leadership roles. No experience needed.
CYBERSECURITY FOUNDATIONS, CYBER SECURITY FOUNDATION, CYBER, CYBER SECURITY FOUNDATIONS, CYBERSECURITY FOUNDATION, CYBERSECURITY INTRO, CYBERSECURITY INTRODUCTION, CYBER SECURITY INTRO, CYBER SECURITY INTRODUCTION, ISC2, Certified in Cybersecurity, CC, entry-level certification, workforce gap, opportunities, field, candidates, recent graduates, career changers, IT professionals, cybersecurity certifications, CISSP, Certified Information Systems Security Professional, Security+, leadership roles, ISC squared, certified cyber security, CC certification, cybersecurity certifications, CISSP certification.
Foundation1 dayOnline or In-classStarts from $900 -
Learning Tree
The Information Security Training provides the knowledge and skills to analyze and assess network risks, then select & deploy appropriate countermeasures.
CYBERSECURITY FOUNDATIONS, CYBER SECURITY FOUNDATION, CYBER, CYBER SECURITY FOUNDATIONS, CYBERSECURITY FOUNDATION, CYBERSECURITY INTRO, CYBERSECURITY INTRODUCTION, CYBER SECURITY INTRO, CYBER SECURITY INTRODUCTION, Information security, cybersecurity, network security, risk assessment, countermeasures, security training, security awareness, security protocols, security policies, security best practices, security management, security controls, security audits, security compliance, security certification, security assessment, security analysis, security planning, security implementation, security monitoring, security incident response, security incident management, security incident investigation, security incident reporting, security incident handling, security incident resolution, security incident prevention, security incident mitigation, security incident recovery, security incident remediation, security incident escalation, security incident notification, security incident communication, security incident documentation, security incident training, security incident awareness, security incident education, security incident prevention training, security incident response training, security incident management training, security incident investigation training, security incident reporting training, security incident handling training, security incident resolution training, security incident prevention education, security incident mitigation education, security incident recovery education, security incident remediation education, security incident escalation education, security incident notification education, security incident communication education, security incident documentation education, security incident awareness education, security incident prevention certification, security incident response certification, security incident management certification, security incident investigation certification, security incident reporting certification, security incident handling certification, security incident resolution certification, security incident prevention accreditation, security incident mitigation accreditation, security incident recovery accreditation, security incident remediation accreditation, security incident escalation accreditation, security incident notification accreditation, security incident communication accreditation, security incident documentation accreditation, security incident awareness accreditation, security incident prevention best practices, security incident response best practices, security incident management best practices, security incident investigation best practices, security incident reporting best practices, security incident handling best practices, security incident resolution best practices, security incident prevention guidelines, security incident response guidelines, security incident management guidelines, security incident investigation guidelines, security incident reporting guidelines, security incident handling guidelines, security incident resolution guidelines, security incident prevention policies, security incident response policies, security incident management policies, security incident investigation policies, security incident reporting policies, security incident handling policies, security incident resolution policies, security incident prevention protocols, security incident response protocols, security incident management protocols, security incident investigation protocols, security incident reporting protocols, security incident handling protocols, security incident resolution protocols, security incident prevention controls, security incident response controls, security incident management controls, security incident investigation controls, security incident reporting controls, security incident handling controls, security incident resolution controls, security incident prevention audits, security incident response audits, security incident management audits, security incident investigation audits, security incident reporting audits, security incident handling audits, security incident resolution audits, security incident prevention compliance, security incident response compliance, security incident management compliance, security incident investigation compliance, security incident reporting compliance, security incident handling compliance, security incident resolution compliance, security incident prevention mispell
Foundation4 daysOnline or In-classStarts from $3,285 -
Learning Tree
This boot camp goes in-depth into the tools, techniques and processes used by forensics examiners to find and extract evidence from computers.
Computer forensics, cybercrime investigation, forensics examiners, evidence extraction, evidence analysis, evidence reporting, operating system analysis, Windows examination, Linux examination, forensic tools, CCFE certification, criminal record, basic computer skills, A+ certification, law enforcement professionals, legal professionals, information security professionals, corporate forensics, incident handling, learning computer forensics, developing skills, forensics examinors, evidance, operting system, forensics tools, CCFA certification, computer criminology, information security forensics.
