|
AZ-104 Microsoft Azure Administrator Training Boot Camp
- AZ-104 Microsoft Azure Administrator Training Boot Camp
-
Fee: $2,495.00
Dates: 4/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Location:
Building:
Room:
Instructor:
This boot camp is for cloud and IT operations administrators, IT and cybersecurity professionals, cloud developers and entry-level cloud engineers, or anyone interested in learning how to deploy and manage cloud infrastructure. Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
Software Requirements:
- PC: Windows 10 or later.
- Mac: macOS 10.6 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
- Microsoft Word Online
- Adobe Acrobat Reader
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment and will be available online. As an Azure administrator, you will help your team implement cloud infrastructure while working closely with other roles to deliver Azure networking, security, database, application development, and DevOps solutions. During this Azure administrator certification boot camp, you will build your knowledge through hands-on labs, simulations, and real-world application of these skills. This combination of practical labs and expert instruction helps you leave the boot camp with applicable skills that you can immediately start to utilize in the workplace.
Upon course completion, you will have received a thorough understanding of Azure/cloud fundamentals and Azure identities and governance. You will also learn about Azure storage and compute resources, and how to configure and manage virtual networking. These are all necessary skills and knowledge to successfully deploy and manage Azure/cloud infrastructure at your organization.
With your enrollment in this AZ-104 certification course, you will receive an AZ-104 exam voucher for the Microsoft Certified: Azure Administrator Associate exam.
Our Certification Success Program, paired with our provided prep materials, boot camp sessions, and post-work, is designed to ease any concerns you may have when taking the certification exam. If your first attempt is unsuccessful, this program provides peace of mind that you may be eligible to take the certification exam a second time (if needed) at no additional fee.
*To qualify for a second certification exam voucher, students must:
- Attend at least 85% of each day of class
- Score 90% or higher on their final practice exam
- Take the first exam within 90 days of class completion
- Upload your exam failure notice from your first exam attempt
- Day 1
- Introductions
- Azure/Cloud Fundamentals Review
- Azure Identities & Governance
- Day 2
- Azure Storage Resources
- Azure Compute Resources
- Day 3
- Azure Compute Resources continued
- Configure and Manage Virtual Networking
- Day 4
- Azure Monitoring and Maintenance Resources
What you will learn
- Ways to implement cloud infrastructure
- Master the oversight of Azure identities and governance
- Gain expertise in configuring and administering Azure storage solutions
- Develop skills to deploy and oversee Azure compute resources
- Acquire the ability to establish and manage Azure virtual networks
- Become proficient in monitoring and sustaining Azure resources
How you will benefit
- Practice your skills in the hands-on labs and simulations
- Obtain real-world applications
- Prepare to earn the AZ 104: Azure Administrator certification
Infosec
Boot camps are led by instructors that have years of industry experience and are recognized as subject matter experts.
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.
As an Azure administrator, you will help your team implement cloud infrastructure while working closely with other roles to deliver Azure networking, security, database, application development, and DevOps solutions. During this Azure administrator certification boot camp, you will build your knowledge through hands-on labs, simulations, and real-world application of these skills. This combination of practical labs and expert instruction helps you leave the boot camp with applicable skills that you can immediately start to utilize in the workplace.
Upon course completion, you will have received a thorough understanding of Azure/cloud fundamentals and Azure identities and governance. You will also learn about Azure storage and compute resources, and how to configure and manage virtual networking. These are all necessary skills and knowledge to successfully deploy and manage Azure/cloud infrastructure at your organization.
With your enrollment in this AZ-104 certification course, you will receive an AZ-104 exam voucher for the Microsoft Certified: Azure Administrator Associate exam.
Our Certification Success Program, paired with our provided prep materials, boot camp sessions, and post-work, is designed to ease any concerns you may have when taking the certification exam. If your first attempt is unsuccessful, this program provides peace of mind that you may be eligible to take the certification exam a second time (if needed) at no additional fee.
*To qualify for a second certification exam voucher, students must:
- Attend at least 85% of each day of class
- Score 90% or higher on their final practice exam
- Take the first exam within 90 days of class completion
- Upload your exam failure notice from your first exam attempt
|
|
|
AZ-104: Microsoft Azure Administrator (Voucher Included)
- AZ-104: Microsoft Azure Administrator (Voucher Included)
-
Fee: $1,995.00
Dates: 4/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Location:
Building:
Room:
Instructor:
You will learn to manage Azure subscriptions and resources, implement and manage storage, deploy and manage virtual machines (VMs), configure and manage virtual networks, and manage identities. Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
Software Requirements:
- PC: Windows 8 or later.
- Mac: macOS 10.6 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
- Microsoft Word Online
- Adobe Acrobat Reader
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment and will be available online. The Microsoft Azure Administrator course is intended for those who are either looking to gain more knowledge about administering Azure cloud services, security, networking, and compute cloud abilities or who are looking to pass the AZ-104 exam and complete their Microsoft Certified: Azure Administrator certification.
You will learn to Implement access management with Azure users, groups, and role-based access control. This is in addition to creating Windows virtual machines in the Azure Portal, with Azure PowerShell, or using ARM Templates. You will also implement Azure Active Directory, Self-Service Password Reset, Azure AD Identity Protection, and integrated SaaS applications, understand virtual networking components, IP addressing, network routing options, and much more.
Furthermore, you will learn to use Azure Monitor to configure Azure alerts and review the Azure Activity Log, explain virtual machine usage cases, storage options, pricing, operating systems, networking capabilities, and general planning considerations. You will also discover how to optimize your use of Azure tools like the Azure portal, Azure PowerShell, Cloud Shell, and the Azure CLI.
By course completion, you will have the AZ-104 training needed to sit for the AZ-104: Microsoft Azure Administrator Exam. This course offers enrollment with a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.
- Azure Subscriptions, Resources & Billing
- Azure Policies
- Azure Users & Groups
- Azure Logging & Monitoring
- Azure Resource Management
- Azure User & Groups
- Azure Logging & Monitoring
- Azure Resource Management
- Azure Storage Accounts & Types
- Azure Virtual Machines
- Shared Access Signature, backup & File
- Deploy & Manage Virtual Machines
- Azure Containers
- Configure & Manage Victual Networks
- Manage Identities
What you will learn
- Query and analyze Log Analytics data
- Deploy resources with ARM templates and organize Azure resources
- Create Azure storage accounts for different data replication, pricing, and content scenarios
- Implement virtual machine storage, blob storage, Azure files, and structured storage
- Secure and manage storage with shared access keys, Azure backup, and Azure File Sync
- Store and access data using Azure Content Delivery Network, and the Import and Export service
- Deploy custom server images and Linux virtual machines
- Configure virtual machine networking and storage options
- Implement virtual machine high availability, scalability, and custom scripts extensions
- Backup, restore, and monitor virtual machines
- Implement Azure DNS domains, zones, record types, and resolution methods
- Configure network security groups, service endpoints, logging, and network troubleshooting
- Implement site connectivity schemas, including VNet-to-VNet connections and virtual network peering
- Configure domains and tenants, users and groups, roles, and devices
- Implement and manage Azure Active Directory integration options and Azure AD Application Proxy
- Implement and configure Azure Load Balancer, Azure Traffic Manager, and Azure Application Gateway
- Use Azure RBAC to grant a granular level of access based on an administrator's assigned tasks
- Use Azure Multi-Factor Authentication to configure a strong authentication for users at sign-in
How you will benefit
- You will be prepared for the AZ-104: Microsoft Azure Administrator Exam
- Grow your IT career and open new job opportunities
Doug Bassett
Doug Bassett is an IT instructor specializing in Microsoft Azure, Server 2016/19, and Exchange messaging. He holds many highly sought-after IT certifications, including Microsoft MCSE, Microsoft MCSA, CompTIA Network+, Cisco CCNA, and Microsoft MCT. In addition to his certifications, Doug has expert knowledge of Microsoft Server 2000, 2003, 2008/2012/2016/2019, Exchange Server and Exchange Online, and Networking structure and applications. As an instructor, Doug is deeply involved in helping his students understand complex concepts and loves to approach teaching a subject from multiple angles.
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.
The Microsoft Azure Administrator course is intended for those who are either looking to gain more knowledge about administering Azure cloud services, security, networking, and compute cloud abilities or who are looking to pass the AZ-104 exam and complete their Microsoft Certified: Azure Administrator certification.
You will learn to Implement access management with Azure users, groups, and role-based access control. This is in addition to creating Windows virtual machines in the Azure Portal, with Azure PowerShell, or using ARM Templates. You will also implement Azure Active Directory, Self-Service Password Reset, Azure AD Identity Protection, and integrated SaaS applications, understand virtual networking components, IP addressing, network routing options, and much more.
Furthermore, you will learn to use Azure Monitor to configure Azure alerts and review the Azure Activity Log, explain virtual machine usage cases, storage options, pricing, operating systems, networking capabilities, and general planning considerations. You will also discover how to optimize your use of Azure tools like the Azure portal, Azure PowerShell, Cloud Shell, and the Azure CLI.
By course completion, you will have the AZ-104 training needed to sit for the AZ-104: Microsoft Azure Administrator Exam. This course offers enrollment with a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.
|
|
|
AZ-500: Microsoft Azure Security Technologies (Voucher Included)
- AZ-500: Microsoft Azure Security Technologies (Voucher Included)
-
Fee: $1,995.00
Dates: 4/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Location:
Building:
Room:
Instructor:
This course is intended for Azure and Microsoft server security professionals and those who are looking to take and pass the AZ-500: Microsoft Azure Security Technologies exam. Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
Software Requirements:
- PC: Windows 8 or later.
- Mac: macOS 10.6 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
- Microsoft Word Online
- Adobe Acrobat Reader
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment and will be available online. Take the next step towards getting your Azure security certification. In this online training course, you will gain the knowledge and skills needed to implement security controls, maintain the security posture, and identify and remediate vulnerabilities by using a variety of security tools. This course also covers scripting and automation, virtualization, and cloud N-tier architecture while you study for the AZ-500 certification.
By course completion, you will be prepared to sit for the AZ-500: Microsoft Azure Security Technologies Exam. This course offers enrollment with a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.
- Azure AD Identities
- Securing Access
- Securing Application Access
- Access Control
- Network Security
- Azure Security Center
- Azure Containers
- Azure Vulnerability
- Security Operations
- Secure Applications & Data
What you will learn
- Describe specialized data classifications on Azure
- Identify Azure data protection mechanisms
- Implement Azure data encryption methods
- Secure Internet protocols and how to implement them on Azure
- Describe Azure security services and features
How you will benefit
- You will be prepared for the AZ-500: Microsoft Azure Security Technologies Exam
- Grow your IT career and open new job opportunities
Doug Bassett
Doug Bassett is an IT instructor specializing in Microsoft Azure, Server 2016/19, and Exchange messaging. He holds many highly sought-after IT certifications, including Microsoft MCSE, Microsoft MCSA, CompTIA Network+, Cisco CCNA, and Microsoft MCT. In addition to his certifications, Doug has expert knowledge of Microsoft Server 2000, 2003, 2008/2012/2016/2019, Exchange Server and Exchange Online, and Networking structure and applications. As an instructor, Doug is deeply involved in helping his students understand complex concepts and loves to approach teaching a subject from multiple angles.
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.
Take the next step towards getting your Azure security certification. In this online training course, you will gain the knowledge and skills needed to implement security controls, maintain the security posture, and identify and remediate vulnerabilities by using a variety of security tools. This course also covers scripting and automation, virtualization, and cloud N-tier architecture while you study for the AZ-500 certification.
By course completion, you will be prepared to sit for the AZ-500: Microsoft Azure Security Technologies Exam. This course offers enrollment with a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.
|
|
|
AZ-800: Administering Windows Server Hybrid Core Infrastructure (Voucher Included)
- AZ-800: Administering Windows Server Hybrid Core Infrastructure (Voucher Included)
-
Fee: $1,695.00
Dates: 4/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Location:
Building:
Room:
Instructor:
This online AZ 800 exam training is intended for Windows Server administrators. It is designed for anyone who is trying to attain the Microsoft Certified: Windows Server Hybrid Administrator Associate certification. Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
Software Requirements:
- PC: Windows 8 or later.
- Mac: macOS 10.6 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
- Virtual Labs included with the course
- Microsoft Word Online
- Adobe Acrobat Reader
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment. In this online Windows Server certification course, you will learn the fundamental skills required to administer core Windows Server 2022 workloads using on-premises, hybrid, and cloud technologies. From deploying and managing Active Directory Domain Services (AD DS) on-premises and in cloud environments to managing Windows Servers and workloads in a hybrid environment, you will get the training to succeed as a Windows Server administrator.
Your Windows Server training also touches on managing virtual machines and containers, as well as managing storage and file services. The course curriculum even dives into the fundamentals of implementing and managing an on-premises and hybrid networking infrastructure.
This course and the AZ-800: Administering Windows Server Hybrid Core Infrastructure exam are the first portion of the Microsoft Certified: Windows Server Hybrid Administrator Associate certification. Your course offers a voucher with your enrollment, which offers prepaid access to sit for the certifying exam (AZ-800) upon eligibility. To achieve your Microsoft server certification you must also successfully complete the AZ-801: Configuring Windows Server Hybrid Advanced Services exam, which is not included with this training program.
- Deploy and manage AD DS domain controllers
- Configure and manage multi-site, multi-domain, and multi-forest environments
- Create and manage AD DS security principals
- Implement and manage hybrid identities
- Manage Windows Server by using domain-based Group Policies
- Manage Windows Servers in a hybrid environment
- Manage Windows Servers and workloads by using Azure services
- Manage Hyper-V and guest virtual machines
- Create and manage containers
- Manage Azure Virtual Machines that run Windows Server
- Implement on-premises and hybrid name resolution
- Manage IP addressing in on-premises and hybrid scenarios
- Implement on-premises and hybrid network connectivity
- Configure and manage Azure File Sync
- Configure and manage Windows Server file shares
- Configure Windows Server storage
What you will learn
- Deploy and manage Active Directory Domain Services (AD DS) in on-premises and cloud environments
- Manage Windows Servers and workloads in a hybrid environment
- Manage virtual machines and containers
- Implement and manage an on-premises and hybrid networking infrastructure
- Manage storage and file services
How you will benefit
- Become prepared for the AZ-800: Administering Windows Server Hybrid Core Infrastructure exam
- Begin a career in cloud environments or broaden your skills if you're already working
- Become more efficient on the job and better able to manage cloud environments
Will Panek
Will Panek is a worldwide recognized Microsoft instructor and author. Will Panek is a 5-time Microsoft MVP and has published over 40 titles on Microsoft technologies. Will is a passionate and authoritative instructor, and makes sure that his students can implement Microsoft technologies and get themselves certified along the way. Outside the class and authorship, you'd be likely to find Will at the forge smithing his latest creation.
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.
In this online Windows Server certification course, you will learn the fundamental skills required to administer core Windows Server 2022 workloads using on-premises, hybrid, and cloud technologies. From deploying and managing Active Directory Domain Services (AD DS) on-premises and in cloud environments to managing Windows Servers and workloads in a hybrid environment, you will get the training to succeed as a Windows Server administrator.
Your Windows Server training also touches on managing virtual machines and containers, as well as managing storage and file services. The course curriculum even dives into the fundamentals of implementing and managing an on-premises and hybrid networking infrastructure.
This course and the AZ-800: Administering Windows Server Hybrid Core Infrastructure exam are the first portion of the Microsoft Certified: Windows Server Hybrid Administrator Associate certification. Your course offers a voucher with your enrollment, which offers prepaid access to sit for the certifying exam (AZ-800) upon eligibility. To achieve your Microsoft server certification you must also successfully complete the AZ-801: Configuring Windows Server Hybrid Advanced Services exam, which is not included with this training program.
|
|
|
AZ-801: Configuring Windows Server Hybrid Advanced Services (Voucher Included)
- AZ-801: Configuring Windows Server Hybrid Advanced Services (Voucher Included)
-
Fee: $1,695.00
Dates: 4/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Location:
Building:
Room:
Instructor:
This online Windows Server 2022 certification course is intended for Windows Server administrators. The training is designed for anyone who is trying to attain the Microsoft Certified: Windows Server Hybrid Administrator Associate certification. Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
Software Requirements:
- PC: Windows 8 or later.
- Mac: macOS 10.6 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
- Virtual Labs included with course
- Microsoft Word Online
- Adobe Acrobat Reader
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment. In this Microsoft Windows Server certification course, you will learn the fundamental skills required to configure advanced Windows Server services using on-premises, hybrid, and cloud technologies. Your Windows Server training covers securing Windows Server on-premises and hybrid infrastructures, including securing networking and storage, implementing and managing failover clusters, and using Azure services for related security issues.
The Windows Server certification course also dives into implementing and managing Windows Server high-availability, disaster recovery using Azure Site Recovery, migrating servers and workloads, and how best to monitor and troubleshoot Windows Server environments.
This comprehensive training is a valuable resource for Windows Server administrators. Upon course completion, you will be prepared for the AZ-801: Configuring Windows Server Hybrid Advanced Services certification exam. An exam voucher is included with your enrollment., which grants prepaid access to sit for the certifying exam (AZ-801) upon eligibility.
- Secure Windows Server operating system
- Secure a hybrid Active Directory (AD) infrastructure
- Identify and remediate Windows Server security issues by using Azure services
- Secure Windows Server networking
- Secure Windows Server storage
- Implement a Windows Server failover cluster
- Manage failover clustering
- Implement and manage Storage Spaces Direct
- Manage backup and recovery for Windows Server
- Implement disaster recovery by using Azure Site Recovery
- Protect virtual machines by using Hyper-V replicas
- Migrate on-premises storage to on-premises servers or Azure
- Migrate on-premises servers to Azure
- Migrate workloads from previous versions to Windows Server 2022
- Migrate IIS workloads to Azure
- Migrate an AD DS infrastructure to Windows Server 2022 AD DS
- Directory Migration Tool
- Monitor Windows Server by using Windows Server tools and Azure services
- Troubleshoot Windows Server on-premises and hybrid networking
- Troubleshoot Windows Server virtual machines in Azure
- Troubleshoot Active Directory
What you will learn
- Secure Windows Server on-premises and hybrid infrastructures
- Implement and manage Windows Server high availability
- Implement disaster recovery
- Migrate servers and workloads
- Monitor and troubleshoot Windows Server environments
How you will benefit
- Become prepared for the AZ-801: Configuring Windows Server Hybrid Advanced Services exam
- Begin a career in on-premises servers or broaden your skills if you are already working
- Become more efficient on the job and better able to manage Windows Server environments
Will Panek
Will Panek is a worldwide recognized Microsoft instructor and author. Will Panek is a 5-time Microsoft MVP and has published over 40 titles on Microsoft technologies. Will is a passionate and authoritative instructor, and makes sure that his students can implement Microsoft technologies and get themselves certified along the way. Outside the class and authorship, you'd be likely to find Will at the forge smithing his latest creation.
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.
In this Microsoft Windows Server certification course, you will learn the fundamental skills required to configure advanced Windows Server services using on-premises, hybrid, and cloud technologies. Your Windows Server training covers securing Windows Server on-premises and hybrid infrastructures, including securing networking and storage, implementing and managing failover clusters, and using Azure services for related security issues.
The Windows Server certification course also dives into implementing and managing Windows Server high-availability, disaster recovery using Azure Site Recovery, migrating servers and workloads, and how best to monitor and troubleshoot Windows Server environments.
This comprehensive training is a valuable resource for Windows Server administrators. Upon course completion, you will be prepared for the AZ-801: Configuring Windows Server Hybrid Advanced Services certification exam. An exam voucher is included with your enrollment., which grants prepaid access to sit for the certifying exam (AZ-801) upon eligibility.
|
|
|
AZ-900 & 104: Microsoft Azure Fundamental & Administrator (Vouchers Included)
- AZ-900 & 104: Microsoft Azure Fundamental & Administrator (Vouchers Included)
-
Fee: $3,995.00
Dates: 4/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Location:
Building:
Room:
Instructor:
You will learn foundational level knowledge on cloud concepts; core Microsoft Azure services; security, privacy, compliance, and trust; and Azure pricing and support. You will also learn to manage Azure subscriptions and resources, implement and manage storage, deploy and manage virtual machines (VMs), configure and manage virtual networks, and manage identities. Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
Software Requirements:
- PC: Windows 8 or later.
- Mac: macOS 10.6 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
- Microsoft Word Online
- Adobe Acrobat Reader
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment and will be available online. This comprehensive course bundle is designed to provide you with the Microsoft Azure training needed to take your career to the next level. Optimize your use of Azure tools, learn virtual machine (VM) storage and implement best practices, understand related essential functions and components, and much more, all on your own time.
The Microsoft Azure Fundamentals course is intended for entry-level Azure professionals and builds the groundwork needed to properly administer and subscribe to Microsoft Azure. From networking and cloud concepts to Azure workloads, security, privacy, and more, you will master the training needed to take your career to the next level. By course completion, you will be prepared to sit for the AZ-900 exam and achieve your Microsoft Certified: Azure Fundamentals certification.
The Microsoft Azure Administrator course is intended for those who are either looking to gain more knowledge about administering Azure cloud services, security, networking, and compute cloud abilities or who are looking to pass the AZ-104 exam and complete their Microsoft Certified: Azure Administrator certification. Whatever your motivation, this course will help you become an Azure admin pro in six months or less!
The course will also prepare you to sit for the AZ-900: Microsoft Azure Fundamentals and the AZ-104: Microsoft Azure Administrator Exams. This course offers enrollment with vouchers. The vouchers are prepaid access to sit for the certifying exam upon eligibility.
- Microsoft Azure Fundamentals
- Using Cloud Services
- Differences between IaaS, PaaS, and SaaS
- Differences Between Public, Private, and Hybrid Clouds
- Core Azure Architecture Components
- Core Products Available and Subscriptions in Azure
- Azure Management and Monitoring Tools
- Securing Network Connectivity in Azure
- Core Azure Identity Services
- Security Tools and Features of Azure
- Azure Governance Methodologies
- Conditional Access
- Using Profiles
- Privacy Standards
- Azure Service Level Agreements (SLAs)
- Mobile Application Management (MDM)
- Windows Defender Tools
- Microsoft Azure Administrator
- Azure Subscriptions, Resources & Billing
- Azure Policies
- Azure Users & Groups
- Azure Logging & Monitoring
- Azure Resource Management
- Azure User & Groups
- Azure Logging & Monitoring
- Azure Resource Management
- Azure Storage Accounts & Types
- Azure Virtual Machines
- Shared Access Signature, backup & File
- Deploy & Manage Virtual Machines
- Azure Containers
- Configure & Manage Victual Networks
- Manage Identities
What you will learn
- Understand Azure workloads and subscriptions
- Security and privacy in Azure
- Implement access management with Azure users, groups, and role-based access control
- Use Azure Monitor to configure Azure alerts and review the Azure Activity Log
- Query and analyze Log Analytics data
- Deploy resources with ARM templates and organize Azure resources
- Store and access data using Azure Content Delivery Network, and the Import and Export service
- Deploy custom server images and Linux virtual machines
- Implement Azure DNS domains, zones, record types, and resolution methods
- Implement site connectivity schemas including VNet-to-VNet connections and virtual network peering
- Implement Azure Active Directory, Self-Service Password Reset, Azure AD Identity Protection, and integrated SaaS applications
- Configure domains and tenants, users and groups, roles, and devices
- Implement and manage Azure Active Directory integration options and Azure AD Application Proxy
- Implement and configure Azure Load Balancer, Azure Traffic Manager, and Azure Application Gateway
- Use Azure RBAC to grant a granular level of access based on an administrator's assigned tasks
- Use Azure Multi-Factor Authentication to configure a strong authentication for users at sign-in
How you will benefit
- You will be prepared for the AZ-900: Microsoft Azure Fundamentals and AZ-104: Microsoft Azure Administrator Exams
- Learn key concepts, applications, and skills that can help broaden your career working with cloud-based solutions and services
Will Panek
Will Panek is a worldwide recognized Microsoft instructor and author. Will is a 5-time Microsoft MVP and has published over 30 titles on Microsoft technologies. Will is a passionate and authoritative instructor and makes sure that his students can implement Microsoft technologies and get themselves certified along the way. Outside the class and authorship, you'd be likely to find Will at the forge smithing his latest creation.
Doug Bassett
Doug Bassett is an IT instructor specializing in Microsoft Azure, Server 2016/19, and Exchange messaging. He holds many highly sought-after IT certifications, including Microsoft MCSE, Microsoft MCSA, CompTIA Network+, Cisco CCNA, and Microsoft MCT. In addition to his certifications, Doug has expert knowledge of Microsoft Server 2000, 2003, 2008/2012/2016/2019, Exchange Server and Exchange Online, and Networking structure and applications. As an instructor, Doug is deeply involved in helping his students understand complex concepts and loves to approach teaching a subject from multiple angles.
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.
This comprehensive course bundle is designed to provide you with the Microsoft Azure training needed to take your career to the next level. Optimize your use of Azure tools, learn virtual machine (VM) storage and implement best practices, understand related essential functions and components, and much more, all on your own time.
The Microsoft Azure Fundamentals course is intended for entry-level Azure professionals and builds the groundwork needed to properly administer and subscribe to Microsoft Azure. From networking and cloud concepts to Azure workloads, security, privacy, and more, you will master the training needed to take your career to the next level. By course completion, you will be prepared to sit for the AZ-900 exam and achieve your Microsoft Certified: Azure Fundamentals certification.
The Microsoft Azure Administrator course is intended for those who are either looking to gain more knowledge about administering Azure cloud services, security, networking, and compute cloud abilities or who are looking to pass the AZ-104 exam and complete their Microsoft Certified: Azure Administrator certification. Whatever your motivation, this course will help you become an Azure admin pro in six months or less!
The course will also prepare you to sit for the AZ-900: Microsoft Azure Fundamentals and the AZ-104: Microsoft Azure Administrator Exams. This course offers enrollment with vouchers. The vouchers are prepaid access to sit for the certifying exam upon eligibility.
|
|
|
AZ-900 & 500: Microsoft Azure Fundamental & Security Technologies (Vouchers Included)
- AZ-900 & 500: Microsoft Azure Fundamental & Security Technologies (Vouchers Included)
-
Fee: $3,995.00
Dates: 4/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Location:
Building:
Room:
Instructor:
You will learn foundational level knowledge on cloud concepts; core Microsoft Azure services; security, privacy, compliance, and trust; and Azure pricing and support. You will also learn to manage Azure subscriptions and resources, implement and manage storage, deploy and manage virtual machines (VMs), configure and manage virtual networks, and manage identities. Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
Software Requirements:
- PC: Windows 8 or later.
- Mac: macOS 10.6 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
- Microsoft Word Online.
- Adobe Acrobat Reader.
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment and will be available online. The Microsoft Azure Fundamentals course is intended for entry-level Azure professionals and builds the groundwork needed for you to properly administer and subscribe to Microsoft Azure. From networking and cloud concepts to Azure workloads, cloud security, privacy, and more, you will master the training needed to take your career to the next level. By course completion, you will be prepared to achieve your Microsoft Azure certification.
The Microsoft Azure Security Technologies course will help you gain the knowledge and skills needed to implement security controls, maintain the security posture, and identify and remediate vulnerabilities by using a variety of security tools. This course also covers scripting and automation, virtualization, and cloud N-tier architecture. Upon completion, you will have the fundamental knowledge required of a Microsoft cloud app security professional.
The course will also prepare you to sit for the AZ-900: Microsoft Azure Fundamentals and the AZ-500: Microsoft Azure Security Technologies Exams. This course offers enrollment with vouchers. The vouchers are prepaid access to sit for the certifying exam upon eligibility.
- Microsoft Azure Fundamentals
- Using Cloud Services
- Differences between IaaS, PaaS, and SaaS
- Differences Between Public, Private, and Hybrid Clouds
- Core Azure Architecture Components
- Core Products Available and Subscriptions in Azure
- Azure Management and Monitoring Tools
- Securing Network Connectivity in Azure
- Core Azure Identity Services
- Security Tools and Features of Azure
- Azure Governance Methodologies
- Conditional Access
- Using Profiles
- Privacy Standards
- Azure Service Level Agreements (SLAs)
- Mobile Application Management (MDM)
- Windows Defender Tools
- Microsoft Azure Security Technologies
- Azure AD Identities
- Securing Access
- Securing Application Access
- Access Control
- Network Security
- Azure Security Center
- Azure Containers
- Azure Vulnerability
- Security Operations
- Secure Applications & Data
What you will learn
- Concepts of onsite networking
- Cloud and cloud-based networking concepts
- Azure workloads, security, and subscriptions
- Concepts of hybrid networking
- Azure application support
- How to manage and monitor Azure Services
- Describe specialized data classifications on Azure
- Identify Azure data protection mechanisms
- Implement Azure data encryption methods
- Secure Internet protocols and how to implement them on Azure
How you will benefit
- You will be prepared for the AZ-900: Microsoft Azure Fundamentals and AZ-500: Microsoft Azure Security Technologies Exams
- Expand your career opportunities as an IT professional
Will Panek
Will Panek is a worldwide recognized Microsoft instructor and author. Will is a 5-time Microsoft MVP and has published over 30 titles on Microsoft technologies. Will is a passionate and authoritative instructor and makes sure that his students can implement Microsoft technologies and get themselves certified along the way. Outside the class and authorship, you'd be likely to find Will at the forge smithing his latest creation.
Doug Bassett
Doug Bassett is an IT instructor specializing in Microsoft Azure, Server 2016/19, and Exchange messaging. He holds many highly sought-after IT certifications, including Microsoft MCSE, Microsoft MCSA, CompTIA Network+, Cisco CCNA, and Microsoft MCT. In addition to his certifications, Doug has expert knowledge of Microsoft Server 2000, 2003, 2008/2012/2016/2019, Exchange Server and Exchange Online, and Networking structure and applications. As an instructor, Doug is deeply involved in helping his students understand complex concepts and loves to approach teaching a subject from multiple angles.
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.
The Microsoft Azure Fundamentals course is intended for entry-level Azure professionals and builds the groundwork needed for you to properly administer and subscribe to Microsoft Azure. From networking and cloud concepts to Azure workloads, cloud security, privacy, and more, you will master the training needed to take your career to the next level. By course completion, you will be prepared to achieve your Microsoft Azure certification.
The Microsoft Azure Security Technologies course will help you gain the knowledge and skills needed to implement security controls, maintain the security posture, and identify and remediate vulnerabilities by using a variety of security tools. This course also covers scripting and automation, virtualization, and cloud N-tier architecture. Upon completion, you will have the fundamental knowledge required of a Microsoft cloud app security professional.
The course will also prepare you to sit for the AZ-900: Microsoft Azure Fundamentals and the AZ-500: Microsoft Azure Security Technologies Exams. This course offers enrollment with vouchers. The vouchers are prepaid access to sit for the certifying exam upon eligibility.
|
|
|
AZ-900: Microsoft Azure Fundamentals (Voucher Included)
- AZ-900: Microsoft Azure Fundamentals (Voucher Included)
-
Fee: $1,995.00
Dates: 4/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Location:
Building:
Room:
Instructor:
You will learn foundational level knowledge on cloud concepts; core Microsoft Azure services; security, privacy, compliance, and trust; and Azure pricing and support. Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
Software Requirements:
- PC: Windows 8 or later.
- Mac: macOS 10.6 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
- Microsoft Word Online
- Adobe Acrobat Reader
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment and will be available online. The Microsoft Azure Fundamentals course is intended for entry-level Azure professionals and builds the groundwork needed to properly administer and subscribe to Microsoft Azure. From networking and cloud concepts to Azure workloads, security, privacy, and more, you will master the training needed to take your career to the next level. By course completion, you will be prepared to achieve your Microsoft Azure certification.
The course will also prepare you to sit for the AZ-900: Microsoft Azure Fundamentals Exam. This course offers enrollment with a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.
- Onsite Networking
- Benefits and Considerations of Using Cloud Services
- Differences between IaaS, PaaS, and SaaS
- Differences Between Public, Private, and Hybrid Clouds
- Core Azure Architecture Components
- Core Products Available and Subscriptions in Azure
- Azure Management and Monitoring Tools
- Securing Network Connectivity in Azure
- Core Azure Identity Services
- Security Tools and Features of Azure
- Azure Governance Methodologies
- Conditional Access
- Using Profiles
- Privacy Standards
- Azure Service Level Agreements (SLAs)
- Mobile Application Management (MDM)
- Windows Defender Tools
What you will learn
- Concepts of onsite networking
- Cloud concepts
- Concepts of cloud-based networking
- Azure workloads
- Security and privacy in Azure
- Azure subscriptions
- Concepts of hybrid networking
- Azure application support
- How to manage and monitor Azure Services
How you will benefit
- You will be prepared for the AZ-900: Microsoft Azure Fundamentals Exam
- Increase your career opportunities as an IT professional
Will Panek
Will Panek is a worldwide recognized Microsoft instructor and author. Will Panek is a 5-time Microsoft MVP and has published over 30 titles on Microsoft technologies. Will is a passionate and authoritative instructor and makes sure that his students can implement Microsoft technologies and get themselves certified along the way. Outside the class and authorship, you'd be likely to find Will at the forge smithing his latest creation.
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.
The Microsoft Azure Fundamentals course is intended for entry-level Azure professionals and builds the groundwork needed to properly administer and subscribe to Microsoft Azure. From networking and cloud concepts to Azure workloads, security, privacy, and more, you will master the training needed to take your career to the next level. By course completion, you will be prepared to achieve your Microsoft Azure certification.
The course will also prepare you to sit for the AZ-900: Microsoft Azure Fundamentals Exam. This course offers enrollment with a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.
|
|
|
Certified AWS Cloud Practitioner (Voucher Included)
- Certified AWS Cloud Practitioner (Voucher Included)
-
Fee: $1,995.00
Dates: 4/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Location:
Building:
Room:
Instructor:
This course is intended for IT professionals who would like to better understand AWS Cloud concepts and core AWS services. Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
Software Requirements:
- PC: Windows 10 or later.
- Mac: macOS 10.6 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
- Virtual Labs included with the course
- Microsoft Word Online
- Adobe Acrobat Reader
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment and available online.
- Study guide
- Virtual labs
- Practice exams
This course is the first step in training for the industry-leading Amazon AWS product. It serves as a thorough introduction to the services and solutions possible with AWS. It is also the first certification in paths available for IT professionals looking to codify their knowledge and skills in AWS.
Anyone looking for exposure to AWS or the AWS Certified Cloud Practitioner should take this course. This course can be used to prepare for the AWS Certified Cloud Practitioner exam. This course offers enrollment with a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.
- Course Overview and AWS Introduction
- Introduction to AWS Certified Cloud Practitioner Course and Exam Objectives
- Introducing AWS and the Cloud
- AWS Well-Architected Framework
- The AWS Global Architecture (Regions, Availability Zones, and Edge Locations)
- AWS Pricing, Billing, Support Plans and Dashboards
- Accessing AWS Resources
- AWS Compute
- Amazon EC2
- EC2 Scaling and Load Balancing
- Amazon ECS, EKS, and Fargate
- AWS Lambda
- Elastic BeanStalk
- AWS Databases
- Database Overview and RDS
- Amazon Elasticache
- DynamoDB
- DocumentDB
- Amazon Redshift
- Amazon Neptune
- AWS Storage
- Instance and EBS Storage
- EFS, FSx for Windows and FSx for Lustre
- Simple Storage Service (S3)
- AWS Storage Gateway
- AWS Networking
- VPC Overview and Subnets
- VPC Internet Connectivity, Routing, and NAT
- VPC Security Groups and ACLs
- VPNs and Direct Connect
- CloudFront, Global Accelerator and Route53
- API Gateway
- AWS Messaging, Migration, and Translation
- SQS
- SNS and SES
- Snowcone, Snowball, Snowmobile
- AWS DataSync, AWS Transfer, AWS Database Migration Service
- AWS Translate and Transcribe
- Security
- Security Overview, IAM Users and Groups
- Permissions and Policies
- IAM Roles, Identity Federation and Cognito
- KMS, Secrets Manager, AWS Organizations and Compliance
- AWS WAF, Shield, Inspector, Macie, and GuardDuty
- Monitoring and Maintenance
- CloudWatch, CloudWatch Logs, and CloudWatch Events
- CloudTrail and Trusted Advisor
What you will learn
- Define what the AWS Cloud is and the basic global infrastructure
- Describe basic AWS Cloud architectural principles
- Describe the AWS Cloud value proposition
- Describe key services on the AWS platform and their common use cases (for example, compute and analytics)
- Describe basic security and compliance aspects of the AWS platform and the shared security model
- Define the billing, account management, and pricing models
- Identify sources of documentation or technical assistance (for example, whitepapers or support tickets)
- Describe basic/core characteristics of deploying and operating in the AWS Cloud
How you will benefit
- You will be prepared to sit for the AWS Certified Cloud Practitioner exam
- Complete the course in 3 months or less
- Improve your job opportunities and earning potential by increasing your AWS Cloud skills and knowledge
Raymond Lacoste
Raymond Lacoste is a highly recognized instructor and IT professional who holds the Cisco Sirius Instructor Award. He has authored Cisco Press publications on the Cisco ENARSI and Cisco TSHOOT exams.
Raymond's areas of expertise include Cisco Enterprise networking, Cisco Routing and Switching, Cisco Datacenter Networking, ITIL, and Amazon AWS. He also holds certifications in Cisco CCSI, Cisco CCNP Routing and Switching, Cisco CCNP Enterprise, ITIL Foundations, ITIL Practitioner, ITIL Intermediate, Amazon AWS System Operations, Amazon AWS Architect, Amazon AWS Developer, and CISSP.
In addition to his certifications and experience, Raymond's engaging instruction style makes even the most obscenely complicated or obtuse concepts relatable and understandable. Outside of class, he enjoys dominating both on the golf course and the basketball court.
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.
This course is the first step in training for the industry-leading Amazon AWS product. It serves as a thorough introduction to the services and solutions possible with AWS. It is also the first certification in paths available for IT professionals looking to codify their knowledge and skills in AWS.
Anyone looking for exposure to AWS or the AWS Certified Cloud Practitioner should take this course. This course can be used to prepare for the AWS Certified Cloud Practitioner exam. This course offers enrollment with a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.
|
|
|
Certified AWS Cloud Practitioner Developer Associate (Vouchers Included)
- Certified AWS Cloud Practitioner Developer Associate (Vouchers Included)
-
Fee: $3,995.00
Dates: 4/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Location:
Building:
Room:
Instructor:
This course is intended for IT professionals who would like to better understand AWS Cloud concepts, core AWS services, and those looking to gain more knowledge into AWS's developing capabilities. Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
Software Requirements:
- PC: Windows 8 or later.
- Mac: macOS 10.6 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
- Virtual Labs included with the course
- Microsoft Word Online
- Adobe Acrobat Reader
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment and available online.
- Study guide
- Virtual labs
- Practice exams
This comprehensive course is the first step in training for the industry-leading Amazon AWS product. It serves as a thorough introduction to the services and solutions possible with AWS. It is also the first certification in paths available for IT professionals looking to codify their knowledge and skills in AWS.
You will learn how to use the AWS SDK to develop secure and scalable cloud applications. You will also explore how to interact with AWS using code and discuss key concepts, best practices, and troubleshooting tips.
This course can be used to prepare for the AWS Certified Cloud Practitioner - Foundational and AWS Certified Developer – Associate exams. This course offers enrollment with vouchers. The voucher is prepaid access to sit for the certifying exam upon eligibility.
- Course Overview and AWS Introduction
- Introduction to AWS Certified Cloud Practitioner Course and Exam Objectives
- Introducing AWS and the Cloud
- AWS Well-Architected Framework
- The AWS Global Architecture (Regions, Availability Zones, and Edge Locations)
- AWS Pricing, Billing, Support Plans, and Dashboards
- Accessing AWS Resources
- AWS Compute
- Amazon EC2
- EC2 Scaling and Load Balancing
- Amazon ECS, EKS, and Fargate
- AWS Lambda
- Elastic BeanStalk
- AWS Databases
- Database Overview and RDS
- Amazon Elasticache
- DynamoDB
- DocumentDB
- Amazon Redshift
- Amazon Neptune
- AWS Storage
- Instance and EBS Storage
- EFS, FSx for Windows and FSx for Lustre
- Simple Storage Service (S3)
- AWS Storage Gateway
- AWS Networking
- VPC Overview and Subnets
- VPC Internet Connectivity, Routing, and NAT
- VPC Security Groups and ACLs
- VPNs and Direct Connect
- CloudFront, Global Accelerator and Route53
- API Gateway
- AWS Messaging, Migration, and Translation
- SQS
- SNS and SES
- Snowcone, Snowball, Snowmobile
- AWS DataSync, AWS Transfer, AWS Database Migration Service
- AWS Translate and Transcribe
- Security
- Security Overview, IAM Users and Groups
- Permissions and Policies
- IAM Roles, Identity Federation, and Cognito
- KMS, Secrets Manager, AWS Organizations and Compliance
- AWS WAF, Shield, Inspector, Macie, and GuardDuty
- Monitoring and Maintenance
- CloudWatch, CloudWatch Logs, and CloudWatch Events
- CloudTrail and Trusted Advisor
- Course Overview and the AWS Global Infrastructure
- Introduction to AWS Developer Associate Course and Exam Objectives
- Regions, Availability Zones, and Edge Locations
- AWS Security
- IAM Users, Groups, Permissions
- Access Keys and IAM Roles
- Identity Federation and Cognito
- KMS, HSM, and Secrets Manager
- Networking and Compute
- VPC Overview and VPC Subnets
- VPC Internet Connectivity, Routing, and NAT
- VPC Security Groups and ACLs
- CloudFront and Global Accelerator
- EC2 Overview and Launching a Server
- EC2 Storage
- EC2 Auto Scaling
- EC2 Elastic Loadbalancing
- Elastic Container Service Overview
- Databases
- Database Overview and RDS
- RDS Multi-AZ and Read Replicas
- Amazon Aurora
- Elasticache
- DynamoDB Overview, Table Creation, Modes, and Encryption
- DynamoDB Access Controls, Scans, Queries, Indexes
- DynamoDB DAX, Global Tables, Streams, and Additional Considerations
- DocumentDB
- Simple Storage Service (S3)
- S3 Overview, Bucket Creation, Object Upload, Storage Classes, and Lifecycle Policies
- S3 Object Paths, Data Consistency, and Limits
- S3 Encryption, Permissions, and Pre-signed URLs
- S3 Versioning, MFA Delete, and Object Lock
- S3 CORs, Server Access Logging, Event Notifications, Replication
- S3 Static Website Hosting
- Lambda, API Gateway, Step Functions
- Lambda Overview and Examples
- Lambda Features, Limits, and Permissions
- Step Functions
- API Gateway
- Messaging
- SQS
- SNS
- SES
- Elastic Beanstalk and Kinesis
- Elastic Beanstalk Overview
- Elastic Beanstalk Versions and Deployment Options
- Kinesis
- Developer Tools
- Continuous Integration and Continuous Deployment Overview
- Code Commit, Artifact, Build, Deploy, and Pipeline
- CloudFormation and Sam
- SDKs, CLIs, and Simple Workflow Service
- Monitoring
- CloudWatch, CloudWatch Logs, and CloudWatch Events
- CloudTrail and X-Ray
What you will learn
- Define what the AWS Cloud is and the basic global infrastructure and basic AWS Cloud architectural principles
- Describe the AWS Cloud value proposition
- Describe key services on the AWS platform and their common use cases Describe basic security and compliance aspects of the AWS platform and the shared security model
- Define the billing, account management, and pricing models
- Identify sources of documentation or technical assistance (for example, whitepapers or support tickets)
- Describe basic/core characteristics of deploying and operating in the AWS Cloud
- Set up the AWS SDK and developer credentials for Java, C#/.NET, Python, and JavaScript
- Interact with AWS services and develop solutions by using the AWS SDK
- Use AWS Identity and Access Management (IAM) for service authentication
- Use Amazon Simple Storage Service (Amazon S3) and Amazon DynamoDB as datastores
- Integrate applications and data by using AWS Lambda, Amazon API Gateway, Amazon Simple Queue Service (Amazon SQS), Amazon Simple Notification Service (Amazon SNS), and AWS Step Functions
- Use Web Identity Framework and Amazon Cognito for user authentication
- Use Amazon ElastiCache to improve application scalability
- Use containers in the development process
- Leverage the CI/CD pipeline to deploy applications on AWS
How you will benefit
- You will be prepared to sit for the AWS Certified Cloud Practitioner exam
- You will be prepared to sit for the AWS Certified AWS Developer Associate: Associate Exam
- Gain valuable career skills that you can apply immediately
- Increase your earning potential
- Complete your program in 6 months or less
- Certificate of completion from the school or organization that you registered through (upon successfully passing the final exam)
Raymond Lacoste
Raymond Lacoste is a highly recognized instructor and IT professional who holds the Cisco Sirius Instructor Award. He has authored Cisco Press publications on the Cisco ENARSI and Cisco TSHOOT exams.
