Courses

Vendor-Neutral Courses Focusing on Cyber and Cloud Security

Filter
CAP: Certified Authorization Professional

(ISC)² Cyber Security

CPE
35

Our CAP training program delivers a comprehensive review of authorizing and maintaining information systems.

CASP: CompTIA Advanced Security Practitioner

CompTIA Cyber Security

CPE
35

CASP focuses on critical thinking and judgment across a spectrum of security disciplines in complex environments.

CCISO: Certified Chief Information Security Officer

EC-Council Cyber Security

CPE
35

CCISO reviews the real-world experience necessary to succeed at the highest executive levels of Information Security.

CCSK Foundation: Certificate of Cloud Security Knowledge

Cloud Security Alliance Cloud Security

CPE
14

CCSK Foundation training (2-days) reviews the security aspects of the cloud and what's needed for a secure cloud business environment.

CCSK PLUS: Certificate of Cloud Security Knowledge

Cloud Security Alliance Cloud Security

CPE
21

CCSK Plus training (3-days) reviews the security aspects of cloud computing and what's needed for a secure cloud business environment.

CCSP: Certified Cloud Security Professional

(ISC)² Cloud Security

CPE
35

CCSP training (5-days) focuses on the best practices in cloud security architecture, design, operations, and service orchestration.

CEH: Certified Ethical Hacker

EC-Council Cyber Security

CPE
35

CEH provides the knowledge & skills to protect your network, while also analyzing the tools & techniques hackers maliciously utilize.

CGEIT: Certified in the Governance of Enterprise IT

ISACA Cyber Security

CPE
28

Our CGEIT training seminar is a comprehensive review of enterprise IT governance principles and practices.

CHFI: Computer Hacking Forensic Investigator

EC-Council Cyber Security

CPE
35

CHFI reviews the process of detecting hacking attacks and properly collecting evidence to make a report and conduct audits.

CISA: Certified Information Systems Auditor

ISACA Cyber Security

CPE
35

Our CISA course reviews auditing, controlling, monitoring and assessing information technology and business systems.

CISM: Certified Information Security Manager

ISACA Cyber Security

CPE
28

CISM is a review of international security practices; managing, designing, overseeing and assessing an enterprise's information security.

CISSP-ISSAP (Architecture)

(ISC)² Cyber Security

CPE
35

CISSP-ISSAP analyzes the design of security solutions and providing management with risk-based guidance to meet organizational goals.

 

Sign In

 

Request a consultation