Intermediate5 daysOnline or In-classStarts from $5,610 -
Learning Tree
In this Introduction to Cyber Security course, you'll learn to assess your environment, identify needs & enumerate critical elements of security awareness.
CYBERSECURITY FOUNDATIONS, CYBER SECURITY FOUNDATION, CYBER, CYBER SECURITY FOUNDATIONS, CYBERSECURITY FOUNDATION, CYBERSECURITY INTRO, CYBERSECURITY INTRODUCTION, CYBER SECURITY INTRO, CYBER SECURITY INTRODUCTION, Introduction, Cyber Security, Starter Guide, Training Course, Protect, Organization, Social Engineering Attacks, Cyber Threats, Disaster Recovery, Continuity of Operations, Awareness Course, Establish Security, Assessing, Environment, Identifying Needs, Deficits, Critical Elements, Security Awareness, Prior Experience, Cyber Secutiry, Cyper Security, Security Awarness, Disater Recovery
Foundation1 dayOnline or In-classStarts from $900 -
EC-Council
Get ready to work with diverse hardware, software & network setups with CYBRScore's 16 security-focused labs.
design, configure, manage, troubleshoot, analyze traffic, wired networks, wireless networks, security, hardware, software, IT professional, CompTIA, Network+ certification, desing, configre, manag, troubleshhot, analys traffic, wirelss networks, secutiry, hardwear, softwere, IT profesionel, comptia, netwrok+ sertification
FoundationMulti-WeekStarts from $125 -
CompTIA
CYBRScore Security Essentials Labs include 19 distinct, hands-on labs that prepare you with the essential principles of network security & risk management.
Security Essentials, network security, risk management, CompTIA Security+, certification, labs, hands-on, techniques, professionals, learning objectives, internet security, cybersecurity, information security, data protection, threat management, vulnerability assessment, access control, cryptography, misconfigurations, incident response, secruity, essentails, comptia, cyberscurity, information secuirty.
FoundationMulti-WeekStarts from $125 -
Cisco
Learning Tree's SCOR training helps you prepare for the Cisco® CCNP® Security and CCIE® Security certifications and for senior-level security roles.
Implementing and Operating Cisco Security Core Technologies, SCOR Course Outline, CCNP Security, CCIE Security, cybersecurity attacks, security for networks, cloud and content, endpoint protection, secure network access, visibility and enforcements, Cisco Firepower Next-Generation Firewall, Cisco ASA Firewall, access control policies, mail policies, 802.1X Authentication, Cisco Stealthwatch Enterprise, Cisco Stealthwatch Cloud, threat detection features, Implementing and Administering Cisco Solutions, Ethernet, TCP/IP networking, Windows operating system, Cisco IOS networking, networking security concepts, Security Engineer, Network Engineer, Network Designer, Network Administrator, Systems Engineer, Consulting Systems Engineer, Technical Solutions Architect, Cisco Integrators/Partners, Network Manager, Cisco integrators, partners, hands-on experience, best practices, professional-level security job roles, expert-level security job roles, 350-701 SCOR exam, CCNP Security certification, Cisco Certified Specialist Security Core certification. Implementing and Operating Cisco Security Core Technologies Implementing and Oprating Cisco Security Core Technologies, Implementing and Operating Cisco Security Core Technologis SCOR Course Outline SCOR Course Outlline CCNP Security CCNP Secuirty, CCNP Securtiy CCIE Security CCIE Secuirty, CCIE Securtiy cybersecurity attacks cybersecurity attaks security for networks securty for networks cloud and content clound and content endpoint protection endpint protection secure network access secure netowrk access visibility and enforcements visiblity and enforcements Cisco Firepower Next-Generation Firewall Cisco Firepower Next-Generation Firewal Cisco ASA Firewall Cisco ASA Firewal access control policies access control policie mail policies mail policie 802.1X Authentication 802.1X Authentiction Cisco Stealthwatch Enterprise Cisco Stealthwatch Enterprize Cisco Stealthwatch Cloud Cisco Stealthwatch Clud threat detection features threat detetion features Implementing and Administering Cisco Solutions Implementing and Adminstering Cisco Solutions Ethernet Ethernat TCP/IP networking TCP/IP netowrking Windows operating system Windows oprating system Cisco IOS networking Cisco IOS netowrking networking security concepts networking securty concepts Security Engineer Secuirty Engineer Network Engineer Netowrk Engineer Network Designer Netowrk Designer Network Administrator Netowrk Administrator Systems Engineer
Intermediate5 daysOnline or In-classStarts from $5,413 -
Cisco
Learn about TCP/IP protocol suite devices, operations, and vulnerabilities in this 5-day Cisco course.