Raymond's areas of expertise include Cisco Enterprise networking, Cisco Routing, and Switching, Cisco Datacenter Networking, ITIL, and Amazon AWS. He also holds certifications in Cisco CCSI, Cisco CCNP Routing and Switching, Cisco CCNP Enterprise, ITIL Foundations, ITIL Practitioner, ITIL Intermediate, Amazon AWS System Operations, Amazon AWS Architect, Amazon AWS Developer, and CISSP.
In addition to his certifications and experience, Raymond's engaging instruction style makes even the most obscenely complicated or obtuse concepts relatable and understandable. Outside of class, he enjoys dominating both on the golf course and the basketball court.
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.
This comprehensive course is the first step in training for the industry-leading Amazon AWS product. It serves as a thorough introduction to the services and solutions possible with AWS. It is also the first certification in paths available for IT professionals looking to codify their knowledge and skills in AWS.
You will learn how to use the AWS SDK to develop secure and scalable cloud applications. You will also explore how to interact with AWS using code and discuss key concepts, best practices, and troubleshooting tips.
This course can be used to prepare for the AWS Certified Cloud Practitioner - Foundational and AWS Certified Developer – Associate exams. This course offers enrollment with vouchers. The voucher is prepaid access to sit for the certifying exam upon eligibility.
|
|
|
Certified AWS Cloud Practitioner Solutions Architect (Vouchers Included)
- Certified AWS Cloud Practitioner Solutions Architect (Vouchers Included)
-
Fee: $3,995.00
Dates: 4/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Location:
Building:
Room:
Instructor:
This course is intended for IT professionals who would like to better understand AWS Cloud concepts, core AWS services, Solutions Architects and Solution Design Engineers. Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
Software Requirements:
- PC: Windows 8 or later.
- Mac: macOS 10.6 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
- Virtual Labs included with the course
- Microsoft Word Online
- Adobe Acrobat Reader
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment and available online.
- Study guide
- Virtual labs
- Practice exams
This course is the first step in training for the industry-leading Amazon AWS product. It serves as a thorough introduction to the services and solutions possible with AWS. It is also the first certification in paths available for IT professionals looking to codify their knowledge and skills in AWS.
You will be taught the fundamental skills to architect your IT solutions on AWS. AWS Architect Associate is a course for system engineers and system developers. It will cover optimizing the AWS Cloud by understanding AWS services and how they fit into cloud-based solutions.
This course can be used to prepare for the AWS Certified Cloud Practitioner - Foundational and the AWS Certified Solutions Architect – Associate exams. This course offers enrollment with vouchers. The voucher is prepaid access to sit for the certifying exam upon eligibility.
- Course Overview and AWS Introduction
- Introduction to AWS Certified Cloud Practitioner Course and Exam Objectives
- Introducing AWS and the Cloud
- AWS Well-Architected Framework
- The AWS Global Architecture (Regions, Availability Zones, and Edge Locations)
- AWS Pricing, Billing, Support Plans and Dashboards
- Accessing AWS Resources
- AWS Compute
- Amazon EC2
- EC2 Scaling and Load Balancing
- Amazon ECS, EKS, and Fargate
- AWS Lambda
- Elastic BeanStalk
- AWS Databases
- Database Overview and RDS
- Amazon Elasticache
- DynamoDB
- DocumentDB
- Amazon Redshift
- Amazon Neptune
- AWS Storage
- Instance and EBS Storage
- EFS, FSx for Windows and FSx for Lustre
- Simple Storage Service (S3)
- AWS Storage Gateway
- AWS Networking
- VPC Overview and Subnets
- VPC Internet Connectivity, Routing, and NAT
- VPC Security Groups and ACLs
- VPNs and Direct Connect
- CloudFront, Global Accelerator and Route53
- API Gateway
- AWS Messaging, Migration, and Translation
- SQS
- SNS and SES
- Snowcone, Snowball, Snowmobile
- AWS DataSync, AWS Transfer, AWS Database Migration Service
- AWS Translate and Transcribe
- Security
- Security Overview, IAM Users and Groups
- Permissions and Policies
- IAM Roles, Identity Federation and Cognito
- KMS, Secrets Manager, AWS Organizations and Compliance
- AWS WAF, Shield, Inspector, Macie, and GuardDuty
- Monitoring and Maintenance
- CloudWatch, CloudWatch Logs, and CloudWatch Events
- CloudTrail and Trusted Advisor
- Course Overview and the AWS Global Infrastructure
- Introduction to AWS Architect Associate Course and Exam Objectives
- Regions, Availability Zones, and Edge Locations
- Compute
- EC2: Overview, Architecture, and Pricing
- EC2: Launching and Accessing a Linux and Windows Server
- EC2: AMIs and Instance Types
- EC2: Instance Store, EBS, EFS, FSx
- EC2: IP addressing, Network Interfaces, Security Groups and Placement Groups
- EC2: Auto Scaling
- EC2: Load Balancers
- ECS: Overview
- Serverless: Lambda
- Serverless: API Gateway
- Databases
- Databases: Overview
- RDS: Overview, Instances, Storage, Encryption and Backups
- RDS: Multi-AZ, and Read Replicas
- RDS: Amazon Aurora
- Elasticache: Overview
- DynamoDB: Overview
- Redshift: Overview
- Networking
- VPC: Overview, and VPC Subnets
- VPC: Internet Connectivity, Routing, and NAT
- VPC: Security Groups and ACLs
- VPC: VPNs, Direct Connect, Peering, Transit Gateways, and Endpoints
- CloudFront and Global Accelerator
- Route53
- Storage and Migration
- Storage: Overview and Review
- Storage: S3 Introduction, Storage Classes, Lifecyle Policies, and Static Websites
- Storage: S3 Security, Integrity, and Replication
- Storage: Storage Gateway and AWS Backup
- Migration: Snowcone, Snowball and Snowmobile
- Migration: AWS DataSync, AWS Transfer, AWS Database Migration Service
- Application Integration and Customer Engagement
- SQS, SNS, SES, Amazon MQ
- Security
- IAM: Users, Groups, Policies
- IAM: Temporary Credentials, Roles, Password Policies
- KMS and HSM
- Amazon Inspector, Macie, GuardDuty
- AWS Certificate Manager. Secrets Manager, WAF, Shield
- Monitoring and Management
- Amazon CloudWatch
- AWS CloudTrail, AWS Config
- AWS Organizations and AWS Resource Groups
- AWS Billing and Cost Management
What you will learn
- Define what the AWS Cloud is and the basic global infrastructure
- Describe basic AWS Cloud architectural principles
- Describe the AWS Cloud value proposition
- Describe key services on the AWS platform and their common use cases (for example, compute and analytics)
- Describe basic security and compliance aspects of the AWS platform and the shared security model
- Define the billing, account management, and pricing models
- Identify sources of documentation or technical assistance (for example, whitepapers or support tickets)
- Describe basic/core characteristics of deploying and operating in the AWS CloudMake architectural decisions based on AWS architectural principles and best practices
- Leverage AWS services to make your infrastructure scalable, reliable, and highly available
- Leverage AWS Managed Services to enable greater flexibility and resiliency in an infrastructure
- Make an AWS-based infrastructure more efficient to increase performance and reduce costs
- Use the Well-Architected Framework to improve architectures with AWS solutions
How you will benefit
- You will be prepared to sit for the AWS Certified Cloud Practitioner exam
- You will be prepared to sit for the AWS Solutions Architect: Associate Exam
- Gain valuable career skills that you can apply immediately
- Increase your earning potential
- Complete your program in 6 months or less
Raymond Lacoste
Raymond Lacoste is a highly recognized instructor and IT professional who holds the Cisco Sirius Instructor Award. He has authored Cisco Press publications on the Cisco ENARSI and Cisco TSHOOT exams.
Raymond's areas of expertise include Cisco Enterprise networking, Cisco Routing, and Switching, Cisco Datacenter Networking, ITIL, and Amazon AWS. He also holds certifications in Cisco CCSI, Cisco CCNP Routing and Switching, Cisco CCNP Enterprise, ITIL Foundations, ITIL Practitioner, ITIL Intermediate, Amazon AWS System Operations, Amazon AWS Architect, Amazon AWS Developer, and CISSP.
In addition to his certifications and experience, Raymond's engaging instruction style makes even the most obscenely complicated or obtuse concepts relatable and understandable. Outside of class, he enjoys dominating both on the golf course and the basketball court.
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.
This course is the first step in training for the industry-leading Amazon AWS product. It serves as a thorough introduction to the services and solutions possible with AWS. It is also the first certification in paths available for IT professionals looking to codify their knowledge and skills in AWS.
You will be taught the fundamental skills to architect your IT solutions on AWS. AWS Architect Associate is a course for system engineers and system developers. It will cover optimizing the AWS Cloud by understanding AWS services and how they fit into cloud-based solutions.
This course can be used to prepare for the AWS Certified Cloud Practitioner - Foundational and the AWS Certified Solutions Architect – Associate exams. This course offers enrollment with vouchers. The voucher is prepaid access to sit for the certifying exam upon eligibility.
|
|
|
Certified AWS Cloud Practitioner SysOps Administrator (Vouchers Included)
- Certified AWS Cloud Practitioner SysOps Administrator (Vouchers Included)
-
Fee: $3,995.00
Dates: 4/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Location:
Building:
Room:
Instructor:
This course is intended for system administrators and software developers and other IT professionals who would like to better understand AWS Cloud concepts and core AWS services. Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
Software Requirements:
- PC: Windows 8 or later.
- Mac: macOS 10.6 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
- Virtual Labs included with the course
- Microsoft Word Online
- Adobe Acrobat Reader
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment and available online.
- Study guide
- Virtual labs
- Practice exams
This course is the first step in training for the industry-leading Amazon AWS product. It serves as a thorough introduction to the services and solutions possible with AWS. It is also the first certification in paths available for IT professionals looking to codify their knowledge and skills in AWS.
Students will then be taught how to create automatable and repeatable deployments of networks and systems on the AWS platform. AWS System Operations is a course for system administrators and developer operations personnel and will cover the specific AWS features and tools related to configuration and deployment, as well as common techniques used throughout the industry for configuring and deploying systems.
This course can be used to prepare for the AWS Certified Cloud Practitioner – Foundational and AWS Certified SysOps Administrator – Associate exams. This course offers enrollment with vouchers. The voucher is prepaid access to sit for the certifying exam upon eligibility.
- Course Overview and AWS Introduction
- Introduction to AWS Certified Cloud Practitioner Course and Exam Objectives
- Introducing AWS and the Cloud
- AWS Well-Architected Framework
- The AWS Global Architecture (Regions, Availability Zones, and Edge Locations)
- AWS Pricing, Billing, Support Plans, and Dashboards
- Accessing AWS Resources
- AWS Compute
- Amazon EC2
- EC2 Scaling and Load Balancing
- Amazon ECS, EKS, and Fargate
- AWS Lambda
- Elastic BeanStalk
- AWS Databases
- Database Overview and RDS
- Amazon Elasticache
- DynamoDB
- DocumentDB
- Amazon Redshift
- Amazon Neptune
- AWS Storage
- Instance and EBS Storage
- EFS, FSx for Windows and FSx for Lustre
- Simple Storage Service (S3)
- AWS Storage Gateway
- AWS Networking
- VPC Overview and Subnets
- VPC Internet Connectivity, Routing, and NAT
- VPC Security Groups and ACLs
- VPNs and Direct Connect
- CloudFront, Global Accelerator and Route53
- API Gateway
- AWS Messaging, Migration, and Translation
- SQS
- SNS and SES
- Snowcone, Snowball, Snowmobile
- AWS DataSync, AWS Transfer, AWS Database Migration Service
- AWS Translate and Transcribe
- Security
- Security Overview, IAM Users and Groups
- Permissions and Policies
- IAM Roles, Identity Federation, and Cognito
- KMS, Secrets Manager, AWS Organizations and Compliance
- AWS WAF, Shield, Inspector, Macie, and GuardDuty
- Monitoring and Maintenance
- CloudWatch, CloudWatch Logs, and CloudWatch Events
- CloudTrail and Trusted Advisor
- Course Overview and AWS Introduction
- Introduction to AWS Certified SysOps Administrator Associate Course and Exam Objectives
- Introducing AWS and the Cloud
- The AWS Global Architecture (Regions, Availability Zones, and Edge Locations)
- AWS Pricing, Billing, Support Plans, and Dashboards
- Accessing AWS Resources
- AWS Networking
- VPC Overview and VPC Subnets
- VPC Internet Connectivity, Routing, and NAT
- VPC Security Groups, ACLs, and Flow Logs
- VPC VPNs, Direct Connect, Peering, Transit Gateways, and Endpoints
- CloudFront, Global Accelerator and Route53
- AWS Compute
- EC2 Overview, Architecture, and Pricing
- EC2 Launching and Accessing a Linux and Windows Server
- EC2 AMIs, Instance Types, Features
- EC2 Instance Store, EBS, EFS, FSx, and S3 Storage
- EC2 IP addressing, Network Interfaces, Security Groups, and Placement Groups
- EC2 Auto Scaling
- EC2 Load Balancers
- ECS Overview
- Lambda Overview and Examples
- API Gateway
- AWS Databases
- Database Overview
- RDS Overview, Instances, Storage, Encryption, and Backups
- RDS Multi-AZ, and Read Replicas
- RDS Amazon Aurora
- Elasticache Overview
- DynamoDB Overview
- Redshift Overview
- AWS Storage
- Storage Overview and Review
- S3 Introduction, Storage Classes, and Lifecycle Policies
- S3 Security and Integrity
- S3 Replication, Event Notifications, Inventory, and Limits
- S3 Static Website Hosting
- Storage Gateway and AWS Backup
- AWS Migration and Messaging
- Snowcone, Snowball, Snowmobile
- AWS DataSync, AWS Transfer, AWS Database Migration Service
- SQS, SNS, and SES
- AWS Security
- Security Overview, IAM Users and Groups
- Permissions and Policies
- IAM Roles, Identity Federation, and Cognito
- KMS, Secrets Manager, Certificates Manager, and Compliance
- AWS WAF, Shield, Inspector, Macie, and GuardDuty
- Monitoring, Maintenance, and Management
- CloudWatch, CloudWatch Logs, and CloudWatch Events
- AWS CloudTrail, AWS Config, and Trusted Advisor
- CloudFormation and Service Catalog
- AWS Organizations and Control Towe
- AWS Systems Manager, Resource Groups, and Service/Personal Health Dashboards
- AWS Pricing, Billing, and Cost Management
What you will learn
- Define what the AWS Cloud is and the basic global infrastructure
- Describe basic AWS Cloud architectural principles, key services, and common use cases and the AWS Cloud value proposition
- Describe basic security and compliance aspects of the AWS platform and the shared security model
- Define the billing, account management, and pricing models
- Identify sources of documentation or technical assistance
- Describe basic/core characteristics of deploying and operating in the AWS Cloud
- Use standard AWS infrastructure features such as Amazon Virtual Private Cloud (VPC), Amazon Elastic Compute Cloud (EC2), Elastic Load Balancing, and Auto Scaling from the command line
- Use AWS CloudFormation and other automation technologies to produce stacks of AWS resources that can be deployed in an automated, repeatable fashion
- Build functioning virtual private networks with Amazon VPC from the ground up using the AWS Management Console
- Deploy Amazon EC2 instances using command line calls and troubleshoot the most common problems with instances
- Monitor the health of Amazon EC2 instances and other AWS services
- Manage user identity, AWS permissions, and security in the cloud
- Manage resource consumption in an AWS account using tools such as Amazon CloudWatch, tagging, and Trusted Advisor
- Select and implement the best strategy for creating reusable Amazon EC2 instances
- Configure a set of Amazon EC2 instances that launch behind a load balancer, with the system scaling up and down in response to demand
- Edit and troubleshoot a basic AWS CloudFormation stack definition
How you will benefit
- You will be prepared to sit for the AWS Certified Cloud Practitioner exam
- You will be prepared to sit for the AWS SysOps Administrator: Associate Exam
- Gain valuable career skills that you can apply immediately
- Increase your earning potential
- Complete your program in 6 months or less
- Certificate of completion from the school or organization that you registered through (upon successfully passing the final exam)
Raymond Lacoste
Raymond Lacoste is a highly recognized instructor and IT professional who holds the Cisco Sirius Instructor Award. He has authored Cisco Press publications on the Cisco ENARSI and Cisco TSHOOT exams.
Raymond's areas of expertise include Cisco Enterprise networking, Cisco Routing, and Switching, Cisco Datacenter Networking, ITIL, and Amazon AWS. He also holds certifications in Cisco CCSI, Cisco CCNP Routing and Switching, Cisco CCNP Enterprise, ITIL Foundations, ITIL Practitioner, ITIL Intermediate, Amazon AWS System Operations, Amazon AWS Architect, Amazon AWS Developer, and CISSP.
In addition to his certifications and experience, Raymond's engaging instruction style makes even the most obscenely complicated or obtuse concepts relatable and understandable. Outside of class, he enjoys dominating both on the golf course and the basketball court.
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.
This course is the first step in training for the industry-leading Amazon AWS product. It serves as a thorough introduction to the services and solutions possible with AWS. It is also the first certification in paths available for IT professionals looking to codify their knowledge and skills in AWS.
Students will then be taught how to create automatable and repeatable deployments of networks and systems on the AWS platform. AWS System Operations is a course for system administrators and developer operations personnel and will cover the specific AWS features and tools related to configuration and deployment, as well as common techniques used throughout the industry for configuring and deploying systems.
This course can be used to prepare for the AWS Certified Cloud Practitioner – Foundational and AWS Certified SysOps Administrator – Associate exams. This course offers enrollment with vouchers. The voucher is prepaid access to sit for the certifying exam upon eligibility.
|
|
|
Certified AWS Developer (Voucher Included)
- Certified AWS Developer (Voucher Included)
-
Fee: $1,995.00
Dates: 4/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Location:
Building:
Room:
Instructor:
The AWS Developer course is designed for intermediate-level software developers and those looking to learn more about AWS's developing capabilities. Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
Software Requirements:
- PC: Windows 8 or later.
- Mac: macOS 10.6 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
- Virtual Labs included with the course
- Microsoft Word Online
- Adobe Acrobat Reader
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment and available online.
- Study guide
- Virtual labs
- Practice exams
In this online training course, you will learn how to use the AWS SDK to develop secure and scalable cloud applications. You will also explore how to interact with AWS using code and discuss key concepts, best practices, and troubleshooting tips
This course can be used to prepare for the AWS Certified Developer – Associate exam. This course offers enrollment with a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.
- Introduction to Developing in Azure
- Getting Started with AWS
- Exploring IAM
- EC2
- EC2 Basics
- EC2 Instance Storage Section
- Load Balancing, Auto Scaling Groups, and EBSVolumes
- High Availability and Scalability
- Load Balancing
- Auto Scaling Groups
- RDS, Aurora, and Elasticache
- Relational Database Service
- Aurora
- Elasticache
- DNS and VPCs
- Route 53
- VPC primer
- Tier 3 Architecture
- Tier 3 Architecture
- Amazon Simple Storage Service
- Amazon S3
- Cross Origin Resource Sharing
- AWS Development
- Developing on AWS
- Development with Simple Storage Service
- CloudFront, Beanstalk, and Docker development
- CloudFront
- Elastic Beanstalk
- AWS ECS Essentials
- AWS CICD
- Introduction to AWS CICD
- AWS CodeBuild
- AWS CodeDeploy
- Other AWS CICD Services
- Managing Your Infrastructure as Code
- CloudFormation
- CloudFormation Functions
- AWS Monitoring, Troubleshooting & Audit
- CloudWatch
- AWS X-ray
- AWS CloudTrail
- AWS Integration and Messaging
- Amazon Simple Queue Service
- Amazon Simple Notification Service
- Kinesis
- AWS Lambda and DynamoDB
- Introduction to AWS Lambda
- Even More Lambda
- DynamoDB Basics
- Working with DynamoDB
- API Gateway
- API Gateway Basics
- API Tuning
- Working with the Serverless Application Model (SAM)
- Serverless Application Model
- AWS Cloud Development Kit
- Amazon Cognito
- Other Serverless Features
- Additional Security
- Advanced Identity Management
- AWS Security and Encryption
- Additional AWS Services
- Other AWS Services
What you will learn
- Set up the AWS SDK and developer credentials for Java, C#/.NET, Python, and JavaScript
- Interact with AWS services and develop solutions by using the AWS SDK
- Use AWS Identity and Access Management (IAM) for service authentication
- Use Amazon Simple Storage Service (Amazon S3) and Amazon DynamoDB as datastores
- Integrate applications and data by using AWS Lambda, Amazon API Gateway, Amazon Simple Queue Service (Amazon SQS), Amazon Simple Notification Service (Amazon SNS), and AWS Step Functions
- Use Web Identity Framework and Amazon Cognito for user authentication
- Use Amazon ElastiCache to improve application scalability
- Use containers in the development process
- Leverage the CI/CD pipeline to deploy applications on AWS
How you will benefit
- You will be prepared to sit for the AWS Certified AWS Developer Associate: Associate Exam
- Gain valuable career skills that you can apply immediately
- Increase your earning potential
- Complete your program in 3 months or less
- Certificate of completion from the school or organization that you registered through (upon successfully passing the final exam)
Raymond Lacoste
Raymond Lacoste is a highly recognized instructor and IT professional who holds the Cisco Sirius Instructor Award. He has authored Cisco Press publications on the Cisco ENARSI and Cisco TSHOOT exams.
Raymond's areas of expertise include Cisco Enterprise networking, Cisco Routing, and Switching, Cisco Datacenter Networking, ITIL, and Amazon AWS. He also holds certifications in Cisco CCSI, Cisco CCNP Routing and Switching, Cisco CCNP Enterprise, ITIL Foundations, ITIL Practitioner, ITIL Intermediate, Amazon AWS System Operations, Amazon AWS Architect, Amazon AWS Developer, and CISSP.
In addition to his certifications and experience, Raymond's engaging instruction style makes even the most obscenely complicated or obtuse concepts relatable and understandable. Outside of class, he enjoys dominating both on the golf course and the basketball court.
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.
In this online training course, you will learn how to use the AWS SDK to develop secure and scalable cloud applications. You will also explore how to interact with AWS using code and discuss key concepts, best practices, and troubleshooting tips
This course can be used to prepare for the AWS Certified Developer – Associate exam. This course offers enrollment with a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.
|
|
|
Certified AWS Solutions Architect (Voucher Included)
- Certified AWS Solutions Architect (Voucher Included)
-
Fee: $1,995.00
Dates: 4/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Location:
Building:
Room:
Instructor:
The AWS Architect Associate course is designed for solutions architects and solution design engineers who want to learn fundamental skills to architect their IT solutions on AWS and more. Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
Software Requirements:
- PC: Windows 8 or later.
- Mac: macOS 10.6 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
- Virtual Labs included with the course
- Microsoft Word Online
- Adobe Acrobat Reader
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment and available online.
- Study guide
- Virtual labs
- Practice exams
In this online training course, you will be taught the fundamental skills to architect your IT solutions on AWS. AWS Architect Associate is a course for system engineers and system developers that will cover how to optimize the AWS Cloud by understanding AWS services and how they fit into cloud-based solutions.
This course can be used to prepare for the AWS Certified Solutions Architect – Associate exam. This course offers enrollment with a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.
- Course Overview
- Introduction to AWS Architect Associate Course and Exam Objectives
- The Well Architected Framework and the AWS Global Architecture
- AWS Well Architected Framework
- AWS Global Architecture
- Building a Server-based Architecture in AWS
- Virtual Private Cloud (VPC): Overview and Subnets
- Virtual Private Cloud (VPC): Internet Connectivity, Routing, NAT, Network Firewall
- Virtual Private Cloud (VPC): Security Groups and ACLs
- Virtual Private Cloud (VPC): VPNs, Direct Connect, Peering, Transit Gateways, and Endpoints
- Elastic Compute Cloud (EC2): Overview, Architecture and Pricing
- Elastic Compute Cloud (EC2): Launching and Accessing a Linux and Windows Server
- Elastic Compute Cloud (EC2): AMIs and Instance Types
- Elastic Compute Cloud (EC2): Storage: IS, EBS, EFS, FSx, S3
- Elastic Compute Cloud (EC2): IP addressing, Network Interfaces, Security Groups and Placement Groups
- Elastic Compute Cloud (EC2): Auto Scaling
- Application AutoScaling
- Elastic Compute Cloud (EC2): Elastic Load Balancers
- Elastic Container Service and Elastic Kubernetes Service
- Relational Database Service (RDS): Overview, Pricing, Instances, Storage, Encryption, and Backups
- Relational Database Service (RDS): Multi-AZ, Read Replicas, RDS Proxy
- Relational Database Service (RDS): Amazon Aurora
- Amazon Elasticache
- Architecting with Amazon S3 Storage
- Simple Storage Service (S3): Storage Review, S3 Overview, and Architecture
- Simple Storage Service (S3): Storage Classes, Lifecyle Policies and Performance
- Simple Storage Service (S3): Permissions, Encryption, Versioning, MFA Delete, and Object Lock
- Simple Storage Service (S3): Static Website Hosting
- Simple Storage Service (S3): Additional Services and Tools
- Improving Access and Reliability to your AWS Services
- Amazon CloudFront & AWS Global Accelerator
- Amazon Route 53
- Building a Server-based Architecture in AWS
- Introducing the Serverless Architecture
- Lambda and API Gateway
- AWS Step Functions
- Amazon DynamoDB
- DocumentDB, Redshift, Lake Formation, and Neptune
- Amazon SQS, Amazon SNS, Amazon SES, Amazon Pinpoint, and Amazon MQ
- Migrating, Transferring, and Syncing Data with Amazon S3
- AWS Storage Gateway and AWS Backup
- AWS Snowcone, Snowball and Snowmobile
- AWS DataSync, AWS Transfer, AWS Database Migration Service, and AWS Batch
- Authentication and Security in AWS
- Identity and Access Management: Users, Groups, and Roles
- Identity and Access Management: Permissions and Policies
- Identity Providers and Cognito
- AWS Certificate Manager, Secrets Manager, WAF, Shield
- AWS Key Management Service and AWS CloudHSM
- Amazon Inspector, Macie, and Guard Duty
- Managing and Monitoring in AWS
- AWS Systems Manager
- Amazon CloudWatch: Metrics, Logs, Alarms, Dashboards
- AWS CloudTrail and AWS Config
- Amazon EventBridge
- AWS Organizations, Control Tower, and Resource Groups
- AWS Billing, Cost Management, and Trusted Advisor
- Additional Services You Need to Know
- Amazon Translate, Transcribe, Textract, Comprehend, and Rekognition
- Amazon Athena, QuickSight, Glue, and AppFlow
- Amazon Kinesis and Amazon Elastic Beanstalk
- How to Approach Exam Questions and Course Wrap-Up!
- Practice Questions
- Course Wrap-Up!
What you will learn
- Make architectural decisions based on AWS architectural principles and best practices
- Leverage AWS services to make your infrastructure scalable, reliable, and highly available
- Leverage AWS Managed Services to enable greater flexibility and resiliency in an infrastructure
- Make an AWS-based infrastructure more efficient to increase performance and reduce costs
- Use the Well-Architected Framework to improve architectures with AWS solutions
How you will benefit
- You will be prepared to sit for the AWS Solutions Architect: Associate Exam
- Gain valuable career skills that you can apply immediately
- Increase your earning potential
- Complete your program in 3 months or less
- Certificate of completion from the school or organization that you registered through (upon successfully passing the final exam)
Raymond Lacoste
Raymond Lacoste is a highly recognized instructor and IT professional who holds the Cisco Sirius Instructor Award. He has authored Cisco Press publications on the Cisco ENARSI and Cisco TSHOOT exams.
Raymond's areas of expertise include Cisco Enterprise networking, Cisco Routing, and Switching, Cisco Datacenter Networking, ITIL, and Amazon AWS. He also holds certifications in Cisco CCSI, Cisco CCNP Routing and Switching, Cisco CCNP Enterprise, ITIL Foundations, ITIL Practitioner, ITIL Intermediate, Amazon AWS System Operations, Amazon AWS Architect, Amazon AWS Developer, and CISSP.
In addition to his certifications and experience, Raymond's engaging instruction style makes even the most obscenely complicated or obtuse concepts relatable and understandable. Outside of class, he enjoys dominating both on the golf course and the basketball court.
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.
In this online training course, you will be taught the fundamental skills to architect your IT solutions on AWS. AWS Architect Associate is a course for system engineers and system developers that will cover how to optimize the AWS Cloud by understanding AWS services and how they fit into cloud-based solutions.
This course can be used to prepare for the AWS Certified Solutions Architect – Associate exam. This course offers enrollment with a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.
|
|
|
Certified AWS SysOps Administrator (Voucher Included)
- Certified AWS SysOps Administrator (Voucher Included)
-
Fee: $1,995.00
Dates: 4/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Location:
Building:
Room:
Instructor:
The AWS SysOps Administrator course is intended for system administrators and software developers who wish to learn related best practices and tools on the AWS platform for configuring and deploying systems. Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
Software Requirements:
- PC: Windows 8 or later.
- Mac: macOS 10.6 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
- Virtual Labs included with the course
- Microsoft Word Online
- Adobe Acrobat Reader
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment and available online.
- Study guide
- Virtual labs
- Practice exams
In this online training course, you will be taught how to create automatable and repeatable deployments of networks and systems on the AWS platform. AWS SysOps Administrator is a course for system administrators and developer operations personnel. It will cover the specific AWS features and tools related to configuration and deployment and common techniques used throughout the industry for configuring and deploying systems.
This course can be used to prepare for the AWS Certified SysOps Administrator – Associate exam. This course offers enrollment with a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.
- Course Overview and AWS Introduction
- Introduction to AWS Certified SysOps Administrator Associate Course and Exam Objectives
- Introducing AWS and the Cloud
- The AWS Global Architecture (Regions, Availability Zones, and Edge Locations)
- AWS Pricing, Billing, Support Plans and Dashboards
- Accessing AWS Resources
- AWS Networking
- VPC Overview and VPC Subnets
- VPC Internet Connectivity, Routing, and NAT
- VPC Security Groups, ACLs, and Flow Logs
- VPC VPNs, Direct Connect, Peering, Transit Gateways, and Endpoints
- CloudFront, Global Accelerator and Route53
- AWS Compute
- EC2 Overview, Architecture, and Pricing
- EC2 Launching and Accessing a Linux and Windows Server
- EC2 AMIs, Instance Types, Features
- EC2 Instance Store, EBS, EFS, FSx, and S3 Storage
- EC2 IP addressing, Network Interfaces, Security Groups and Placement Groups
- EC2 Auto Scaling
- EC2 Load Balancers
- ECS Overview
- Lambda Overview and Examples
- API Gateway
- AWS Databases
- Database Overview
- RDS Overview, Instances, Storage, Encryption and Backups
- RDS Multi-AZ, and Read Replicas
- RDS Amazon Aurora
- Elasticache Overview
- DynamoDB Overview
- Redshift Overview
- AWS Storage
- Storage Overview and Review
- S3 Introduction, Storage Classes, and Lifecyle Policies
- S3 Security, and Integrity
- S3 Replication, Event Notifications, Inventory, and Limits
- S3 Static Website Hosting
- Storage Gateway and AWS Backup
- AWS Migration and Messaging
- Snowcone, Snowball, Snowmobile
- AWS DataSync, AWS Transfer, AWS Database Migration Service
- SQS, SNS, and SES
- AWS Security
- Security Overview, IAM Users and Groups
- Permissions and Policies
- IAM Roles, Identity Federation and Cognito
- KMS, Secrets Manager, Certificates Manager, and Compliance
- AWS WAF, Shield, Inspector, Macie, and GuardDuty
- Monitoring, Maintenance, and Management
- CloudWatch, CloudWatch Logs, and CloudWatch Events
- AWS CloudTrail, AWS Config, and Trusted Advisor
- CloudFormation and Service Catalog
- AWS Organizations, and Control Towe
- AWS Systems Manager, Resource Groups, and Service/Personal Health Dashboards
- AWS Pricing, Billing, and Cost Management
What you will learn
- Use standard AWS infrastructure features such as Amazon Virtual Private Cloud (VPC), Amazon Elastic Compute Cloud (EC2), Elastic Load Balancing, and Auto Scaling from the command line
- Use AWS CloudFormation and other automation technologies to produce stacks of AWS resources that can be deployed in an automated, repeatable fashion
- Build functioning virtual private networks with Amazon VPC from the ground up using the AWS Management Console
- Deploy Amazon EC2 instances using command line calls and troubleshoot the most common problems with instances
- Monitor the health of Amazon EC2 instances and other AWS services
- Manage user identity, AWS permissions, and security in the cloud
- Manage resource consumption in an AWS account using tools such as Amazon CloudWatch, tagging, and Trusted Advisor
- Select and implement the best strategy for creating reusable Amazon EC2 instances
- Configure a set of Amazon EC2 instances that launch behind a load balancer, with the system scaling up and down in response to demand
- Edit and troubleshoot a basic AWS CloudFormation stack definition
How you will benefit
- You will be prepared to sit for the AWS SysOps Administrator: Associate Exam
- Gain valuable career skills that you can apply immediately
- Increase your earning potential
- Complete your program in 3 months or less
Raymond Lacoste
Raymond Lacoste is a highly recognized instructor and IT professional who holds the Cisco Sirius Instructor Award. He has authored Cisco Press publications on the Cisco ENARSI and Cisco TSHOOT exams.
Raymond's areas of expertise include Cisco Enterprise networking, Cisco Routing and Switching, Cisco Datacenter Networking, ITIL, and Amazon AWS. He also holds certifications in Cisco CCSI, Cisco CCNP Routing and Switching, Cisco CCNP Enterprise, ITIL Foundations, ITIL Practitioner, ITIL Intermediate, Amazon AWS System Operations, Amazon AWS Architect, Amazon AWS Developer, and CISSP.
In addition to his certifications and experience, Raymond's engaging instruction style makes even the most obscenely complicated or obtuse concepts relatable and understandable. Outside of class, he enjoys dominating both on the golf course and the basketball court.
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.
In this online training course, you will be taught how to create automatable and repeatable deployments of networks and systems on the AWS platform. AWS SysOps Administrator is a course for system administrators and developer operations personnel. It will cover the specific AWS features and tools related to configuration and deployment and common techniques used throughout the industry for configuring and deploying systems.
This course can be used to prepare for the AWS Certified SysOps Administrator – Associate exam. This course offers enrollment with a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.
|
|
|
Certified Cloud Security Professional (CCSP)
- Certified Cloud Security Professional (CCSP)
-
Fee: $1,595.00
Dates: 4/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Location:
Building:
Room:
Instructor:
This engaging CCSP certification course covers the advanced technical skills and knowledge to design, manage, and secure data, applications, and infrastructure in the cloud using best practices, policies, and procedures established by the cybersecurity experts at (ISC)2. Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
Software Requirements:
- PC: Windows 8 or later.
- Mac: macOS 10.6 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
- Virtual Labs included with course
- Microsoft Word Online
- Adobe Acrobat Reader
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment. The following textbooks will be shipped to you approximately 7-10 business days after enrollment:
- (ISC)2 CCSP Certified Cloud Security Professional Official Study Guide
Now is a great time to earn your Certified Cloud Security Professional (CCSP) credential and advance your cybersecurity career! These trained professionals earn $137,100 annually, according to Certification Magazine's 2023 Annual Salary Survey. This online instructor-led CCSP certification course will provide you with the advanced technical skills and knowledge to design, manage, and secure data, applications, and infrastructure in the cloud.
This CCSP course is an engaging, fully online course that provides in-depth instruction in key areas related to securing critical assets in the cloud. You will learn key cloud security topics and techniques necessary for maintaining a secure cloud infrastructure using best practices, policies, and procedures established by the cybersecurity experts at (ISC)2.
You will dive into cloud concepts, architectures, and design principles and understand cloud service models and deployment models along the way. Next, you will review legal and compliance principles of IT governance, risk management, and compliance in a cloud environment, as well as compliance frameworks and standards relevant to cloud security, such as ISO, GDPR, HIPAA, and more.
Throughout this compressive CCSP training, you review many in-demand and relevant topics, such as the cloud platform and infrastructure security component, cloud application security and operations, incident response, data lifecycle manage and business continuity.
By completing this cloud security certification course, you will be prepared for the Certified Cloud Security Professional (CCSP) exam and ready to secure assets in the cloud.
- Cloud Concepts, Architecture and Design
- Legal and Compliance
- Cloud Data Security
- Cloud Platform and Infrastructure Security
- Cloud Application Security
- Cloud Security Operations
What you will learn
- Architectural concepts and design requirements
- Cloud data security
- Cloud platform and infrastructure security
- Cloud application security
- Operations
- Legal and compliance
How you will benefit
- Become prepared for the Certified Cloud Security Professional (CCSP) exam
- Begin a career in cloud security or broaden your skills if you are already working
- Become more efficient on the job and better able to secure assets in the cloud
Christopher Paul
Christopher Paul is a seasoned IT professional, cybersecurity expert, and Army veteran. He brings 15 years of experience, having previously held positions in military cybersecurity and tech startups. His robust skill set includes leadership, team building, active directory, data center, computer network operations, and more.
Christopher currently holds certifications in ISC2 SSCP, CompTIA CASP+, and CompTIA PenTest+. Outside work, he enjoys spending time with his two sons, running with his labradoodle, and playing the drums.
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.
Now is a great time to earn your Certified Cloud Security Professional (CCSP) credential and advance your cybersecurity career! These trained professionals earn $137,100 annually, according to Certification Magazine's 2023 Annual Salary Survey. This online instructor-led CCSP certification course will provide you with the advanced technical skills and knowledge to design, manage, and secure data, applications, and infrastructure in the cloud.
This CCSP course is an engaging, fully online course that provides in-depth instruction in key areas related to securing critical assets in the cloud. You will learn key cloud security topics and techniques necessary for maintaining a secure cloud infrastructure using best practices, policies, and procedures established by the cybersecurity experts at (ISC)2.
You will dive into cloud concepts, architectures, and design principles and understand cloud service models and deployment models along the way. Next, you will review legal and compliance principles of IT governance, risk management, and compliance in a cloud environment, as well as compliance frameworks and standards relevant to cloud security, such as ISO, GDPR, HIPAA, and more.
Throughout this compressive CCSP training, you review many in-demand and relevant topics, such as the cloud platform and infrastructure security component, cloud application security and operations, incident response, data lifecycle manage and business continuity.
By completing this cloud security certification course, you will be prepared for the Certified Cloud Security Professional (CCSP) exam and ready to secure assets in the cloud.
|
|
|
Certified Ethical Hacker (Voucher Included)
- Certified Ethical Hacker (Voucher Included)
-
Fee: $2,895.00
Dates: 4/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Location:
Building:
Room:
Instructor:
This online Certified Ethical Hacker (CEH) course will teach you the valuable details that every information security professional needs to know. Requirements:
Hardware Requirements:
- This course can be taken on either a PC or Mac.
Software Requirements:
- PC: Windows 8 or later.
- Mac: macOS 10.10 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
- Adobe Acrobat Reader.
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment and will be available online. The materials are non-refundable upon registration.
- Certified Ethical Hacker, Ethical Hacking and Countermeasures (eBook)
To be successful in beating a hacker, you need to think like one. This ethical hacking certification course immerses you in the hacker mindset and puts you in control with hands-on activities. As a certified ethical hacker (CEH), you use the same techniques as malicious hackers to assess security and identify weaknesses, but for ethical purposes. You will scan, test, hack, and secure your own systems to help prevent potentially catastrophic damage to your organization.
By completing this CEH training, you will learn the industry standards of ethical hacking developed by the EC-Council. This process involves five phases, namely Reconnaissance, Gaining Access, Enumeration, Maintaining Access, and Covering Your Tracks. With these skills, you will be able to assess the security posture of an organization and identify and fix weaknesses before malicious hackers can exploit them.
This unique credential sets you apart from other IT professionals and adds even more value to your organization. According to the EC-Council, one in every two professionals receive promotions after gaining their ethical hacking certification.
Gain advanced hacking tools and techniques while preparing to sit for the Certified Ethical Hacker Exam 312-50 with this accredited CEH course offered by the EC-Council. The exam voucher is included in the cost of your enrollment.
- Introduction to Ethical Hacking
- Foot Printing and Reconnaissance
- Scanning Networks
- Enumeration
- Vulnerability Analysis
- System Hacking
- Malware Threats
- Sniffing
- Social Engineering
- Denial of Service
- Session Hijacking
- Evading IDS, Firewalls and Honeypots
- Hacking Web Servers
- Hacking Web Applications
- SQL Injection
- Hacking Wireless Networks
- Hacking Mobile Platforms
- IoT and OT Hacking
- Cloud Computing
- Cryptography
What you will learn
- Assess ethical and legal requirements for security assessment and penetration testing and develop a compliance strategy
- Analyze the different phases of hacking and determine the most effective ethical hacking strategy for assessing the security of information system components
- Identify vulnerabilities, threats, and attacks to information systems, and recommend countermeasures.
- Evaluate cryptography algorithms and encryption techniques and develop implementation strategies for securing information
- Evaluate network security techniques and tools, and implement appropriate information security controls based on evidence, information, and research
How you will benefit
- Prepare for Certified Ethical Hacker (CEH) Exam Number 312-50 with example CEH exam questions
- Obtain the CEH credential to unlock a number of career opportunities in the information security and cybersecurity industry
- Obtain a credential highly acknowledged and recognized by employers in the public and private sector
- Complete the most advanced, hands on ethical hacking program in the industry
Eric Reed
Eric Reed has over 12 years of experience in IT consulting, specializing in security. Since 2005, he has consulted and delivered custom training to the U.S. military and numerous Fortune 100 and Fortune 500 companies. He has delivered CEH, CHFI, and ECSA/LPT training for the last seven years, with a 95 percent pass rating. Reed was awarded the EC Council Instructor of the Year in 2009 and 2012, as well as the Circle of Excellence in 2006, 2007, and 2010.
