Courses

Vendor-Neutral Courses Focusing on Cyber and Cloud Security

Filter
CAP: Certified Authorization Professional

(ISC)² Cyber Security

CPE
35

Our CAP training program delivers a comprehensive review of authorizing and maintaining information systems.

CCFP: Certified Cyber Forensics Professional

(ISC)² Cyber Security

CPE
35

Students review the CCFP CBK: cyber forensics techniques and procedures to support investigations.

CCSP: Certified Cloud Security Professional

(ISC)² Cloud Security

CPE
35

Our CCSP training focuses on the best practices in cloud security architecture, design, operations, and service orchestration.

CISSP-ISSAP (Architecture)

(ISC)² Cyber Security

CPE
35

CISSP-ISSAP analyzes the design of security solutions and providing management with risk-based guidance to meet organizational goals.

CISSP-ISSEP (Engineering)

(ISC)² Cyber Security

CPE
35

Our CISSP-ISSEP training reviews the practical application of systems engineering principles and processes to develop secure systems.

CISSP-ISSMP (Management)

(ISC)² Cyber Security

CPE
35

CISSP-ISSMP covers establishing, presenting, and governing information security programs with management and leadership skills.

CISSP: Certified Information Systems Security Professional

(ISC)² Cyber Security

CPE
35

CISSP covers the required information to effectively design, engineer, and manage the overall security posture of an organization.

CSSLP: Certified Secure Software Lifecycle Professional

(ISC)² Cyber Security

CPE
35

Our CSSLP course covers the key qualifications and practices of developers building secure software applications.

HCISPP: HealthCare Information Security and Privacy Practitioner

(ISC)² Cyber Security

CPE
21

HCISPP focuses on implementing, managing, and assessing security and privacy controls for healthcare and patient information.

SSCP: Systems Security Certified Practitioner

(ISC)² Cyber Security

CPE
35

SSCP reviews implementing, monitoring and administering IT infrastructure in accordance with info. security policies and procedures.

 

Sign In

 

Request a consultation