Understanding Cisco Cybersecurity Operations Fundamentals, CBROPS, network infrastructure devices, vulnerabilities, TCP/IP protocol suite, security concepts, network application operations, attacks, Windows operating system, Linux operating system, data investigation, cybersecurity analyst, threat-centric security operations center, network protocol, device protection, operational efficiency, Cisco Certified CyberOps Associate certification, 200-201 exam, Instructor-Led, Self-Paced Study, classroom, self-study, digital courseware, preparation, Implementing and Administering Cisco Solutions, CCNA, Ethernet, networking security concepts. Understanding Cybersecurity Operations Fundamentals Cisco Cybersecurity Operations Fundamentals CBROPS v1.0 TCP/IP protocol suit cyber security analyst threat-centric security operations centre Cisco Certified CyberOps Associate cert Implementing and Administering Cisco Solutions CCNA
Foundation5 daysOnline or In-classStarts from $5,427 -
Cisco
Get Cisco Firepower Next-Gen IPS. Prep for 500-285, get Network Security Firepower Cert. with official SSFIPS Training.
Securing Networks, Cisco Firepower, Next-Generation IPS, NGIPS, firewall security, system components, event analysis, NGIPS tuning, Snort rules language, File inspection, Malware inspection, Security Intelligence, Domain Awareness, system architecture, policies, manage devices, discovery, application control, network-based malware, file controls, performance tuning, event analysis, user administration, TCP/IP networking, network architecture, intrusion detection systems, IDS, technical professionals, security administrators, security consultants, network administrators, system engineers, technical support personnel, channel partners, resellers. Securing Network, Cisco Fire power, Next-Gen IPS, NG-IPS, firewall securities, system component, event analyses, NGIPS tune, Snort rule language, File inspections, Mal-ware inspection, Security intelligent, Domain aware, system architectures, policy, manage device, discover, application controls, network-based malwares, file control, performance tunings, event analyses, user administration, TCP/IP network, network architectures, intrusion detection system, technical professional, security administrator, security consultant, network administrator, system engineer, technical support person, channel partner, reseller.
Intermediate5 daysOnline or In-classStarts from $5,220 -
Cisco
Enroll in Securing Email w/ Cisco Email Security. Prep for exam 300-710 & earn CCNP Security & Cisco Cert Specialist - Network Security Firepower.
Securing Networks, Cisco Firepower, Threat Defence, NGFW, NGIPS, routing, high availability, ASA, traffic control, NAT, network intelligence, file type detection, malware detection, deep packet inspection, site-to-site VPN, remote-access VPN, SSL decryption, system administration, troubleshooting, CCNP Security, Network Security Firepower, TCP/IP networking, network architecture, firewall, IPS, security administrators, security consultants, network administrators, system engineers, technical support personnel, channel partners, resellers, Securing Netwroks, CIsco Firepowr, Thrat Defence, NGF, NGIP, routng, hi availabilty, AS, trafic cntrol, NTA, network intellegence, file typ detection, malwere detection, deep packet inspecion, site-to-site VNP, remote-acess VNP, SSL decrytion, system administratin, troubleshootng, CCNP Securty, Network Securty Firepowr, TCP/IP netwroking, netwrok architecture, firewal, IPS, secuirty administrators, secuirty consultnts, netwrok administratrs, system enginerrs, technical supprt personnel, chanel partners, reselers.
Intermediate5 daysOnline or In-classStarts from $5,336 -
CompTIA
This CompTIA Security+® certification course prepares you for the CompTIA SY0-601 exam & ensures compliance & secures your organization.