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.
To be successful in beating a hacker, you need to think like one. This ethical hacking certification course immerses you in the hacker mindset and puts you in control with hands-on activities. As a certified ethical hacker (CEH), you use the same techniques as malicious hackers to assess security and identify weaknesses, but for ethical purposes. You will scan, test, hack, and secure your own systems to help prevent potentially catastrophic damage to your organization.
By completing this CEH training, you will learn the industry standards of ethical hacking developed by the EC-Council. This process involves five phases, namely Reconnaissance, Gaining Access, Enumeration, Maintaining Access, and Covering Your Tracks. With these skills, you will be able to assess the security posture of an organization and identify and fix weaknesses before malicious hackers can exploit them.
This unique credential sets you apart from other IT professionals and adds even more value to your organization. According to the EC-Council, one in every two professionals receive promotions after gaining their ethical hacking certification.
Gain advanced hacking tools and techniques while preparing to sit for the Certified Ethical Hacker Exam 312-50 with this accredited CEH course offered by the EC-Council. The exam voucher is included in the cost of your enrollment.
|
|
|
Certified Information Security Manager (CISM) (Voucher Included)
- Certified Information Security Manager (CISM) (Voucher Included)
-
Fee: $1,695.00
Dates: 4/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Location:
Building:
Room:
Instructor:
The Certified Information Security Manager (CISM) credential is one of the most valued certifications in the IT security industry. This online course will prepare you to sit for the CISM certification exam, and the exam cost is included. Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
Software Requirements:
- PC: Windows 10 or later.
- Mac: macOS 10.6 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
- Virtual Labs included with course
- Microsoft Word Online
- Adobe Acrobat Reader
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment.
- Study guide
- Practice exams
The following textbook(s) will also be shipped to you approximately 7-10 business days after enrollment:
- Principles of Information Security, 7th Edition
In a world where cyberattacks are rising, security managers are the driving force behind an organization's cybersecurity policies, ensuring that risk assessments, vulnerability assessments, and threat analyses are conducted consistently to safeguard an organization's information. These key individuals typically started their IT careers in hands-on roles before earning their Certified Information Security Manager (CISM) certification and taking on managerial duties. This CISM training course is designed for professionals with technical expertise and experience in information security and/or IT security who want to move from an integral team player to a manager.
Topics covered in this CISM certification course include information security governance, information risk management, information security program development and management, and information security incident management. By course completion, you will understand key processes and procedures to effectively manage and respond to information security incidents.
Obtaining your CISM certification will help you gain credibility and add confidence to your interactions with stakeholders, regulators, and peers. You will learn how to develop an effective information security strategy aligned with business goals and directives, further helping you gain ongoing commitment from senior leadership and other stakeholders.
This course prepares you for the CISM certification exam, an industry-recognized credential that further helps you stand out. This course offers enrollment with a voucher. Your CISM exam voucher is prepaid access to sit for the certifying exam upon eligibility. Proctor fees may apply but are not included with enrollment.
- Information Security Governance
- Information Risk Management
- Information Security Program Development & Management
- Information Security Incident Management
What you will learn
- Understand information security governance strategies and responsibilities
- Review information risk management and compliance
- Discover information security program development and management fundamentals
- Learn how to use and apply information security incident management
How you will benefit
- Build confidence toward successfully completing the CISM certification exam
- Become recognized by ISACA, a global leader in certification, training, and career development
- Prove comprehensive information security knowledge to employers, validated by your CISM certification
Derrick Coston
Derrick Coston is a blue-team cybersecurity professional. Derrick has run a team of cybersecurity professionals for a major financial institution. Outside of teaching classes such as CISA and CISSP, Derrick serves as a cybersecurity consultant and auditor for organizations and performs security assessments for large organizations.
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.
In a world where cyberattacks are rising, security managers are the driving force behind an organization's cybersecurity policies, ensuring that risk assessments, vulnerability assessments, and threat analyses are conducted consistently to safeguard an organization's information. These key individuals typically started their IT careers in hands-on roles before earning their Certified Information Security Manager (CISM) certification and taking on managerial duties. This CISM training course is designed for professionals with technical expertise and experience in information security and/or IT security who want to move from an integral team player to a manager.
Topics covered in this CISM certification course include information security governance, information risk management, information security program development and management, and information security incident management. By course completion, you will understand key processes and procedures to effectively manage and respond to information security incidents.
Obtaining your CISM certification will help you gain credibility and add confidence to your interactions with stakeholders, regulators, and peers. You will learn how to develop an effective information security strategy aligned with business goals and directives, further helping you gain ongoing commitment from senior leadership and other stakeholders.
This course prepares you for the CISM certification exam, an industry-recognized credential that further helps you stand out. This course offers enrollment with a voucher. Your CISM exam voucher is prepaid access to sit for the certifying exam upon eligibility. Proctor fees may apply but are not included with enrollment.
|
|
|
Certified Information Systems Auditor (CISA) (Voucher Included)
- Certified Information Systems Auditor (CISA) (Voucher Included)
-
Fee: $1,695.00
Dates: 4/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Location:
Building:
Room:
Instructor:
This online Certified Information Systems Auditor (CISA) training course will prepare you for the five key domains: auditing, governance, implementation, management, and protection. Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
Software Requirements:
- PC: Windows 10 or later.
- Mac: macOS 10.6 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
- Virtual Labs included with course
- Microsoft Word Online
- Adobe Acrobat Reader
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment.
- Study guide
- Practice exams
The following textbook(s) will also be shipped to you approximately 7-10 business days after enrollment:
- CISA Official Review Manual, 28th Edition 2024
With cyberattacks on the rise, more organizations are investing in data protection and building out their cybersecurity teams. As an IT professional, earning your Certified Information Systems Auditor (CISA) certification could be the first step to leading IT security at your organization.
This online CISA training course will teach you how to identify and evaluate the five Certified Information Systems Auditor domains: auditing, governance, implementation, management, and protection. Throughout this CISA certification course, you will learn the process of auditing information systems, governance and the management of IT, information systems acquisition, development, and implementation, information systems operation, maintenance, and support fundamentals, and protection and information of assets.
This CISA certification course offers enrollment with a voucher. The voucher is prepaid access to sit for the CISA certification exam and is included with this course upon eligibility.
- The Process of Auditing Information Systems
- Task statements
- Knowledge statements
- Executive misconduct and relevant regulations
- Regulatory objectives and assessing threats and vulnerabilities
- Leadership through governance
- Understanding policies, standards, guidelines and procedures
- Understanding professional ethics
- Understanding the purpose of an audit
- Implementing audit standards
- The executive position of auditor
- Understanding the corporate organizational structure
- Governance and Management of IT
- Task statements and knowledge statements
- Managing IT governance
- Tactical management
- Business process re-engineering
- Operations management
- Information Systems Acquisition, Development, and Implementation
- Task statements and knowledge statements
- Audit process
- Performing the audit
- Gathering audit evidence
- Conducting audit evidence testing
- Information Systems Operation, Maintenance, and Support
- Task statements and knowledge statements
- System implementation and operations
- Understanding IT services
- IT operations management
- Administrative protection
- Problem management
- Monitoring controls status
- Implementing physical protection
- Protection and Information Assets
- Protection of information assets
- Technical protection
What you will learn
- IT audit manager essentials
- Internal auditor responsibilities
- Privacy officer duties and fundamentals
- The information needed to obtain your CISA certification
How you will benefit
- Complete your Certified Information Systems Auditor (CISA) training in a flexible online environment
- Build confidence toward completing the CISA certification exam successfully
- Become recognized by ISACA, a global leader in certification, training, and career development
- Prove to employers that you have validated your knowledge and training with your Certified Information Systems Auditor credential
Derrick Coston
Derrick Coston is a blue-team cybersecurity professional. Derrick has run a team of cybersecurity professionals for a major financial institution. Outside of teaching classes such as CISA and CISSP, Derrick serves as a cybersecurity consultant and auditor for organizations and performs security assessments for large organizations.
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.
With cyberattacks on the rise, more organizations are investing in data protection and building out their cybersecurity teams. As an IT professional, earning your Certified Information Systems Auditor (CISA) certification could be the first step to leading IT security at your organization.
This online CISA training course will teach you how to identify and evaluate the five Certified Information Systems Auditor domains: auditing, governance, implementation, management, and protection. Throughout this CISA certification course, you will learn the process of auditing information systems, governance and the management of IT, information systems acquisition, development, and implementation, information systems operation, maintenance, and support fundamentals, and protection and information of assets.
This CISA certification course offers enrollment with a voucher. The voucher is prepaid access to sit for the CISA certification exam and is included with this course upon eligibility.
|
|
|
Certified Information Systems Security Professional (CISSP)
- Certified Information Systems Security Professional (CISSP)
-
Fee: $1,995.00
Dates: 4/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Location:
Building:
Room:
Instructor:
This engaging Certified Information Systems Security Professional (CISSP) course covers the key areas of information security and will prepare you for the CISSP exam. Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
Software Requirements:
- PC: Windows 10 or later.
- Mac: macOS 10.6 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
- Virtual Labs included with course
- Microsoft Word Online
- Adobe Acrobat Reader
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment.
- Study guide
- Practice exams
The following textbooks will also be shipped to you approximately 7-10 business days after enrollment:
- (ISC)2 Certified Information Systems Security Professional (CISSP) Official Study Guide, 10th Edition
In today's online world, information security has become a critical part of virtually every organization—no matter the industry. The demand for information security professionals is much higher than the average for all occupations. In fact, the U.S. Bureau of Labor Statistics projects that the employment of information security analysts will grow 33% by 2033, offering 17,300 openings on average every year!
Earning your Certified Information Systems Security Professional (CISSP) certification can open the door to many IT positions, and it is often necessary for those wishing to pursue higher-level security roles in the future. This CISSP training course is an engaging, fully online course that provides in-depth instruction in key areas related to information/cybersecurity.
The course delves into everything you need to master to pass the CISSP certification exam, including security governance principles, risk management concepts, asset security, security architecture and engineering, communication and network security, identity and access management, security assessment and testing, security operations, and software development security.
Completing your CISSP training online and earning your CISSP certification is ideal for you to advance your career in information security and risk management while also validating your ability to effectively design, implement, and manage best-in-class cybersecurity operations.
- Security and Risk Management
- Asset Security
- Security Architecture and Engineering
- Communication and Network Security
- Identity and Access Management (IAM)
- Security Assessment and Testing
- Security Operations
- Software Development Security
What you will learn
- Security and risk management
- Asset Security
- Security engineering
- Communications and network security
- Identity and access management
- Security assessment and testing
- Security operations
- Software development security
How you will benefit
- Become prepared to work as a Certified Information Systems Security Professional (CISSP)
- Gain hands-on experience in the information/cybersecurity industry
- Begin a career in information security or broaden your skills if you are already working
- Become more efficient on the job and better able to identify risks as a CISSP certification holder
Raymond Lacoste
Raymond Lacoste is a highly recognized instructor and IT professional who holds the Cisco Sirius Instructor Award. He has authored Cisco Press publications on the Cisco ENARSI and Cisco TSHOOT exams.
Raymond's areas of expertise include Cisco Enterprise networking, Cisco Routing and Switching, Cisco Datacenter Networking, ITIL, and Amazon AWS. He also holds certifications in Cisco CCSI, Cisco CCNP Routing and Switching, Cisco CCNP Enterprise, ITIL Foundations, ITIL Practitioner, ITIL Intermediate, Amazon AWS System Operations, Amazon AWS Architect, Amazon AWS Developer, and CISSP.
In addition to his certifications and experience, Raymond's engaging instruction style makes even the most obscenely complicated or obtuse concepts relatable and understandable. Outside of class, he enjoys dominating both on the golf course and the basketball court.
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.
In today's online world, information security has become a critical part of virtually every organization—no matter the industry. The demand for information security professionals is much higher than the average for all occupations. In fact, the U.S. Bureau of Labor Statistics projects that the employment of information security analysts will grow 33% by 2033, offering 17,300 openings on average every year!
Earning your Certified Information Systems Security Professional (CISSP) certification can open the door to many IT positions, and it is often necessary for those wishing to pursue higher-level security roles in the future. This CISSP training course is an engaging, fully online course that provides in-depth instruction in key areas related to information/cybersecurity.
The course delves into everything you need to master to pass the CISSP certification exam, including security governance principles, risk management concepts, asset security, security architecture and engineering, communication and network security, identity and access management, security assessment and testing, security operations, and software development security.
Completing your CISSP training online and earning your CISSP certification is ideal for you to advance your career in information security and risk management while also validating your ability to effectively design, implement, and manage best-in-class cybersecurity operations.
|
|
|
Certified Kubernetes Administrator (CKA) (Voucher Included)
- Certified Kubernetes Administrator (CKA) (Voucher Included)
-
Fee: $1,995.00
Dates: 4/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Location:
Building:
Room:
Instructor:
This course will teach you how to use the container management platform used by companies like Google to manage their application infrastructure. Requirements:
Hardware Requirements:
- This course can be taken on either a PC or Mac. Chromebooks are not compatible.
Required Lab Exercises
- For hands-on lab exercises, access to a Linux server or Linux desktop/laptop is required. Access to a public cloud provider or VirtualBox on your machine is also needed. Lab exercises in this course have been tested in a GCP environment.
- If using a cloud provider like GCP or AWS, you should be able to complete the lab exercises using the free tier or credits provided to you. However, you may incur charges if you exceed the credits initially allocated by the cloud provider.
Software Requirements:
- PC: Windows 7 or later.
- Mac: macOS 10.7 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
- Microsoft Word Online.
- Adobe Acrobat Reader.
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Exam Requirements:
- Exams are delivered online, and candidates must provide their own computer with:
- Current version of Chrome or Chromium.
- Reliable internet access.
- A microphone.
- A webcam.
- All technical exam requirements should be tested and working prior to starting the exam.
- Candidates are not allowed to have other applications or browser windows running except the one on which the Exam is being shown.
- Candidates should run the compatibility check tool to verify that their hardware meets the minimum requirements.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment and will be available online. Learn how to use the container management platform used by top companies, like Google, with the Certified Kubernetes Administrator (CKA) course. This Kubernetes training course will teach you everything you need to know to install and configure a production-grade Kubernetes cluster, from network configuration to upgrades to making deployments available through services.
You will gain a solid understanding of key principles like Pods, Deployments, ReplicaSets, and services. Your training equips you with the necessary skills to work with containers, which enables you to package applications with their dependencies and deploy them on various platforms such as Bare-Metal, VM, Cloud, and more!
This Kubernetes course introduces Continuous Integration/Continuous Delivery (CI/CD) within an open container ecosystem, using a project-based approach to help you understand and implement best practices. You will learn about the crucial role played by Docker Swarm and Kubernetes, revision control using Git, and how to install and configure Jenkins as a Continuous Integration platform. You will also discover how to use code reviews to enforce development workflows, package and distribute applications with Docker and Docker Registry, and set up a deployment pipeline using Argo CD.
Upon course completion, this Kubernetes training course will prepare you for the CKA exam. This exam is performance-based and involves completing various tasks from a Kubernetes command line. With your enrollment, you will also receive an exam voucher to take the CKA certification exam.
Note: This certification is ideal for Kubernetes administrators, cloud administrators, and other IT professionals who manage Kubernetes instances.
- Getting Started
- Containers Fundamentals
- Course Introduction
- Virtualization Fundamentals
- Virtualization Mechanisms
- Container Standards And Runtimes
- Image Operations
- Container Operations
- Building Container Images
- Container Networking
- Container Storage
- Runtime And Containers Security
- DevOps and SRE Fundamentals
- Introduction
- What and Why of CI/CD
- Setup: Exploring and Creating Our Learning Environment
- Basics of Container Operations with Docker
- Version Control with Git
- Setting Up Continuous Integration with Jenkins
- GitHub Branch Policies & Pipeline as Code with Jenkinsfile
- Using Docker with Jenkins Pipelines
- Docker Images
- Launching a Multi-Service Application with Docker Compose
- Automated Code Analysis
- SRE and Deploying a Scalable Application to Kubernetes
- SRE. GitOps and CD with Argo CD
- Kubernetes Fundamentals
- Course Introduction
- Basics of Kubernetes
- Installation and Configuration
- Kubernetes Architecture
- APIs and Access
- API Objects
- Managing State with Deployments
- Volumes and Data
- Services
- Helm
- Ingress
- Scheduling
- Logging and Troubleshooting
- Custom Resource Definitions
- Security
- High Availability
- Exam Domain Review
- Course Completion
- CKA Prep and Exam
What you will learn
- How to use the container management platform used by companies like Google to manage their application infrastructure
- How to install and configure a production-grade Kubernetes cluster
- The key principles, such as Pods, Deployments, ReplicaSets, and services
- Learn revision control using Git
- Understand the role played by Docker and Kubernetes
- Learn to install and configure Jenkins as a Continuous Integration platform
- Understand the fundamentals of Continuous Integration/Continuous Delivery (CI/CD)
How you will benefit
- Demonstrate the ability to do basic installation and configuring and managing production-grade Kubernetes clusters
- Understand key concepts such as Kubernetes networking, storage, security, maintenance, logging and monitoring, application lifecycle, troubleshooting, and API object primitives
- Obtain the ability to establish basic use-cases for end users
- Master enforcing development workflows as code reviews
- Gather application packaging and distribution with Docker Swarm and Docker Registry using Argo CD to set up a deployment pipeline
Linux Instructors
This course does not have an assigned instructor, but you will have access to several Linux instructors and subject matter experts throughout the course.
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.
Learn how to use the container management platform used by top companies, like Google, with the Certified Kubernetes Administrator (CKA) course. This Kubernetes training course will teach you everything you need to know to install and configure a production-grade Kubernetes cluster, from network configuration to upgrades to making deployments available through services.
You will gain a solid understanding of key principles like Pods, Deployments, ReplicaSets, and services. Your training equips you with the necessary skills to work with containers, which enables you to package applications with their dependencies and deploy them on various platforms such as Bare-Metal, VM, Cloud, and more!
This Kubernetes course introduces Continuous Integration/Continuous Delivery (CI/CD) within an open container ecosystem, using a project-based approach to help you understand and implement best practices. You will learn about the crucial role played by Docker Swarm and Kubernetes, revision control using Git, and how to install and configure Jenkins as a Continuous Integration platform. You will also discover how to use code reviews to enforce development workflows, package and distribute applications with Docker and Docker Registry, and set up a deployment pipeline using Argo CD.
Upon course completion, this Kubernetes training course will prepare you for the CKA exam. This exam is performance-based and involves completing various tasks from a Kubernetes command line. With your enrollment, you will also receive an exam voucher to take the CKA certification exam.
Note: This certification is ideal for Kubernetes administrators, cloud administrators, and other IT professionals who manage Kubernetes instances.
|
|
|
Certified Network Defender (CND) (Voucher Included)
- Certified Network Defender (CND) (Voucher Included)
-
Fee: $2,895.00
Dates: 4/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Location:
Building:
Room:
Instructor:
This course prepares for the EC-Council Certified Network Defender (CND) exam. You will gain key skills that network engineers need to protect, detect and respond to the threats on their networks. Requirements:
Hardware Requirements:
- This course can be taken on either a PC or Mac.
Software Requirements:
- PC: Windows 8 or later.
- Mac: macOS 10.10 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
- Adobe Acrobat Reader.
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment and will be available online. The materials are non-refundable upon registration. This comprehensive online course is specifically designed to prepare network engineers for the Certified Network Defender (CND) certification exam offered by the EC-Council (ECC). The CND certification is globally recognized and validates your ability to protect networks and maintain operations during cyber-attacks effectively.
Throughout this CND course, you will delve into various modules that cover essential topics such as network security controls, protocols, and devices. You will learn how to strengthen security infrastructures by effectively implementing intrusion detection and prevention systems and troubleshooting network problems. The course also provides in-depth training on implementing secure virtual private networks (VPNs) for organizations and identifying and mitigating threats to wireless networks.
One of the key highlights of this CND training program is its alignment with global CND responsibilities and Department of Defense (DoD) job roles for system/network administrators. This ensures that the skills and knowledge you acquire are highly relevant and applicable in real-world scenarios. The course follows a vendor-neutral approach, allowing you to understand network security principles and practices comprehensively without being tied to any specific technology or platform.
Upon completing this course, you will receive a voucher covering the certifying exam's cost. This allows you to schedule and take the exam remotely using a proctor function, providing flexibility and convenience in the certification process.
By enrolling in this course and earning the CND certification, you will become proficient in network security, gain the necessary skills to protect networks from cyber breaches, and enhance your professional credibility in this high-demand field.
- Network Attacks and Defense Strategies
- Administrative Network Security
- Technical Network Security
- Network Perimeter Security
- Endpoint Security-Windows Systems
- Endpoint Security-Linux Systems
- Endpoint Security- Mobile Devices
- Endpoint Security-IoT Devices
- Administrative Application Security
- Data Security
- Enterprise Virtual Network Security
- Enterprise Cloud Network Security
- Enterprise Wireless Network Security
- Network Traffic Monitoring and Analysis
- Network Logs Monitoring and Analysis
- Incident Response and Forensic Investigation
- Business Continuity and Disaster Recovery
- Risk Anticipation with Risk Management
- Threat Assessment with Attack Surface Analysis
- Threat Prediction With Cyber Threat Intelligence
What you will learn
- Acquire knowledge of basic networking concepts, including network security controls, protocols, and devices, to design a robust networking infrastructure
- Evaluate potential vulnerabilities and threats to the network infrastructure, assess the potential impact of network security breaches, and analyze available countermeasures
- Explore various network security mechanisms, analyze available security controls, and develop plans for implementing and configuring these controls
- Recognize the significance of network security policies and develop comprehensive policies to protect the network infrastructure
- Gain an understanding of the functioning of different networking devices and devise secure configuration strategies for these devices
- Troubleshooting key network problems
- Learn how to implement a secure VPN for organizational use and engage in monitoring and signature analysis to detect attacks and policy violations
How you will benefit
- This course satisfies the exam eligibility requirements for the Certified Network Defender (CND)—exam number 312-38 and includes sample CND questions
- Gain the necessary technical knowledge to design a secure network, understand network operations, and analyze related materials
- Develop skills in designing effective network security policies and incident response plans, as well as building resiliency and ensuring continuity of operations during attacks
- Upon successfully passing the certification exam, you will earn the title of Certified Network Defender (CND)
Eric Reed
Eric Reed has over 15 years' experience in IT consulting. He has consulted and delivered certification and customized training to the U.S. military, and for many Fortune 100 and Fortune 500 companies. Eric has delivered CEH, CHFI, and ECSA/LPT for the last ten years and was named "EC-Council Instructor of the Year" seven times, as well as being the recipient of the Circle of Excellence Award in 2006, 2007 and 2010. Eric holds many industry certifications, including EC-Council's CND, CNDA, CHFI, ECSA, CEH and LPT.
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.
This comprehensive online course is specifically designed to prepare network engineers for the Certified Network Defender (CND) certification exam offered by the EC-Council (ECC). The CND certification is globally recognized and validates your ability to protect networks and maintain operations during cyber-attacks effectively.
Throughout this CND course, you will delve into various modules that cover essential topics such as network security controls, protocols, and devices. You will learn how to strengthen security infrastructures by effectively implementing intrusion detection and prevention systems and troubleshooting network problems. The course also provides in-depth training on implementing secure virtual private networks (VPNs) for organizations and identifying and mitigating threats to wireless networks.
One of the key highlights of this CND training program is its alignment with global CND responsibilities and Department of Defense (DoD) job roles for system/network administrators. This ensures that the skills and knowledge you acquire are highly relevant and applicable in real-world scenarios. The course follows a vendor-neutral approach, allowing you to understand network security principles and practices comprehensively without being tied to any specific technology or platform.
Upon completing this course, you will receive a voucher covering the certifying exam's cost. This allows you to schedule and take the exam remotely using a proctor function, providing flexibility and convenience in the certification process.
By enrolling in this course and earning the CND certification, you will become proficient in network security, gain the necessary skills to protect networks from cyber breaches, and enhance your professional credibility in this high-demand field.
|
|
|
Certified Penetration Testing Professional (CPENT) (Voucher Included)
- Certified Penetration Testing Professional (CPENT) (Voucher Included)
-
Fee: $2,995.00
Dates: 4/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Location:
Building:
Room:
Instructor:
Learn how to perform an effective penetration test in an enterprise network environment that must be attacked, exploited, evaded, and defended using the EC-Council's Certified Penetration Tester (CPENT) program. Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
Software Requirements:
- PC: Windows 7 or later.
- Mac: macOS 10.12 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
- Adobe Acrobat Reader
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment and will be available online. The EC-Council's Certified Penetration Tester (CPENT) program is an engaging, informative, and expertly designed course that aims to help you master your Penetration Testing (pen-testing) skills. Recognized by the American Council on Education (ACE), this penetrating testing course offers a comprehensive curriculum that encompasses innovative techniques and methodologies for tackling real-world threat scenarios.
In this penetration testing certification course, you will gain an understanding of a wide range of topics, such as how to write your own exploits, build custom tools, conduct advanced binaries exploitation, double pivot to access hidden networks and customize scripts/exploits to penetrate the most secure segments of a network. Pen testing is a practice that goes beyond ethical hacking by incorporating elements of exploitation, risk measurement, reporting, and executive communication.
Securing advanced domains such as the Internet of Things (IoT), Operational Technology (OT), and Cloud has become increasingly more difficult for cybersecurity professionals as there is a shortage of expertise in this area, and CPENT ranges are dynamic and constantly evolving to reflect live networks' changing targets and technology. Expert penetration testers must continually develop their skills in advanced tools, techniques, and methodologies to conduct effective penetration tests in enterprise network environments and protect against current and future cybersecurity threats.
Enrollment in this Pen Testing course includes a voucher that covers the cost of your certification exam upon course completion.
Note: We continually add new targets and defenses throughout the lifetime of this CPENT penetration testing course to ensure its relevance.
- Introduction to Penetration Testing
- Penetration Testing Scoping and Engagement
- Open-Source Intelligence (OSINT)
- Social Engineering Penetration Testing
- Network Penetration Testing – External
- Network Penetration Testing– Internal
- Network Penetration Testing – Perimeter Devices
- Web Application Penetration Testing
- Wireless Penetration Testing
- IoT Penetration Testing
- OT/SCADA Penetration Testing
- Cloud Penetration Testing
- Binary Analysis and Exploitation
- Active Directory Penetration Testing
- Report Writing and Post Testing Actions
What you will learn
- Advanced Windows Attacks
- Attacking IOT Systems
- Writing Exploits: Advanced Binary Exploitation
- Bypassing a Filtered Network
- Pen testing Operational Technology (OT)
- Access Hidden Networks with Pivoting
- Double Pivoting
- Privilege Escalation
- Evading Defense Mechanisms
- Attack Automation with Scripts
- Weaponize Your Exploits
- Write Professional Reports
How you will benefit
- Mapped with the NICE framework.
- 100% methodology-based penetration testing program
- Blends both manual and automated penetration testing approaches
- Designed with the best service providers' most common penetration testing practices
- Maps to all major Job Portals. Role Title: Penetration Tester and Security Analyst
- Provides strong reporting writing guidance
- Gives a real-world experience through an Advanced Penetration Testing Range
- Provides candidates with standard Pen test for use in the field
Kevin Cardwell
Kevin Cardwell is an experienced instructor, technical editor, and author for computer forensics and hacking courses. He has conducted over 500 security assessments across the globe with expertise in finding weaknesses and determining ways clients can mitigate or limit the impact of these weaknesses.
Kevin currently works as a freelance consultant and provides consulting services for companies throughout the world, and as an advisor to numerous government entities within the U.S., Middle East, Africa, Asia, and the U.K. He previously spent 22 years in the U.S. Navy and worked as both a software and systems engineer on a variety of Department of Defense projects.
Kevin is the author of the Center for Advanced Security and Training (CAST) Advanced Network Defense and Advanced Penetration Testing courses and Building Virtual Pentesting Labs for Advanced Penetration Testing, Advanced Penetration Testing for Highly Secured Environments 2nd Edition and Backtrack: Testing Wireless Network Security. He is technical editor of the Learning Tree Course Penetration Testing Techniques and Computer Forensics. He has also presented at the Blackhat USA, Hacker Halted, ISSA, and TakeDownCon conferences, and more.
Kevin received his Bachelor of Science in computer science from the National University in California and a Master of Science in software engineering from Southern Methodist University (SMU) in Texas. He holds the CEH, ECSA, LPT, and several other certifications.
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.
The EC-Council's Certified Penetration Tester (CPENT) program is an engaging, informative, and expertly designed course that aims to help you master your Penetration Testing (pen-testing) skills. Recognized by the American Council on Education (ACE), this penetrating testing course offers a comprehensive curriculum that encompasses innovative techniques and methodologies for tackling real-world threat scenarios.
In this penetration testing certification course, you will gain an understanding of a wide range of topics, such as how to write your own exploits, build custom tools, conduct advanced binaries exploitation, double pivot to access hidden networks and customize scripts/exploits to penetrate the most secure segments of a network. Pen testing is a practice that goes beyond ethical hacking by incorporating elements of exploitation, risk measurement, reporting, and executive communication.
Securing advanced domains such as the Internet of Things (IoT), Operational Technology (OT), and Cloud has become increasingly more difficult for cybersecurity professionals as there is a shortage of expertise in this area, and CPENT ranges are dynamic and constantly evolving to reflect live networks' changing targets and technology. Expert penetration testers must continually develop their skills in advanced tools, techniques, and methodologies to conduct effective penetration tests in enterprise network environments and protect against current and future cybersecurity threats.
Enrollment in this Pen Testing course includes a voucher that covers the cost of your certification exam upon course completion.
Note: We continually add new targets and defenses throughout the lifetime of this CPENT penetration testing course to ensure its relevance.
|
|
|
Cisco CCNA Associate & Cybersecurity Associate Training Boot Camp
- Cisco CCNA Associate & Cybersecurity Associate Training Boot Camp
-
Fee: $3,999.00
Dates: 4/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Location:
Building:
Room:
Instructor:
This dual certification boot camp helps you build your knowledge of networking and provides hands-on experience installing, configuring, and operating network devices — all while preparing you to earn the Cisco CCNA Associate and Cybersecurity Associate certifications. Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
- A microphone.
- Speakers.
- A webcam.
Software Requirements:
- PC: Windows 7 or later.
- Mac: macOS 10.7 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
- Microsoft Word Online.
- Adobe Acrobat Reader.
- Zoom.
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment and will be available online.
You also have the option to purchase a physical copy of the text for an additional fee of $100.
- Cisco Cyber Ops Assoc CRPOPS 200-201 Official Cert Guide
This innovative seven-day boot camp is designed specifically for network engineers and administrators requiring full knowledge of Cisco router and switch configuration. You will gain hands-on experience by completing a series of labs in our Networking Cyber Range. The labs provide practical experience in a networking and switching environment and prepare you for the simulation-based questions you will find on the CCNA 200-301 exam.
In addition to gaining in-depth knowledge about network access, IP connectivity, IP services, and automation and programmability for Cisco networks, you will learn about the hottest area of networking: network security. Our expert instructors first prepare you to pass the CCNA exam. After passing that exam, you will then train directly on the Cisco Certified Cybersecurity Associate curricula — all in one sitting.
You will receive an exam voucher for the Cisco CCNA and the Cisco Cybersecurity certification exams with your enrollment.
Our Certification Success Program, paired with our provided prep materials, boot camp sessions, and post-work, is designed to ease any concerns you may have when taking the certification exam. If your first attempt is unsuccessful, this program provides peace of mind that you may be eligible to take the certification exam a second time (if needed) at no additional fee.
*To qualify for a second certification exam voucher, students must:
- Attend at least 85% of each day of class
- Score a 90% or higher on their final practice exam
- Take the first exam within 90 days of class completion
- Upload your exam failure notice from your first exam attempt
- Day 1 - Cisco CCNA (200-301)
- Network Fundamentals
- Role and function of network components
- Characteristics of network topology architectures
- Compare and contrast network topologies
- Physical interface and cabling types
- Interface and cable issues (collisions, errors, mismatch duplex, and/or speed)
- TCP and UDP
- Configuring and verifying IPv4 addressing and subnetting
- The need for private IPv4 addressing
- Configuring and verifying IPv6 addressing and prefix
- IPv6 address types
- Verifying IP parameters for client OS (Windows, macOS, Linux)
- Wireless principles
- Virtualization fundamentals (virtual machines)
- Switching concepts
- Day 2
- Network Access
- Configuring and verifying VLANs (normal range) spanning multiple switches
- Configuring and verifying interswitch connectivity
- Configuring and verifying Layer 2 discovery protocols (Cisco Discovery Protocol and LLDP)
- Configuring and verifying (Layer 2/Layer 3) EtherChannel (LACP)
- The need for and basic operations of Rapid PVST+ Spanning Tree Protocol
- Cisco Wireless Architectures and AP modes
- Physical infrastructure connections of WLAN
- Components (AP, WLC, access/trunk ports, and LAG)
- AP and WLC management access connections (Telnet, SSH, HTTP, HTTPS, console and TACACS+/RADIUS)
- Configuring the components of a wireless LAN access for client connectivity using GUI only such as WLAN creation, security settings, QoS profiles and advanced WLAN settings
- Day 3
- IP Connectivity
- Components of routing table
- Determining how a router makes a forwarding decision by default
- Configuring and verifying IPv4 and IPv6 static routing
- Configuring and verifying single area OSPFv2
- The purpose of first hop redundancy protocol
- Day 4
- IP Services
- Configuring and verifying inside source NAT using static and pools
- Configuring and verifying NTP operating in a client and server mode
- Role of DHCP and DNS within the network
- Function of SNMP in network operations
- Use of syslog features including facilities and levels
- Configuring and verifying DHCP client and relay
- Understanding the forwarding per-hop behavior (PHB) for QoS such as classification, marking, queuing, congestion, policing, shaping
- Configuring network devices for remote access using SSH
- Capabilities and function of TFTP/FTP in the network
- Security Fundamentals
- Key security concepts (threats, vulnerabilities, exploits and mitigation techniques)
- Security program elements (user awareness, training, and physical access control)
- Configuring device access control using local passwords
- Security password policies elements: management, complexity, and password alternatives (multifactor authentication, certificates, and biometrics)
- Remote access and site-to-site VPNs
- Configuring and verifying access control lists
- Configuring Layer 2 security features (DHCP snooping, dynamic ARP inspection and port security)
- Authentication, authorization, and accounting
- Wireless security protocols (WPA, WPA2 and WPA3)
- Configuring WLAN using WPA2 PSK using the GUI
- Day 5
- Automation and Programmability
- How automation impacts network management
- Traditional networks vs. controller-based networking
- Controller-based and software defined architectures (overlay, underlay and fabric)
- Traditional campus device management vs. Cisco DNA Center enabled device management
- Characteristics of REST-based APIs (CRUD, HTTP verbs and data encoding)
- Capabilities of configuration management mechanisms Puppet, Chef and Ansible
- Interpreting JSON encoded data
- Day 6 - Cisco Certified Cybersecurity Associate (200-201)
- Security Concepts
- Describe the CIA triad
- Compare security deployments
- Describe security terms
- Compare security concepts
- Describe the principles of the defense-in-depth strategy
- Compare access control models
- Describe terms as defined in CVSS
- Identify the challenges of data visibility (network, host, and cloud) in detection
- Identify potential data loss from provided traffic profiles
- Interpret the 5-tuple approach to isolate a compromised host in a grouped set of logs
- Compare rule-based detection vs. behavioral and statistical detection
- Security Monitoring
- Compare attack surface and vulnerability
- Identify the types of data provided by these technologies
- Describe the impact of these technologies on data visibility
- Describe the uses of these data types in security monitoring
- Describe network attacks, such as protocol based, denial of service, distributed denial of service and man-in-the-middle
- Describe web application attacks, such as SQL injection, command injections and crosssite scripting
- Describe social engineering attacks
- Describe endpoint-based attacks, such as buffer overflows, command and control (C2), malware and ransomware
- Describe evasion and obfuscation techniques, such as tunneling, encryption and proxies
- Describe the impact of certificates on security (includes PKI, public/private crossing the network, asymmetric/symmetric)
- Identify the certificate components in a given scenario
- Cipher-suite
- Host-Based Analysis
- Describe the functionality of these endpoint technologies in regard to security monitoring
- Identify components of an operating system (such as Windows and Linux) in a given scenario
- Describe the role of attribution in an investigation
- Identify type of evidence used based on provided logs
- Compare tampered and untampered disk image
- Interpret operating system, application, or command line logs to identify an event
- Interpret the output report of a malware analysis tool (such as a detonation chamber or sandbox)
- Day 7
- Network Intrusion Analysis
- UMap the provided events to source technologies
- Compare impact and no impact
- Compare deep packet inspection with packet filtering and stateful firewall operation
- Compare inline traffic interrogation and taps or traffic monitoring
- Compare the characteristics of data obtained from taps or traffic monitoring and transactional data (NetFlow) in the analysis of network traffic
- Extract files from a TCP stream when given a PCAP file and Wireshark
- Identify key elements in an intrusion from a given PCAP file
- Interpret the fields in protocol headers as related to intrusion analysis
- Interpret common artifact elements from an event to identify an alert
- Interpret basic regular expressions
- Security Policies and Procedures
- Describe management concepts
- Describe the elements in an incident response plan as stated in NIST.SP800-61
- Apply the incident handling process (such as NIST.SP800-61) to an event
- Map elements to these steps of analysis based on the NIST.SP800-61
- Map the organization stakeholders against the NIST IR categories (CMMC, NIST.SP800-61)
- Describe concepts as documented in NIST.SP800-86
- Identify these elements used for network profiling
- Identify these elements used for server profiling
- Identify protected data in a network
- Classify intrusion events into categories as defined by security models, such as Cyber Kill Chain
- Model and Diamond Model of Intrusion
- Describe the relationship of SOC metrics to scope analysis (time to detect, time to contain, time to respond, time to control)
What you will learn
Cisco CCNA (200-301)
- Make appropriate decisions concerning the implementation of hardware and configuration based on ISR routers and switches running Cisco IOS
- Proficiently administer Cisco routers
- Install, configure and maintain dependable, functional networks
- Properly identify protocols involving
- Cisco networking devices
- Troubleshoot general network and security issues
- Successfully operate routers and switched LAN networks
- Follow enterprise network design principles
- Understand routing protocols design considerations (OSPF and EIGRP)
Cisco Cybersecurity Associate
- Security concepts
- Security monitoring
- Host-based analysis
- Network intrusion analysis
- Security policies and procedures
How you will benefit
- Increase your earning potential and career opportunities
- Gain hands-on experience through a series of labs, best practices, and expert instruction
- Obtain a firm understanding of key concepts that are vital for network engineers and administrators
- Prepare to earn two in-demand certifications: Cisco CCNA and the Cisco Cybersecurity certification exams
Boot camps are led by instructors that have years of industry experience and are recognized as subject matter experts.
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.
This innovative seven-day boot camp is designed specifically for network engineers and administrators requiring full knowledge of Cisco router and switch configuration. You will gain hands-on experience by completing a series of labs in our Networking Cyber Range. The labs provide practical experience in a networking and switching environment and prepare you for the simulation-based questions you will find on the CCNA 200-301 exam.
In addition to gaining in-depth knowledge about network access, IP connectivity, IP services, and automation and programmability for Cisco networks, you will learn about the hottest area of networking: network security. Our expert instructors first prepare you to pass the CCNA exam. After passing that exam, you will then train directly on the Cisco Certified Cybersecurity Associate curricula — all in one sitting.
You will receive an exam voucher for the Cisco CCNA and the Cisco Cybersecurity certification exams with your enrollment.
Our Certification Success Program, paired with our provided prep materials, boot camp sessions, and post-work, is designed to ease any concerns you may have when taking the certification exam. If your first attempt is unsuccessful, this program provides peace of mind that you may be eligible to take the certification exam a second time (if needed) at no additional fee.
*To qualify for a second certification exam voucher, students must:
- Attend at least 85% of each day of class
- Score a 90% or higher on their final practice exam
- Take the first exam within 90 days of class completion
- Upload your exam failure notice from your first exam attempt
|
|
|
Cisco CCNA Certification Training (Voucher Included)
- Cisco CCNA Certification Training (Voucher Included)
-
Fee: $2,495.00
Dates: 4/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Location:
Building:
Room:
Instructor:
Take the next step in your IT career by preparing for the Cisco CCNA certification exam. You will master certification-based topics for networking essentials so you can implement and administer Cisco solutions. An exam voucher for the CISCO CCNA certification is included with your enrollment. Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
Software Requirements:
- PC: Windows 10 or later.
- Mac: macOS 10.6 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
- Virtual Labs included with course
- Microsoft Word Online
- Adobe Acrobat Reader
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment.
- Study guide
- Practice exams
- Virtual labs
The following textbook(s) will also be shipped to you approximately 7-10 business days after enrollment:
- CCNA 200-301 Official Cert Guide Library (Volume 1 and Volume 2), 2nd Edition
Most businesses today need daily operation management on their network systems, making networking a high-demand skill set. The Cisco Certified Network Associate (CCNA) certification is the top associate-level certification for IT professionals. Becoming a Cisco CCNA certification holder validates your critical job skills and proves to employers that you can install and configure routers and switches for their entire organization as well as troubleshoot any network issues. The CCNA credential also demonstrates your knowledge of IT networking technology and boosts your career prospects.
Each section of the Cisco CCNA certification training will help you master certification-based topics for Cisco networking, including network, switch, and routing fundamentals, IPv4 addressing and advanced routing, VLANs and Trunks, and spanning tree protocol. You will also gain expertise in security, wireless, and automation fundamentals. Not only will this CCNA course help you prepare for the CCNA 200-301 exam, but you will also be able to provide networking solutions to real-world applications.
With your enrollment in this CCNA course, you will receive a CCNA exam voucher, which covers the cost to sit for the Cisco CCNA certification exam upon eligibility.
- Network Fundamentals
- Switch Fundamentals
- Routing Fundamentals
- IPv4 Addressing and Subnetting
- Cisco IOS
- Advanced Routing
- VLANs and Trunks
- InterVlan Routing
- Spanning Tree Protocol
- EtherChannel
- DHCP and NTP
- CDP, LLDP, Syslog, and SNMP
- QoS
- Security
- Port Security, DHCP Snooping, Dynamic ARP Inspection
- ACLs
- NAT
- Wireless
- Automation and Programmability
- IPv6
What you will learn
- Describe network fundamentals and build simple LANs
- Routing operations and configuration
- Manage network device security
- Expand small to medium sized networks with WAN connectivity
- IPv4 and IPv6 basics
How you will benefit
- Gain an understanding of Cisco networking needed for entry-level networking positions
- Expand your current knowledge of networking essentials
- Become fully prepared to pass the CCNA 200-301 certification exam
- Receive a prepaid exam voucher for CCNA 200-301 upon course completion
Raymond Lacoste
Raymond Lacoste is a highly recognized instructor and IT professional who holds the Cisco Sirius Instructor Award. He has authored Cisco Press publications on the Cisco ENARSI and Cisco TSHOOT exams.
