Courses

Vendor-Neutral Courses Focusing on Cyber and Cloud Security

Filter
CAP: Certified Authorization Professional

(ISC)² Cyber Security

CPE
40

Our CAP training program delivers a comprehensive review of authorizing and maintaining information systems.

CASP: CompTIA Advanced Security Practitioner

CompTIA Cyber Security

CPE
35

CASP focuses on critical thinking and judgment across a spectrum of security disciplines in complex environments.

CCISO: Certified Chief Information Security Officer

EC-Council Cyber Security

CPE
35

CCISO reviews the real-world experience necessary to succeed at the highest executive levels of Information Security.

CCSK Foundation: Certificate of Cloud Security Knowledge

Cloud Security Alliance Cloud Security

CPE
14

CCSK Foundation training (2-days) reviews the security aspects of the cloud and what’s needed for a secure cloud business environment.

CCSK Plus: Certificate of Cloud Security Knowledge

Cloud Security Alliance Cloud Security

CPE
21

CCSK Plus training (3-days) reviews the security aspects of cloud computing and what’s needed for a secure cloud business environment.

CCSP: Certified Cloud Security Professional

(ISC)² Cloud Security

CPE
40

CCSP training (5-days) focuses on the best practices in cloud security architecture, design, operations, and service orchestration.

CEH: Certified Ethical Hacker

EC-Council Cyber Security

CPE
35

CEH provides the knowledge & skills to protect your network, while also analyzing the tools & techniques hackers maliciously utilize.

CGEIT: Certified in the Governance of Enterprise IT

ISACA Cyber Security

CPE
28

Our CGEIT training seminar is a comprehensive review of enterprise IT governance principles and practices.

CHFI: Computer Hacking Forensic Investigator

EC-Council Cyber Security

CPE
35

CHFI reviews the process of detecting hacking attacks and properly collecting evidence to make a report and conduct audits.

CISA: Certified Information Systems Auditor

ISACA Cyber Security

CPE
35

Our CISA course reviews auditing, controlling, monitoring and assessing information technology and business systems.

CISM: Certified Information Security Manager

ISACA Cyber Security

CPE
28

CISM is a review of international security practices; managing, designing, overseeing and assessing an enterprise’s information security.

CISSP-ISSAP (Architecture)

(ISC)² Cyber Security

CPE
40

CISSP-ISSAP analyzes the design of security solutions and providing management with risk-based guidance to meet organizational goals.

CISSP-ISSEP (Engineering)

(ISC)² Cyber Security

CPE
40

Our CISSP-ISSEP training reviews the practical application of systems engineering principles and processes to develop secure systems.

CISSP-ISSMP (Management)

(ISC)² Cyber Security

CPE
40

CISSP-ISSMP covers establishing, presenting, and governing information security programs with management and leadership skills.

CISSP: Certified Information Systems Security Professional

(ISC)² Cyber Security

CPE
40

CISSP covers the required information to effectively design, engineer, and manage the overall security posture of an organization.

Cloud Audit and Compliance

Intrinsec Cloud Security

CPE
14

Gain the knowledge and skill to properly assess cloud service providers and analyze internal usage and readiness to adopt cloud services.

 

Sign In