CYBERSECURITY FOUNDATIONS, CYBER SECURITY FOUNDATION, CYBER, CYBER SECURITY FOUNDATIONS, CYBERSECURITY FOUNDATION, CYBERSECURITY INTRO, CYBERSECURITY INTRODUCTION, CYBER SECURITY INTRO, CYBER SECURITY INTRODUCTION, CompTIA Security+, training, certification, vendor-neutral, information system security, best practices, knowledge, systems, network security, network infrastructure, access control, assessments, audits, cryptography, organizational security, U.S. DoD Directive 8140/8570.01, Technical IAT Level-II, Management IAM Level-I, pass, exam, worldwide, benchmark, topics, demonstrate, requirements, comptia security, comptia security plus, comptia security certification, comptia security+ certification, comptia security course, comptia security training, comptia security+ training
Intermediate5 daysOnline or In-classPremiumBundleStarts from $1,675 -
EC-Council
Validate your cybersecurity skills with the C|CT Certification in network defense, ethical hacking, digital forensics, and security operations.
CYBERSECURITY FOUNDATIONS, CYBER SECURITY FOUNDATION, CYBER, CYBER SECURITY FOUNDATIONS, CYBERSECURITY FOUNDATION, CYBERSECURITY INTRO, CYBERSECURITY INTRODUCTION, CYBER SECURITY INTRO, CYBER SECURITY INTRODUCTION, Cybersecurity, technician, certification, entry-level, network defense, ethical hacking, digital forensics, security operations, C|CT, EC-Council, validate, foundational skills, increasing need, fundamental cybersecurity skills, domain, program, individual, strong skills, cybersecurity technician, certify, cyber security, cyber technician, cyber technician certification, ethical hacker, digital forensic, security operation, cyber defense, network security, cybersecurity validation, cybersecurity program.
Foundation5 daysOnline or In-classStarts from $3,710 -
EC-Council
In this Certified Network Defender (CND) training course, you will get prepped to pass the EC-Council CND 312-38 exam and learn how to manage a secure network.
Certified Network Defender, CND, EC-Council, 312-38 exam, network security, defensive security, data security, networking technologies, defensive software, confidentiality, integrity, availability, cyber security, network administrators, U.S. DoD Directive 8140/8570.01, Technical IAT Level-I, Technical IAT Level-II, Management IAM Level-I, CSSP Infrastructure Support, CYBRScore Lab Bundles, training, certification, pass, skills, design, manage, secure network, hands-on capability, build defenses, enterprise network, Certified Network Defendor, CND certification, EC Council, 31238 exam, cyber secutiry, network adminstrators, U.S. DoD Directive 8140/8570.1, Technical IAT Level 1, Technical IAT Level 2, Management IAM Level 1, CSSP Infrastructure Suppport.
Intermediate5 daysOnline or In-classStarts from $2,525 -
Learning Tree
This Disaster Recovery & Business Continuity course teaches you to identify vulnerabilities and implement a Business Continuity Management System (BCMS).
disaster recovery, business continuity, training, mission-critical, continuity needs, risk, incident response team charter, Business Continuity Management System, organizational resilience, disaster recovery plan, internal threats, external threats, ICT, Information and Communication Technology, Service Delivery, Line management, project management, Facilities, Human Resources, finance, disater recovery, bisiness continuity, traning, missin-critical, continuty needs, rsk, incidnt response team charter, Business Continuty Managment System, organzational resilience, disster recovery plan, internal threts, external threts, IT, Infrmation and Commnication Technology, Service Delivry, Line managment, project managment, Facilties, Humn Resources, finace.
Foundation4 daysOnline or In-classStarts from $3,285 -
EC-Council
This EC-Council Certified Application Security Engineer (CASE) .NET course teaches how to create secure applications & to achieve CASE .NET certification
EC-Council, Certified Application Security Engineer, CASE, .NET, hands-on, comprehensive, application security training, software professional, secure applications, critical security skills, knowledge, software development life cycle, SDLC, secure methodologies, insecure operating environment, exam prep, certification, exam voucher, secure programming concepts, programming experience, desktop, mobile, web, cloud applications, multiple choice questions, passing score, software developers, testers, architects, high quality, security, privacy. EC-Counsil Certifid Application Security Engineer CASE .NET appication security training sofware professional secure metodologiesecure programming concetprograming experience desktop, moble, web, cloude applicationexam preperation certificaton privacy and security.