Raymond's areas of expertise include Cisco Enterprise networking, Cisco Routing and Switching, Cisco Datacenter Networking, ITIL, and Amazon AWS. He also holds certifications in Cisco CCSI, Cisco CCNP Routing and Switching, Cisco CCNP Enterprise, ITIL Foundations, ITIL Practitioner, ITIL Intermediate, Amazon AWS System Operations, Amazon AWS Architect, Amazon AWS Developer, and CISSP.
In addition to his certifications and experience, Raymond's engaging instruction style makes even the most obscenely complicated or obtuse concepts relatable and understandable. Outside of class, he enjoys dominating both on the golf course and the basketball court.
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.
Most businesses today need daily operation management on their network systems, making networking a high-demand skill set. The Cisco Certified Network Associate (CCNA) certification is the top associate-level certification for IT professionals. Becoming a Cisco CCNA certification holder validates your critical job skills and proves to employers that you can install and configure routers and switches for their entire organization as well as troubleshoot any network issues. The CCNA credential also demonstrates your knowledge of IT networking technology and boosts your career prospects.
Each section of the Cisco CCNA certification training will help you master certification-based topics for Cisco networking, including network, switch, and routing fundamentals, IPv4 addressing and advanced routing, VLANs and Trunks, and spanning tree protocol. You will also gain expertise in security, wireless, and automation fundamentals. Not only will this CCNA course help you prepare for the CCNA 200-301 exam, but you will also be able to provide networking solutions to real-world applications.
With your enrollment in this CCNA course, you will receive a CCNA exam voucher, which covers the cost to sit for the Cisco CCNA certification exam upon eligibility.
|
|
|
Cisco CCNP Collaboration: CLCOR & CLICA
- Cisco CCNP Collaboration: CLCOR & CLICA
-
Fee: $3,295.00
Dates: 4/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Location:
Building:
Room:
Instructor:
This course is intended for network security engineers and those looking to attain their CCNP Security certification. Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
Software Requirements:
- PC: Windows 8 or later.
- Mac: macOS 10.6 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
- Microsoft Word Online
- Adobe Acrobat Reader
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment and will be available online. The Implementing Cisco Collaboration Core Technologies (CLCOR) course provides you with skills needed to implement and deploy core collaboration and networking technologies, including infrastructure and design, protocols, codecs, and endpoints, Cisco Internetwork Operating System (IOS®) XE gateway and media resources, call control, Quality of Service (QoS), and additional Cisco collaboration applications.
In the Implementing Cisco Collaboration Applications (CLICA) course, you will learn collaboration applications, including single sign-on, Cisco Unified IM and Presence, Cisco Unity Connection, Cisco Unity Express, and application clients.
The course will also prepare you to sit for the Cisco CCNP Collaboration Core exam CLCOR and the Cisco CCNP Collaboration Concentration exam CLICA. These exams in tandem will earn you the CCNP Collaboration certification. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.
- Overview of Infrastructure and Design
- Traditional Voice Versus Unified Voice
- Overview of Cisco Collaborations
- Overview of Cisco Collaborations Architecture
- Understanding Cisco IP Phones
- Voice Port Codec and DSP
- Introduction to Cisco Unified CM Deployment Model
- Overview of Installation & Hardware Platform
- Getting Started with GUI and Initial Configuration
- Overview and Configuration of SSL Certificate for Collaboration
- Deployment of SIP and SCCP Endpoint
- Deployment of Cisco Collaboration Features
- Voice Gateways & Trunks
- Deployment & Configurations of H323 Gateways and Trunks
- Deployment & Configurations of MGCP Gateway
- Deployment & Configurations of Call Routing
- Understanding & Configuring Call Routing
- Understanding Call Routing Digit Analysis and Calling Privileges
- Configure Globalized Call Routing in Cisco Unified CM
- Describe Mobile and Remote Access
- Cisco Unity Connection
- Overview and Configure these in Cisco Unity Connection
- Understanding Features in Cisco Unity Connection
- Describe Cisco Unified IM & P Protocols and Deployment
- Deploy Cisco Jabber on Premises
- Describe Problems That Can Lead to Poor Voice and Video Quality
- Troubleshooting Cisco Collaboration
- Troubleshooting Cisco Unity Connection Integration
- Single Sign-On (SSO) for Collaboration Applications
- Introduction to Single Sign-On
- Types of SSO
- Configuring SSO
- Introduction to SAML SSO
- Configuring Cisco Unified IM and Presence
- Introduction to Cisco Unity Connection
- Introduction to CUC multicluster operation
- Configuring on-prem Cisco Unified Instant Message and Presence
- Troubleshooting on prem Cisco Unified Instant Message and Presence
- Configuring Cisco Unity Connection and Cisco Unity Express
- Configuring call operation and rules in Cisco Unity Connection
- Troubleshoot Cisco Unity Connection
- Implementing toll fraud prevention
- Configuring Cisco Unity Express integration to Cisco Unified Communications Manager Express
- Application Clients
- Introduction to Cisco Unified Attendant Console
- Configuring service discovery
- Configuring Jabber client installation switches
- Troubleshooting Cisco Jabber
What you will learn
CLCOR
- Describe the Cisco Collaboration solutions architecture
- Compare the IP Phone signaling protocols of Session Initiation Protocol (SIP), H323, Media Gateway Control Protocol (MGCP), and Skinny Client Control Protocol (SCCP)
- Integrate and troubleshoot Cisco Unified Communications Manager with LDAP for user synchronization and user authentication
- Implement Cisco Unified Communications Manager provisioning features
- Describe the different codecs and how they are used to transform analog voice into digital streams
- Describe a dial plan, and explain call routing in Cisco Unified Communications Manager
- Implement Public Switched Telephone Network (PSTN) access using MGCP gateways
- Implement a Cisco gateway for PSTN access
- Configure calling privileges in Cisco Unified Communications Manager
- Implement toll fraud prevention
- Implement globalized call routing within a Cisco Unified Communications Manager cluster
- Implement and troubleshoot media resources in Cisco Unified Communications Manager
- Describe Cisco Instant Messaging and Presence, including call flows and protocols
- Describe and configure endpoints and commonly required features
- Configure and troubleshoot Cisco Unity Connection integration
- Configure and troubleshoot Cisco Unity Connection call handlers
- Describe how Mobile Remote Access (MRA) is used to allow endpoints to work from outside the company
- Analyze traffic patterns and quality issues in converged IP networks supporting voice, video, and data traffic
- Define QoS and its models
- Implement classification and marking
- Configure classification and marking options on Cisco Catalyst® switches
CLICA
- Configure and utilize the Single Sign-On application
- Describe Cisco Unity Connection
- Describe the CUC multicluster operation
- Configure on-prem Cisco Unified Instant Message and Presence
- Configure call operation and rules in Unity Connection
- Implement toll fraud prevention
- Describe Cisco Unified Attendant Console
- Configure and troubleshoot Cisco Jabber
How you will benefit
- You will be prepared to sit for the Cisco CCNP Collaboration core exam: 350-801 CLCOR: Implementing and Operating Cisco Collaboration Core Technologies
- You will be prepared to sit for the Cisco CCNP Security concentration exam: 300-810 CLICA: Implementing Cisco Collaboration Applications
Faisal Khan
Faisal Khan is an expert in Cisco telephony and collaboration and the world of AWS, holding many certifications with their cloud technologies. These credentials include Cisco CCIE Collaboration, Cisco CCNP, Cisco CCNA, and AWS Solutions Architect.
In addition to his certifications, Faisal has expert knowledge in the following areas: Cisco Collaboration, Amazon AWS, Cisco UCCE/UCCX, and Cisco networking.
Faisal is deeply interested in understanding technologies at the most granular level.
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.
The Implementing Cisco Collaboration Core Technologies (CLCOR) course provides you with skills needed to implement and deploy core collaboration and networking technologies, including infrastructure and design, protocols, codecs, and endpoints, Cisco Internetwork Operating System (IOS®) XE gateway and media resources, call control, Quality of Service (QoS), and additional Cisco collaboration applications.
In the Implementing Cisco Collaboration Applications (CLICA) course, you will learn collaboration applications, including single sign-on, Cisco Unified IM and Presence, Cisco Unity Connection, Cisco Unity Express, and application clients.
The course will also prepare you to sit for the Cisco CCNP Collaboration Core exam CLCOR and the Cisco CCNP Collaboration Concentration exam CLICA. These exams in tandem will earn you the CCNP Collaboration certification. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.
|
|
|
Cisco CCNP Collaboration: CLCOR & CLICA (Vouchers Included)
- Cisco CCNP Collaboration: CLCOR & CLICA (Vouchers Included)
-
Fee: $3,995.00
Dates: 4/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Location:
Building:
Room:
Instructor:
This course is intended for network security engineers and those looking to attain their CCNP Security certification. Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
Software Requirements:
- PC: Windows 8 or later.
- Mac: macOS 10.6 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
- Microsoft Word Online
- Adobe Acrobat Reader
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment and will be available online. The Implementing Cisco Collaboration Core Technologies (CLCOR) course provides you with skills needed to implement and deploy core collaboration and networking technologies, including infrastructure and design, protocols, codecs, and endpoints, Cisco Internetwork Operating System (IOS®) XE gateway and media resources, call control, Quality of Service (QoS), and additional Cisco collaboration applications.
In the Implementing Cisco Collaboration Applications (CLICA) course, you will learn collaboration applications, including single sign-on, Cisco Unified IM and Presence, Cisco Unity Connection, Cisco Unity Express, and application clients.
The course will also prepare you to sit for the Cisco CCNP Collaboration Core exam CLCOR and the Cisco CCNP Collaboration Concentration exam CLICA. These exams in tandem will earn you the CCNP Collaboration certification. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.
- Overview of Infrastructure and Design
- Traditional Voice Versus Unified Voice
- Overview of Cisco Collaborations
- Overview of Cisco Collaborations Architecture
- Understanding Cisco IP Phones
- Voice Port Codec and DSP
- Introduction to Cisco Unified CM Deployment Model
- Overview of Installation & Hardware Platform
- Getting Started with GUI and Initial Configuration
- Overview and Configuration of SSL Certificate for Collaboration
- Deployment of SIP and SCCP Endpoint
- Deployment of Cisco Collaboration Features
- Voice Gateways & Trunks
- Deployment & Configurations of H323 Gateways and Trunks
- Deployment & Configurations of MGCP Gateway
- Deployment & Configurations of Call Routing
- Understanding & Configuring Call Routing
- Understanding Call Routing Digit Analysis and Calling Privileges
- Configure Globalized Call Routing in Cisco Unified CM
- Describe Mobile and Remote Access
- Cisco Unity Connection
- Overview and Configure these in Cisco Unity Connection
- Understanding Features in Cisco Unity Connection
- Describe Cisco Unified IM & P Protocols and Deployment
- Deploy Cisco Jabber on Premises
- Describe Problems That Can Lead to Poor Voice and Video Quality
- Troubleshooting Cisco Collaboration
- Troubleshooting Cisco Unity Connection Integration
- Single Sign-On (SSO) for Collaboration Applications
- Introduction to Single Sign-On
- Types of SSO
- Configuring SSO
- Introduction to SAML SSO
- Configuring Cisco Unified IM and Presence
- Introduction to Cisco Unity Connection
- Introduction to CUC multicluster operation
- Configuring on-prem Cisco Unified Instant Message and Presence
- Troubleshooting on prem Cisco Unified Instant Message and Presence
- Configuring Cisco Unity Connection and Cisco Unity Express
- Configuring call operation and rules in Cisco Unity Connection
- Troubleshoot Cisco Unity Connection
- Implementing toll fraud prevention
- Configuring Cisco Unity Express integration to Cisco Unified Communications Manager Express
- Application Clients
- Introduction to Cisco Unified Attendant Console
- Configuring service discovery
- Configuring Jabber client installation switches
- Troubleshooting Cisco Jabber
What you will learn
CLCOR
- Describe the Cisco Collaboration solutions architecture
- Compare the IP Phone signaling protocols of Session Initiation Protocol (SIP), H323, Media Gateway Control Protocol (MGCP), and Skinny Client Control Protocol (SCCP)
- Integrate and troubleshoot Cisco Unified Communications Manager with LDAP for user synchronization and user authentication
- Implement Cisco Unified Communications Manager provisioning features
- Describe the different codecs and how they are used to transform analog voice into digital streams
- Describe a dial plan, and explain call routing in Cisco Unified Communications Manager
- Implement Public Switched Telephone Network (PSTN) access using MGCP gateways
- Implement a Cisco gateway for PSTN access
- Configure calling privileges in Cisco Unified Communications Manager
- Implement toll fraud prevention
- Implement globalized call routing within a Cisco Unified Communications Manager cluster
- Implement and troubleshoot media resources in Cisco Unified Communications Manager
- Describe Cisco Instant Messaging and Presence, including call flows and protocols
- Describe and configure endpoints and commonly required features
- Configure and troubleshoot Cisco Unity Connection integration
- Configure and troubleshoot Cisco Unity Connection call handlers
- Describe how Mobile Remote Access (MRA) is used to allow endpoints to work from outside the company
- Analyze traffic patterns and quality issues in converged IP networks supporting voice, video, and data traffic
- Define QoS and its models
- Implement classification and marking
- Configure classification and marking options on Cisco Catalyst® switches
CLICA
- Configure and utilize the Single Sign-On application
- Describe Cisco Unity Connection
- Describe the CUC multicluster operation
- Configure on-prem Cisco Unified Instant Message and Presence
- Configure call operation and rules in Unity Connection
- Implement toll fraud prevention
- Describe Cisco Unified Attendant Console
- Configure and troubleshoot Cisco Jabber
How you will benefit
- You will be prepared to sit for the Cisco CCNP Collaboration core exam: 350-801 CLCOR: Implementing and Operating Cisco Collaboration Core Technologies
- You will be prepared to sit for the Cisco CCNP Security concentration exam: 300-810 CLICA: Implementing Cisco Collaboration Applications
Faisal Khan
Faisal Khan is an expert in Cisco telephony and collaboration and the world of AWS, holding many certifications with their cloud technologies. These credentials include Cisco CCIE Collaboration, Cisco CCNP, Cisco CCNA, and AWS Solutions Architect.
In addition to his certifications, Faisal has expert knowledge in the following areas: Cisco Collaboration, Amazon AWS, Cisco UCCE/UCCX, and Cisco networking.
Faisal is deeply interested in understanding technologies at the most granular level.
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.
The Implementing Cisco Collaboration Core Technologies (CLCOR) course provides you with skills needed to implement and deploy core collaboration and networking technologies, including infrastructure and design, protocols, codecs, and endpoints, Cisco Internetwork Operating System (IOS®) XE gateway and media resources, call control, Quality of Service (QoS), and additional Cisco collaboration applications.
In the Implementing Cisco Collaboration Applications (CLICA) course, you will learn collaboration applications, including single sign-on, Cisco Unified IM and Presence, Cisco Unity Connection, Cisco Unity Express, and application clients.
The course will also prepare you to sit for the Cisco CCNP Collaboration Core exam CLCOR and the Cisco CCNP Collaboration Concentration exam CLICA. These exams in tandem will earn you the CCNP Collaboration certification. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.
|
|
|
Cisco CCNP Enterprise: ENCOR & ENARSI
- Cisco CCNP Enterprise: ENCOR & ENARSI
-
Fee: $3,295.00
Dates: 4/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Location:
Building:
Room:
Instructor:
This course is intended for network engineers, system engineers, network administrators, and those looking to attain their CCNP Enterprise certification. Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
Software Requirements:
- PC: Windows 8 or later.
- Mac: macOS 10.6 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
- Microsoft Word Online
- Adobe Acrobat Reader
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment and will be available online. The CCNP Enterprise: ENCOR is the first step to mastering the implementation of core enterprise network technologies. The goal of this online training course is to provide you with the skills needed to install, manage, and administer dual stack architecture, virtualization, network assurance, security, and automation in an enterprise network.
The CCNP Enterprise: ENARSI provides you with the knowledge of implementation and troubleshooting for advanced routing technologies and services. In this course, you will learn about Layer 3, VPN services, infrastructure security, infrastructure services, and infrastructure automation.
The course will also prepare you to sit for the Cisco CCNP Enterprise Core exam ENOR and the Cisco CCNP Enterprise Concentration exam ENARSI. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.
- Course Overview
- Introduction to ENCOR Course and Exam Objectives
- Campus Architecture and Device Fundamentals
- Campus Architecture
- Device Architecture
- Access and Distribution Layer Features and Services
- Configuring and Verifying VLANs
- Configuring and Verifying Trunks
- VLAN Trunking Protocol (VTP)
- STP Overview and Algorithm Deep Dive
- STP Convergence, Configuration and Manipulation
- STP PortFast, and BPDU Guard
- Multiple Spanning Tree Protocol (MSTP)
- EtherChannels
- Inter-VLAN Routing
- First-Hop Redundancy Protocol (FHRP)
- Routing
- Routing Introduction
- Dynamic Routing Overview
- OSPFv2 Overview, Packets, States, and Design
- OSPFv2 Configuration and Verification
- Text BoxOSPFv2 Network Types and DR/BDR Election
- OSPFv2 LSAs and Metric
- OSPFv2 Summarization
- OSPFv2 Filtering
- EBGP Overview, Configuration and Verification
- Text BoxShapeBGP Best Path Selection Process
- Network Address Translation (NAT)
- Multicast Protocol Overview
- VPN's
- GRE Tunnel Configuration and Verification
- IPSec Introduction
- IPSec Site-to-Site VPN Tunnel Configuration and Verification
- GRE over IPSec Tunnel Configuration and Verification
- Virtual Routing and Forwarding (VRF)
- Management Protocols and Services
- NTP Configuration and Verification
- Syslog Configuration and Verification
- Debugs, Conditional Debugs, Ping, and Traceroute
- SNMP Configuration and Verification
- NetFlow / Flexible NetFlow Configuration and Verification
- SPAN, RSPAN, ERSPAN Configuration and Verification
- IPSLA Configuration and Verification
- Quality of Service (QoS) Overview
- Embedded Event Manager (EEM) Configuration
- Security
- Device Access, Authentication Configuration and Verification
- AAA Configuration and Verification
- Access Control Lists (ACLs)
- Control Plane Policing (CoPP)
- Next-Gen Firewalls, Network Access Control, MACSec, and TrustSec
- Next Generation Campus Networks
- SD-Access
- LISP and VXLAN
- SD-WAN
- DNA Center Overview
- Data Formats
- Data Modeling
- NetConf / RestConf
- Python Exam Prep
- ShapeChef, Puppet, Ansible, SaltStack
- LAN Essentials
- Course Overview
- Introduction to ENARSI Course and Exam Objectives
- EIGRPv4, EIGRPv6 and Named EIGRP
- EIGRPv4 Configuration and Verification
- EIGRPv4 Security Features
- EIGRPv4 Metric and Path Selection
- EIGRPv4 Convergence
- EIGRPv4 Summarization
- EIGRP Route Manipulation
- EIGRPv4 Troubleshooting
- EIGRPv6
- Named EIGRP
- OSPFv2, OSPFv3, OSPF Address-Families
- OSPFv2 Design, Configuration and Verification
- OSPFv2 Security Features
- OSPFv2 Packets and States
- OSPFv2 LSAs
- OSPFv2 Metric
- OSPFv2 Network Types and DR/BDR Elections
- OSPFv2 Summarization and Area Types
- OSPFv2 Filtering, Virtual-Links, and Convergence
- OSPFv2 Troubleshooting
- OSPFv3
- OSPF Address-Families
- Multi-Protocol BGPv4
- BGP Core Operations
- BGP Configuration and Verification
- BGP Summarization
- BGP Filtering
- BGP Peer Groups and Route Reflectors
- BGP Path Selection Process and Attribute Manipulation
- Troubleshooting BGP
- BGP for IPv6
- Redistribution and Advanced Routing Control
- Redistribution Configuration and Verification
- Redistribution Filtering
- Redistribution Challenges
- Redistribution for IPv6
- Policy Based Routing Configuration and Verification
- IPSLA Configuration and Verification
- VPNs
- VRF-Lite Configuration and Verification
- MPLS Overview
- MPLS L3 VPNS
- GRE Review
- DMVPN Configuration and Verification
- DMPVN IPSec Configuration and Verification
- Management Protocol and Services
- Device Access and Authentication Configuration and Verification
- IOS Management Tools
- Syslog Configuration and Verification
- SNMP Configuration and Verification
- NetFlow and Flexible NetFlow Configuration and Verification
- DHCPv4 and DHCPv6 for Cisco IOS
- Device Security
- uRPF Configuration and Verification
- CoPP Configuration and Verification
- IPv4 ACL Review
- IPv6 ACL Review
- IPv6 First Hop Security Features
What you will learn
- ENCOR
- Configuration of VRF, GRE, VLANs, RSTP, MST, NTP, IPSec VPNs, and more
- Advanced Routing
- Configure and verify device management
- Cisco DNA Center
- Examine threat defense, endpoint security, and introduction to the Next-Generation Firewall
- ENARSI
- Route Maps
- Redistribution
- Policy-Based Routing
- VRF-Lite
- eBGP and iBGP
- DMVPNs
- IOS AAA
- DCHP for IPv4 and IPv6
- IPv4 and IPv6 ACL's
How you will benefit
- You will be prepared to sit for the Cisco CCNP Enterprise core exam: 350-401 ENCOR: Implementing and Operating Cisco Enterprise Network Core Technologies
- You will be prepared to sit for the Cisco CCNP Enterprise concentration exam: 300-410 ENARSI: Implementing Cisco Enterprise Advanced Routing and Services
Raymond Lacoste
Raymond Lacoste is a highly recognized instructor and IT professional who holds the Cisco Sirius Instructor Award. He has authored Cisco Press publications on the Cisco ENARSI and Cisco TSHOOT exams.
Raymond's areas of expertise include Cisco Enterprise networking, Cisco Routing and Switching, Cisco Datacenter Networking, ITIL, and Amazon AWS. He also holds certifications in Cisco CCSI, Cisco CCNP Routing and Switching, Cisco CCNP Enterprise, ITIL Foundations, ITIL Practitioner, ITIL Intermediate, Amazon AWS System Operations, Amazon AWS Architect, Amazon AWS Developer, and CISSP.
In addition to his certifications and experience, Raymond's engaging instruction style makes even the most obscenely complicated or obtuse concepts relatable and understandable. Outside of class, he enjoys dominating both on the golf course and the basketball court.
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.
The CCNP Enterprise: ENCOR is the first step to mastering the implementation of core enterprise network technologies. The goal of this online training course is to provide you with the skills needed to install, manage, and administer dual stack architecture, virtualization, network assurance, security, and automation in an enterprise network.
The CCNP Enterprise: ENARSI provides you with the knowledge of implementation and troubleshooting for advanced routing technologies and services. In this course, you will learn about Layer 3, VPN services, infrastructure security, infrastructure services, and infrastructure automation.
The course will also prepare you to sit for the Cisco CCNP Enterprise Core exam ENOR and the Cisco CCNP Enterprise Concentration exam ENARSI. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.
|
|
|
Cisco CCNP Enterprise: ENCOR & ENARSI (Vouchers Included)
- Cisco CCNP Enterprise: ENCOR & ENARSI (Vouchers Included)
-
Fee: $3,995.00
Dates: 4/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Location:
Building:
Room:
Instructor:
This course is intended for network engineers, system engineers, network administrators, and those looking to attain their CCNP Enterprise certification. Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
Software Requirements:
- PC: Windows 8 or later.
- Mac: macOS 10.6 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
- Microsoft Word Online
- Adobe Acrobat Reader
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment and will be available online. The CCNP Enterprise: ENCOR is the first step to mastering the implementation of core enterprise network technologies. The goal of this online training course is to provide you with the skills needed to install, manage, and administer dual stack architecture, virtualization, network assurance, security, and automation in an enterprise network.
The CCNP Enterprise: ENARSI provides you with the knowledge of implementation and troubleshooting for advanced routing technologies and services. In this course, you will learn about Layer 3, VPN services, infrastructure security, infrastructure services, and infrastructure automation.
The course will also prepare you to sit for the Cisco CCNP Enterprise Core exam ENOR and the Cisco CCNP Enterprise Concentration exam ENARSI. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.
- Course Overview
- Introduction to ENCOR Course and Exam Objectives
- Campus Architecture and Device Fundamentals
- Campus Architecture
- Device Architecture
- Access and Distribution Layer Features and Services
- Configuring and Verifying VLANs
- Configuring and Verifying Trunks
- VLAN Trunking Protocol (VTP)
- STP Overview and Algorithm Deep Dive
- STP Convergence, Configuration and Manipulation
- STP PortFast, and BPDU Guard
- Multiple Spanning Tree Protocol (MSTP)
- EtherChannels
- Inter-VLAN Routing
- First-Hop Redundancy Protocol (FHRP)
- Routing
- Routing Introduction
- Dynamic Routing Overview
- OSPFv2 Overview, Packets, States, and Design
- OSPFv2 Configuration and Verification
- Text BoxOSPFv2 Network Types and DR/BDR Election
- OSPFv2 LSAs and Metric
- OSPFv2 Summarization
- OSPFv2 Filtering
- EBGP Overview, Configuration and Verification
- Text BoxShapeBGP Best Path Selection Process
- Network Address Translation (NAT)
- Multicast Protocol Overview
- VPN's
- GRE Tunnel Configuration and Verification
- IPSec Introduction
- IPSec Site-to-Site VPN Tunnel Configuration and Verification
- GRE over IPSec Tunnel Configuration and Verification
- Virtual Routing and Forwarding (VRF)
- Management Protocols and Services
- NTP Configuration and Verification
- Syslog Configuration and Verification
- Debugs, Conditional Debugs, Ping, and Traceroute
- SNMP Configuration and Verification
- NetFlow / Flexible NetFlow Configuration and Verification
- SPAN, RSPAN, ERSPAN Configuration and Verification
- IPSLA Configuration and Verification
- Quality of Service (QoS) Overview
- Embedded Event Manager (EEM) Configuration
- Security
- Device Access, Authentication Configuration and Verification
- AAA Configuration and Verification
- Access Control Lists (ACLs)
- Control Plane Policing (CoPP)
- Next-Gen Firewalls, Network Access Control, MACSec, and TrustSec
- Next Generation Campus Networks
- SD-Access
- LISP and VXLAN
- SD-WAN
- DNA Center Overview
- Data Formats
- Data Modeling
- NetConf / RestConf
- Python Exam Prep
- ShapeChef, Puppet, Ansible, SaltStack
- LAN Essentials
- Course Overview
- Introduction to ENARSI Course and Exam Objectives
- EIGRPv4, EIGRPv6 and Named EIGRP
- EIGRPv4 Configuration and Verification
- EIGRPv4 Security Features
- EIGRPv4 Metric and Path Selection
- EIGRPv4 Convergence
- EIGRPv4 Summarization
- EIGRP Route Manipulation
- EIGRPv4 Troubleshooting
- EIGRPv6
- Named EIGRP
- OSPFv2, OSPFv3, OSPF Address-Families
- OSPFv2 Design, Configuration and Verification
- OSPFv2 Security Features
- OSPFv2 Packets and States
- OSPFv2 LSAs
- OSPFv2 Metric
- OSPFv2 Network Types and DR/BDR Elections
- OSPFv2 Summarization and Area Types
- OSPFv2 Filtering, Virtual-Links, and Convergence
- OSPFv2 Troubleshooting
- OSPFv3
- OSPF Address-Families
- Multi-Protocol BGPv4
- BGP Core Operations
- BGP Configuration and Verification
- BGP Summarization
- BGP Filtering
- BGP Peer Groups and Route Reflectors
- BGP Path Selection Process and Attribute Manipulation
- Troubleshooting BGP
- BGP for IPv6
- Redistribution and Advanced Routing Control
- Redistribution Configuration and Verification
- Redistribution Filtering
- Redistribution Challenges
- Redistribution for IPv6
- Policy Based Routing Configuration and Verification
- IPSLA Configuration and Verification
- VPNs
- VRF-Lite Configuration and Verification
- MPLS Overview
- MPLS L3 VPNS
- GRE Review
- DMVPN Configuration and Verification
- DMPVN IPSec Configuration and Verification
- Management Protocol and Services
- Device Access and Authentication Configuration and Verification
- IOS Management Tools
- Syslog Configuration and Verification
- SNMP Configuration and Verification
- NetFlow and Flexible NetFlow Configuration and Verification
- DHCPv4 and DHCPv6 for Cisco IOS
- Device Security
- uRPF Configuration and Verification
- CoPP Configuration and Verification
- IPv4 ACL Review
- IPv6 ACL Review
- IPv6 First Hop Security Features
What you will learn
ENCOR
- Configuration of VRF, GRE, VLANs, RSTP, MST, NTP, IPSec VPNs, and more
- Advanced Routing
- Configure and verify device management
- Cisco DNA Center
- Examine threat defense, endpoint security, and introduction to the Next-Generation Firewall
ENARSI
- Route Maps
- Redistribution
- Policy-Based Routing
- VRF-Lite
- eBGP and iBGP
- DMVPNs
- IOS AAA
- DCHP for IPv4 and IPv6
- IPv4 and IPv6 ACL's
How you will benefit
- You will be prepared to sit for the Cisco CCNP Enterprise core exam: 350-401 ENCOR: Implementing and Operating Cisco Enterprise Network Core Technologies
- You will be prepared to sit for the Cisco CCNP Enterprise concentration exam: 300-410 ENARSI: Implementing Cisco Enterprise Advanced Routing and Services
Raymond Lacoste
Raymond Lacoste is a highly recognized instructor and IT professional who holds the Cisco Sirius Instructor Award. He has authored Cisco Press publications on the Cisco ENARSI and Cisco TSHOOT exams.
Raymond's areas of expertise include Cisco Enterprise networking, Cisco Routing and Switching, Cisco Datacenter Networking, ITIL, and Amazon AWS. He also holds certifications in Cisco CCSI, Cisco CCNP Routing and Switching, Cisco CCNP Enterprise, ITIL Foundations, ITIL Practitioner, ITIL Intermediate, Amazon AWS System Operations, Amazon AWS Architect, Amazon AWS Developer, and CISSP.
In addition to his certifications and experience, Raymond's engaging instruction style makes even the most obscenely complicated or obtuse concepts relatable and understandable. Outside of class, he enjoys dominating both on the golf course and the basketball court.
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.
The CCNP Enterprise: ENCOR is the first step to mastering the implementation of core enterprise network technologies. The goal of this online training course is to provide you with the skills needed to install, manage, and administer dual stack architecture, virtualization, network assurance, security, and automation in an enterprise network.
The CCNP Enterprise: ENARSI provides you with the knowledge of implementation and troubleshooting for advanced routing technologies and services. In this course, you will learn about Layer 3, VPN services, infrastructure security, infrastructure services, and infrastructure automation.
The course will also prepare you to sit for the Cisco CCNP Enterprise Core exam ENOR and the Cisco CCNP Enterprise Concentration exam ENARSI. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.
|
|
|
Cisco CCNP Enterprise: ENCOR & ENSLD
- Cisco CCNP Enterprise: ENCOR & ENSLD
-
Fee: $3,295.00
Dates: 4/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Location:
Building:
Room:
Instructor:
This course is intended for network engineers, system engineers, network administrators, and those looking to attain their CCNP Enterprise certification. Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
Software Requirements:
- PC: Windows 8 or later.
- Mac: macOS 10.6 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
- Microsoft Word Online
- Adobe Acrobat Reader
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment and will be available online. The CCNP Enterprise: ENCOR is the first step to mastering the implementation of core enterprise network technologies. The goal of this online training course is to provide you with the skills needed to install, manage, and administer dual stack architecture, virtualization, network assurance, security, and automation in an enterprise network.
CCNP Enterprise: ENARSI provides you with knowledge of Cisco solutions in advanced addressing and routing solutions, advanced enterprise campus networks, WAN, security and network services, and Software-Defined Access.
The course will also prepare you to sit for the Cisco CCNP Enterprise Core exam ENOR and the Cisco CCNP Enterprise Concentration exam ENSLD. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.
- Course Overview
- Introduction to ENCOR Course and Exam Objectives
- Campus Architecture and Device Fundamentals
- Campus Architecture
- Device Architecture
- Access and Distribution Layer Features and Services
- Configuring and Verifying VLANs
- Configuring and Verifying Trunks
- VLAN Trunking Protocol (VTP)
- STP Overview and Algorithm Deep Dive
- STP Convergence, Configuration and Manipulation
- STP PortFast, and BPDU Guard
- Multiple Spanning Tree Protocol (MSTP)
- EtherChannels
- Inter-VLAN Routing
- First-Hop Redundancy Protocol (FHRP)
- Routing
- Routing Introduction
- Dynamic Routing Overview
- OSPFv2 Overview, Packets, States, and Design
- OSPFv2 Configuration and Verification
- Text BoxOSPFv2 Network Types and DR/BDR Election
- OSPFv2 LSAs and Metric
- OSPFv2 Summarization
- OSPFv2 Filtering
- EBGP Overview, Configuration and Verification
- Text BoxShapeBGP Best Path Selection Process
- Network Address Translation (NAT)
- Multicast Protocol Overview
- VPN's
- GRE Tunnel Configuration and Verification
- IPSec Introduction
- IPSec Site-to-Site VPN Tunnel Configuration and Verification
- GRE over IPSec Tunnel Configuration and Verification
- Virtual Routing and Forwarding (VRF)
- Management Protocols and Services
- NTP Configuration and Verification
- Syslog Configuration and Verification
- Debugs, Conditional Debugs, Ping, and Traceroute
- SNMP Configuration and Verification
- NetFlow / Flexible NetFlow Configuration and Verification
- SPAN, RSPAN, ERSPAN Configuration and Verification
- IPSLA Configuration and Verification
- Quality of Service (QoS) Overview
- Embedded Event Manager (EEM) Configuration
- Security
- Device Access, Authentication Configuration and Verification
- AAA Configuration and Verification
- Access Control Lists (ACLs)
- Control Plane Policing (CoPP)
- Next-Gen Firewalls, Network Access Control, MACSec, and TrustSec
- Next Generation Campus Networks
- SD-Access
- LISP and VXLAN
- SD-WAN
- DNA Center Overview
- Data Formats
- Data Modeling
- NetConf / RestConf
- Python Exam Prep
- ShapeChef, Puppet, Ansible, SaltStack
- LAN Essentials
- Routed Protocols - Addressing
- IPv4 addressing (create plan)
- IPv6 addressing (create plan)
- IPv6 migration methods (determine)
- Routing Protocols – Secure and scale (create design)
- IS-IS
- EIGRP
- OSPF
- BGP – address families, attributes, filtering, RR's, load sharing, balancing, symmetry
- Enterprise Campus Networks (design)
- HA – GR, FHRP's
- L2 – xSTP, loop prevention, convergence
- L3 – convergence, vrf, redistribution, filtering, summarization
- SD-Access architecture and design (describe) – underlay, overlay, control and data planes
- Wide Area Networks (WAN)
- Options (compare) – L2/3 VPN's, metro ethernet, DWDM, SD-Wan ce
- Site to site VPN (design) – L2/L3, GRE, DMVPN, GET VPN
- HA (design) – single, multi, backup, failover
- SD-WAN architecture and design (describe) – various planes, QoS, multicast
- End-to-End Quality of Service (QoS)
- QoS strategies – IntServ/Diffserv (design)
- End-to-End QoS – Classify, mark, shape, police, queue (design)
- Network management techniques, out-of-band, in-band (design)
- Multicast
- Concepts – source/shared trees, RPF, RP (describe)
- Services – PIM bi-dir, SSM, MSDP (design)
- Automation
- YANG data models (IETF, Openconfig, Cisco native) – recognize differences
- Netconf and Restconf – recognize differences
- Telemetry model-driven (periodic/on-change publication and dial-in/dial-out) – recognize differences and impact
What you will learn
ENCOR
- Configuration of VRF, GRE, VLANs, RSTP, MST, NTP, IPSec VPNs, and more!
- Advanced Routing
- Configure and verify device management
- Cisco DNA Center
- Examine threat defense, endpoint security, and introduction to the Next-Generation Firewall
ENSLD
- Describe and apply advanced addressing and routing solutions
- Describe and apply advanced enterprise campus networks
- Describe and apply WAN
- Describe and apply security and network services
- Describe and apply Software-Defined Access
How you will benefit
- You will be prepared to sit for the Cisco CCNP Enterprise core exam: 350-401 ENCOR: Implementing and Operating Cisco Enterprise Network Core Technologies
- You will be prepared to sit for the Cisco CCNP Enterprise concentration exam: 300-420 ENSLD: Designing Cisco Enterprise Networks
Raymond Lacoste
Raymond Lacoste is a highly recognized instructor and IT professional who holds the Cisco Sirius Instructor Award. He has authored Cisco Press publications on the Cisco ENARSI and Cisco TSHOOT exams. Raymond's areas of expertise include Cisco Enterprise networking, Cisco Routing and Switching, Cisco Datacenter Networking, ITIL, and Amazon AWS. He also holds certifications in Cisco CCSI, Cisco CCNP Routing and Switching, Cisco CCNP Enterprise, ITIL Foundations, ITIL Practitioner, ITIL Intermediate, Amazon AWS System Operations, Amazon AWS Architect, Amazon AWS Developer, and CISSP. In addition to his certifications and experience, Raymond's engaging instruction style makes even the most obscenely complicated or obtuse concepts relatable and understandable. Outside of class, he enjoys dominating both on the golf course and the basketball court.
Aaron Gould
Aaron Gould is a highly knowledgeable network engineer with heavy experience in the Internet Service Provider space. Aaron holds multiple professional-level certifications with Juniper and Cisco equipment as well as Juniper - JNCIP-SP, Juniper - JNCIS-SP, Juniper - JNCDS-DC, Juniper - AAA (JNCIA X 3), Juniper – JNCDA, Juniper - JNCIA-Cloud, Juniper - JNCIA-Junos, Cisco - CCNP SP, Cisco – CCIP, Cisco – CCDP, Cisco - CCNP R/S, MEF CECP, and IPv6 Forum - Silver certifications. Aaron's extensive expertise includes Cisco IOS Routing and Switching, Cisco Network Design, Cisco Service Provider Routing, and Juniper Service Provider Routing.
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.
The CCNP Enterprise: ENCOR is the first step to mastering the implementation of core enterprise network technologies. The goal of this online training course is to provide you with the skills needed to install, manage, and administer dual stack architecture, virtualization, network assurance, security, and automation in an enterprise network.
CCNP Enterprise: ENARSI provides you with knowledge of Cisco solutions in advanced addressing and routing solutions, advanced enterprise campus networks, WAN, security and network services, and Software-Defined Access.
The course will also prepare you to sit for the Cisco CCNP Enterprise Core exam ENOR and the Cisco CCNP Enterprise Concentration exam ENSLD. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.
|
|
|
Cisco CCNP Enterprise: ENCOR & ENSLD (Vouchers Included)
- Cisco CCNP Enterprise: ENCOR & ENSLD (Vouchers Included)
-
Fee: $3,995.00
Dates: 4/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Location:
Building:
Room:
Instructor:
This course is intended for network engineers, system engineers, network administrators, and those looking to attain their CCNP Enterprise certification. Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
Software Requirements:
- PC: Windows 8 or later.
- Mac: macOS 10.6 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
- Microsoft Word Online
- Adobe Acrobat Reader
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment and will be available online. The CCNP Enterprise: ENCOR is the first step to mastering the implementation of core enterprise network technologies. The goal of this online training course is to provide you with the skills needed to install, manage, and administer dual stack architecture, virtualization, network assurance, security, and automation in an enterprise network.
CCNP Enterprise: ENARSI provides you with knowledge of Cisco solutions in advanced addressing and routing solutions, advanced enterprise campus networks, WAN, security and network services, and Software-Defined Access.
The course will also prepare you to sit for the Cisco CCNP Enterprise Core exam ENOR and the Cisco CCNP Enterprise Concentration exam ENSLD. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.
- Course Overview
- Introduction to ENCOR Course and Exam Objectives
- Campus Architecture and Device Fundamentals
- Campus Architecture
- Device Architecture
- Access and Distribution Layer Features and Services
- Configuring and Verifying VLANs
- Configuring and Verifying Trunks
- VLAN Trunking Protocol (VTP)
- STP Overview and Algorithm Deep Dive
- STP Convergence, Configuration and Manipulation
- STP PortFast, and BPDU Guard
- Multiple Spanning Tree Protocol (MSTP)
- EtherChannels
- Inter-VLAN Routing
- First-Hop Redundancy Protocol (FHRP)
- Routing
- Routing Introduction
- Dynamic Routing Overview
- OSPFv2 Overview, Packets, States, and Design
- OSPFv2 Configuration and Verification
- Text BoxOSPFv2 Network Types and DR/BDR Election
- OSPFv2 LSAs and Metric
- OSPFv2 Summarization
- OSPFv2 Filtering
- EBGP Overview, Configuration and Verification
- Text BoxShapeBGP Best Path Selection Process
- Network Address Translation (NAT)
- Multicast Protocol Overview
- VPN's
- GRE Tunnel Configuration and Verification
- IPSec Introduction
- IPSec Site-to-Site VPN Tunnel Configuration and Verification
- GRE over IPSec Tunnel Configuration and Verification
- Virtual Routing and Forwarding (VRF)
- Management Protocols and Services
- NTP Configuration and Verification
- Syslog Configuration and Verification
- Debugs, Conditional Debugs, Ping, and Traceroute
- SNMP Configuration and Verification
- NetFlow / Flexible NetFlow Configuration and Verification
- SPAN, RSPAN, ERSPAN Configuration and Verification
- IPSLA Configuration and Verification
- Quality of Service (QoS) Overview
- Embedded Event Manager (EEM) Configuration
- Security
- Device Access, Authentication Configuration and Verification
- AAA Configuration and Verification
- Access Control Lists (ACLs)
- Control Plane Policing (CoPP)
- Next-Gen Firewalls, Network Access Control, MACSec, and TrustSec
- Next Generation Campus Networks
- SD-Access
- LISP and VXLAN
- SD-WAN
- DNA Center Overview
- Data Formats
- Data Modeling
- NetConf / RestConf
- Python Exam Prep
- ShapeChef, Puppet, Ansible, SaltStack
- LAN Essentials
- Routed Protocols - Addressing
- IPv4 addressing (create plan)
- IPv6 addressing (create plan)
- IPv6 migration methods (determine)
- Routing Protocols – Secure and scale (create design)
- IS-IS
- EIGRP
- OSPF
- BGP – address families, attributes, filtering, RR's, load sharing, balancing, symmetry
- Enterprise Campus Networks (design)
- HA – GR, FHRP's
- L2 – xSTP, loop prevention, convergence
- L3 – convergence, vrf, redistribution, filtering, summarization
- SD-Access architecture and design (describe) – underlay, overlay, control and data planes
- Wide Area Networks (WAN)
- Options (compare) – L2/3 VPN's, metro ethernet, DWDM, SD-Wan ce
- Site to site VPN (design) – L2/L3, GRE, DMVPN, GET VPN
- HA (design) – single, multi, backup, failover
- SD-WAN architecture and design (describe) – various planes, QoS, multicast
- End-to-End Quality of Service (QoS)
- QoS strategies – IntServ/Diffserv (design)
- End-to-End QoS – Classify, mark, shape, police, queue (design)
- Network management techniques, out-of-band, in-band (design)
- Multicast
- Concepts – source/shared trees, RPF, RP (describe)
- Services – PIM bi-dir, SSM, MSDP (design)
- Automation
- YANG data models (IETF, Openconfig, Cisco native) – recognize differences
- Netconf and Restconf – recognize differences
- Telemetry model-driven (periodic/on-change publication and dial-in/dial-out) – recognize differences and impact
What you will learn
ENCOR
- Configuration of VRF, GRE, VLANs, RSTP, MST, NTP, IPSec VPNs, and more!
- Advanced Routing
- Configure and verify device management
- Cisco DNA Center
- Examine threat defense, endpoint security, and introduction to the Next-Generation Firewall
ENSLD
- Describe and apply advanced addressing and routing solutions
- Describe and apply advanced enterprise campus networks
- Describe and apply WAN
- Describe and apply security and network services
- Describe and apply Software-Defined Access
How you will benefit
- You will be prepared to sit for the Cisco CCNP Enterprise core exam: 350-401 ENCOR: Implementing and Operating Cisco Enterprise Network Core Technologies
- You will be prepared to sit for the Cisco CCNP Enterprise concentration exam: 300-420 ENSLD: Designing Cisco Enterprise Networks
Raymond Lacoste
Raymond Lacoste is a highly recognized instructor and IT professional who holds the Cisco Sirius Instructor Award. He has authored Cisco Press publications on the Cisco ENARSI and Cisco TSHOOT exams. Raymond's areas of expertise include Cisco Enterprise networking, Cisco Routing and Switching, Cisco Datacenter Networking, ITIL, and Amazon AWS. He also holds certifications in Cisco CCSI, Cisco CCNP Routing and Switching, Cisco CCNP Enterprise, ITIL Foundations, ITIL Practitioner, ITIL Intermediate, Amazon AWS System Operations, Amazon AWS Architect, Amazon AWS Developer, and CISSP. In addition to his certifications and experience, Raymond's engaging instruction style makes even the most obscenely complicated or obtuse concepts relatable and understandable. Outside of class, he enjoys dominating both on the golf course and the basketball court.
Aaron Gould
Aaron Gould is a highly knowledgeable network engineer with heavy experience in the Internet Service Provider space. Aaron holds multiple professional-level certifications with Juniper and Cisco equipment as well as Juniper - JNCIP-SP, Juniper - JNCIS-SP, Juniper - JNCDS-DC, Juniper - AAA (JNCIA X 3), Juniper – JNCDA, Juniper - JNCIA-Cloud, Juniper - JNCIA-Junos, Cisco - CCNP SP, Cisco – CCIP, Cisco – CCDP, Cisco - CCNP R/S, MEF CECP, and IPv6 Forum - Silver certifications. Aaron's extensive expertise includes Cisco IOS Routing and Switching, Cisco Network Design, Cisco Service Provider Routing, and Juniper Service Provider Routing.
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.
The CCNP Enterprise: ENCOR is the first step to mastering the implementation of core enterprise network technologies. The goal of this online training course is to provide you with the skills needed to install, manage, and administer dual stack architecture, virtualization, network assurance, security, and automation in an enterprise network.
CCNP Enterprise: ENARSI provides you with knowledge of Cisco solutions in advanced addressing and routing solutions, advanced enterprise campus networks, WAN, security and network services, and Software-Defined Access.
The course will also prepare you to sit for the Cisco CCNP Enterprise Core exam ENOR and the Cisco CCNP Enterprise Concentration exam ENSLD. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.
|
|
|
Cisco CCNP Enterprise: ENCOR & ENWLSI
- Cisco CCNP Enterprise: ENCOR & ENWLSI
-
Fee: $3,295.00
Dates: 4/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Location:
Building:
Room:
Instructor:
This course is intended for network engineers, system engineers, network administrators, and those looking to attain their CCNP Enterprise certification. Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
Software Requirements:
- PC: Windows 8 or later.
- Mac: macOS 10.6 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
- Microsoft Word Online
- Adobe Acrobat Reader
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment and will be available online. The CCNP Enterprise: ENCOR is the first step to mastering the implementation of core enterprise network technologies. The goal of this online training course is to provide you with the skills needed to install, manage, and administer dual stack architecture, virtualization, network assurance, security, and automation in an enterprise network.
In CCNP Enterprise: ENWLSI, you will be given the skills and knowledge to implement wireless networks, including FlexConnect, QoS, Multicast, advanced location services, security for client connectivity, monitoring, and device hardening.
The course will prepare you to sit for the Cisco CCNP Enterprise Core exam ENCOR and the Cisco CCNP Enterprise Concentration exam ENWLSI. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.
- Course Overview
- Introduction to ENCOR Course and Exam Objectives
- Campus Architecture and Device Fundamentals
- Campus Architecture
- Device Architecture
- Access and Distribution Layer Features and Services
- Configuring and Verifying VLANs
- Configuring and Verifying Trunks
- VLAN Trunking Protocol (VTP)
- STP Overview and Algorithm Deep Dive
- STP Convergence, Configuration and Manipulation
- STP PortFast, and BPDU Guard
- Multiple Spanning Tree Protocol (MSTP)
- EtherChannels
- Inter-VLAN Routing
- First-Hop Redundancy Protocol (FHRP)
- Routing
- Routing Introduction
- Dynamic Routing Overview
- OSPFv2 Overview, Packets, States, and Design
- OSPFv2 Configuration and Verification
- Text BoxOSPFv2 Network Types and DR/BDR Election
- OSPFv2 LSAs and Metric
- OSPFv2 Summarization
- OSPFv2 Filtering
- EBGP Overview, Configuration and Verification
- Text BoxShapeBGP Best Path Selection Process
- Network Address Translation (NAT)
- Multicast Protocol Overview
- VPN's
- GRE Tunnel Configuration and Verification
- IPSec Introduction
- IPSec Site-to-Site VPN Tunnel Configuration and Verification
- GRE over IPSec Tunnel Configuration and Verification
- Virtual Routing and Forwarding (VRF)
- Management Protocols and Services
- NTP Configuration and Verification
- Syslog Configuration and Verification
- Debugs, Conditional Debugs, Ping, and Traceroute
- SNMP Configuration and Verification
- NetFlow / Flexible NetFlow Configuration and Verification
- SPAN, RSPAN, ERSPAN Configuration and Verification
- IPSLA Configuration and Verification
- Quality of Service (QoS) Overview
- Embedded Event Manager (EEM) Configuration
- Security
- Device Access, Authentication Configuration and Verification
- AAA Configuration and Verification
- Access Control Lists (ACLs)
- Control Plane Policing (CoPP)
- Next-Gen Firewalls, Network Access Control, MACSec, and TrustSec
- Next Generation Campus Networks
- SD-Access
- LISP and VXLAN
- SD-WAN
- DNA Center Overview
- Data Formats
- Data Modeling
- NetConf / RestConf
- Python Exam Prep
- ShapeChef, Puppet, Ansible, SaltStack
- LAN Essentials
- Securing and Troubleshooting the Wireless Network Infrastructure including
- Secure access to Wireless LAN Controllers (WLCs) and Access Points (APs)
- Configuration management via Cisco DNA Center, Cisco Prime Infrastructure (PI)
- Implementing and Troubleshooting Secure Client Connectivity including
- 802.1X Authentication, AAA services, and Cisco Connected Mobile Experiences (CMX)
- Implementing and Troubleshooting QoS in Wireless Networks including
- Cisco Application Visibility and Control (AVC), Multicast DNS (mDNS), and Cisco Media Stream
- Implementing and Troubleshooting Advanced Wireless Network Services including
- Location Services, Analytics, and wireless spectrum management
What you will learn
ENCOR
- Configuration of VRF, GRE, VLANs, RSTP, MST, NTP, IPSec VPNs, and more
- Advanced Routing
- Configure and verify device management
- Cisco DNA Center
- Examine threat defense, endpoint security, and introduction to the Next-Generation Firewall
ENWLSI
- Implement network settings to provide a secure wireless network infrastructure and troubleshoot security issues as it relates to the wireless network infrastructure
- Implement a secure wireless client and troubleshoot wireless client connectivity issues
- Implement and troubleshoot QoS in wireless networks
- Implement and troubleshoot advanced capabilities in wireless network services
How you will benefit
- You will be prepared to sit for the Cisco CCNP Enterprise core exam: 350-401 ENCOR: Implementing and Operating Cisco Enterprise Network Core Technologies
- You will be prepared to sit for the Cisco CCNP Enterprise concentration exam: 300-430 ENWLSI: Implementing Cisco Enterprise Wireless Networks
Raymond Lacoste
Raymond Lacoste is a highly recognized instructor and IT professional who holds the Cisco Sirius Instructor Award. He has authored Cisco Press publications on the Cisco ENARSI and Cisco TSHOOT exams. Raymond's areas of expertise include Cisco Enterprise networking, Cisco Routing and Switching, Cisco Datacenter Networking, ITIL, and Amazon AWS. He also holds certifications in Cisco CCSI, Cisco CCNP Routing and Switching, Cisco CCNP Enterprise, ITIL Foundations, ITIL Practitioner, ITIL Intermediate, Amazon AWS System Operations, Amazon AWS Architect, Amazon AWS Developer, and CISSP. In addition to his certifications and experience, Raymond's engaging instruction style makes even the most obscenely complicated or obtuse concepts relatable and understandable. Outside of class, he enjoys dominating both on the golf course and the basketball court.
Dan Goodman
Dan Goodman is an IT professional specializing in Linux administration, Palo Alto firewalls, and wireless networking. He holds certifications in CompTIA Linux+, CWNP: CWNA, and Palo Alto PCNSA. In addition to his highly recognizable certifications, Dan is an expert in Linux administration, Palo Alto firewall administration, and wireless networking. Dan enjoys teaching the technologies focusing on real-world application of the theory. Outside of class-related efforts, he runs an animal shelter teaming with rescue animals.
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.
The CCNP Enterprise: ENCOR is the first step to mastering the implementation of core enterprise network technologies. The goal of this online training course is to provide you with the skills needed to install, manage, and administer dual stack architecture, virtualization, network assurance, security, and automation in an enterprise network.
In CCNP Enterprise: ENWLSI, you will be given the skills and knowledge to implement wireless networks, including FlexConnect, QoS, Multicast, advanced location services, security for client connectivity, monitoring, and device hardening.
The course will prepare you to sit for the Cisco CCNP Enterprise Core exam ENCOR and the Cisco CCNP Enterprise Concentration exam ENWLSI. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.
|
|
|
Cisco CCNP Enterprise: ENCOR & ENWLSI (Vouchers Included)
- Cisco CCNP Enterprise: ENCOR & ENWLSI (Vouchers Included)
-
Fee: $3,995.00
Dates: 4/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Location:
Building:
Room:
Instructor:
This course is intended for network engineers, system engineers, network administrators, and those looking to attain their CCNP Enterprise certification. Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
Software Requirements:
- PC: Windows 8 or later.
- Mac: macOS 10.6 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
- Microsoft Word Online
- Adobe Acrobat Reader
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment and will be available online. The CCNP Enterprise: ENCOR is the first step to mastering the implementation of core enterprise network technologies. The goal of this online training course is to provide you with the skills needed to install, manage, and administer dual stack architecture, virtualization, network assurance, security, and automation in an enterprise network.
In CCNP Enterprise: ENWLSI, you will be given the skills and knowledge to implement wireless networks, including FlexConnect, QoS, Multicast, advanced location services, security for client connectivity, monitoring, and device hardening.
The course will prepare you to sit for the Cisco CCNP Enterprise Core exam ENCOR and the Cisco CCNP Enterprise Concentration exam ENWLSI. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.
- Course Overview
- Introduction to ENCOR Course and Exam Objectives
- Campus Architecture and Device Fundamentals
- Campus Architecture
- Device Architecture
- Access and Distribution Layer Features and Services
- Configuring and Verifying VLANs
- Configuring and Verifying Trunks
- VLAN Trunking Protocol (VTP)
- STP Overview and Algorithm Deep Dive
- STP Convergence, Configuration and Manipulation
- STP PortFast, and BPDU Guard
- Multiple Spanning Tree Protocol (MSTP)
- EtherChannels
- Inter-VLAN Routing
- First-Hop Redundancy Protocol (FHRP)
- Routing
- Routing Introduction
- Dynamic Routing Overview
- OSPFv2 Overview, Packets, States, and Design
- OSPFv2 Configuration and Verification
- Text BoxOSPFv2 Network Types and DR/BDR Election
- OSPFv2 LSAs and Metric
- OSPFv2 Summarization
- OSPFv2 Filtering
- EBGP Overview, Configuration and Verification
- Text BoxShapeBGP Best Path Selection Process
- Network Address Translation (NAT)
- Multicast Protocol Overview
- VPN's
- GRE Tunnel Configuration and Verification
- IPSec Introduction
- IPSec Site-to-Site VPN Tunnel Configuration and Verification
- GRE over IPSec Tunnel Configuration and Verification
- Virtual Routing and Forwarding (VRF)
- Management Protocols and Services
- NTP Configuration and Verification
- Syslog Configuration and Verification
- Debugs, Conditional Debugs, Ping, and Traceroute
- SNMP Configuration and Verification
- NetFlow / Flexible NetFlow Configuration and Verification
- SPAN, RSPAN, ERSPAN Configuration and Verification
- IPSLA Configuration and Verification
- Quality of Service (QoS) Overview
- Embedded Event Manager (EEM) Configuration
- Security
- Device Access, Authentication Configuration and Verification
- AAA Configuration and Verification
- Access Control Lists (ACLs)
- Control Plane Policing (CoPP)
- Next-Gen Firewalls, Network Access Control, MACSec, and TrustSec
- Next Generation Campus Networks
- SD-Access
- LISP and VXLAN
- SD-WAN
- DNA Center Overview
- Data Formats
- Data Modeling
- NetConf / RestConf
- Python Exam Prep
- ShapeChef, Puppet, Ansible, SaltStack
- LAN Essentials
- Securing and Troubleshooting the Wireless Network Infrastructure including
- Secure access to Wireless LAN Controllers (WLCs) and Access Points (APs)
- Configuration management via Cisco DNA Center, Cisco Prime Infrastructure (PI)
- Implementing and Troubleshooting Secure Client Connectivity including
- 802.1X Authentication, AAA services, and Cisco Connected Mobile Experiences (CMX)
- Implementing and Troubleshooting QoS in Wireless Networks including
- Cisco Application Visibility and Control (AVC), Multicast DNS (mDNS), and Cisco Media Stream
- Implementing and Troubleshooting Advanced Wireless Network Services including
- Location Services, Analytics, and wireless spectrum management
What you will learn
ENCOR
- Configuration of VRF, GRE, VLANs, RSTP, MST, NTP, IPSec VPNs, and more
- Advanced Routing
- Configure and verify device management
- Cisco DNA Center
- Examine threat defense, endpoint security, and introduction to the Next-Generation Firewall
ENWLSI
- Implement network settings to provide a secure wireless network infrastructure and troubleshoot security issues as it relates to the wireless network infrastructure
- Implement a secure wireless client and troubleshoot wireless client connectivity issues
- Implement and troubleshoot QoS in wireless networks
- Implement and troubleshoot advanced capabilities in wireless network services
How you will benefit
- You will be prepared to sit for the Cisco CCNP Enterprise core exam: 350-401 ENCOR: Implementing and Operating Cisco Enterprise Network Core Technologies
- You will be prepared to sit for the Cisco CCNP Enterprise concentration exam: 300-430 ENWLSI: Implementing Cisco Enterprise Wireless Networks
Raymond Lacoste
Raymond Lacoste is a highly recognized instructor and IT professional who holds the Cisco Sirius Instructor Award. He has authored Cisco Press publications on the Cisco ENARSI and Cisco TSHOOT exams. Raymond's areas of expertise include Cisco Enterprise networking, Cisco Routing and Switching, Cisco Datacenter Networking, ITIL, and Amazon AWS. He also holds certifications in Cisco CCSI, Cisco CCNP Routing and Switching, Cisco CCNP Enterprise, ITIL Foundations, ITIL Practitioner, ITIL Intermediate, Amazon AWS System Operations, Amazon AWS Architect, Amazon AWS Developer, and CISSP. In addition to his certifications and experience, Raymond's engaging instruction style makes even the most obscenely complicated or obtuse concepts relatable and understandable. Outside of class, he enjoys dominating both on the golf course and the basketball court.
Dan Goodman
Dan Goodman is an IT professional specializing in Linux administration, Palo Alto firewalls, and wireless networking. He holds certifications in CompTIA Linux+, CWNP: CWNA, and Palo Alto PCNSA. In addition to his highly recognizable certifications, Dan is an expert in Linux administration, Palo Alto firewall administration, and wireless networking. Dan enjoys teaching the technologies focusing on real-world application of the theory. Outside of class-related efforts, he runs an animal shelter teaming with rescue animals.
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.
The CCNP Enterprise: ENCOR is the first step to mastering the implementation of core enterprise network technologies. The goal of this online training course is to provide you with the skills needed to install, manage, and administer dual stack architecture, virtualization, network assurance, security, and automation in an enterprise network.
In CCNP Enterprise: ENWLSI, you will be given the skills and knowledge to implement wireless networks, including FlexConnect, QoS, Multicast, advanced location services, security for client connectivity, monitoring, and device hardening.
The course will prepare you to sit for the Cisco CCNP Enterprise Core exam ENCOR and the Cisco CCNP Enterprise Concentration exam ENWLSI. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.
|
|
|
Cisco CCNP Security: SCOR & SISE
- Cisco CCNP Security: SCOR & SISE
-
Fee: $3,295.00
Dates: 4/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Location:
Building:
Room:
Instructor:
This course is intended for network security engineers and those looking to attain their CCNP Security certification. Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
Software Requirements:
- PC: Windows 8 or later.
- Mac: macOS 10.6 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
- Microsoft Word Online
- Adobe Acrobat Reader
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment and will be available online. The CCNP Security: SCOR course provides you with the knowledge to implement and operate core Cisco security technologies. You will learn about common security vulnerabilities, Email Security Appliance (ESA), Web Security Appliance (WSA), Cloud Email Security (CES), mobile device management (MDM), VPN configuration, and more.
The Configuring Cisco Identity Services Engine (SISE) course provides you with the skills and knowledge to deploy and use the Cisco Identity Services Engine (ISE), policy enforcement, profiling services, web authentication and guest access services, BYOD, endpoint compliance services, and TACACS+ device administration. Crucial elements of this course include the ability to use Cisco ISE to gain visibility into what is happening in your network, streamline security policy management, and contribute to operational efficiency.
The course will prepare you to sit for the Cisco CCNP Security Core exam SCOR and the Cisco CCNP Security Concentration exam SISE. These exams in tandem will earn you the CCNP Security certification. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.
- Security Foundations
- Attacks against on-premises and cloud resources
- Common security vulnerabilities
- Cryptography concepts and applications
- Managing Cisco security devices via application programming interfaces (APIs)
- Implementing Security
- Security in common cloud environments
- Division of responsibility (shared responsibility model)
- DevSecOps, continuous integration, and orchestration
- Cloud Concepts and Security
- Configuring and Verifying VLANs
- Configuring and Verifying Trunks
- VLAN Trunking Protocol (VTP)
- STP Overview and Algorithm Deep Dive
- STP Convergence, Configuration and Manipulation
- STP PortFast, and BPDU Guard
- Multiple Spanning Tree Protocol (MSTP)
- EtherChannels
- Inter-VLAN Routing
- First-Hop Redundancy Protocol (FHRP)
- Application-Specific Security Tools
- Email Security Appliance (ESA)
- Web Security Appliance (WSA)
- Cloud Email Security (CES)
- Securing DNS with Cisco Umbrella
- Securing Endpoints
- Antimalware concepts
- Mobile device management (MDM)
- Multifactor authentication (MFA)
- Network access control
- Patch management
- Network Access Control and Visibility
- 802.1x, WebAuth, and MAB
- Network visibility and evasion techniques
- Cisco network analytics technologies
- Introducing Cisco ISE Architecture and Deployment
- Using Cisco ISE as a Network Access Policy Engine
- Cisco ISE Use Cases
- Describing Cisco ISE Functions
- Cisco ISE Deployment Models
- Context Visibility
- Cisco ISE Policy Enforcement
- Using 802.1X for Wired and Wireless Access
- Using MAC Authentication Bypass for Wired and Wireless Access
- Introducing Identity Management
- Configuring Certificate Services
- Introducing Cisco ISE Policy
- Implementing Third-Party Network Access Device Support
- Introducing Cisco TrustSec
- Cisco TrustSec Configuration
- Easy Connect
- Web Authentication and Guest Services
- Introducing Web Access with Cisco ISE
- Introducing Guest Access Components
- Configuring Guest Access Settings
- Configuring Sponsor and Guest Portals
- Cisco ISE Profiler
- Introducing Cisco ISE Profiler
- Profiling Deployment and Best Practices
- Cisco ISE BYOD
- Introducing the Cisco ISE BYOD Process
- Describing BYOD Flow
- Configuring the My Devices Portal
- Configuring Certificates in BYOD Scenarios
- Cisco ISE Endpoint Compliance Services
- Introducing Endpoint Compliance Services
- Configuring Client Posture Services and Provisioning in Cisco ISE
- Working with Network Access Devices
- Review TACACS+
- Cisco ISE TACACS+ Device Administration
- Configure TACACS+ Device Administration
- TACACS+ Device Administration Guidelines and Best Practices
- Migrating from Cisco ACS to Cisco ISE
What you will learn
SCOR
- Cisco security devices via an API
- Layer 2 and Layer 3+ security
- VPNs
- Cloud security concepts
- Email Security Appliance (ESA)
- Web Security Appliance (WSA)
- Cloud Email Security (CES)
- DNS with Cisco Umbrella
- Mobile device management (MDM)
- Multifactor authentication (MFA)
SISE
- Describe Cisco ISE deployments, including core deployment components and how they interact to create a cohesive security architecture
- Describe the advantages of such a deployment and how each Cisco ISE capability contributes to these advantages
- Describe concepts and configure components related to 802.1X and MAC Authentication Bypass (MAB) authentication, identity management, and certificate services
- Describe how Cisco ISE policy sets are used to implement authentication and authorization and how to leverage this capability to meet the needs of your organization
- Describe third-party Network Access Devices (NADs), Cisco TrustSec®, and Easy Connect
- Describe and configure web authentication, processes, operation, and guest services, including guest access components and various guest access scenarios
- Describe and configure Cisco ISE profiling services and understand how to monitor these services to enhance your situational awareness about network-connected endpoints
- Describe best practices for deploying this profiler service in your specific environment
- Describe BYOD challenges, solutions, processes, and portalsConfigure a BYOD solution and describe the relationship between BYOD processes and their related configuration components
- Describe and configure various certificates related to a BYOD solution
- Describe the value of the My Devices portal and how to configure this portal
- Describe endpoint compliance, compliance components, posture agents, posture deployment and licensing, and the posture service in Cisco ISE
- Describe and configure TACACS+ device administration using Cisco ISE, including command sets, profiles, and policy sets
- Understand the role of TACACS+ within the Authentication, Authentication, and Accounting (AAA) framework and the differences between the RADIUS and TACACS+ protocols
- Migrate TACACS+ functionality from Cisco Secure Access Control System (ACS) to Cisco ISE, using a migration tool
How you will benefit
- You will be prepared to sit for the Cisco CCNP Security core exam: 350-701 SCOR: Implementing and Operating Cisco Security Core Technologies
- You will be prepared to sit for the Cisco CCNP Security concentration exam: 300-715 SISE: Implementing and Configuring Cisco Identity Services Engine
Shane Sexton
Shane Sexton is a cybersecurity-focused instructor with a hunger for using technology to combat real-world challenges. He holds many professional IT certifications such as Citrix CCA, CompTIA A+, CompTIA Security+, CompTIA Linux+, CompTIA CySA+, ITIL Foundations, Cisco CCNA, AWS SysOps, and Cisco CCNP Security. Shane's extensive professional expertise includes Citrix Virtualization, Citrix Virtualization, Computer Hardware support, Cisco networking, Cybersecurity Blue Team, Cybersecurity Red Team, Cisco security, Amazon AWS, and ITIL. Inside the classroom, Shane makes the complicated seem approachable. Outside the classroom, Shane is a mad scientist with automation, coding, and scripting, tying them back to technologies he teaches in class. If he isn't watching the latest SpaceX launch, he can usually be found tinkering with something.
Doug Bassett
Doug Bassett is an IT instructor specializing in Microsoft Azure, Server 2016/19, and Exchange messaging. He holds many highly sought-after IT certifications, including Microsoft MCSE, Microsoft MCSA, CompTIA Network+, Cisco CCNA, and Microsoft MCT. In addition to his certifications, Doug has expert knowledge of Microsoft Server 2000, 2003, 2008/2012/2016/2019, Exchange Server and Exchange Online, and Networking structure and applications. As an instructor, Doug is deeply involved in helping his students understand complex concepts and loves to approach teaching a subject from multiple angles.
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.
The CCNP Security: SCOR course provides you with the knowledge to implement and operate core Cisco security technologies. You will learn about common security vulnerabilities, Email Security Appliance (ESA), Web Security Appliance (WSA), Cloud Email Security (CES), mobile device management (MDM), VPN configuration, and more.
The Configuring Cisco Identity Services Engine (SISE) course provides you with the skills and knowledge to deploy and use the Cisco Identity Services Engine (ISE), policy enforcement, profiling services, web authentication and guest access services, BYOD, endpoint compliance services, and TACACS+ device administration. Crucial elements of this course include the ability to use Cisco ISE to gain visibility into what is happening in your network, streamline security policy management, and contribute to operational efficiency.
The course will prepare you to sit for the Cisco CCNP Security Core exam SCOR and the Cisco CCNP Security Concentration exam SISE. These exams in tandem will earn you the CCNP Security certification. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.
|
|
|
Cisco CCNP Security: SCOR & SISE (Vouchers Included)
- Cisco CCNP Security: SCOR & SISE (Vouchers Included)
-
Fee: $3,995.00
Dates: 4/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Location:
Building:
Room:
Instructor:
This course is intended for network security engineers and those looking to attain their CCNP Security certification. Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
Software Requirements:
- PC: Windows 8 or later.
- Mac: macOS 10.6 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
- Microsoft Word Online
- Adobe Acrobat Reader
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment and will be available online. The CCNP Security: SCOR course provides you with the knowledge to implement and operate core Cisco security technologies. You will learn about common security vulnerabilities, Email Security Appliance (ESA), Web Security Appliance (WSA), Cloud Email Security (CES), mobile device management (MDM), VPN configuration, and more.
The Configuring Cisco Identity Services Engine (SISE) course provides you with the skills and knowledge to deploy and use the Cisco Identity Services Engine (ISE), policy enforcement, profiling services, web authentication and guest access services, BYOD, endpoint compliance services, and TACACS+ device administration. Crucial elements of this course include the ability to use Cisco ISE to gain visibility into what is happening in your network, streamline security policy management, and contribute to operational efficiency.
The course will prepare you to sit for the Cisco CCNP Security Core exam SCOR and the Cisco CCNP Security Concentration exam SISE. These exams in tandem will earn you the CCNP Security certification. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.
- Security Foundations
- Attacks against on-premises and cloud resources
- Common security vulnerabilities
- Cryptography concepts and applications
- Managing Cisco security devices via application programming interfaces (APIs)
- Implementing Security
- Security in common cloud environments
- Division of responsibility (shared responsibility model)
- DevSecOps, continuous integration, and orchestration
- Cloud Concepts and Security
- Configuring and Verifying VLANs
- Configuring and Verifying Trunks
- VLAN Trunking Protocol (VTP)
- STP Overview and Algorithm Deep Dive
- STP Convergence, Configuration and Manipulation
- STP PortFast, and BPDU Guard
- Multiple Spanning Tree Protocol (MSTP)
- EtherChannels
- Inter-VLAN Routing
- First-Hop Redundancy Protocol (FHRP)
- Application-Specific Security Tools
- Email Security Appliance (ESA)
- Web Security Appliance (WSA)
- Cloud Email Security (CES)
- Securing DNS with Cisco Umbrella
- Securing Endpoints
- Antimalware concepts
- Mobile device management (MDM)
- Multifactor authentication (MFA)
- Network access control
- Patch management
- Network Access Control and Visibility
- 802.1x, WebAuth, and MAB
- Network visibility and evasion techniques
- Cisco network analytics technologies
- Introducing Cisco ISE Architecture and Deployment
- Using Cisco ISE as a Network Access Policy Engine
- Cisco ISE Use Cases
- Describing Cisco ISE Functions
- Cisco ISE Deployment Models
- Context Visibility
- Cisco ISE Policy Enforcement
- Using 802.1X for Wired and Wireless Access
- Using MAC Authentication Bypass for Wired and Wireless Access
- Introducing Identity Management
- Configuring Certificate Services
- Introducing Cisco ISE Policy
- Implementing Third-Party Network Access Device Support
- Introducing Cisco TrustSec
- Cisco TrustSec Configuration
- Easy Connect
- Web Authentication and Guest Services
- Introducing Web Access with Cisco ISE
- Introducing Guest Access Components
- Configuring Guest Access Settings
- Configuring Sponsor and Guest Portals
- Cisco ISE Profiler
- Introducing Cisco ISE Profiler
- Profiling Deployment and Best Practices
- Cisco ISE BYOD
- Introducing the Cisco ISE BYOD Process
- Describing BYOD Flow
- Configuring the My Devices Portal
- Configuring Certificates in BYOD Scenarios
- Cisco ISE Endpoint Compliance Services
- Introducing Endpoint Compliance Services
- Configuring Client Posture Services and Provisioning in Cisco ISE
- Working with Network Access Devices
- Review TACACS+
- Cisco ISE TACACS+ Device Administration
- Configure TACACS+ Device Administration
- TACACS+ Device Administration Guidelines and Best Practices
- Migrating from Cisco ACS to Cisco ISE
What you will learn
SCOR
- Cisco security devices via an API
- Layer 2 and Layer 3+ security
- VPNs
- Cloud security concepts
- Email Security Appliance (ESA)
- Web Security Appliance (WSA)
- Cloud Email Security (CES)
- DNS with Cisco Umbrella
- Mobile device management (MDM)
- Multifactor authentication (MFA)
SISE
- Describe Cisco ISE deployments, including core deployment components and how they interact to create a cohesive security architecture
- Describe the advantages of such a deployment and how each Cisco ISE capability contributes to these advantages
- Describe concepts and configure components related to 802.1X and MAC Authentication Bypass (MAB) authentication, identity management, and certificate services
- Describe how Cisco ISE policy sets are used to implement authentication and authorization and how to leverage this capability to meet the needs of your organization
- Describe third-party Network Access Devices (NADs), Cisco TrustSec®, and Easy Connect
- Describe and configure web authentication, processes, operation, and guest services, including guest access components and various guest access scenarios
- Describe and configure Cisco ISE profiling services and understand how to monitor these services to enhance your situational awareness about network-connected endpoints
- Describe best practices for deploying this profiler service in your specific environment
- Describe BYOD challenges, solutions, processes, and portalsConfigure a BYOD solution and describe the relationship between BYOD processes and their related configuration components
- Describe and configure various certificates related to a BYOD solution
- Describe the value of the My Devices portal and how to configure this portal
- Describe endpoint compliance, compliance components, posture agents, posture deployment and licensing, and the posture service in Cisco ISE
- Describe and configure TACACS+ device administration using Cisco ISE, including command sets, profiles, and policy sets
- Understand the role of TACACS+ within the Authentication, Authentication, and Accounting (AAA) framework and the differences between the RADIUS and TACACS+ protocols
- Migrate TACACS+ functionality from Cisco Secure Access Control System (ACS) to Cisco ISE, using a migration tool
How you will benefit
- You will be prepared to sit for the Cisco CCNP Security core exam: 350-701 SCOR: Implementing and Operating Cisco Security Core Technologies
- You will be prepared to sit for the Cisco CCNP Security concentration exam: 300-715 SISE: Implementing and Configuring Cisco Identity Services Engine
Shane Sexton
Shane Sexton is a cybersecurity-focused instructor with a hunger for using technology to combat real-world challenges. He holds many professional IT certifications such as Citrix CCA, CompTIA A+, CompTIA Security+, CompTIA Linux+, CompTIA CySA+, ITIL Foundations, Cisco CCNA, AWS SysOps, and Cisco CCNP Security. Shane's extensive professional expertise includes Citrix Virtualization, Citrix Virtualization, Computer Hardware support, Cisco networking, Cybersecurity Blue Team, Cybersecurity Red Team, Cisco security, Amazon AWS, and ITIL. Inside the classroom, Shane makes the complicated seem approachable. Outside the classroom, Shane is a mad scientist with automation, coding, and scripting, tying them back to technologies he teaches in class. If he isn't watching the latest SpaceX launch, he can usually be found tinkering with something.
Doug Bassett
Doug Bassett is an IT instructor specializing in Microsoft Azure, Server 2016/19, and Exchange messaging. He holds many highly sought-after IT certifications, including Microsoft MCSE, Microsoft MCSA, CompTIA Network+, Cisco CCNA, and Microsoft MCT. In addition to his certifications, Doug has expert knowledge of Microsoft Server 2000, 2003, 2008/2012/2016/2019, Exchange Server and Exchange Online, and Networking structure and applications. As an instructor, Doug is deeply involved in helping his students understand complex concepts and loves to approach teaching a subject from multiple angles.
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.
The CCNP Security: SCOR course provides you with the knowledge to implement and operate core Cisco security technologies. You will learn about common security vulnerabilities, Email Security Appliance (ESA), Web Security Appliance (WSA), Cloud Email Security (CES), mobile device management (MDM), VPN configuration, and more.
The Configuring Cisco Identity Services Engine (SISE) course provides you with the skills and knowledge to deploy and use the Cisco Identity Services Engine (ISE), policy enforcement, profiling services, web authentication and guest access services, BYOD, endpoint compliance services, and TACACS+ device administration. Crucial elements of this course include the ability to use Cisco ISE to gain visibility into what is happening in your network, streamline security policy management, and contribute to operational efficiency.
The course will prepare you to sit for the Cisco CCNP Security Core exam SCOR and the Cisco CCNP Security Concentration exam SISE. These exams in tandem will earn you the CCNP Security certification. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.
|
|
|
Cisco CCNP Security: SCOR & SVPN
- Cisco CCNP Security: SCOR & SVPN
-
Fee: $3,295.00
Dates: 4/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Location:
Building:
Room:
Instructor:
This course is intended for network security engineers and those looking to attain their CCNP Security certification. Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
Software Requirements:
- PC: Windows 8 or later.
- Mac: macOS 10.6 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
- Microsoft Word Online
- Adobe Acrobat Reader
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment and will be available online. The CCNP Security: SCOR course provides you with the knowledge to implement and operate core Cisco security technologies. You will learn about common security vulnerabilities, Email Security Appliance (ESA), Web Security Appliance (WSA), Cloud Email Security (CES), mobile device management (MDM), VPN configuration, and more.
The Implementing Secure Solutions with Virtual Private Networks (SVPN) course focuses on implementing secure remote communications with Virtual Private Network (VPN) solutions, including secure communications, architectures, and troubleshooting on Cisco ASAs and Cisco IOS Routers.
The course will prepare you to sit for the Cisco CCNP Security Core exam SCOR and the Cisco CCNP Security Concentration exam SVPN. These exams in tandem will earn you the CCNP Security certification. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.
- Security Foundations
- Attacks against on-premises and cloud resources
- Common security vulnerabilities
- Cryptography concepts and applications
- Managing Cisco security devices via application programming interfaces (APIs)
- Implementing Security
- Security in common cloud environments
- Division of responsibility (shared responsibility model)
- DevSecOps, continuous integration, and orchestration
- Cloud Concepts and Security
- Configuring and Verifying VLANs
- Configuring and Verifying Trunks
- VLAN Trunking Protocol (VTP)
- STP Overview and Algorithm Deep Dive
- STP Convergence, Configuration and Manipulation
- STP PortFast, and BPDU Guard
- Multiple Spanning Tree Protocol (MSTP)
- EtherChannels
- Inter-VLAN Routing
- First-Hop Redundancy Protocol (FHRP)
- Application-Specific Security Tools
- Email Security Appliance (ESA)
- Web Security Appliance (WSA)
- Cloud Email Security (CES)
- Securing DNS with Cisco Umbrella
- Securing Endpoints
- Antimalware concepts
- Mobile device management (MDM)
- Multifactor authentication (MFA)
- Network access control
- Patch management
- Network Access Control and Visibility
- 802.1x, WebAuth, and MAB
- Network visibility and evasion techniques
- Cisco network analytics technologies
- Introduction to VPN Technologies
- Site-to-site and remote access VPNs
- Cryptography concepts
- Public Key Infrastructure (PKI)
- IPsec Concepts
- IKEv1 and IKEv2
- AH and ESP
- VPN Configuration
- Traditional crypto map IPsec configuration
- VTI configuration
- Configuring and troubleshooting DMVPN
- Deploying and troubleshooting FlexVPN
- Remote Access VPN Configuration
- SSL concepts
- Clientless AnyConnect deployments
- Client-based AnyConnect deployments
- Extended functionality with plugins
- Local, remote, and two-factor authentication
- Host scan and posture assessment
- AnyConnect troubleshooting
What you will learn
SCOR
- Cisco security devices via an API
- Layer 2 and Layer 3+ security
- VPNs
- Cloud security concepts
- Email Security Appliance (ESA)
- Web Security Appliance (WSA)
- Cloud Email Security (CES)
- DNS with Cisco Umbrella
- Mobile device management (MDM)
- Multifactor authentication (MFA)
SVPN
- Implement secure remote communications with Virtual Private Network (VPN) solutions including secure communications, architectures, and troubleshooting
- Implementing Site to Site IPsec VPN on Routers & ASA
- Implementing FlexVPN with IKEv2 on Cisco Routers
- Implementing DMVPN on Cisco Routers
- Implementing Cisco AnyConnect
How you will benefit
- You will be prepared to sit for the Cisco CCNP Security core exam: 350-701 SCOR: Implementing and Operating Cisco Security Core Technologies
- You will be prepared to sit for the Cisco CCNP Security concentration exam: 300-730 SVPN: Implementing Secure Solutions with Virtual Private Networks
Shane Sexton
Shane Sexton is a cybersecurity-focused instructor with a hunger for using technology to combat real-world challenges. He holds many professional IT certifications such as Citrix CCA, CompTIA A+, CompTIA Security+, CompTIA Linux+, CompTIA CySA+, ITIL Foundations, Cisco CCNA, AWS SysOps, and Cisco CCNP Security. Shane's extensive professional expertise includes Citrix Virtualization, Citrix Virtualization, Computer Hardware support, Cisco networking, Cybersecurity Blue Team, Cybersecurity Red Team, Cisco security, Amazon AWS, and ITIL. Inside the classroom, Shane makes the complicated seem approachable. Outside the classroom, Shane is a mad scientist with automation, coding, and scripting, tying them back to technologies he teaches in class. If he isn't watching the latest SpaceX launch, he can usually be found tinkering with something.
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.
The CCNP Security: SCOR course provides you with the knowledge to implement and operate core Cisco security technologies. You will learn about common security vulnerabilities, Email Security Appliance (ESA), Web Security Appliance (WSA), Cloud Email Security (CES), mobile device management (MDM), VPN configuration, and more.
The Implementing Secure Solutions with Virtual Private Networks (SVPN) course focuses on implementing secure remote communications with Virtual Private Network (VPN) solutions, including secure communications, architectures, and troubleshooting on Cisco ASAs and Cisco IOS Routers.
The course will prepare you to sit for the Cisco CCNP Security Core exam SCOR and the Cisco CCNP Security Concentration exam SVPN. These exams in tandem will earn you the CCNP Security certification. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.
|
|
|
Cisco CCNP Security: SCOR & SVPN (Vouchers Included)
- Cisco CCNP Security: SCOR & SVPN (Vouchers Included)
-
Fee: $3,995.00
Dates: 4/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Location:
Building:
Room:
Instructor:
This course is intended for network security engineers and those looking to attain their CCNP Security certification. Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
Software Requirements:
- PC: Windows 8 or later.
- Mac: macOS 10.6 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
- Microsoft Word Online
- Adobe Acrobat Reader
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment and will be available online. The CCNP Security: SCOR course provides you with the knowledge to implement and operate core Cisco security technologies. You will learn about common security vulnerabilities, Email Security Appliance (ESA), Web Security Appliance (WSA), Cloud Email Security (CES), mobile device management (MDM), VPN configuration, and more.
The Implementing Secure Solutions with Virtual Private Networks (SVPN) course focuses on implementing secure remote communications with Virtual Private Network (VPN) solutions, including secure communications, architectures, and troubleshooting on Cisco ASAs and Cisco IOS Routers.
The course will prepare you to sit for the Cisco CCNP Security Core exam SCOR and the Cisco CCNP Security Concentration exam SVPN. These exams in tandem will earn you the CCNP Security certification. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.
- Security Foundations
- Attacks against on-premises and cloud resources
- Common security vulnerabilities
- Cryptography concepts and applications
- Managing Cisco security devices via application programming interfaces (APIs)
- Implementing Security
- Security in common cloud environments
- Division of responsibility (shared responsibility model)
- DevSecOps, continuous integration, and orchestration
- Cloud Concepts and Security
- Configuring and Verifying VLANs
- Configuring and Verifying Trunks
- VLAN Trunking Protocol (VTP)
- STP Overview and Algorithm Deep Dive
- STP Convergence, Configuration and Manipulation
- STP PortFast, and BPDU Guard
- Multiple Spanning Tree Protocol (MSTP)
- EtherChannels
- Inter-VLAN Routing
- First-Hop Redundancy Protocol (FHRP)
- Application-Specific Security Tools
- Email Security Appliance (ESA)
- Web Security Appliance (WSA)
- Cloud Email Security (CES)
- Securing DNS with Cisco Umbrella
- Securing Endpoints
- Antimalware concepts
- Mobile device management (MDM)
- Multifactor authentication (MFA)
- Network access control
- Patch management
- Network Access Control and Visibility
- 802.1x, WebAuth, and MAB
- Network visibility and evasion techniques
- Cisco network analytics technologies
- Introduction to VPN Technologies
- Site-to-site and remote access VPNs
- Cryptography concepts
- Public Key Infrastructure (PKI)
- IPsec Concepts
- IKEv1 and IKEv2
- AH and ESP
- VPN Configuration
- Traditional crypto map IPsec configuration
- VTI configuration
- Configuring and troubleshooting DMVPN
- Deploying and troubleshooting FlexVPN
- Remote Access VPN Configuration
- SSL concepts
- Clientless AnyConnect deployments
- Client-based AnyConnect deployments
- Extended functionality with plugins
- Local, remote, and two-factor authentication
- Host scan and posture assessment
- AnyConnect troubleshooting
What you will learn
SCOR
- Cisco security devices via an API
- Layer 2 and Layer 3+ security
- VPNs
- Cloud security concepts
- Email Security Appliance (ESA)
- Web Security Appliance (WSA)
- Cloud Email Security (CES)
- DNS with Cisco Umbrella
- Mobile device management (MDM)
- Multifactor authentication (MFA)
SVPN
- Implement secure remote communications with Virtual Private Network (VPN) solutions including secure communications, architectures, and troubleshooting
- Implementing Site to Site IPsec VPN on Routers & ASA
- Implementing FlexVPN with IKEv2 on Cisco Routers
- Implementing DMVPN on Cisco Routers
- Implementing Cisco AnyConnect
How you will benefit
- You will be prepared to sit for the Cisco CCNP Security core exam: 350-701 SCOR: Implementing and Operating Cisco Security Core Technologies
- You will be prepared to sit for the Cisco CCNP Security concentration exam: 300-730 SVPN: Implementing Secure Solutions with Virtual Private Networks
Shane Sexton
Shane Sexton is a cybersecurity-focused instructor with a hunger for using technology to combat real-world challenges. He holds many professional IT certifications such as Citrix CCA, CompTIA A+, CompTIA Security+, CompTIA Linux+, CompTIA CySA+, ITIL Foundations, Cisco CCNA, AWS SysOps, and Cisco CCNP Security. Shane's extensive professional expertise includes Citrix Virtualization, Citrix Virtualization, Computer Hardware support, Cisco networking, Cybersecurity Blue Team, Cybersecurity Red Team, Cisco security, Amazon AWS, and ITIL. Inside the classroom, Shane makes the complicated seem approachable. Outside the classroom, Shane is a mad scientist with automation, coding, and scripting, tying them back to technologies he teaches in class. If he isn't watching the latest SpaceX launch, he can usually be found tinkering with something.