Intermediate3 daysTeam Training -
Learning Tree
This secure software development course covers best practices needed to avoid opening up users, customers & organizations to attack at the application layer.
secure software development, software security, secure programming, application layer security, software developer best practices, proactive requirements, coding security, testing security, information security policy, staff security, risk mitigation, robust application development, software security training, secure coding practices, secure application development, software security strategy, secure software training, secure coding training, software development security
Foundation2 daysOnline or In-classStarts from $1,650 -
Learning Tree
Learn to integrate strong security measures into web app development with our Securing Web Apps Training.
Web application security, web service security, securing servers, cybersecurity training, full stack security, OWASP top 10, web app development, security measures, best practices, web-based applications, securing web services web application secutiry web service secutiry securing servrs cyber security training full stack cyberscurity OWASP top ten web app devlopment security mesures web-basd applications securing web servces
Intermediate4 daysOnline or In-classStarts from $3,285 -
(ISC)²®
This CSSLP® Training and Certification course provides you with in-depth coverage of the skills and concepts of the eight domains of software security.
CA, CSSLP, training, certification, ISC ², secure software, lifecycle professional, skills, concepts, domains, software security, software concepts, requirements, design, implementation, testing, lifecycle management, passing, exam, U.S. DoD Directive 8140/8570.01, Information Assurance Security Architect/Engineer, IASAE, Level-I, Level-II, requirements. CSSLP CSSP, CSSL, CSLLP ISC ² ISC2, ISC squared Information Assurance Security Architect/Engineer Information Assurance Security Architect/Engineering
Intermediate5 daysOnline or In-classStarts from $3,812 -
Microsoft
The Microsoft 365 Security course will prepare you for the MS-500 exam & achieve Microsoft 365 Certified: Security Administrator Associate designation.
ms500, ms-500, Microsoft 365, Security Administrator, user access, resources, user password protection, multi-factor authentication, Azure Identity Protection, Azure AD Connect, conditional access, threat protection technologies, threat vectors, Secure Score, Exchange Online protection, Azure Advanced Threat Protection, Windows Defender Advanced Threat Protection, threat management, information protection technologies, information rights-managed content, message encryption, labels, policies, rules, data loss prevention, archiving, retention, data governance, content searches, investigations, data retention policies, tags, in-place records management, SharePoint, email retention, eDiscovery investigations. Microsoft365 Security Admin multi factor authentication Azure ID Protection Azure AD Connector SecureScore ExchangeOnline Windows Defender ATP information rights managed content data loss prevension in place records management content sercheediscovery investigations
Intermediate4 daysOnline or In-classStarts from $3,285 -
AWS
This Security Engineering on AWS course teaches how to efficiently use Amazon Web Services security services to stay secure & compliant in the AWS Cloud.
AWS security, AWS security services, cloud security, data security, system security, compute security, storage security, networking security, database security, automation, continuous monitoring, logging, security incidents, AWS key services, AWS tools, AWS Cloud, AWS best practices, AWS security features, AWS secure services, cloud data security, cloud system security, cloud compute security, cloud storage security, cloud networking security, cloud database security, AWS automation, AWS monitoring, AWS logging, AWS security incidents, AWS security course, AWS security engineering
Intermediate3 daysOnline or In-classStarts from $2,552 -
CertNexus
Prepare for the CSC-210 exam with this CertNexus Cyber Secure Coder certification training course.
CertNexus, Cyber Secure Coder, software security, development teams, code, delivery, software quality, privacy issues, software development lifecycle, vulnerabilities, remediate, security defects, misconfiguration, design software, human element, all phases of development, CertNexus CSC-210 exam, Cert Nexus, Cyber Secure Coder Training, development team, software developement, privicy, vulnerabilites, remediate, secuirty, defects, misconfigurations, design softwere, human elemnt, all phases of developement, CertNexus CSC-210 exam.
Intermediate3 daysOnline or In-classStarts from $2,745 -
DevOps Institute
This SecDevOps Practitioner® (SDOP) Certification course builds on foundational SecDevOps knowledge while providing practical, hands-on experience.
SecDevOps, SDOP, certification, training, foundational practice, foundation course, implementation, practitioner-level class, techniques, pipeline architecture, effective team, best-practice processes, SecDevOp, SDOPs, certifcation, traning, foundatonal practice, foundaton course, implemenation, practitoner-level class, techiques, pipelne architecture, efective team, best-practce processes
Intermediate2 daysOnline or In-classStarts from $2,225