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.
The CCNP Security: SCOR course provides you with the knowledge to implement and operate core Cisco security technologies. You will learn about common security vulnerabilities, Email Security Appliance (ESA), Web Security Appliance (WSA), Cloud Email Security (CES), mobile device management (MDM), VPN configuration, and more.
The Implementing Secure Solutions with Virtual Private Networks (SVPN) course focuses on implementing secure remote communications with Virtual Private Network (VPN) solutions, including secure communications, architectures, and troubleshooting on Cisco ASAs and Cisco IOS Routers.
The course will prepare you to sit for the Cisco CCNP Security Core exam SCOR and the Cisco CCNP Security Concentration exam SVPN. These exams in tandem will earn you the CCNP Security certification. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.
|
|
|
CompTIA A+ Certification Prep 1: Hardware Offered in partnership with ed2go
-
Fee: $129.00
Hours: 24
The CompTIA A+ Certification Prep 1: Hardware course teaches you about the hardware common to nearly every personal computer, including microprocessors, RAM, power supplies, motherboards, UEFI/BIOS, the system setup utility, the expansion bus, and input/output devices.
According to CompTIA, getting your A+ certification can lead to a rewarding IT career—with average salaries ranging from $45,000-$60,000, depending on the role you pursue.
Note: To properly prepare for your 220-1101/1102 CompTIA A+ certification exams, in addition to this course, you will need to complete the following course series: CompTIA A+ Certification Prep 2: Software and CompTIA A+ Certification Prep 3: Network Security.
|
|
|
CompTIA A+ Certification Prep 1: Hardware (Self-Guided)
- CompTIA A+ Certification Prep 1: Hardware (Self-Guided)
-
Fee: $129.00
Dates: 4/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Location:
Building:
Room:
Instructor:
Discover the inner workings of computers! Learn how to configure and troubleshoot computer hardware in real-world environments with hands-on practice. This online course is the first of three courses necessary to prepare you for the CompTIA A+ Certification. Get ready to roll up your sleeves and dive inside your personal computer! The CompTIA A+ Certification Prep 1: Hardware course is the first of three CompTIA courses you will need to take to successfully prepare for your A+ certification. It teaches you about the hardware common to nearly every personal computer, including microprocessors, RAM, power supplies, motherboards, UEFI/BIOS, the system setup utility, the expansion bus, and input/output devices.
Throughout our CompTIA A+ prep course, you will learn techniques every tech masters for building and troubleshooting all sorts of computers, plus get the inside scoop on how techs work within the enterprise. This computer hardware course also gives you the base knowledge needed to continue your CompTIA A+ certification studies for the 220-1101 and 220-1102 exams. Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
- It's also recommended that you have a PC that you can take apart and put back together again. Because of the dangers of electro-static discharge (to the machine, not the student), you are not required to tear apart your own primary computer. This is, however, a class that trains you to be a hardware technician - having a machine to play with greatly helps your learning.
Software Requirements:
- PC: Windows 8 or later.
- Mac: macOS 10.6 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
- Adobe Acrobat Reader.
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment and will be available online. The CompTIA A+ Certification Prep 1: Hardware course teaches you about the hardware common to nearly every personal computer, including microprocessors, RAM, power supplies, motherboards, UEFI/BIOS, the system setup utility, the expansion bus, and input/output devices.
According to CompTIA, getting your A+ certification can lead to a rewarding IT career—with average salaries ranging from $45,000-$60,000, depending on the role you pursue.
Note: To properly prepare for your 220-1101/1102 CompTIA A+ certification exams, in addition to this course, you will need to complete the following course series: CompTIA A+ Certification Prep 2: Software and CompTIA A+ Certification Prep 3: Network Security.
- The Art of the Tech
- Desktop PC Basics
- Laptop PC Basics
- Maintenance and Safety Precautions
- Central Processing Units and RAM
- Motherboards and Cases
- Powering the PC
- Input Devices
- Storage Technologies
- Working with Storage Devices
- Removable Media and RAID
- Operational Procedures
What you will learn
- Learn proper tech terminology and how all the components of the PC work together
- Discover important safety techniques that every good tech needs to know
- Gain practical information and advice on installing and troubleshooting CPUs
- Learn about the different varieties of RAM and proper techniques for installing it
- Obtain everything you need to know about motherboard form factors, types of expansion slots, and installation steps for expansion cards
- Gain knowledge of hard drive technologies and the fundamentals of protecting data with RAID technology
How you will benefit
- Learn the skills you need to promote yourself as a PC hardware technician capable of solving various computer issues
- Gain the confidence you need to successfully perform integral computer support in the workplace
- Become an indispensable part of any organization that uses computers daily
- Complete the first of three courses needed to prepare for your CompTIA A+ certification
Self-Study
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.
The CompTIA A+ Certification Prep 1: Hardware course teaches you about the hardware common to nearly every personal computer, including microprocessors, RAM, power supplies, motherboards, UEFI/BIOS, the system setup utility, the expansion bus, and input/output devices.
According to CompTIA, getting your A+ certification can lead to a rewarding IT career—with average salaries ranging from $45,000-$60,000, depending on the role you pursue.
Note: To properly prepare for your 220-1101/1102 CompTIA A+ certification exams, in addition to this course, you will need to complete the following course series: CompTIA A+ Certification Prep 2: Software and CompTIA A+ Certification Prep 3: Network Security.
|
|
|
CompTIA A+ Certification Prep 2: Software Offered in partnership with ed2go
-
Fee: $129.00
Hours: 24
The CompTIA A+ Certification Prep 2: Software course teaches you about working with many different operating systems, virtual machines, and various software. In part two of our three-step series, you will learn how to operate and maintain these items on our systems.
According to CompTIA, getting your A+ certification can lead to a rewarding IT career—with average salaries ranging from $45,000-$60,000, depending on the role you pursue.
Note: Students should previously have completed the CompTIA A+ Certification Prep 1: Hardware course. Upon completion of CompTIA A+ Certification Prep 2: Software, you should prepare to enroll in our final prep course, CompTIA A+ Certification Prep 3: Network Security, to successfully prepare for both the 220-1101/1102 exams and your career as a certified technician.
|
|
|
CompTIA A+ Certification Prep 2: Software (Self-Guided)
- CompTIA A+ Certification Prep 2: Software (Self-Guided)
-
Fee: $129.00
Dates: 4/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Location:
Building:
Room:
Instructor:
Take the next step toward becoming a CompTIA A+ certified tech by mastering virtualization, multifunction devices, and three versions of Windows, plus macOS and Linux operating systems as you prepare for your A+ certification exam. This is the second of three courses in our A+ certification prep series. The CompTIA A+ Certification Prep 2: Software course picks up where the CompTIA A+ Certification Prep 1: Hardware course left off and dives into Windows, macOS, and Linux.
Throughout the CompTIA A+ prep training, you will learn about operating systems from installation to operations, maintenance to troubleshooting. Our computer software training course teaches you about virtualization and virtual machines, plus it goes in-depth on printer and multifunction device technologies.
This CompTIA A+ prep course takes you through the second of three prep courses you need to become both a highly competent computer tech and a CompTIA A+ certified technician, using the 1101 and 1102 competencies. Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
- Access to a Mac running macOS (in addition to the PC) is recommended.
- You should have access to a hard drive that you can install, format, and partition, and to a couple of Plug and Play devices that you can practice installing. Because of the dangers of electro-static discharge (to the machine), you are not required to tear apart your own primary computer.
Software Requirements:
- PC: Windows 8 or later.
- Mac: macOS 10.6 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge is also compatible.
- Adobe Acrobat Reader.
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment and will be available online. The CompTIA A+ Certification Prep 2: Software course teaches you about working with many different operating systems, virtual machines, and various software. In part two of our three-step series, you will learn how to operate and maintain these items on our systems.
According to CompTIA, getting your A+ certification can lead to a rewarding IT career—with average salaries ranging from $45,000-$60,000, depending on the role you pursue.
Note: Students should previously have completed the CompTIA A+ Certification Prep 1: Hardware course. Upon completion of CompTIA A+ Certification Prep 2: Software, you should prepare to enroll in our final prep course, CompTIA A+ Certification Prep 3: Network Security, to successfully prepare for both the 220-1101/1102 exams and your career as a certified technician.
- Understanding Operating Systems
- Installing Windows
- Starting Windows and Managing User Accounts
- Customizing and Configuring Windows
- Using Windows Utilities
- Exploring macOS and Linux
- Working at a Command Prompt
- Troubleshooting Windows Startup and System Issues
- Troubleshooting Windows Performance and Application Issues
- Virtual Machines and Remote Access
- Printers and Multifunction Devices
- Installing and Troubleshooting Printers and Multifunction Devices
What you will learn
- Learn how to install, organize, maintain, and troubleshoot three different versions of Windows (explore similar features in MacOS and Linux)
- Examine and compare the features and structures of Windows Vista, 7, and 8/8.1
- Get a deeper understanding of how we use virtualization and virtual machines in modern networks
- Learn about printers and multifunction devices, from the various technologies in use to installing and troubleshooting
How you will benefit
- Master many of the techniques covered on the certification exam and feel confident on test day
- Become an integral part of any organization as you learn to install and troubleshoot new hardware, software, and MFDs
- Open the door to new opportunities as a technician once certification is achieved
Self-Study
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.
The CompTIA A+ Certification Prep 2: Software course teaches you about working with many different operating systems, virtual machines, and various software. In part two of our three-step series, you will learn how to operate and maintain these items on our systems.
According to CompTIA, getting your A+ certification can lead to a rewarding IT career—with average salaries ranging from $45,000-$60,000, depending on the role you pursue.
Note: Students should previously have completed the CompTIA A+ Certification Prep 1: Hardware course. Upon completion of CompTIA A+ Certification Prep 2: Software, you should prepare to enroll in our final prep course, CompTIA A+ Certification Prep 3: Network Security, to successfully prepare for both the 220-1101/1102 exams and your career as a certified technician.
|
|
|
CompTIA A+ Certification Prep 3: Network/Security Offered in partnership with ed2go
-
Fee: $129.00
Hours: 24
The CompTIA A+ Certification Prep 3: Networking/Security course focuses on keeping our networks and systems secure from outside threats and how to troubleshoot issues as they appear.
If you want to jumpstart your career with your first tech support job, this third and final course in our CompTIA prep series is a necessary component to prepare you for the A+ certification exam successfully.
According to CompTIA, getting your A+ certification can lead to a rewarding IT career—with average salaries ranging from $45,000-$60,000, depending on the role you pursue.
Note: Students need to complete CompTIA A+ Certification Prep 1: Hardware and CompTIA A+ Certification Prep 2: Software before attempting CompTIA A+ Certification Prep 3: Networking/Security to properly prepare to sit for the A+ certification exam.
|
|
|
CompTIA A+ Certification Prep 3: Network/Security (Self-Guided)
- CompTIA A+ Certification Prep 3: Network/Security (Self-Guided)
-
Fee: $129.00
Dates: 4/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Location:
Building:
Room:
Instructor:
Finish your CompTIA A+ certification prep by learning how to select, install, and service video, sound, and portable computers. In this final course needed in the three-part A+ certification series, you will learn how to network, secure, and troubleshoot. The CompTIA A+ Certification Prep 3: Networking/Security course focuses on fun and practical technology. You will learn how to select, install, and service sound and display components, and how to set up, maintain, and troubleshoot wired and wireless networks.
During this network/security training, you will also learn about many aspects of PC and network security and discover how to configure and troubleshoot tablets and smartphones.
Note: This CompTIA A+ Prep 3 course completes the three-course CompTIA A+ certification exam prep series that is needed to prepare you for both the 220-1101/1102 exams and your career as a certified technician. Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
- A Windows PC that you can experiment on. You will probably want to remove/install various devices, such as video, sound, and modems. Because of the dangers of electro-static discharge (to the machine, not the student), however, we do not require you to tear apart your own primary computer. This is a class that trains you to be a technician - having a machine to play with greatly helps your learning.
Software Requirements:
- PC: Windows 8 or later.
- Mac: macOS 10.6 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
- Adobe Acrobat Reader.
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment and will be available online. The CompTIA A+ Certification Prep 3: Networking/Security course focuses on keeping our networks and systems secure from outside threats and how to troubleshoot issues as they appear.
If you want to jumpstart your career with your first tech support job, this third and final course in our CompTIA prep series is a necessary component to prepare you for the A+ certification exam successfully.
According to CompTIA, getting your A+ certification can lead to a rewarding IT career—with average salaries ranging from $45,000-$60,000, depending on the role you pursue.
Note: Students need to complete CompTIA A+ Certification Prep 1: Hardware and CompTIA A+ Certification Prep 2: Software before attempting CompTIA A+ Certification Prep 3: Networking/Security to properly prepare to sit for the A+ certification exam.
- Video Technologies
- Multimedia
- Essentials of Networking
- Local Area Networking
- Wireless Networking
- Internet Connections and Cloud Computing
- Internet Protocols and Troubleshooting
- Facility and Workstation Security
- Authentication and Data Security
- Network Security
- Understanding Mobile Devices
- Care and Feeding of Mobile Devices
What you will learn
- Learn how to install and troubleshoot video technologies properly
- Understand how to upgrade, manage, maintain, and repair portable computing devices
- Learn the essentials of networking, including local area networking and wireless networking
- Discover the best ways to keep your network secure
- Understand how to work with mobile devices
How you will benefit
- Prepare for both the 1001/1002 CompTIA A+ Certification Exams
- Complete the third and final course needed to prepare for your CompTIA A+ certification
- Open the door to new opportunities as a technician once certification is achieved
Self-Study
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.
The CompTIA A+ Certification Prep 3: Networking/Security course focuses on keeping our networks and systems secure from outside threats and how to troubleshoot issues as they appear.
If you want to jumpstart your career with your first tech support job, this third and final course in our CompTIA prep series is a necessary component to prepare you for the A+ certification exam successfully.
According to CompTIA, getting your A+ certification can lead to a rewarding IT career—with average salaries ranging from $45,000-$60,000, depending on the role you pursue.
Note: Students need to complete CompTIA A+ Certification Prep 1: Hardware and CompTIA A+ Certification Prep 2: Software before attempting CompTIA A+ Certification Prep 3: Networking/Security to properly prepare to sit for the A+ certification exam.
|
|
|
CompTIA A+ Certification Prep Series Offered in partnership with ed2go
-
Fee: $349.00
Hours: 72
Master the inner workings of computers and become a certified tech with our online course bundle. Prepare for the CompTIA A+ Certification by gaining hands-on experience in hardware configuration, troubleshooting, and mastering various operating systems.
|
|
|
CompTIA A+ Certification Training (Vouchers Included)
- CompTIA A+ Certification Training (Vouchers Included)
-
Fee: $2,095.00
Dates: 4/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Location:
Building:
Room:
Instructor:
This course is designed to help you prepare to earn your CompTIA A+ credential by passing both required certification exams (220-1101 & 220-1102). Essential exam topics covered include various computer hardware and software aspects, including mobile devices, networking technology, virtualization, cloud computing, security, and operational procedures. Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
- Labs included in this program are not supported on mobile devices (i.e., phones and tablets).
Software Requirements:
- PC: Windows 10 or later.
- Note: Access to Windows 11 is needed for the optional textbook module "Installing Windows".
- Note: A Windows environment is required to complete some course assignments.
- Mac: macOS 10.6 or later.
- Chromebook 113 or later
- Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
- Microsoft Word. To complete your assignments, you may need Microsoft Word 2003 or higher, or an equivalent word-processing program, such as LibreOffice, which is available to download for free.
- Adobe Acrobat Reader. (Software must be installed and fully operational before the course begins.)
Other:
- Email capabilities and access to a personal email account.
- A reliable high-speed Internet connection.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment and will be available online. The textbook for the A+ course is accessed via links in the course lessons.
- CompTIA A+ Guide to IT Technical Support
Prepare to pass the CompTIA A+ certification exams (220-1101 & 220-1102) to boost your resume and demonstrate your IT competence with a globally recognized credential! Obtaining your CompTIA A+ certification will open doors to entry-level IT jobs such as technical support specialists, help desk technicians, or field service technicians.
Our comprehensive CompTIA A+ course offers a thorough overview of the basic concepts around multiple operating systems, enabling you to efficiently maintain and troubleshoot various operating systems. The CompTIA A+ certification is vendor-neutral and adaptable to different technology platforms, providing a solid foundation to pursue specialized certifications.
You will become equipped with the skills to effectively diagnose and troubleshoot common software, hardware, and connectivity issues. With this employer-desired expertise, you will be an indispensable asset in any organization as you ensure smooth system operations and handle any technical challenges that arise.
This CompTIA A+ certification training also covers network fundamentals, providing you with a solid foundation in networking concepts, protocols, and troubleshooting techniques. This knowledge will enable you to effectively manage network infrastructure, enhance connectivity, and contribute to efficient communication within organizations.
Furthermore, you will gain practical experience in assembling and disassembling multiple computer parts, honing your skills in computer hardware. The in-depth CompTIA A+ training enables you to become proficient in building and maintaining computer systems, giving you a competitive edge in the job market.
Upon successful completion of the lessons and exercises in this bundled CompTIA A+ certification program, you will be well-prepared to take CompTIA's A+ certification exams. You will receive an exam voucher for each certification exam, which covers the cost to sit for the certifying exams upon eligibility.
- CompTIA A+ Certification Training
- Taking a Computer Apart and Putting It Back Together
- All About Cases and Motherboards
- Supporting Processors and Upgrading Memory
- Power Supplies and Troubleshooting Computer Problems
- Supporting Hard Drives and Other Storage Devices
- Supporting Input/Output Devices
- Networking Fundamentals
- Network Infrastructure and Cloud Computing
- Supporting Mobile Devices
- Supporting Printers
- The Complex World of IT Professionals
- Installing Windows
- Maintaining Windows
- Troubleshooting Windows After Startup
- Troubleshooting Windows Startup
- Security Strategies
- Securing and Sharing Windows Resources
- Mobile Device Security
- Network Security and Troubleshooting
- Supporting macOS
- Linux and Scripting
- Preparing for a Certification Exam
What you will learn
- Explore a comprehensive video overview of the CompTIA A+ course
- Master fundamental concepts of multiple operating systems to maintain and support them effectively
- Develop troubleshooting skills for software, hardware, and connectivity issues
- Acquire knowledge of network fundamentals, protocols, and troubleshooting techniques
- Gain in-depth experience in assembling and disassembling computer parts to expand your IT expertise
How you will benefit
- Enhance and ensure your preparation for the CompTIA A+ certification exams (220-1101 and 220-1102)
- Engage with a variety of interactive learning materials, assignments, and assessments that will deepen your understanding and help with exam preparation
- Boost your employability by jump-starting your IT career with a highly respected and recognized certification that demonstrates your proficiency in essential IT skills
Linda Matthews
Linda Matthews has years of experience both in the classroom teaching technical material and in the field solving a myriad of technical issues.
Linda possesses the background to engage deeply with cybersecurity through teaching and intellectual focus. For the past eight years, she has lived with this vast and fascinating body of knowledge. Now, she regularly trains individuals in several of the most popular security courses from CompTIA and Microsoft. CompTIA's Security+ is the foundational course students need to begin an incredible journey into cybersecurity.
Linda has a strong love for teaching and igniting the spark that can set students on a most worthwhile and fulfilling path.
Sara Perrott
Sara Perrott has been working in the information technology field for 20+ years and has devoted the last 10 of those to focusing on cybersecurity. She is a published author and a former college professor, and she is passionate about teaching the next generation of cybersecurity professionals. Sara has a Master of Science in Cybersecurity and Information Assurance from Western Governors University Washington and a Bachelor of Science in Information Systems Security from the University of Phoenix.
Paula Woodall
Paula Woodall began her technical career as a network and computer consultant 30 years ago. She first taught at a local university before taking the CompTIA and Microsoft exams to teach certified courses. Paula has been fortunate to teach these classes worldwide for companies such as HP and Microsoft. Paula enjoys teaching classes regarding computers and networking and talking to students about how their companies put these technologies to work for them.
Justin Burandt
Justin Burandt has built a strong career in information technology (IT) education, holding various leadership and support roles across several universities. As an assistant director at Miami Dade College's Cybersecurity Center of the Americas, he played a key role in developing the IT training infrastructure and expanding certification programs. Additionally, Justin has mentored over 120 students in Western Governors University's IT bachelor's programs. His teaching experience spans both online and in-person, including CompTIA Tech+, A+, and Network+ courses across high school, college, and adult education settings. He has also led IT seminars for various organizations, including governments, financial institutions, and businesses.
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.
Prepare to pass the CompTIA A+ certification exams (220-1101 & 220-1102) to boost your resume and demonstrate your IT competence with a globally recognized credential! Obtaining your CompTIA A+ certification will open doors to entry-level IT jobs such as technical support specialists, help desk technicians, or field service technicians.
Our comprehensive CompTIA A+ course offers a thorough overview of the basic concepts around multiple operating systems, enabling you to efficiently maintain and troubleshoot various operating systems. The CompTIA A+ certification is vendor-neutral and adaptable to different technology platforms, providing a solid foundation to pursue specialized certifications.
You will become equipped with the skills to effectively diagnose and troubleshoot common software, hardware, and connectivity issues. With this employer-desired expertise, you will be an indispensable asset in any organization as you ensure smooth system operations and handle any technical challenges that arise.
This CompTIA A+ certification training also covers network fundamentals, providing you with a solid foundation in networking concepts, protocols, and troubleshooting techniques. This knowledge will enable you to effectively manage network infrastructure, enhance connectivity, and contribute to efficient communication within organizations.
Furthermore, you will gain practical experience in assembling and disassembling multiple computer parts, honing your skills in computer hardware. The in-depth CompTIA A+ training enables you to become proficient in building and maintaining computer systems, giving you a competitive edge in the job market.
Upon successful completion of the lessons and exercises in this bundled CompTIA A+ certification program, you will be well-prepared to take CompTIA's A+ certification exams. You will receive an exam voucher for each certification exam, which covers the cost to sit for the certifying exams upon eligibility.
|
|
|
CompTIA A+ Training Boot Camp
- CompTIA A+ Training Boot Camp
-
Fee: $2,495.00
Dates: 4/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Location:
Building:
Room:
Instructor:
This entry-level boot camp provides the most comprehensive approach to earning your CompTIA A+ certification. A+ certification leads to IT career advancement, personal improvement, skills enhancement, and higher salaries. Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
- Speakers and a microphone
- Webcam
Software Requirements:
- PC: Windows 7 or later.
- Mac: macOS 10.7 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
- Microsoft Word Online
- Adobe Acrobat Reader
- Zoom Meetings
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The student materials required for this course are included in enrollment and will be available online. The CompTIA A+ Boot Camp is an accelerated, in-depth training designed to teach you the skills required to become a successful computer technician. This CompTIA A+ training focuses on teaching you basic software and hardware knowledge, like installation and configuration, to help you achieve one of the industry's most influential certifications. You will learn a wide range of entry-level computer technician skills and leave fully prepared to pass your A+ certification exam.
Throughout the CompTIA A+ course, you will gain the confidence needed to break into the field or take the next step in your information technology career. The A+ certification is a key benchmark for employers looking for the best and brightest technicians available, and by enrolling in this CompTIA A+ online course, you can prepare for career success.
With your enrollment, you will also receive exam vouchers for the CompTIA A+ certification exams, 220-1101 and 220-1102.
Our certification success program, paired with our provided prep materials, boot camp sessions, and post-work, is designed to ease any concerns or doubts you may have when attempting your initial exam. You are also eligible for a free second exam attempt should you meet the required qualifications. *
*To qualify for a second certification exam voucher, students must:
- Attend at least 85% of each day of class
- Score a 90% or higher on their final practice exam
- Take the exam within 90 days of class completion
- Upload your exam failure notice from your first exam attempt
- Day 1
- Introduction to 220-1101 and 220-1102 Exams
- Mobile Devices
- Laptop hardware & components
- Display components of mobile device
- Accessories and ports of mobile devices
- Basic mobile-device network connectivity and application support
- Networking
- Transmission Control Protocol (TCP) and User
- Datagram Protocol (UDP) ports and protocols
- Common networking hardware
- Protocols for wireless networking
- Services provided by networked hosts
- Basic wired/wireless small office/home office (SOHO) networks
- Common network configuration concepts
- Internet connection types, network types, and their features
- Networking tools
- Day 2
- Hardware
- Cable types and their connectors, features, and purposes.
- RAM
- Storage devices
- Motherboards, central processing units (CPUs), and add-on cards
- Power supply
- Multifunction devices/printers and settings
- Printer consumables
- Virtualization and Cloud Computing Cloud-computing concepts. (1101.4)
- Client-side virtualization.
- Day 3
- Hardware and Network Troubleshooting
- Best practice methodology to resolve problems
- Problems related to motherboards, RAM, CPU, and power
- Problems with storage drives and RAID arrays
- Video, projector, and display issues
- Common issues with mobile devices
- Printer issues
- Problems with wired and wireless networks.
- Operating Systems
- Basic features of Microsoft Windows editions
- Microsoft command-line tools
- Features and tools of the Microsoft
- Windows 10 operating system (OS)
- Microsoft Windows 10 Control Panel utility
- Windows settings
- Microsoft Windows networking features on a client/desktop
- Application installation and configuration
- Common OS types and their purposes
- OS installations/upgrades in diverse OS environments
- Features & tools of the macOS/desktop OS
- Features & tools of the Linux client/desktop OS.
- Day 4
- Security
- Security measures and their purposes
- Wireless security protocols & authentication
- Detecting, removing, and preventing malware
- Social-engineering attacks, threats, and vulnerabilities
- Basic security settings in the Microsoft Windows OS
- Workstation best practices for security
- Securing mobile and embedded devices
- Common data destruction and disposal methods
- Security settings on small office/home office (SOHO) wireless and wired networks.
- Browsers and relevant security settings
- Software Troubleshooting
- Common Windows OS problems
- Common personal computer (PC) security issues
- Best practice procedures for malware removal
- Common mobile OS and application issues
- Common mobile OS and application security issues
- Day 5
- Operational Procedures
- Best practices associated with documentation and support systems information management
- Basic change-management best practices workstation backup and recovery methods
- Common safety procedures
- Environmental impacts and local environmental controls
- Prohibited content/activity and privacy, licensing, and policy concepts
- Proper communication techniques
- Basics of scripting
- Exam Prep
- Review 220-1101 Exam
- Review 220-1102 Exam
What you will learn
- Installing and configuring hardware and Windows OS
- Troubleshooting device and network issues
- Overview of networking, mobile devices, security, and more
How you will benefit
- Assemble components based on customer requirements
- Install, configure and maintain devices, PCs, and software for end users
- Understand the basics of networking and security/ forensics
- Properly and safely diagnose, resolve and document common hardware and software issues
- Apply troubleshooting skills
- Provide appropriate customer support
- Understand the basics of virtualization, desktop imaging, and deployment
Boot camps are led by instructors that have years of industry experience and are recognized as subject matter experts.
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.
The CompTIA A+ Boot Camp is an accelerated, in-depth training designed to teach you the skills required to become a successful computer technician. This CompTIA A+ training focuses on teaching you basic software and hardware knowledge, like installation and configuration, to help you achieve one of the industry's most influential certifications. You will learn a wide range of entry-level computer technician skills and leave fully prepared to pass your A+ certification exam.
Throughout the CompTIA A+ course, you will gain the confidence needed to break into the field or take the next step in your information technology career. The A+ certification is a key benchmark for employers looking for the best and brightest technicians available, and by enrolling in this CompTIA A+ online course, you can prepare for career success.
With your enrollment, you will also receive exam vouchers for the CompTIA A+ certification exams, 220-1101 and 220-1102.
Our certification success program, paired with our provided prep materials, boot camp sessions, and post-work, is designed to ease any concerns or doubts you may have when attempting your initial exam. You are also eligible for a free second exam attempt should you meet the required qualifications. *
*To qualify for a second certification exam voucher, students must:
- Attend at least 85% of each day of class
- Score a 90% or higher on their final practice exam
- Take the exam within 90 days of class completion
- Upload your exam failure notice from your first exam attempt
|
|
|
CompTIA Certification Training: A+, Network+, Security+ (Vouchers Included)
- CompTIA Certification Training: A+, Network+, Security+ (Vouchers Included)
-
Fee: $3,995.00
Dates: 4/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Location:
Building:
Room:
Instructor:
Begin your journey as an IT professional by preparing for the CompTIA A+ certification exams (220-1101 & 220-1102), the Network+ certification exam (N10-009), and the Security+ certification exam (SY0-701). This bundle will give you all the tools you need to succeed in the ever-growing field of IT and stand out to future employers. Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
- Note: A Windows environment is required to complete some course assignments (A+ and N+).
- Labs included in this program are not supported on mobile devices (i.e., phones and tablets).
- A motherboard capable of client-side virtualization:
- A 64-bit CPU
- UEFI firmware
- Hardware virtualization support in UEFI
Software Requirements:
- PC: Windows 10 or later. Access to Windows 11 is needed for the textbook module "Installing Windows" (A+)
- Mac: macOS 10.6 or later.
- Chromebook 113 or later
- Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
- Microsoft Word. To complete your assignments, you may need Microsoft Word 2003 or higher or an equivalent word-processing program, such as LibreOffice, which is available to download for free.
- Adobe Acrobat Reader. (Software must be installed and fully operational before the course begins.)
Tools:
- Access to copper Ethernet cable-making tools and equipment:
- RJ-45 connectors
- A crimping tool
- Cat5, Cat5e, or Cat6 cable to practice on
Other:
- A reliable high-speed Internet connection
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment. The digital textbooks for the A+, Network+, and Security+ courses are accessed via links in the course lessons.
- CompTIA A+ Guide to IT Technical Support (eBook)
- CompTIA Network+ Guide to Networks, by Jill West (eBook)
- CompTIA Security+ Guide to Network Security Fundamentals, by Mark Ciampa (eBook)
- CompTIA A+
- Taking a Computer Apart and Putting It Back Together
- All About Cases and Motherboards
- Supporting Processors and Upgrading Memory
- Power Supplies and Troubleshooting Computer Problems
- Supporting Hard Drives and Other Storage Devices
- Supporting Input/Output Devices
- Networking Fundamentals
- Network Infrastructure and Cloud Computing
- Supporting Mobile Devices
- Supporting Printers
- The Complex World of IT Professionals
- Installing Windows
- Maintaining Windows
- Troubleshooting Windows After Startup
- Troubleshooting Windows Startup
- Security Strategies
- Securing and Sharing Windows Resources
- Mobile Device Security
- Network Security and Troubleshooting
- Supporting macOS
- Linux and Scripting
- Preparing for a Certification Exam
- CompTIA Network+
- Introduction to CompTIA
- Introduction to Networking
- Infrastructure and Documentation
- Addressing
- Protocols
- Cabling
- Wireless Networking
- Network Architecture
- Segmentation
- Wide Area Networking
- Risk Management
- Security in Network Design
- Performance and Recovery
- Final Exam
- CompTIA Security+
- Introduction to CompTIA
- Security Fundamentals
- Threat Management and Cybersecurity Resources
- Threats and Attacks on Endpoints
- Endpoint and Application Development Security
- Cryptography
- Public Key Infrastructure and Cryptographic Protocols
- Mobile, Embedded, and Specialized Device Security
- Networking Threats, Assessments, and Defenses
- Network Security Appliances and Technologies
- Cloud and Virtualization Security
- Network Threats, Assessments, and Defenses
- Authentication
- Incident Preparation, Response, and Investigation
- Cybersecurity Resilience
- Risk Management and Data Privacy
- Preparing for the Certificate Exam
- Exploring a Career in Cybersecurity
What you will learn
- Master fundamental concepts of multiple operating systems to maintain and support them effectively
- Develop troubleshooting skills for software, hardware, connectivity, and network problems
- Gain in-depth knowledge about assembling and disassembling computer parts
- Learn how to compare network types, topologies, and architectures
- Acquire knowledge and skills in networking hardware, tools, and their installation for effective network setup
- Understand TCP/IP functionality, protocols, and IP addressing concepts, including subnetting and VLANs
- Explore cloud computing, virtualization, and remote access systems and methods
- Discover network performance monitoring tools and practices
- Develop expertise in network safety, security threats, vulnerability assessments, and mitigation strategies
- Attain a solid understanding of computer security concepts, network policies, and documentation
- Learn incident preparation, response, and risk management for network security
How you will benefit
- Become prepared for the most updated objectives in the CompTIA A+, Network+, and Security+ certification exams
- Optional in-depth learning activities with simulations and live virtual machine labs
- Practice for your exams with access to multiple-choice questions to thoroughly prepare
- Engage with interactive learning materials, assignments, and assessments to sharpen your knowledge and skills
- Boost your employability and jump-start your IT career with highly respected certifications that demonstrate your proficiency in essential IT skills
Linda Matthews
Linda Matthews has years of experience both in the classroom teaching technical material and in the field solving a myriad of technical issues.
Linda possesses the background to engage deeply with cybersecurity through teaching and intellectual focus. For the past eight years, she has lived with this vast and fascinating body of knowledge. Now, she regularly trains individuals in several of the most popular security courses from CompTIA and Microsoft. CompTIA's Security+ is the foundational course students need to begin an incredible journey into cybersecurity.
Linda has a strong love for teaching and igniting the spark that can set students on a most worthwhile and fulfilling path.
Sara Perrott
Sara Perrott has been working in the information technology field for 20+ years and has devoted the last 10 of those to focusing on cybersecurity. She is a published author and a former college professor, and she is passionate about teaching the next generation of cybersecurity professionals. Sara has a Master of Science in Cybersecurity and Information Assurance from Western Governors University Washington and a Bachelor of Science in Information Systems Security from the University of Phoenix.
Paula Woodall
Paula Woodall began her technical career as a network and computer consultant 30 years ago. She first taught at a local university before taking the CompTIA and Microsoft exams to teach certified courses. Paula has been fortunate to teach these classes worldwide for companies such as HP and Microsoft. Paula enjoys teaching classes regarding computers and networking and talking to students about how their companies put these technologies to work for them.
Brett Glines
Brett Glines holds a Bachelor of Science in Finance from BYU and an MBA from Emory University. Since 1995, he has excelled as a consultant and educator in the field of technical education, primarily specializing in IT applications, leadership development, and certification. He has helped thousands transition into IT careers and holds certifications in CompTIA A+, Network+, and Security+.
Brett is a master at leveraging online environments for learning and has been training online exclusively since 2015. He focuses on engaging students, ensuring they understand and remember what they learn. He uses practical examples, everyday analogies, and recall techniques to make learning easier and more effective.
Justin Burandt
Justin Burandt has built a strong career in information technology (IT) education, holding various leadership and support roles across several universities. As an assistant director at Miami Dade College’s Cybersecurity Center of the Americas, he played a key role in developing the IT training infrastructure and expanding certification programs. Additionally, Justin has mentored over 120 students in Western Governors University’s IT bachelor’s programs. His teaching experience spans both online and in-person, including CompTIA Tech+, A+, and Network+ courses across high school, college, and adult education settings. He has also led IT seminars for various organizations, including governments, financial institutions, and businesses.
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.
Begin your journey as an IT professional by preparing for the CompTIA A+ certification exams (220-1101 & 220-1102), the Network+ certification exam (N10-009), and the Security+ certification exam (SY0-701). This bundle will give you all the tools you need to succeed in the ever-growing field of IT and stand out to future employers.
|
|
|
CompTIA Certification Training: Network+, Security+ (Vouchers Included)
- CompTIA Certification Training: Network+, Security+ (Vouchers Included)
-
Fee: $3,295.00
Dates: 4/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Location:
Building:
Room:
Instructor:
This course will prepare you for a career as a network technician and qualify you to take the CompTIA Network+ certification exam (N10-009). This course will also teach you everything you need to take and successfully pass the CompTIA Security+ certification exam (SY0-701). Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
- Labs included in this program are not supported on mobile devices (i.e., phones and tablets).
- Please note that a Windows environment is required to complete some course assignments (N+).
- A motherboard capable of client-side virtualization:
- A 64-bit CPU
- UEFI firmware
- Hardware virtualization support in UEFI
Software Requirements:
- PC: Windows 10 or later. Access to Windows 11 is needed for the textbook module "Installing Windows" (A+).
- Mac: macOS 10.6 or later.
- Chromebook 113 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
- Microsoft Word. To complete your assignments, you may need Microsoft Word 2003 or higher or an equivalent word-processing program, such as LibreOffice, which is available to download for free.
- Adobe Acrobat Reader. (Software must be installed and fully operational before the course begins.)
Tools:
- Access to copper Ethernet cable-making tools and equipment:
- RJ-45 connectors
- A crimping tool
- Cat5, Cat5e, or Cat6 cable to practice on
Other:
- A reliable high-speed Internet connection
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment. The digital textbooks for the Network+ and Security+ courses are accessed via links in the course lessons.
- CompTIA Network+ Guide to Networks, by Jill West (eBook)
- CompTIA Security+ Guide to Network Security Fundamentals, by Mark Ciampa (eBook)
- CompTIA Network+
- Introduction to CompTIA
- Introduction to Networking
- Infrastructure and Documentation
- Addressing
- Protocols
- Cabling
- Wireless Networking
- Network Architecture
- Segmentation
- Wide Area Networking
- Risk Management
- Security in Network Design
- Performance and Recovery
- Final Exam
- CompTIA Security+
- Introduction to CompTIA
- Security Fundamentals
- Threat Management and Cybersecurity Resources
- Threats and Attacks on Endpoints
- Endpoint and Application Development Security
- Cryptography
- Public Key Infrastructure and Cryptographic Protocols
- Mobile, Embedded, and Specialized Device Security
- Networking Threats, Assessments, and Defenses
- Network Security Appliances and Technologies
- Cloud and Virtualization Security
- Network Threats, Assessments, and Defenses
- Authentication
- Incident Preparation, Response, and Investigation
- Cybersecurity Resilience
- Risk Management and Data Privacy
- Preparing for the Certificate Exam
- Exploring a Career in Cybersecurity
What you will learn
- Compare common network types, topologies, and architectures
- The characteristics and uses of networking hardware and tools
- How to install and configure wired and wireless networks
- TCP/IP functionality and protocols
- IP addressing concepts, including subnetting and VLANs
- Cloud computing, virtualization, and remote access systems and methods
- Tools and practices for monitoring network performance and health
- Network safety and security threats and how to mitigate them
- How to troubleshoot and recover from network problems
- The purposes of network policies and documentation
- Fundamental concepts of computer security
- Cybersecurity threats, vulnerabilities, and assessments
- Incident preparations, response, and risk management
How you will benefit
- Course content aligned to the most updated objectives in the CompTIA Network+ and Security+ certification exams
- Optional hands-on learning activities with simulations and live virtual machine labs
- Practice on multiple-choice questions to prepare you for your exam
- Utilize a variety of interactives, assignments, and assessments
Linda Matthews
Linda Matthews has years of experience both in the classroom teaching technical material and in the field solving a myriad of technical issues.
Linda possesses the background to engage deeply with cybersecurity through teaching and intellectual focus. For the past eight years, she has lived with this vast and fascinating body of knowledge. Now, she regularly trains individuals in several of the most popular security courses from CompTIA and Microsoft. CompTIA's Security+ is the foundational course students need to begin an incredible journey into cybersecurity.
Linda has a strong love for teaching and igniting the spark that can set students on a most worthwhile and fulfilling path.
Sara Perrott
Sara Perrott has been working in the information technology field for 20+ years and has devoted the last 10 of those to focusing on cybersecurity. She is a published author and a former college professor, and she is passionate about teaching the next generation of cybersecurity professionals. Sara has a Master of Science in Cybersecurity and Information Assurance from Western Governors University Washington and a Bachelor of Science in Information Systems Security from the University of Phoenix.
Brett Glines
Brett Glines holds a Bachelor of Science in Finance from BYU and an MBA from Emory University. Since 1995, he has excelled as a consultant and educator in the field of technical education, primarily specializing in IT applications, leadership development, and certification. He has helped thousands transition into IT careers and holds certifications in CompTIA A+, Network+, and Security+.
Brett is a master at leveraging online environments for learning and has been training online exclusively since 2015. He focuses on engaging students, ensuring they understand and remember what they learn. He uses practical examples, everyday analogies, and recall techniques to make learning easier and more effective.
Justin Burandt
Justin Burandt has built a strong career in information technology (IT) education, holding various leadership and support roles across several universities. As an assistant director at Miami Dade College’s Cybersecurity Center of the Americas, he played a key role in developing the IT training infrastructure and expanding certification programs. Additionally, Justin has mentored over 120 students in Western Governors University’s IT bachelor’s programs. His teaching experience spans both online and in-person, including CompTIA Tech+, A+, and Network+ courses across high school, college, and adult education settings. He has also led IT seminars for various organizations, including governments, financial institutions, and businesses.
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.
This course will prepare you for a career as a network technician and qualify you to take the CompTIA Network+ certification exam (N10-009). This course will also teach you everything you need to take and successfully pass the CompTIA Security+ certification exam (SY0-701).
|
|
|
CompTIA Certification Training: TECH+ and A+ (Vouchers Included)
- CompTIA Certification Training: TECH+ and A+ (Vouchers Included)
-
Fee: $2,495.00
Dates: 4/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Location:
Building:
Room:
Instructor:
Unlock a world of opportunities with the CompTIA TECH+ certification training to gain a solid foundation in essential IT concepts, preparing you for a dynamic career in the rapidly evolving tech industry. Plus, get ready to earn your CompTIA A+ credential by mastering computer hardware, software, networking, security, and more. Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
- Labs included in this program are not supported on mobile devices (i.e., phones and tablets).
- Note: A Windows environment is required to complete some course assignments.
Software Requirements:
- PC: Windows 10 or later. Access to Windows 11 is needed for the textbook module "Installing Windows"
- Mac: macOS 10.6 or later.
- Chromebook 113 or later
- Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
- Microsoft Word. To complete your assignments, you may need Microsoft Word 2003 or higher, or an equivalent word-processing program, such as LibreOffice, which is available to download for free.
- Adobe Acrobat Reader. (Software must be installed and fully operational before the course begins.)
Other:
- A reliable high-speed Internet connection
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment. The textbook will be shipped to you approximately 7-10 business days after enrollment in the ITF+ course.
- CompTIA® TECH+ Cert Mike: Prepare. Practice. Pass the Test! Get Certified! Exam FC0-U71, by Mike Chapple
The instructional materials required for this course are included in enrollment and will be available online. The textbook for the A+ course is accessed via links in the course lessons.
- CompTIA A+ Guide to IT Technical Support, 11th Edition (eBook)
- CompTIA TECH+ Certification Training
- Introduction to CompTIA Certification
- IT Concepts and Terminology
- Understanding Computer Hardware
- Data Storage
- Operating Systems
- Networking Basics
- Managing Applications
- Troubleshooting Basics
- Database Fundamentals
- Security Basics
- Authentication, Authorization, and Accounting
- Protecting Data and Ensuring Business Continuity
- Software Development Fundamentals
- Preparing for a Certification Exam
- CompTIA A+
- Taking a Computer Apart and Putting It Back Together
- All About Cases and Motherboards
- Supporting Processors and Upgrading Memory
- Power Supplies and Troubleshooting Computer Problems
- Supporting Hard Drives and Other Storage Devices
- Supporting Input/Output Devices
- Networking Fundamentals
- Network Infrastructure and Cloud Computing
- Supporting Mobile Devices
- Supporting Printers
- The Complex World of IT Professionals
- Installing Windows
- Maintaining Windows
- Troubleshooting Windows After Startup
- Troubleshooting Windows Startup
- Security Strategies
- Securing and Sharing Windows Resources
- Mobile Device Security
- Network Security and Troubleshooting
- Supporting macOS
- Linux and Scripting
- Preparing for a Certification Exam
What you will learn
- Understand how to define IT-related terminology and concepts
- Learn and explain about the tools and constructs that enable programmers to create software
- Describe how databases store and report structured data
- Master fundamental concepts of multiple operating systems to maintain and support them effectively
- Develop troubleshooting skills for software, hardware, and connectivity issues
- Acquire knowledge of network fundamentals, protocols, and troubleshooting techniques
- Gain in-depth experience in assembling and disassembling computer parts to expand your IT expertise
How you will benefit
- Ensure your preparation for CompTIA TECH+ and A+ certification exams (220-1101 and 220-1102)
- Engage with a variety of interactive learning materials, assignments, and assessments that will deepen your understanding and help with exam preparation
- Boost your employability by jump-starting your IT career with a highly respected and recognized certification that demonstrates your proficiency in essential IT skills
The CompTIA ITF+ Certification Training course is designed for self-paced learning and does not feature a designated instructor.
Linda Matthews
Linda Matthews has years of experience both in the classroom teaching technical material and, in the field, solving a myriad of technical issues.
Linda possesses the background to engage deeply with cybersecurity through teaching and intellectual focus. For the past eight years, she has lived with this vast and fascinating body of knowledge. Now, she regularly trains individuals in several of the most popular security courses from CompTIA and Microsoft. CompTIA's Security+ is the foundational course students need to begin an incredible journey into cybersecurity.
Linda has a strong love for teaching and igniting the spark that can set students on a most worthwhile and fulfilling path.
Sara Perrott
Sara Perrott has been working in the information technology field for 20+ years and has devoted the last 10 of those to focusing on cybersecurity. She is a published author and a former college professor, and she is passionate about teaching the next generation of cybersecurity professionals. Sara has a Master of Science in Cybersecurity and Information Assurance from Western Governors University Washington and a Bachelor of Science in Information Systems Security from the University of Phoenix.
Paula Woodall
Paula Woodall began her technical career as a network and computer consultant 30 years ago. She first taught at a local university before taking the CompTIA and Microsoft exams to teach certified courses. Paula has been fortunate to teach these classes worldwide for companies such as HP and Microsoft. Paula enjoys teaching classes regarding computers and networking and talking to students about how their companies put these technologies to work for them.
Justin Burandt
Justin Burandt has built a strong career in information technology (IT) education, holding various leadership and support roles across several universities. As an assistant director at Miami Dade College's Cybersecurity Center of the Americas, he played a key role in developing the IT training infrastructure and expanding certification programs. Additionally, Justin has mentored over 120 students in Western Governors University's IT bachelor's programs. His teaching experience spans both online and in-person, including CompTIA Tech+, A+, and Network+ courses across high school, college, and adult education settings. He has also led IT seminars for various organizations, including governments, financial institutions, and businesses.
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.
Unlock a world of opportunities with the CompTIA TECH+ certification training to gain a solid foundation in essential IT concepts, preparing you for a dynamic career in the rapidly evolving tech industry. Plus, get ready to earn your CompTIA A+ credential by mastering computer hardware, software, networking, security, and more.
|
|
|
CompTIA Certification Training: TECH+, A+, Network+, Security+ (Vouchers Included)
- CompTIA Certification Training: TECH+, A+, Network+, Security+ (Vouchers Included)
-
Fee: $4,895.00
Dates: 4/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Location:
Building:
Room:
Instructor:
Begin your journey as an IT professional by preparing for the CompTIA TECH+ certification exam, A+ certification exams (220-1101 & 220-1102), the Network+ certification exam (N10-009), and the Security+ certification exam (SY0-701). This bundle will give you all the tools you need to succeed in the ever-growing field of IT and stand out to future employers. Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
- Labs included in this program are not supported on mobile devices (i.e., phones and tablets).
- Please note that a Windows environment is required to complete some course assignments (A+ and N+).
- A motherboard capable of client-side virtualization:
- A 64-bit CPU
- UEFI firmware
- Hardware virtualization support in UEFI
Software Requirements:
- PC: Windows 10 or later. Access to Windows 11 is needed for the textbook module "Installing Windows" (A+)
- Mac: macOS 10.6 or later.
- Chromebook 113 or later
- Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
- Microsoft Word. To complete your assignments, you may need Microsoft Word 2003 or higher or an equivalent word-processing program, such as LibreOffice, which is available to download for free.
- Adobe Acrobat Reader. (Software must be installed and fully operational before the course begins.)
Tools:
- Access to copper Ethernet cable-making tools and equipment:
- RJ-45 connectors
- A crimping tool
- Cat5, Cat5e, or Cat6 cable to practice on
Other:
- A reliable high-speed Internet connection
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment. The textbook will be shipped to you approximately 7-10 business days after enrollment.
- CompTIA® TECH+ Cert Mike: Prepare. Practice. Pass the Test! Get Certified! Exam FC0-U71, by Mike Chapple
The digital textbooks for the A+, Network+, and Security+ courses are accessed via links in the course lessons.
- CompTIA A+ Guide to IT Technical Support (eBook)
- CompTIA Network+ Guide to Networks, by Jill West (eBook)
- CompTIA Security+ Guide to Network Security Fundamentals, by Mark Ciampa (eBook)
- CompTIA TECH+ Certification Training
- Introduction to CompTIA Certification
- IT Concepts and Terminology
- Understanding Computer Hardware
- Data Storage
- Operating Systems
- Networking Basics
- Managing Applications
- Troubleshooting Basics
- Database Fundamentals
- Security Basics
- Authentication, Authorization, and Accounting
- Protecting Data and Ensuring Business Continuity
- Software Development Fundamentals
- Preparing for a Certification Exam
- CompTIA A+
- Taking a Computer Apart and Putting It Back Together
- All About Cases and Motherboards
- Supporting Processors and Upgrading Memory
- Power Supplies and Troubleshooting Computer Problems
- Supporting Hard Drives and Other Storage Devices
- Supporting Input/Output Devices
- Networking Fundamentals
- Network Infrastructure and Cloud Computing
- Supporting Mobile Devices
- Supporting Printers
- The Complex World of IT Professionals
- Installing Windows
- Maintaining Windows
- Troubleshooting Windows After Startup
- Troubleshooting Windows Startup
- Security Strategies
- Securing and Sharing Windows Resources
- Mobile Device Security
- Network Security and Troubleshooting
- Supporting macOS
- Linux and Scripting
- Preparing for a Certification Exam
- CompTIA Network+
- Introduction to CompTIA
- Introduction to Networking
- Infrastructure and Documentation
- Addressing
- Protocols
- Cabling
- Wireless Networking
- Network Architecture
- Segmentation
- Wide Area Networking
- Risk Management
- Security in Network Design
- Performance and Recovery
- Final Exam
- CompTIA Security+
- Introduction to CompTIA
- Security Fundamentals
- Threat Management and Cybersecurity Resources
- Threats and Attacks on Endpoints
- Endpoint and Application Development Security
- Cryptography
- Public Key Infrastructure and Cryptographic Protocols
- Mobile, Embedded, and Specialized Device Security
- Networking Threats, Assessments, and Defenses
- Network Security Appliances and Technologies
- Cloud and Virtualization Security
- Network Threats, Assessments, and Defenses
- Authentication
- Incident Preparation, Response, and Investigation
- Cybersecurity Resilience
- Risk Management and Data Privacy
- Preparing for the Certificate Exam
- Exploring a Career in Cybersecurity
What you will learn
- Master fundamental concepts of multiple operating systems to maintain and support them effectively
- Develop troubleshooting skills for software, hardware, connectivity, and network problems
- Gain in-depth knowledge about assembling and disassembling computer parts
- Learn how to compare network types, topologies, and architectures
- Acquire knowledge and skills in networking hardware, tools, and their installation for effective network setup
- Understand TCP/IP functionality, protocols, and IP addressing concepts, including subnetting and VLANs
- Explore cloud computing, virtualization, and remote access systems and methods
- Discover network performance monitoring tools and practices
- Develop expertise in network safety, security threats, vulnerability assessments, and mitigation strategies
- Attain a solid understanding of computer security concepts, network policies, and documentation
- Learn incident preparation, response, and risk management for network security
How you will benefit
- Become prepared for the most updated objectives in the CompTIA TECH+, A+, Network+, and Security+ certification exams
- Optional in-depth learning activities with simulations and live virtual machine labs
- Practice for your exams with access to multiple-choice questions to thoroughly prepare
- Engage with interactive learning materials, assignments, and assessments to sharpen your knowledge and skills
- Boost your employability and jump-start your IT career with highly respected certifications that demonstrate your proficiency in essential IT skills
The CompTIA ITF+ course is designed for self-paced learning and does not feature a designated instructor.
Linda Matthews
Linda Matthews has years of experience both in the classroom teaching technical material and in the field solving a myriad of technical issues.
Linda possesses the background to engage deeply with cybersecurity through teaching and intellectual focus. For the past eight years, she has lived with this vast and fascinating body of knowledge. Now, she regularly trains individuals in several of the most popular security courses from CompTIA and Microsoft. CompTIA's Security+ is the foundational course students need to begin an incredible journey into cybersecurity.
Linda has a strong love for teaching and igniting the spark that can set students on a most worthwhile and fulfilling path.
Sara Perrott
Sara Perrott has been working in the information technology field for 20+ years and has devoted the last 10 of those to focusing on cybersecurity. She is a published author and a former college professor, and she is passionate about teaching the next generation of cybersecurity professionals. Sara has a Master of Science in Cybersecurity and Information Assurance from Western Governors University Washington and a Bachelor of Science in Information Systems Security from the University of Phoenix.
Paula Woodall
Paula Woodall began her technical career as a network and computer consultant 30 years ago. She first taught at a local university before taking the CompTIA and Microsoft exams to teach certified courses. Paula has been fortunate to teach these classes worldwide for companies such as HP and Microsoft. Paula enjoys teaching classes regarding computers and networking and talking to students about how their companies put these technologies to work for them.
Brett Glines
Brett Glines holds a Bachelor of Science in Finance from BYU and an MBA from Emory University. Since 1995, he has excelled as a consultant and educator in the field of technical education, primarily specializing in IT applications, leadership development, and certification. He has helped thousands transition into IT careers and holds certifications in CompTIA A+, Network+, and Security+.
Brett is a master at leveraging online environments for learning and has been training online exclusively since 2015. He focuses on engaging students, ensuring they understand and remember what they learn. He uses practical examples, everyday analogies, and recall techniques to make learning easier and more effective.
Justin Burandt
Justin Burandt has built a strong career in information technology (IT) education, holding various leadership and support roles across several universities. As an assistant director at Miami Dade College’s Cybersecurity Center of the Americas, he played a key role in developing the IT training infrastructure and expanding certification programs. Additionally, Justin has mentored over 120 students in Western Governors University’s IT bachelor’s programs. His teaching experience spans both online and in-person, including CompTIA Tech+, A+, and Network+ courses across high school, college, and adult education settings. He has also led IT seminars for various organizations, including governments, financial institutions, and businesses.
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.
Begin your journey as an IT professional by preparing for the CompTIA TECH+ certification exam, A+ certification exams (220-1101 & 220-1102), the Network+ certification exam (N10-009), and the Security+ certification exam (SY0-701). This bundle will give you all the tools you need to succeed in the ever-growing field of IT and stand out to future employers.
|
|
|
CompTIA Cloud+ Certification Training (Voucher Included)
- CompTIA Cloud+ Certification Training (Voucher Included)
-
Fee: $1,695.00
Dates: 4/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Location:
Building:
Room:
Instructor:
Cloud computing is how technology is done today, and this online course will teach you key skills you need to succeed in a growing career field filled with opportunity. You will also prepare for the CompTIA Cloud+ CV0-004 exam. Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
Software Requirements:
- PC: Windows 10 or later.
- Mac: macOS 10.6 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
- Virtual Labs included with course
- Microsoft Word Online
- Adobe Acrobat Reader
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment.
- Study guide
- Practice exams
The following textbook(s) will also be shipped to you approximately 7-10 business days after enrollment:
- CompTIA Cloud+ Study Guide: Exam CV0-003, 3rd Edition
The best time to pursue CompTIA Cloud+ training is right now! Cloud computing is growing as experts create innovative ways to store, manage, access, and protect some of the world's most important data. According to MarketsandMarkets data, the global cloud computing market will have grown from $626.4 billion in 2023 to a projected $1,266.4 trillion by 2028. This impressive industry growth is increasing the demand for professionals with cloud computing skills, with Deloitte reporting that cloud computing remains the number one most sought-after skill.
This online cloud computing certification course is designed for individuals who are just starting out in information technology and is ideal for those who have limited experience. You will learn everything you need to pass your cloud certification exam and pursue a career in cloud computing. Starting with the basics of cloud service environments. This course covers key concepts and skills, including virtualization, infrastructure, troubleshooting, resource management, security, systems management, and business continuity.
After completing this cloud computing course, you will be prepared for the CompTIA Cloud+ CV0-004 Certification designation. Your enrollment includes an exam voucher, which covers the cost to sit for the certifying exam upon eligibility.
- Cloud Architecture
- Deployment
- Operations
- Security
- DevOps Fundamentals
- Troubleshooting
What you will learn
- Discover how to make effective cloud models and their importance
- Gain key cloud security fundamentals and become proficient in data security and compliance controls
- Understand resource management as it pertains to cloud networking and migration
- Ensure business continuity through operations and support best practices in a cloud environment
- Effectively use the troubleshooting methodology to resolve cloud-related issues
How you will benefit
- Lay a foundation for your career as a cloud computing specialist, cloud support technician, cloud consultant, or cloud support associate
- Get a strong start on your CompTIA Cloud+ certification path and prepare for the exam
Christopher Paul
Christopher Paul is a seasoned IT professional, cybersecurity expert, and Army veteran. He brings 15 years of experience, having previously held positions in military cybersecurity and tech startups. His robust skill set includes leadership, team building, active directory, data center, computer network operations, and more.
Christopher currently holds certifications in ISC2 SSCP, CompTIA CASP+, and CompTIA PenTest+. Outside work, he enjoys spending time with his two sons, running with his labradoodle, and playing the drums.
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.
The best time to pursue CompTIA Cloud+ training is right now! Cloud computing is growing as experts create innovative ways to store, manage, access, and protect some of the world's most important data. According to MarketsandMarkets data, the global cloud computing market will have grown from $626.4 billion in 2023 to a projected $1,266.4 trillion by 2028. This impressive industry growth is increasing the demand for professionals with cloud computing skills, with Deloitte reporting that cloud computing remains the number one most sought-after skill.
This online cloud computing certification course is designed for individuals who are just starting out in information technology and is ideal for those who have limited experience. You will learn everything you need to pass your cloud certification exam and pursue a career in cloud computing. Starting with the basics of cloud service environments. This course covers key concepts and skills, including virtualization, infrastructure, troubleshooting, resource management, security, systems management, and business continuity.
After completing this cloud computing course, you will be prepared for the CompTIA Cloud+ CV0-004 Certification designation. Your enrollment includes an exam voucher, which covers the cost to sit for the certifying exam upon eligibility.
|
|
|
CompTIA Cloud+ Training Boot Camp
- CompTIA Cloud+ Training Boot Camp
-
Fee: $2,495.00
Dates: 4/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Location:
Building:
Room:
Instructor:
Learn how to select, manage, implement, secure, and maintain cloud systems! This cloud computing boot camp provides the most comprehensive approach to earning CompTIA's Cloud+ certification. Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
- Speakers and a microphone
- Webcam
Software Requirements:
- PC: Windows 7 or later.
- Mac: macOS 10.7 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
- Microsoft Word Online
- Adobe Acrobat Reader
- Zoom Meetings
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The student materials required for this course are included in enrollment and will be available online. The mass adoption of cloud technologies and services has revolutionized how we manage our IT and business ecosystems—placing cloud-related skills in high demand.
Adopting a vendor-neutral approach, this cloud computing certification course provides you with an understanding of essential cloud concepts needed to start or advance your career working with cloud technologies. You will leave our cloud computing training with the knowledge required to pass your Cloud+ exam, the only cloud-focused certification approved for DoD 8570.01-M.
You will also receive an exam voucher for the CompTIA Cloud+ certification exam, CV0-004, with your enrollment.
Our Certification Success Program, paired with our provided prep materials, boot camp sessions, and post-work, is designed to ease any concerns you may have when taking the certification exam. If your first attempt is unsuccessful, this program provides peace of mind that you may be eligible to take the certification exam a second time (if needed) at no additional fee.
*To qualify for a second certification exam voucher, students must:
- Attend at least 85% of each day of class
- Score a 90% or higher on their final practice exam
- Take the first exam within 90 days of class completion
- Upload your exam failure notice from your first exam attempt
- Day 1
- Introduction to Cloud+
- Domain I: Cloud Architecture and Design
- Day 2
- Domain II: Security
- Day 3
- Domain III: Deployment
- Day 4
- Domain IV: Operations and Support
- Day 5
- Domain V: Troubleshooting
What you will learn
- Core cloud concepts and principles
- Cloud designs and architectures
- Cloud security controls and configurations
- Deployment and operational best practices
- Operational strategies and best practices
- How to troubleshoot common cloud issues
How you will benefit
The latest version of the Cloud+ exam includes five domain areas:
- Architecture and Design
- Security
- Deployment
- Operations and Support
- Troubleshooting
Boot camps are led by instructors that have years of industry experience and are recognized as subject matter experts.
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.
The mass adoption of cloud technologies and services has revolutionized how we manage our IT and business ecosystems—placing cloud-related skills in high demand.
Adopting a vendor-neutral approach, this cloud computing certification course provides you with an understanding of essential cloud concepts needed to start or advance your career working with cloud technologies. You will leave our cloud computing training with the knowledge required to pass your Cloud+ exam, the only cloud-focused certification approved for DoD 8570.01-M.
You will also receive an exam voucher for the CompTIA Cloud+ certification exam, CV0-004, with your enrollment.
Our Certification Success Program, paired with our provided prep materials, boot camp sessions, and post-work, is designed to ease any concerns you may have when taking the certification exam. If your first attempt is unsuccessful, this program provides peace of mind that you may be eligible to take the certification exam a second time (if needed) at no additional fee.
*To qualify for a second certification exam voucher, students must:
- Attend at least 85% of each day of class
- Score a 90% or higher on their final practice exam
- Take the first exam within 90 days of class completion
- Upload your exam failure notice from your first exam attempt
|
|
|
CompTIA CySA+ (Voucher Included)
- CompTIA CySA+ (Voucher Included)
-
Fee: $1,595.00
Dates: 4/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Location:
Building:
Room:
Instructor:
This CompTIA Cybersecurity Analyst (CySA+) course provides the knowledge to defend through incident detection and response at the intermediate-skills level of the cybersecurity career pathway. You will also prepare for the CySA+ certification exam. Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
Software Requirements:
- PC: Windows 10 or later.
- Mac: macOS 10.6 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
- Virtual Labs included with course
- Microsoft Word Online
- Adobe Acrobat Reader
- Software must be installed and fully operational before the course begins
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment. The following textbooks will be shipped to you approximately 7-10 business days after enrollment:
- CompTIA CySA+ Study Guide: Exam CS0-003, 3rd Edition
- Study guide and Practice exams
Please note: You will receive a digital book if the physical book is on backorder. The CompTIA CySA certification course provides intermediate-level skills and knowledge to defend against cyber threats through incident detection and response. In this cybersecurity analyst certification course, you will learn best practices in threat management, security architecture, vulnerability management, and cyber-incident response.
During the security operations module, you will obtain an understanding of system and network architecture concepts as they relate to security operations. You will also learn to analyze indicators of potentially malicious activity in network, host, and application-related scenarios. Additionally, you will be equipped with the skills to use appropriate tools or techniques to determine malicious activity and compare threat-intelligence and threat-hunting concepts.
In the vulnerability management section of your training, gain knowledge of vulnerability scanning methods and concepts, understand different operating environments and industry frameworks for vulnerability scanning, and analyze output from different vulnerability assessment tools. You will also understand how to prioritize vulnerability management and remediation, as well as recommend controls to mitigate different attacks and software vulnerabilities.
The incident response and management module will cover concepts related to different attack methodology frameworks, incident response activities, including containment, eradication, and recovery, and post-incident activity phases of the incident management life cycle.
Finally, in the reporting and communication component of this cybersecurity analyst course, compare important components of different types of reports and understand how to effectively communicate with stakeholders. You will also interpret metrics and key performance indicators (KPIs). Upon completion of this course, you will be prepared to take the CompTIA Cybersecurity Analyst (CySA+) certification exam. This course offers enrollment with a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.
The CompTIA CySA+ course complies with the ISO 17024 standard and is approved by the U.S. Department of Defense to meet Directive 8570.01-M requirements. It also complies with government regulations under the Federal Information Security Management Act (FISMA). Regulators and the government rely on ANSI accreditation because it instills confidence and trust in the outcomes of an accredited program.
- Security Operations
- Vulnerability Management
- Incident Response and Management
- Reporting and Communication
What you will learn
- Understand threat and vulnerability management concepts
- Review how to setup a strong security architecture for your networks
- Comprehend security operations
- Learn how to conduct a cyber incident response
- Know what different types of cybersecurity tools are on the market and which to use in different scenarios
How you will benefit
- Advance your cybersecurity skills
- Prepare for the CompTIA Cybersecurity Analyst (CySA+) certification exam
- Become highly desirable to employers in cybersecurity
Christopher Paul
Christopher Paul is a seasoned IT professional, cybersecurity expert, and Army veteran. He brings 15 years of experience, having previously held positions in military cybersecurity and tech startups. His robust skill set includes leadership, team building, active directory, data center, computer network operations, and more.
Christopher currently holds certifications in ISC2 SSCP, CompTIA CASP+, and CompTIA PenTest+. Outside work, he enjoys spending time with his two sons, running with his labradoodle, and playing the drums.
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.
The CompTIA CySA certification course provides intermediate-level skills and knowledge to defend against cyber threats through incident detection and response. In this cybersecurity analyst certification course, you will learn best practices in threat management, security architecture, vulnerability management, and cyber-incident response.
During the security operations module, you will obtain an understanding of system and network architecture concepts as they relate to security operations. You will also learn to analyze indicators of potentially malicious activity in network, host, and application-related scenarios. Additionally, you will be equipped with the skills to use appropriate tools or techniques to determine malicious activity and compare threat-intelligence and threat-hunting concepts.
In the vulnerability management section of your training, gain knowledge of vulnerability scanning methods and concepts, understand different operating environments and industry frameworks for vulnerability scanning, and analyze output from different vulnerability assessment tools. You will also understand how to prioritize vulnerability management and remediation, as well as recommend controls to mitigate different attacks and software vulnerabilities.
The incident response and management module will cover concepts related to different attack methodology frameworks, incident response activities, including containment, eradication, and recovery, and post-incident activity phases of the incident management life cycle.
Finally, in the reporting and communication component of this cybersecurity analyst course, compare important components of different types of reports and understand how to effectively communicate with stakeholders. You will also interpret metrics and key performance indicators (KPIs). Upon completion of this course, you will be prepared to take the CompTIA Cybersecurity Analyst (CySA+) certification exam. This course offers enrollment with a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.
The CompTIA CySA+ course complies with the ISO 17024 standard and is approved by the U.S. Department of Defense to meet Directive 8570.01-M requirements. It also complies with government regulations under the Federal Information Security Management Act (FISMA). Regulators and the government rely on ANSI accreditation because it instills confidence and trust in the outcomes of an accredited program.
|
|
|
CompTIA CySA+ Training Boot Camp
- CompTIA CySA+ Training Boot Camp
-
Fee: $2,999.00
Dates: 4/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Location:
Building:
Room:
Instructor:
Learn how to use behavioral analytics to prevent, detect and combat cyber threats! This boot camp provides the most comprehensive approach to earning CompTIA's intermediate-level Cybersecurity Analyst (CySA+) certification. Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
- A microphone.
- Speakers.
- Webcam.
Software Requirements:
- PC: Windows 7 or later.
- Mac: macOS 10.7 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
- Microsoft Word Online.
- Adobe Acrobat Reader.
- Zoom Meetings.
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The student materials required for this course are included in enrollment and will be available online. The CompTIA CySA+ Boot Camp is a comprehensive five-day training that teaches you the knowledge and skills required to configure and use the latest industry-standard threat detection tools. Throughout the cybersecurity program, you will learn how to perform data analysis to identify vulnerabilities and expose cyber threats — with the ultimate goal of helping organizations protect and secure their applications and systems.
You will leave with the required knowledge to pass your CySA+ exam, including its five domains: threat and vulnerability management, software and systems security, security operations and monitoring, incident response, and compliance and assessment. You will also possess the behavioral analytics skills needed to provide increased visibility into cyber threats and stand out as a cybersecurity analyst.
You will receive an exam voucher for the CompTIA CySA+ certification exam with your enrollment.
Our Certification Success Program, paired with our provided prep materials, boot camp sessions, and post-work, is designed to ease any concerns you may have when taking the certification exam. If your first attempt is unsuccessful, this program provides peace of mind that you may be eligible to take the certification exam a second time (if needed) at no additional fee.
*To qualify for a second certification exam voucher, students must:
- Attend at least 85% of each day of class
- Score a 90% or higher on their final practice exam
- Take the first exam within 90 days of class completion
- Upload your exam failure notice from your first exam attempt
- Day 1 - Security Operations
- System and Network architecture concepts in security operations
- Analyzing indicators of potentially malicious activity
- Tools or techniques for determining malicious activity
- Threat-intelligence and threat-hunting concepts
- Efficiency and process improvement in security operations
- Day 2 - Vulnerability Management
- Analyzing indicators of potentially malicious activity
- Tools or techniques for determining malicious activity
- Threat-intelligence and threat-hunting concepts
- Efficiency and process improvement in security operations
- Day 3 - Incident Response and Management
- Concepts related to attack Methodology frameworks.
- Performing incident response activities
- Preparation and post-incident activity phases of the incident management life cycle.
- Day 4 - Reporting and Communication
- Importance of vulnerability management reporting and communication.
- Importance of incident response reporting and communication.
- Day 5 - Domain Wrap-up and Review
- Exam Tips
- Exam review
- Take the CS0-003 exam
What you will learn
- Applying environmental reconnaissance techniques and analyzing the results
- Implementing or recommending responses to network-based threats
- Implementing a vulnerability management process
- Identifying common vulnerabilities and analyzing vulnerability scans
- Analyzing threat data to determine the impact of threats
- Preparing toolkits and supporting incident response
- Using data to recommend remediation of security issues
How you will benefit
- You will verify that you have the knowledge and skills required to configure and use the latest industry-standard threat detection tools, analyze data, and identify vulnerabilities in the results, exposing threats and risks to an organization.
- You will prepare to pass the CompTIA CySA+ exam
- The provided information security theory is also enforced through hands-on exercises
- Learn how to configure and operate many different technical security controls over the course of the 5-day boot camp
- The CySA+ certification meets 8570.1 mandate and is approved for five job categories, including 1) Information Assurance Technician Level II, 2) Cybersecurity Service, 3) Provider (CSSP) – Analyst, 4) CSSP – Incident Response, 5) CSSP – Infrastructure Support, 6) CSSP – Auditor
Boot camps are led by instructors that have years of industry experience and are recognized as subject matter experts
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.
The CompTIA CySA+ Boot Camp is a comprehensive five-day training that teaches you the knowledge and skills required to configure and use the latest industry-standard threat detection tools. Throughout the cybersecurity program, you will learn how to perform data analysis to identify vulnerabilities and expose cyber threats — with the ultimate goal of helping organizations protect and secure their applications and systems.
You will leave with the required knowledge to pass your CySA+ exam, including its five domains: threat and vulnerability management, software and systems security, security operations and monitoring, incident response, and compliance and assessment. You will also possess the behavioral analytics skills needed to provide increased visibility into cyber threats and stand out as a cybersecurity analyst.
You will receive an exam voucher for the CompTIA CySA+ certification exam with your enrollment.
Our Certification Success Program, paired with our provided prep materials, boot camp sessions, and post-work, is designed to ease any concerns you may have when taking the certification exam. If your first attempt is unsuccessful, this program provides peace of mind that you may be eligible to take the certification exam a second time (if needed) at no additional fee.
*To qualify for a second certification exam voucher, students must:
- Attend at least 85% of each day of class
- Score a 90% or higher on their final practice exam
- Take the first exam within 90 days of class completion
- Upload your exam failure notice from your first exam attempt
|
|
|
CompTIA Data+ Training Boot Camp
- CompTIA Data+ Training Boot Camp
-
Fee: $2,495.00
Dates: 4/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Location:
Building:
Room:
Instructor:
Certify your skills and knowledge in data management, analysis, and technologies! This boot camp provides the most comprehensive approach to earning CompTIA's Data+ certification. Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
- Speakers and a microphone
- Webcam
Software Requirements:
- PC: Windows 7 or later.
- Mac: macOS 10.7 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
- Microsoft Word Online
- Adobe Acrobat Reader
- Zoom Meetings
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The student materials required for this course are included in enrollment and will be available online. With data playing an ever-increasing role in today's business and technology landscape, the demand for skilled data professionals is higher than ever. Upon completion of this data analysis course, you will have the knowledge needed to pass the CompTIA Data+ exam as well as valuable data skills for nearly any industry or role.
This in-depth data analysis boot camp aligns with the five exam domains, covering topics ranging from high-level concepts and principles to specific technical practices and tools—all preparing you for your data analysis certification.
You will also receive an exam voucher for the CompTIA Data+ certification exam, DA0-001, with your enrollment.
Our Certification Success Program, paired with our provided prep materials, boot camp sessions, and post-work, is designed to ease any concerns you may have when taking the certification exam. If your first attempt is unsuccessful, this program provides peace of mind that you may be eligible to take the certification exam a second time (if needed) at no additional fee.
*To qualify for a second certification exam voucher, students must:
- Attend at least 85% of each day of class
- Score a 90% or higher on their final practice exam
- Take the first exam within 90 days of class completion
- Upload your exam failure notice from your first exam attempt
- Day 1
- Introduction to Data+
- Domain I: Data Concepts and Environments
- Day 2
- Domain II: Data Mining
- Day 3
- Domain III: Data Analysis
- Day 4
- Domain IV: Visualization
- Day 5
- Domain V: Data Governance, Quality and Controls
What you will learn
- Data Concepts and Environments
- Data Mining
- Data Analysis
- Visualization
- Data Governance, Quality, and Controls
How you will benefit
- Data schemas, dimensions, types, and structures
- How to execute data manipulations and optimize queries
- How to select and use statistical methods
- Analysis types and techniques
- How to design reports and dashboards
Boot camps are led by instructors that have years of industry experience and are recognized as subject matter experts.
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.
With data playing an ever-increasing role in today's business and technology landscape, the demand for skilled data professionals is higher than ever. Upon completion of this data analysis course, you will have the knowledge needed to pass the CompTIA Data+ exam as well as valuable data skills for nearly any industry or role.
This in-depth data analysis boot camp aligns with the five exam domains, covering topics ranging from high-level concepts and principles to specific technical practices and tools—all preparing you for your data analysis certification.
You will also receive an exam voucher for the CompTIA Data+ certification exam, DA0-001, with your enrollment.
Our Certification Success Program, paired with our provided prep materials, boot camp sessions, and post-work, is designed to ease any concerns you may have when taking the certification exam. If your first attempt is unsuccessful, this program provides peace of mind that you may be eligible to take the certification exam a second time (if needed) at no additional fee.
*To qualify for a second certification exam voucher, students must:
- Attend at least 85% of each day of class
- Score a 90% or higher on their final practice exam
- Take the first exam within 90 days of class completion
- Upload your exam failure notice from your first exam attempt
|
|
|
CompTIA ITF+ Certification Training (Voucher Included) Offered in partnership with ed2go
-
Fee: $895.00
Hours: 40
Prepare for a successful start in the IT field with the CompTIA IT Fundamentals (ITF+) certification course. Tailored for those without prior experience, this comprehensive program covers essential areas of information technology, including PC hardware, operating systems, applications, networking, programming, databases, and security. By acquiring this foundational knowledge, you will develop your IT skill set and build a solid base for further certification exams such as A+, Network+, and Security+.
This IT course is designed to help you showcase your readiness for the digital workplace. From networking and cybersecurity essentials to hardware and software basics, it equips you with proficiency in today's technologies. Whether you are considering a career in IT or work in a related field requiring broad IT understanding, this IT certification course is ideal. Moreover, earning the CompTIA IT Fundamentals certification serves as a step towards advanced certifications like CompTIA A+, Network+, and Security+, providing a holistic approach for long-term success and expertise in the ever-evolving field of information technology.
This IT training course includes a voucher for the CompTIA IT Fundamentals (ITF+) certification exam, covering the cost of the certifying exam upon eligibility.
|
|
|
CompTIA Linux+ (Voucher Included)
- CompTIA Linux+ (Voucher Included)
-
Fee: $1,395.00
Dates: 4/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Location:
Building:
Room:
Instructor:
Prepare for a career as a systems administrator supporting Linux systems. This Linux+ training course covers operating, maintaining, and troubleshooting Linux operating systems in a systems administrator role. You will also train for the CompTIA Linux+ (XK0-005) exam. Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
Software Requirements:
- PC: Windows 10 or later.
- Mac: macOS 10.6 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
- Virtual Labs included with course
- Microsoft Word Online
- Adobe Acrobat Reader
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment.
- Study guide
- Practice exams
The following textbook(s) will also be shipped to you approximately 7-10 business days after enrollment:
- CompTIA Linux+ Study Guide: Exam XK0-005, 5th Edition
The CompTIA Linux+ credential is the only job-focused Linux certification covering the latest foundational skills demanded by hiring managers. The Linux+ exam covers tasks associated with all major Linux distributions, setting the foundation for advanced vendor and distro-specific knowledge.
During your Linux+ certification training, you will become ready to work on installation processes, network configurations, security and troubleshooting, and automating processes with scripting. From managing Linux networking and software to describing Kernel modules and identifying devices in Linux to working with Git, you will get the desired skills needed to excel in entry or junior-level IT-related roles.
For system administrators, the Linux+ certification is a benchmark for working in certain IT functions, including cloud computing, server administration, Internet of things (IoT), mobile, and supercomputing. This Linux training course will prepare you for the CompTIA Linux+ (XK0-005) exam and help you stand out for new employment or promotion opportunities with the new skills you will acquire.
- Introduction to Linux
- CLI and Bash shell
- Linux users and groups
- Permissions and ownership
- Data storage
- Linux kernel modules
- Managing Linux services, processes, and performance
- Devices in Linux
- Linux networking
- Managing Linux software
- Security
- Scripting in Bash
- Git
What you will learn
- Gain a better understanding of the command line interface (CLI) and Bash shell
- How to set up permissions
- Describe Kernel modules
- Identify devices in Linux
- Manage the Linux networking and software
- Describe best practices of Linux security
- Understand how to schedule jobs and work with Git
How you will benefit
- Receive a prepaid voucher to take the CompTIA Linux+ (XK0-005) exam
- Become proficient in the Linux operating system to assist in IT-related job roles
- Become prepared to take the CompTIA Linux+ certification test to prove your knowledge
- Obtain opportunities for entry or junior-level positions in IT-related positions
Shane Sexton
Shane Sexton is a cybersecurity-focused instructor with a hunger for mastering the usage of technology to deal with real-world challenges. Inside the classroom, Shane makes the complicated seem approachable. Outside the classroom, Shane is a mad scientist with automation, coding and scripting, tying them back to technologies he teaches in class. If Shane isn't watching the latest SpaceX launch, he is tinkering with something.
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.
The CompTIA Linux+ credential is the only job-focused Linux certification covering the latest foundational skills demanded by hiring managers. The Linux+ exam covers tasks associated with all major Linux distributions, setting the foundation for advanced vendor and distro-specific knowledge.
During your Linux+ certification training, you will become ready to work on installation processes, network configurations, security and troubleshooting, and automating processes with scripting. From managing Linux networking and software to describing Kernel modules and identifying devices in Linux to working with Git, you will get the desired skills needed to excel in entry or junior-level IT-related roles.
For system administrators, the Linux+ certification is a benchmark for working in certain IT functions, including cloud computing, server administration, Internet of things (IoT), mobile, and supercomputing. This Linux training course will prepare you for the CompTIA Linux+ (XK0-005) exam and help you stand out for new employment or promotion opportunities with the new skills you will acquire.
|
|
|
CompTIA Network+ Certification Training (Voucher Included)
- CompTIA Network+ Certification Training (Voucher Included)
-
Fee: $1,895.00
Dates: 4/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Location:
Building:
Room:
Instructor:
This course will prepare you for a career as a network technician and qualify you to take the CompTIA Network+ certification exam (N10-009). You will master a variety of networking concepts and gain a fundamental knowledge of network design, security, cloud computing, and routing and switching. Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
- Labs included in this program are not supported on mobile devices (i.e., phones and tablets).
- Please note that a Windows environment is required to complete some course assignments.
- A motherboard capable of client-side virtualization:
- A 64-bit CPU
- UEFI firmware
- Hardware virtualization support in UEFI
Software Requirements:
- PC: Windows 10 or later.
- Mac: macOS 10.6 or later.
- Chromebook 113 or later
- Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
- Microsoft Word. To complete your assignments, you may need Microsoft Word 2003 or higher, or an equivalent word-processing program, such as LibreOffice, which is available to download for free.
- Adobe Acrobat Reader. (Software must be installed and fully operational before the course begins.)
Tools:
- Access to copper Ethernet cable-making tools and equipment:
- RJ-45 connectors
- A crimping tool
- Cat5, Cat5e, or Cat6 cable to practice on
Other:
- Email capabilities and access to a personal email account.
- A reliable high-speed Internet connection.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment. The following digital textbook for this course is accessed via links in the course lessons:
- CompTIA Network+ Guide to Networks, by Jill West (eBook)
Knowing how to install, configure, and troubleshoot a computer network is a highly marketable and in-demand skill—and it's an ideal time to explore online CompTIA Network+ courses to expand your career opportunities and earning potential!
This CompTIA Network+ certification course introduces the fundamental building blocks that form a modern network, such as hardware, topologies, and protocols, along with an introduction to the OSI model. The course provides in-depth coverage of the most important concepts in contemporary networking, including TCP/IP, Ethernet, wireless transmission, virtual networks, cloud computing, segmentation, security, performance optimization, and troubleshooting.
After reading the lessons and completing the exercises in this CompTIA Net+ certification course, you will gain the confidence to select the network design, hardware, and software that best fits your environment. You will have the skills to build a network from scratch and maintain, upgrade, troubleshoot, and manage an existing network. Finally, you will be well-prepared to take CompTIA's Network+ certification exam.
You will receive an exam voucher with your enrollment, which covers the fee to sit for the CompTIA Network+ (N10-009) certifying exam upon eligibility.
- Introduction to CompTIA
- Introduction to Networking
- Infrastructure and Documentation
- Addressing
- Protocols
- Cabling
- Wireless Networking
- Network Architecture
- Segmentation
- Wide Area Networking
- Risk Management
- Security in Network Design
- Performance and Recovery
- Final Exam
What you will learn
- Compare common network types, topologies, and architectures
- Characteristics and uses of networking hardware and tools
- How to install and configure wired and wireless networks
- TCP/IP functionality and protocols
- IP addressing concepts, including subnetting and VLANs
- Cloud computing, virtualization, and remote access systems and methods
- Tools and practices for monitoring network performance and health
- Network safety and security threats and how to mitigate them
- Explain how to troubleshoot and recover from network problems
- Identify the purposes of network policies and documentation
How you will benefit
- Expand your career opportunities and earning potential
- Course content is aligned with the CompTIA Network+ certification
- Optional hands-on learning activities with simulations and live virtual machine labs
- Opportunity to practice on multiple-choice questions to prepare you for your Network+ certification exam (N10-009)
Linda Matthews
Linda Matthews has years of experience both in the classroom teaching technical material and, in the field, solving a myriad of technical issues.
Linda possesses the background to engage deeply with cybersecurity through teaching and intellectual focus. For the past eight years, she has lived with this vast and fascinating body of knowledge. Now, she regularly trains individuals in several of the most popular security courses from CompTIA and Microsoft.
Linda has a strong love for teaching and igniting the spark that can set students on a most worthwhile and fulfilling path.
Sara Perrott
Sara Perrott has been working in the information technology field for 20+ years and has devoted the last 10 of those to focusing on cybersecurity. She is a published author and a former college professor, and she is passionate about teaching the next generation of cybersecurity professionals. Sara has a Master of Science in Cybersecurity and Information Assurance from Western Governors University Washington and a Bachelor of Science in Information Systems Security from the University of Phoenix.
Brett Glines
Brett Glines holds a Bachelor of Science in Finance from BYU and an MBA from Emory University. Since 1995, he has excelled as a consultant and educator in the field of technical education, primarily specializing in information technology and certification. He has helped thousands transition into IT careers and holds certifications in CompTIA A+, Network+, and Security+.
Brett is a master at leveraging online environments for learning and has been training online exclusively since 2015. His focus is on engaging students and ensuring they understand and remember what they learn. He uses practical examples, everyday analogies and recall techniques to make learning easier and more effective.
Justin Burandt
Justin Burandt has built a strong career in information technology (IT) education, holding various leadership and support roles across several universities. As an assistant director at Miami Dade College's Cybersecurity Center of the Americas, he played a key role in developing the IT training infrastructure and expanding certification programs. Additionally, Justin has mentored over 120 students in Western Governors University's IT bachelor's programs. His teaching experience spans both online and in-person, including CompTIA Tech+, A+, and Network+ courses across high school, college, and adult education settings. He has also led IT seminars for various organizations, including governments, financial institutions, and businesses.
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.
Knowing how to install, configure, and troubleshoot a computer network is a highly marketable and in-demand skill—and it's an ideal time to explore online CompTIA Network+ courses to expand your career opportunities and earning potential!
This CompTIA Network+ certification course introduces the fundamental building blocks that form a modern network, such as hardware, topologies, and protocols, along with an introduction to the OSI model. The course provides in-depth coverage of the most important concepts in contemporary networking, including TCP/IP, Ethernet, wireless transmission, virtual networks, cloud computing, segmentation, security, performance optimization, and troubleshooting.
After reading the lessons and completing the exercises in this CompTIA Net+ certification course, you will gain the confidence to select the network design, hardware, and software that best fits your environment. You will have the skills to build a network from scratch and maintain, upgrade, troubleshoot, and manage an existing network. Finally, you will be well-prepared to take CompTIA's Network+ certification exam.
You will receive an exam voucher with your enrollment, which covers the fee to sit for the CompTIA Network+ (N10-009) certifying exam upon eligibility.
|
|
|
CompTIA Network+ Training Boot Camp
- CompTIA Network+ Training Boot Camp
-
Fee: $1,895.00
Dates: 4/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Location:
Building:
Room:
Instructor:
In this Boot Camp, you will learn how to configure, troubleshoot, and oversee networks! It provides the most comprehensive approach to earning your CompTIA Network+ certification, one of the most popular certifications an IT professional can attain. Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
- A microphone.
- Speakers.
- A webcam.
Software Requirements:
- PC: Windows 7 or later.
- Mac: macOS 10.7 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
- Microsoft Word Online.
- Adobe Acrobat Reader.
- Zoom Meetings.
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The student materials required for this course are included in enrollment and will be available online. The CompTIA Network+ Boot Camp is a comprehensive, five-day training that teaches you important networking administration and support skills. The ever-evolving networking capabilities of organizations require more advanced skills than the A+ certification. This Network+ online course builds on your existing knowledge by teaching you fundamental information technology (IT) concepts, including the design and implementation of networks, using routers and switches to segment traffic, troubleshooting network problems, and more.
You will leave this IT boot camp with the skills needed to take the next step in your career and the knowledge required to pass your Network+ certification exam, a leading IT certification, and prove your worth to employers.
With your enrollment, you will also receive an exam voucher for the CompTIA Network+ certification exam.
Our certification success program, paired with our provided prep materials, boot camp sessions, and post-work, is designed to ease any concerns or doubts you may have when attempting your initial exam. You are also eligible for a free second exam attempt should you meet the required qualifications.*
*To qualify for a second certification exam voucher, students must:
- Attend at least 85% of each day of class
- Score 90% or higher on their final practice exam
- Take the exam within 90 days of class completion
- Upload your exam failure notice from your first exam attempt
- Day 1
- Introduction to Networks
- OSI Specifications
- Network Topologies, Connectors, and Wiring Standards
- Ethernet
- Networking Devices
- Introduction to IP
- IP Addressing
- Introduction to IP Routing
- Routing Protocols
- Day 2
- Switching and VLANs
- Wireless technologies
- Authentication and access control
- Network threats and mitigation
- Physical and hardware security
- Day 3
- Software and hardware tools
- Network troubleshooting
- Subnet troubleshooting and NAT
- Day 4
- Management, monitoring and optimization
- Wide area networks (WANS)
- Command line tools
- Day 5
- Network+ Exam Prep
What you will learn
- Essential information security concepts
- Threats and attack vectors used by malicious actors
- Network security, monitoring, access control, cryptography, and more
How you will benefit
- Design and implement functional networks
- Configure, manage and maintain essential network devices
- Use devices such as switches and routers to segment network traffic and create resilient networks
- Identify benefits and drawbacks of existing network configurations
- Implement network security, standards, and protocols
- Troubleshoot network problems
- Support the creation of virtualized networks
Boot camps are led by instructors that have years of industry experience and are recognized as subject matter experts.
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.
The CompTIA Network+ Boot Camp is a comprehensive, five-day training that teaches you important networking administration and support skills. The ever-evolving networking capabilities of organizations require more advanced skills than the A+ certification. This Network+ online course builds on your existing knowledge by teaching you fundamental information technology (IT) concepts, including the design and implementation of networks, using routers and switches to segment traffic, troubleshooting network problems, and more.
You will leave this IT boot camp with the skills needed to take the next step in your career and the knowledge required to pass your Network+ certification exam, a leading IT certification, and prove your worth to employers.
With your enrollment, you will also receive an exam voucher for the CompTIA Network+ certification exam.
Our certification success program, paired with our provided prep materials, boot camp sessions, and post-work, is designed to ease any concerns or doubts you may have when attempting your initial exam. You are also eligible for a free second exam attempt should you meet the required qualifications.*
*To qualify for a second certification exam voucher, students must:
- Attend at least 85% of each day of class
- Score 90% or higher on their final practice exam
- Take the exam within 90 days of class completion
- Upload your exam failure notice from your first exam attempt
|
|
|
CompTIA PenTest+ (Voucher Included)
- CompTIA PenTest+ (Voucher Included)
-
Fee: $1,995.00
Dates: 4/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Location:
Building:
Room:
Instructor:
This Penetration tester (PenTest) training course is designed to help you gain essential knowledge of threat and vulnerability management, setting up robust security architectures and security operations, conducting cyber incident responses, and selecting appropriate cybersecurity tools for different scenarios. You will also prepare for the CompTIA PenTest+ certification exam. Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
Software Requirements:
- PC: Windows 8 or later.
- Mac: macOS 10.6 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
- Virtual Labs included with course
- Microsoft Word Online
- Adobe Acrobat Reader
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment. The following textbooks will be shipped to you approximately 7-10 business days after enrollment:
- CompTIA PenTest+ Certification All-in-One Exam Guide, Second Edition (Exam PT0-002)
- Study guide and Practice exams
Please note: You will receive a digital book if the physical book is on backorder. Now is a great time to train for and expand on your current skill set to develop your career in cybersecurity! Information security analysts are projected to grow 33% by 2033, with over 17,000 jobs in this field projected annually by the U.S. Bureau of Labor Statistics. This PenTest+ certification course will expand on your existing cybersecurity skills, knowledge, and ability to perform tests on a variety of devices and systems. You will also further develop your ability to exploit network weaknesses and to plan, scope, and manage them.
During your training for the CompTIA PenTest+ certification, you will learn best practices in vulnerability assessment, scanning and analysis, planning, scoping, and managing weaknesses. You will dive into key tools for success and crucial reporting and communication techniques and best practices. The course curriculum uniquely reviews comprehensive coverage of all penetration testing stages you may see on the PenTest+ exam, unlike other exams that rely on limited stages with essay questions and hands-on tasks.
Upon course completion, you will be able to demonstrate proficiency in the latest penetration testing techniques for cloud, hybrid environments, web applications, Internet of Things (IoT), and traditional on-premises systems. This PenTest+ course offers CompTIA PenTest+ exam voucher with your enrollment. The voucher is prepaid access to sit for the certifying exam upon eligibility.
- Planning and Scoping
- Information Gathering and Vulnerability Scanning
- Attacks and Exploits
- Reporting and Communication
- Tools and Code Analysis
What you will learn
- Understand governance, risk, compliance, scoping, customer requirements, and ethical hacking
- Review vulnerability scanning, reconnaissance, vulnerability management, and analyzing reconnaissance results
- Explore attack surfaces, social engineering, network, wireless, application, cloud attacks, and post-exploitation techniques
- Learn reporting, communication, analyzing findings, and suggesting remediation in a regulatory environment
- Study identifying and analyzing scripts and understand explaining penetration testing tools without requiring scripting or coding
How you will benefit
- Advance your cybersecurity skills
- Prepare for CompTIA PenTest+ certification exam
- Become highly desirable to employers in cybersecurity
Christopher Paul
Christopher Paul is a seasoned IT professional, cybersecurity expert, and Army veteran. He brings 15 years of experience, having previously held positions in military cybersecurity and tech startups. His robust skill set includes leadership, team building, active directory, data center, computer network operations, and more.
Christopher currently holds certifications in ISC2 SSCP, CompTIA CASP+, and CompTIA PenTest+. Outside work, he enjoys spending time with his two sons, running with his labradoodle, and playing the drums.
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.
Now is a great time to train for and expand on your current skill set to develop your career in cybersecurity! Information security analysts are projected to grow 33% by 2033, with over 17,000 jobs in this field projected annually by the U.S. Bureau of Labor Statistics. This PenTest+ certification course will expand on your existing cybersecurity skills, knowledge, and ability to perform tests on a variety of devices and systems. You will also further develop your ability to exploit network weaknesses and to plan, scope, and manage them.
During your training for the CompTIA PenTest+ certification, you will learn best practices in vulnerability assessment, scanning and analysis, planning, scoping, and managing weaknesses. You will dive into key tools for success and crucial reporting and communication techniques and best practices. The course curriculum uniquely reviews comprehensive coverage of all penetration testing stages you may see on the PenTest+ exam, unlike other exams that rely on limited stages with essay questions and hands-on tasks.
Upon course completion, you will be able to demonstrate proficiency in the latest penetration testing techniques for cloud, hybrid environments, web applications, Internet of Things (IoT), and traditional on-premises systems. This PenTest+ course offers CompTIA PenTest+ exam voucher with your enrollment. The voucher is prepaid access to sit for the certifying exam upon eligibility.
|
|
|
CompTIA PenTest+ Training Boot Camp
- CompTIA PenTest+ Training Boot Camp
-
Fee: $2,995.00
Dates: 4/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Location:
Building:
Room:
Instructor:
Take your cybersecurity career to new heights with this immersive boot camp designed to enhance your penetration testing skills. By the end of your training, you will be fully prepared for the CompTIA PenTest+ certification exam.
Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
Software Requirements:
- PC: Windows 10 or later.
- Mac: macOS 10.6 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
- Microsoft Word Online
- Adobe Acrobat Reader
- Zoom
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment and will be available online. PenTest+ certifications are continuing to rise for industry professionals looking to stand out and advance their careers as the demand for ethical hackers rises. The U.S. Bureau of Labor Statistics projects that information security analysts will increase 33% by 2033, with over 17,000 jobs estimated annually. Upskill your cybersecurity knowledge and credentials now, and you can start to earn an annual salary ranging from $92,759 to $125,000.
The CompTIA PenTest+ Training Boot Camp is an accelerated, in-depth program designed to help you enhance your penetration testing skills. This course is uniquely designed to equip you with the knowledge to confidently pass your PenTest+ certification exam and fulfill your responsibilities as a security consultant or penetration tester.
Over five days, your PenTest+ training will cover scoping organizational customer requirements, rules of engagement, vulnerability scanning and analyzing results, wireless network testing, system hacking, PenTest+ exam prep, and more.
With your PenTest+ course enrollment, you will receive an exam voucher for the CompTIA PenTest+ certification exam.
Our Certification Success Program, paired with our provided prep materials, boot camp sessions, and post-work, is designed to ease any concerns you may have when taking the certification exam. If your first attempt is unsuccessful, this program provides peace of mind that you may be eligible to take the certification exam a second time (if needed) at no additional fee.
*To qualify for a second certification exam voucher, students must:
- Attend at least 85% of each day of class
- Score a 90% or higher on their final practice exam
- Take the first exam within 90 days of class completion
- Upload your exam failure notice from your first exam attempt
- Day 1
- Scoping Organizational Customer Requirements
- Defining the Rules of Engagement
- Footprinting and Gathering Intelligence
- Evaluations Human and Physical Vulnerabilities
- Preparing the Vulnerability Scan
- Day 2
- Scanning Logical Vulnerabilities
- Analyzing Scanning Results
- Detection and Covering Tracks
- Day 3
- Testing Wireless Networks
- Targeting Mobile Devices
- Attacking Specialized Systems
- Web Application-Based Attacks
- Day 4
- Performing System Hacking
- Scripting and Software Development
- Leveraging the Attack: Pivot and Penetrate
- Communicating During the PenTesting Process
- Summarizing Report Components
- Day 5
- Recommending Remediation
- Performing Post-Report Delivery Activities
- Exam Readiness Activities
- Q&A and course wrap-up
What you will learn
- Plan and scope a penetration testing engagement
- Perform vulnerability scanning and penetration testing
- Produce a written report with remediation techniques
How you will benefit
- Practice your skills in the cyber range
- Access hands-on labs to bring you up to speed on the latest threats your organization is most vulnerable to
- Explore dozens of hands-on exercises and Capture the Flags (CTFs)
- Prepare to earn the CompTIA PenTest+ certification
Boot Camp
Boot camps are led by instructors that have years of industry experience and are recognized as subject matter experts.
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.
PenTest+ certifications are continuing to rise for industry professionals looking to stand out and advance their careers as the demand for ethical hackers rises. The U.S. Bureau of Labor Statistics projects that information security analysts will increase 33% by 2033, with over 17,000 jobs estimated annually. Upskill your cybersecurity knowledge and credentials now, and you can start to earn an annual salary ranging from $92,759 to $125,000.
The CompTIA PenTest+ Training Boot Camp is an accelerated, in-depth program designed to help you enhance your penetration testing skills. This course is uniquely designed to equip you with the knowledge to confidently pass your PenTest+ certification exam and fulfill your responsibilities as a security consultant or penetration tester.
Over five days, your PenTest+ training will cover scoping organizational customer requirements, rules of engagement, vulnerability scanning and analyzing results, wireless network testing, system hacking, PenTest+ exam prep, and more.
With your PenTest+ course enrollment, you will receive an exam voucher for the CompTIA PenTest+ certification exam.
Our Certification Success Program, paired with our provided prep materials, boot camp sessions, and post-work, is designed to ease any concerns you may have when taking the certification exam. If your first attempt is unsuccessful, this program provides peace of mind that you may be eligible to take the certification exam a second time (if needed) at no additional fee.
*To qualify for a second certification exam voucher, students must:
- Attend at least 85% of each day of class
- Score a 90% or higher on their final practice exam
- Take the first exam within 90 days of class completion
- Upload your exam failure notice from your first exam attempt
|
|
|
CompTIA Project+ (Voucher Included)
- CompTIA Project+ (Voucher Included)
-
Fee: $1,695.00
Dates: 4/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Location:
Building:
Room:
Instructor:
CompTIA Project+ is designed for business professionals who coordinate or manage small-to-medium-size projects inside and outside of IT. Upon course completion, you will be prepared for the CompTIA Project+ certification exam Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
Software Requirements:
- PC: Windows 10 or later.
- Mac: macOS 10.6 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
- Virtual Labs included with course
- Microsoft Word Online
- Adobe Acrobat Reader
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment. The following textbooks will be shipped to you approximately 7-10 business days after enrollment:
- CompTIA Project+ Certification All-in-One Exam Guide (Exam PK0-005), 1st Edition
Please note: You will receive a digital book if the physical book is on backorder. Project management skills are needed in almost every field and mastering the roles and responsibilities of project management can separate you from the rest of the workforce. Successful project management means leading your team through the completion of a project on time, within budget, and aligned with your company's goals –and even the smallest projects can benefit from these processes.
In this online project management course, you will learn project management techniques and become prepared to take the CompTIA Project+ certification exam. Although the CompTIA Project+ credential is primarily an IT project management certification, it validates project management skills to employers, both inside and outside the IT profession. The CompTIA Project+ certification also validates the communication and business skills you need to lead projects with confidence, complete projects on time, and make sure you stay within budget.
During this course, you will start with an overview of CompTIA Project+ exam and then dive into project management fundamentals and review project life cycle phases. You will understand the factors influencing project management activities and be able to analyze business cases, project selection, project charter, and stakeholder identification.
You will expand your understanding of Agile frameworks and hybrid frameworks and explore scope management on waterfall projects and Agile projects. The curriculum will cover best practices of planning and management, how to manage your team by defining ground rules, and a lesson on emotional intelligence. The course also covers many other crucial factors such as data security, quality control, budget planning and management, communication techniques, software selection and how to track performance and manage issues, impediments, and blockers.
This CompTIA project management course offers a voucher with your enrollment, which is prepaid access to sit for the certifying exam upon eligibility.
- CompTIA Project+
- Welcome to CompTIA Project+
- Project Management Fundamentals
- Project Life Cycle Phases/Overview
- Factors the influence project management activities
- Business Case and Project selection
- The Project Charter and Stakeholder Identification
- Agile Frameworks
- Agile Hybrid Frameworks
- Scope Management on Waterfall Projects
- Scope Management on Agile Projects
- Plan Quality Management
- Plan And Manage a Waterfall Schedule
- Scheduling Management on Agile Projects
- Resource Management Planning
- Define Team Ground Rules
- Emotional Intelligence
- Procurement Planning
- Data Security
- Plan and Manage Budget
- Execution and Performance Tracking
- Assess and Manage Risks
- Managing Issues, impediments, and blockers
- Manage Communications
- Manage Project Changes
- Manage Organizational Changes
- Control Quality
- Plan and Manage Project/Phase Closure
- Software Options for Project Management
What you will learn
- Purpose of a project charter
- Different Agile hybrid frameworks
- Project process groups
- Waterfall and Agile project lifecycle
- Define team ground rules
- Determine the critical path
- Establish a schedule baseline
- Quality assurance and quality control processes
- Create a quality baseline
- Assess and manage risks Better understand the different software options for project management
How you will benefit
- Acquire the skills required to plan and manage a small-to-medium-size project through to successful completion
- Gain the knowledge to manage the project life cycle, manage resources and stakeholders, and display appropriate communication
- Identify the basic aspects of the Agile methodology
- Prepare to pass the CompTIA Project+ certification exam
Ashley Hunt
Ashley Hunt is a world-recognized project management instructor who has authorship of books on PMP, ACP, and Project+. Ashley has helped over 10,000 individuals get their PMP certification.
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.
Project management skills are needed in almost every field and mastering the roles and responsibilities of project management can separate you from the rest of the workforce. Successful project management means leading your team through the completion of a project on time, within budget, and aligned with your company's goals –and even the smallest projects can benefit from these processes.
In this online project management course, you will learn project management techniques and become prepared to take the CompTIA Project+ certification exam. Although the CompTIA Project+ credential is primarily an IT project management certification, it validates project management skills to employers, both inside and outside the IT profession. The CompTIA Project+ certification also validates the communication and business skills you need to lead projects with confidence, complete projects on time, and make sure you stay within budget.
During this course, you will start with an overview of CompTIA Project+ exam and then dive into project management fundamentals and review project life cycle phases. You will understand the factors influencing project management activities and be able to analyze business cases, project selection, project charter, and stakeholder identification.
You will expand your understanding of Agile frameworks and hybrid frameworks and explore scope management on waterfall projects and Agile projects. The curriculum will cover best practices of planning and management, how to manage your team by defining ground rules, and a lesson on emotional intelligence. The course also covers many other crucial factors such as data security, quality control, budget planning and management, communication techniques, software selection and how to track performance and manage issues, impediments, and blockers.
This CompTIA project management course offers a voucher with your enrollment, which is prepaid access to sit for the certifying exam upon eligibility.
|
|
|
CompTIA Security+ Certification Training (Voucher Included)
- CompTIA Security+ Certification Training (Voucher Included)
-
Fee: $1,995.00
Dates: 4/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Location:
Building:
Room:
Instructor:
Learn a broad range of security topics, including threat management, identity management, access control, cryptography, and network security. This course will teach you everything you need to take and successfully pass the CompTIA Security+ certification exam. Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
- Labs included in this program are not supported on mobile devices (i.e., phones and tablets).
Software Requirements:
- PC: Windows 10 or later.
- Mac: macOS 10.6 or later.
- Chromebook 113 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
- Microsoft Word. To complete your assignments, you may need Microsoft Word 2003 or higher, or an equivalent word-processing program, such as LibreOffice, which is available to download for free.
- Adobe Acrobat Reader.
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
- A reliable high-speed Internet connection
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment. The textbook for the Security+ course is accessed via links in the course lessons.
- CompTIA Security+ Guide to Network Security Fundamentals
Boost your cybersecurity career and yearly income by obtaining your CompTIA Security+ certification! According to CompTIA, five of the top six security jobs have annual salaries of $90,000 or higher, with some exceeding $127,000. The Security+ certification is widely recognized and well-respected in the IT industry and it will validate your skills and help you gain top-paying employment.
The vendor-neutral CompTIA Security+ certification covers a broad range of security topics, including threat management, identity management, access control, cryptography, and network security. By completing this CompTIA Security+ course, learning key cybersecurity concepts and mastering accompanying quizzes and tests, you will be well-prepared to take the Security+ certification exam.
This online CompTIA Security+ training covers the essential knowledge and skills required to identify, assess, and mitigate security risks in modern IT environments. This course provides a comprehensive overview of the key concepts and best practices in cybersecurity, including the latest trends and emerging threats. It also teaches the fundamental principles of cybersecurity and enables students to implement security controls that protect against a wide range of attacks and vulnerabilities.
This Security+ certification course offers an exam voucher with enrollment. The voucher covers the cost to sit for the certifying exam upon eligibility. After completing the CompTIA Security+ course, you can set up your own exam dates and times at a nearby testing center.
- Introduction to CompTIA
- Security Fundamentals
- Threat Management and Cybersecurity Resources
- Threats and Attacks on Endpoints
- Endpoint and Application Development Security
- Cryptography
- Public Key Infrastructure and Cryptographic Protocols
- Mobile, Embedded, and Specialized Device Security
- Networking Threats, Assessments, and Defenses
- Network Security Appliances and Technologies
- Cloud and Virtualization Security
- Network Threats, Assessments, and Defenses
- Authentication
- Incident Preparation, Response, and Investigation
- Cybersecurity Resilience
- Risk Management and Data Privacy
- Preparing for the Certificate Exam
- Exploring a Career in Cybersecurity
What you will learn
- Gain fundamental concepts of computer security
- Understand cybersecurity threats, vulnerabilities, and assessments
- Review incident preparations, response, and risk management
- Learn to monitor and secure hybrid environments, including cloud, mobile, Internet of Things (IoT), and operational technology
How you will benefit
- Prepare for the CompTIA Security+ certificate exam
- Utilize a variety of interactives, assignments, and assessments
- Review topics covering the most updated objectives found in the CompTIA Security+ exam
Linda Matthews
Linda Matthews has years of experience both in the classroom teaching technical material and in the field solving a myriad of technical issues.
Linda possesses the background to engage deeply with cybersecurity through teaching and intellectual focus. For the past eight years, she has lived with this vast and fascinating body of knowledge. Now, she regularly trains individuals in several of the most popular security courses from CompTIA and Microsoft. CompTIA's Security+ is the foundational course students need to begin an incredible journey into cybersecurity.
Linda has a strong love for teaching and igniting the spark that can set students on a most worthwhile and fulfilling path.
Sara Perrott
Sara Perrott has been working in the information technology field for 20+ years and has devoted the last 10 of those to focusing on cybersecurity. She is a published author and a former college professor, and she is passionate about teaching the next generation of cybersecurity professionals. Sara has a Master of Science in Cybersecurity and Information Assurance from Western Governors University Washington and a Bachelor of Science in Information Systems Security from the University of Phoenix.
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.
Boost your cybersecurity career and yearly income by obtaining your CompTIA Security+ certification! According to CompTIA, five of the top six security jobs have annual salaries of $90,000 or higher, with some exceeding $127,000. The Security+ certification is widely recognized and well-respected in the IT industry and it will validate your skills and help you gain top-paying employment.
The vendor-neutral CompTIA Security+ certification covers a broad range of security topics, including threat management, identity management, access control, cryptography, and network security. By completing this CompTIA Security+ course, learning key cybersecurity concepts and mastering accompanying quizzes and tests, you will be well-prepared to take the Security+ certification exam.
This online CompTIA Security+ training covers the essential knowledge and skills required to identify, assess, and mitigate security risks in modern IT environments. This course provides a comprehensive overview of the key concepts and best practices in cybersecurity, including the latest trends and emerging threats. It also teaches the fundamental principles of cybersecurity and enables students to implement security controls that protect against a wide range of attacks and vulnerabilities.
This Security+ certification course offers an exam voucher with enrollment. The voucher covers the cost to sit for the certifying exam upon eligibility. After completing the CompTIA Security+ course, you can set up your own exam dates and times at a nearby testing center.
|
|
|
CompTIA Security+ Training Boot Camp
- CompTIA Security+ Training Boot Camp
-
Fee: $2,799.00
Dates: 4/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Location:
Building:
Room:
Instructor:
The CompTIA Security+ Training Boot Camp teaches you information security theory and reinforces that theory with hands-on exercises to help you learn by doing. You will learn how to configure and operate many different technical security controls — and leave prepared to pass your Security+ exam. Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
- A microphone.
- Speakers.
- A webcam.
Software Requirements:
- PC: Windows 7 or later.
- Mac: macOS 10.7 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
- Microsoft Word Online.
- Adobe Acrobat Reader.
- Zoom Meetings.
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The student materials required for this course are included in enrollment and will be available online. Security+ holders have the knowledge and skills to help organizations proactively identify potential security risks and respond more quickly when incidents do occur. This boot camp includes five days of live training covering today's most critical information security issues and practices. You will leave fully prepared to pass the popular CompTIA Security+ SY0-701 exam and address real-world security challenges across the five areas outlined by the Security+ exam objectives:
- Attacks, threats, and vulnerabilities
- Architecture and design
- Implementation
- Operations and incident response
- Governance, risk, and compliance
You will also receive an exam voucher for the CompTIA Security+ certification exam with your enrollment.
Our Certification Success Program, paired with our provided prep materials, boot camp sessions, and post-work, is designed to ease any concerns you may have when taking the certification exam. If your first attempt is unsuccessful, this program provides peace of mind that you may be eligible to take the certification exam a second time (if needed) at no additional fee.
*To qualify for a second certification exam voucher, students must:
- Attend at least 85% of each day of class
- Score a 90% or higher on their final practice exam
- Take the first exam within 90 days of class completion
- Upload your exam failure notice from your first exam attempt
- Domain 1: General Security Concepts
- Types of security controls
- Fundamental security concepts
- Change management processes
- Cryptographic solutions
- Threat actors
- Domain 2: Threats, Vulnerabilities, and Mitigations
- Common threat actors
- Threat vectors and attack surfaces
- Vulnerabilities types
- Indicators of malicious activity
- Mitigation techniques
- Domain 3: Security Architecture
- Architecture model security implications
- Security principles for enterprise infrastructure
- Data protection concepts and strategies
- Resilience and recovery in security architecture
- Account management practices
- Domain 4: Security Operations
- Common security techniques for computing resources
- Hardware, software, and data asset management
- Vulnerability management
- Security monitoring concepts and tools
- Enterprise security capabilities
- Identity and access management.
- Security automation and orchestration
- Incident response
- Data sources for investigations
- Domain 5: Security Program Management and Oversight
- Elements of effective security governance
- Risk management
- Assessing and managing third-party risks
- Security compliance
- Conducting audits and assessments
- Security awareness practices
- SY0-701 exam
- SY0-701 overview
- Infosec's Security+ SY0-701 exam cram
- Take the SY0-701 exam
What you will learn
- Essential information security concepts
- Threats and attack vectors used by malicious actors
- Network security, monitoring, access control, cryptography, and more
How you will benefit
- Learn key concepts and objectives related to information security issues and practices
- Obtain techniques and methodologies used to successfully configure, execute, construct, and troubleshoot network security to ensure the threat of viruses, worms, Trojans, and improper configuration is minimized or negated
- Training covers the updated objectives added to the most recent version of the exam (SY0-701), including additional cyber threats, cloud environments, entry-level incident response, and governance, risk, and compliance (GRC)
Boot camps are led by instructors that have years of industry experience and are recognized as subject matter experts.
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.
Security+ holders have the knowledge and skills to help organizations proactively identify potential security risks and respond more quickly when incidents do occur. This boot camp includes five days of live training covering today's most critical information security issues and practices. You will leave fully prepared to pass the popular CompTIA Security+ SY0-701 exam and address real-world security challenges across the five areas outlined by the Security+ exam objectives:
- Attacks, threats, and vulnerabilities
- Architecture and design
- Implementation
- Operations and incident response
- Governance, risk, and compliance
You will also receive an exam voucher for the CompTIA Security+ certification exam with your enrollment.
Our Certification Success Program, paired with our provided prep materials, boot camp sessions, and post-work, is designed to ease any concerns you may have when taking the certification exam. If your first attempt is unsuccessful, this program provides peace of mind that you may be eligible to take the certification exam a second time (if needed) at no additional fee.
*To qualify for a second certification exam voucher, students must:
- Attend at least 85% of each day of class
- Score a 90% or higher on their final practice exam
- Take the first exam within 90 days of class completion
- Upload your exam failure notice from your first exam attempt
|
|
|
CompTIA SecurityX (formerly CASP+) Training Boot Camp
- CompTIA SecurityX (formerly CASP+) Training Boot Camp
-
Fee: $2,995.00
Dates: 4/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Location:
Building:
Room:
Instructor:
This CompTIA SecurityX boot camp, formerly known as the CASP+ boot camp, is designed to help you achieve your SecurityX certification and boost your cybersecurity/IT career. You will also learn crucial areas, from analyzing security risks to implementing enterprise-wide security solutions. Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
Software Requirements:
- PC: Windows 10 or later.
- Mac: macOS 10.6 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
- Microsoft Word Online
- Adobe Acrobat Reader
- Zoom
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment and will be available online. Earning your CompTIA SecurityX certification, formerly known as the CASP+ certification, can unlock new career opportunities and high annual salaries for trained professionals.
Within this five-day CompTIA SecurityX boot camp, you will learn the skills necessary to conceptualize, design, and engineer secure solutions across complex enterprise environments. Our hands-on approach ensures you can apply critical thinking and tackle real-world security challenges. From analyzing security risks to implementing enterprise-wide security solutions, you will be able to handle it all without breaking a sweat.
This online cybersecurity certification course dives deep into security architecture, security operations, security engineering, cryptography and governance, risk, and compliance. You will apply critical thinking to propose and implement solutions that map to enterprise drivers.
With your enrollment in this CompTIA SecurityX course, you will receive an exam voucher for the CompTIA SecurityX exam.
Our Certification Success Program, paired with our provided prep materials, boot camp sessions, and post-work, is designed to ease any concerns you may have when taking the SecurityX exam. If your first attempt is unsuccessful, this program provides peace of mind that you may be eligible to take the certification exam a second time (if needed) at no additional fee.
*To qualify for a second certification exam voucher, students must:
- Attend at least 85% of each day of class
- Score a 90% or higher on their final practice exam
- Take the first exam within 90 days of class completion
- Upload your exam failure notice from your first exam attempt
- Day1
- Summarizing Governance, Risk and Compliance
- Day2
- Implementing Architecture & Design
- Day3
- Understanding Security Engineering
- Day 4
- Applying Security Operations & Incident Response
- Day 5
- SecurityX Exam Review
What you will learn
- Gain the skills to conceptualize, design, and engineer solutions across complex enterprise environments
- Learn to tackle real-world security challenges
- Understand how to propose and implement solutions
How you will benefit
- Practice your skills in the cyber range
- Access hands-on labs to bring you up to speed with the latest threats to which your organization is most vulnerable
- Prepare to earn the CompTIA SecurityX certification
Boot Camp
Boot camps are led by instructors that have years of industry experience and are recognized as subject matter experts.
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.
Earning your CompTIA SecurityX certification, formerly known as the CASP+ certification, can unlock new career opportunities and high annual salaries for trained professionals.
Within this five-day CompTIA SecurityX boot camp, you will learn the skills necessary to conceptualize, design, and engineer secure solutions across complex enterprise environments. Our hands-on approach ensures you can apply critical thinking and tackle real-world security challenges. From analyzing security risks to implementing enterprise-wide security solutions, you will be able to handle it all without breaking a sweat.
This online cybersecurity certification course dives deep into security architecture, security operations, security engineering, cryptography and governance, risk, and compliance. You will apply critical thinking to propose and implement solutions that map to enterprise drivers.
With your enrollment in this CompTIA SecurityX course, you will receive an exam voucher for the CompTIA SecurityX exam.
Our Certification Success Program, paired with our provided prep materials, boot camp sessions, and post-work, is designed to ease any concerns you may have when taking the SecurityX exam. If your first attempt is unsuccessful, this program provides peace of mind that you may be eligible to take the certification exam a second time (if needed) at no additional fee.
*To qualify for a second certification exam voucher, students must:
- Attend at least 85% of each day of class
- Score a 90% or higher on their final practice exam
- Take the first exam within 90 days of class completion
- Upload your exam failure notice from your first exam attempt
|
|
|
CompTIA SecurityX Certification Training (Voucher Included)
- CompTIA SecurityX Certification Training (Voucher Included)
-
Fee: $1,595.00
Dates: 4/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Location:
Building:
Room:
Instructor:
Cloud computing is how technology is done today, and this online CompTIA SecurityX certification course, formerly known as the CASP+ certification, will teach you key skills while preparing you for the SecurityX industry credential. Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
Software Requirements:
- PC: Windows 10 or later.
- Mac: macOS 10.6 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
- Virtual Labs included with course
- Microsoft Word Online
- Adobe Acrobat Reader
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment and available online.
- Study guide
- Virtual labs
- Practice exams
From small businesses to large corporations, nearly every organization needs cybersecurity. With security being the fastest-growing sector in the IT field, earning a CompTIA SecurityX certification, formerly known as the CASP+ certification, boosts your professional profile.
This CompTIA SecurityX training provides you with the knowledge and skills to support IT governance and risk management, leverage collaboration to support security, and utilize research and analysis to secure the enterprise. The course delves into advanced authentication and authorization techniques, cryptographic techniques, and security controls for hosts, mobile devices, and networks. It also covers integrating security into the systems and software development lifecycle and conducting security assessments.
To equip you for success upon course completion, the course covers incident response and recovery strategies, better enabling your understanding of security incidents you may face post-graduation.
This CompTIA SecurityX course will prepare you for the SecurityX certification exam in a flexible, online environment. This course offers enrollment with a SecurityX exam voucher. The voucher is prepaid access to sit for the CompTIA SecurityX (CAS-005) certifying exam upon eligibility. Proctor fees may apply, which are not included.
- Governance, Risk, and Compliance
- Security Architecture
- Security Engineering
- Security Operations
What you will learn
- Review IT governance in the enterprise with an emphasis on managing risk
- Use research and analysis to secure the enterprise
- Integrate advanced authentication and authorization techniques
- Implement cryptographic techniques, security controls for hosts and mobile devices, network security, and security in the systems and software development lifecycle
- Leverage collaboration tools and technology to support enterprise security
- Conduct security assessments and respond and recover from security incidents
- Integrate hosts, storage, networks, applications, virtual environments, and cloud technologies in a secure enterprise architecture
How you will benefit
- Gain skills in five key areas: risk management, security architecture, security operations, security integration, and research and development
- Receive a prepaid voucher that covers the cost of the CompTIA SecurityX (CAS-005) exam
- Build confidence toward successfully completing the SecurityX certification exam
- Become recognized by CompTIA, a global leader in certification, training, and career development
- Prove comprehensive cybersecurity knowledge to employers
Christopher Paul
Christopher Paul is a seasoned IT professional, cybersecurity expert, and Army veteran. He brings 15 years of experience, having previously held positions in military cybersecurity and tech startups. His robust skill set includes leadership, team building, active directory, data center, computer network operations, and more.
Christopher currently holds certifications in ISC2 SSCP, CompTIA CASP+, and CompTIA PenTest+. Outside work, he enjoys spending time with his two sons, running with his labradoodle, and playing the drums.
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.
From small businesses to large corporations, nearly every organization needs cybersecurity. With security being the fastest-growing sector in the IT field, earning a CompTIA SecurityX certification, formerly known as the CASP+ certification, boosts your professional profile.
This CompTIA SecurityX training provides you with the knowledge and skills to support IT governance and risk management, leverage collaboration to support security, and utilize research and analysis to secure the enterprise. The course delves into advanced authentication and authorization techniques, cryptographic techniques, and security controls for hosts, mobile devices, and networks. It also covers integrating security into the systems and software development lifecycle and conducting security assessments.
To equip you for success upon course completion, the course covers incident response and recovery strategies, better enabling your understanding of security incidents you may face post-graduation.
This CompTIA SecurityX course will prepare you for the SecurityX certification exam in a flexible, online environment. This course offers enrollment with a SecurityX exam voucher. The voucher is prepaid access to sit for the CompTIA SecurityX (CAS-005) certifying exam upon eligibility. Proctor fees may apply, which are not included.
|
|
|
CompTIA TECH+ Certification Training (Voucher Included)
- CompTIA TECH+ Certification Training (Voucher Included)
-
Fee: $895.00
Dates: 4/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Location:
Building:
Room:
Instructor:
The CompTIA TECH+ certification training is designed for individuals seeking to improve their IT skills. This training program covers essential IT concepts, providing a solid foundation of fundamental skills and preparing you for a dynamic IT career in the rapidly evolving tech landscape. Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
Software Requirements:
- PC: Windows 10 or later.
- Mac: macOS 10.6 or later.
- Chromebook 113 or later
- Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
- Microsoft Word. To complete your assignments, you may need Microsoft Word 2003 or higher, or an equivalent word-processing program, such as OpenOffice, which is available to download for free.
- Adobe Acrobat Reader. (Software must be installed and fully operational before the course begins.)
Other:
- A reliable high-speed Internet connection
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment. The following textbook will be shipped to you approximately 7-10 business days after enrollment:
- CompTIA® TECH+ Cert Mike: Prepare. Practice. Pass the Test! Get Certified! Exam FC0-U71, by Mike Chapple
Prepare for a successful start in the IT field with the CompTIA TECH+ certification, formerly known as the CompTIA ITF+ certification. Tailored for those without prior experience, this comprehensive information technology (IT) training program covers essential areas of information technology, including PC hardware, operating systems, applications, networking, programming, databases, and security. By acquiring this foundational knowledge, you will develop your IT skill set and build a solid base for further certification exams such as A+, Network+, and Security+.
This IT course is designed to help you showcase your readiness for the digital workplace. From networking and cybersecurity essentials to hardware and software basics, it equips you with proficiency in today's technologies, whether you are considering a career in IT or work in a related field requiring broad IT understanding. Moreover, earning the CompTIA TECH+ certification serves as a step towards advanced certifications like CompTIA A+, Network+, and Security+, providing a holistic approach for long-term success and expertise in the ever-evolving field of information technology.
This IT certification course includes a voucher for the CompTIA TECH+ certification exam, covering the cost of the certifying exam upon eligibility.
- CompTIA TECH+ Certification Training
- Introduction to CompTIA Certification
- IT Concepts and Terminology
- Understanding Computer Hardware
- Data Storage
- Operating Systems
- Networking Basics
- Managing Applications
- Troubleshooting Basics
- Database Fundamentals
- Security Basics
- Authentication, Authorization, and Accounting
- Protecting Data and Ensuring Business Continuity
- Software Development Fundamentals
- Preparing for a Certification Exam
What you will learn
- Understand how to define IT-related terminology and concepts
- Be able to explain and classify computer hardware and networking devices
- Gain knowledge on the purposes and functions of operating systems and application software
- Learn and explain about the tools and constructs that enable programmers to create software
- Describe how databases store and report structured data
- Summarize IT security threats and the methods of mitigating their risks
- Explain the basic structure, content, and purpose of CompTIA certification exams
How you will benefit
- Show potential or current employers that you have the knowledge and skills needed to succeed on the job—setting you apart from other candidates
- Become fully prepared to take the CompTIA TECH+ certification exam, which is ideal for those who have or are applying for positions that involve some IT proficiency
- Demonstrate your ability to provide colleagues, family members, or friends with basic PC support
This course is designed for self-paced learning and does not feature a designated instructor.
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.
Prepare for a successful start in the IT field with the CompTIA TECH+ certification, formerly known as the CompTIA ITF+ certification. Tailored for those without prior experience, this comprehensive information technology (IT) training program covers essential areas of information technology, including PC hardware, operating systems, applications, networking, programming, databases, and security. By acquiring this foundational knowledge, you will develop your IT skill set and build a solid base for further certification exams such as A+, Network+, and Security+.
This IT course is designed to help you showcase your readiness for the digital workplace. From networking and cybersecurity essentials to hardware and software basics, it equips you with proficiency in today's technologies, whether you are considering a career in IT or work in a related field requiring broad IT understanding. Moreover, earning the CompTIA TECH+ certification serves as a step towards advanced certifications like CompTIA A+, Network+, and Security+, providing a holistic approach for long-term success and expertise in the ever-evolving field of information technology.
This IT certification course includes a voucher for the CompTIA TECH+ certification exam, covering the cost of the certifying exam upon eligibility.
|
|
|
Computer Hacking Forensics Investigator (CHFI) (Voucher Included)
- Computer Hacking Forensics Investigator (CHFI) (Voucher Included)
-
Fee: $2,895.00
Dates: 4/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Location:
Building:
Room:
Instructor:
This course prepares for Computer Hacking Forensics Investigator (CHFI) certification exam. You will master the security discipline of digital forensics from a vendor-neutral perspective. Requirements:
Hardware Requirements:
- This course can be taken on either a PC or Mac.
Software Requirements:
- PC: Windows 8 or later.
- Mac: macOS 10.10 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
- Adobe Acrobat Reader.
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment and will be available online. The materials are non-refundable upon registration. This computer forensics certification course is designed to equip you with the necessary skills to pass the EC-Council's Computer Hacking Forensic Investigator (CHFI) Certification exam. By achieving this credential, you will be able to demonstrate your proficiency in digital forensic tools and techniques that are crucial in today's cybersecurity industry.
Our digital forensics certification course takes a comprehensive and meticulous approach to computer forensics and evidence analysis. You will learn how to identify an intruder's traces, collect the appropriate evidence for prosecution, and prevent future attacks.
Taught by a skilled digital forensics professional, in this CHFI certification program, you will learn a reliable method for conducting forensic investigations, which includes templates for collecting evidence, maintaining the chain of custody, and creating final investigation reports. Additionally, you will have access to cloud-based virtual labs on advanced Cyber Ranges, allowing you to practice different investigation techniques in realistically simulated environments.
Note: This computer forensics certification is an ANSI 17024 accredited program, mapped to the NICE 2.0 framework and recognized and approved by the DoD under Directive 8570. Course enrollment includes a voucher that covers the certification exam fee upon eligibility. You can take the exam remotely through a proctor function—ensuring scheduling and testing are convenient.
- Computer Forensics in Today's World
- Computer Forensics Investigation Process
- Understanding Hard Disks and File Systems
- Data Acquisition and Duplication
- Defeating Anti-Forensics Techniques
- Windows Forensics
- Linux and Mac Forensics
- Network Forensics
- Malware Forensics
- Investigating Web Attacks
- Dark Web Forensics
- Cloud Forensics
- Email and Social Media Forensics
- Mobile Forensics
- IoT Forensics
What you will learn
- Establish threat intelligence and key learning points to support pro-active profiling and scenario modeling
- Perform anti-forensic methods detection
- Conduct post-intrusion analysis of electronic and digital media to determine who, where, what, when, and how the intrusion occurred
- Extract and analyze logs from various devices such as proxy, firewall, IPS, IDS, desktop, laptop, servers, SIM tool, router, firewall, switches AD server, DHCP logs, and access control logs as part of the investigation process
- Identify & check the possible source/incident origin
- Recover deleted files and partitions in Windows, macOS, and Linux
How you will benefit
- Become a Certified Hacking Forensics Investigator (CHFI)
- Exam eligibility for the EC-Council Certified Hacking Forensics Investigator (CHFI) Exam Number 312-49 with example CHFI questions
- The CHFI certification can fortify the applied knowledge level of law enforcement, system administrators, security, defense and military personnel, legal, banking, and computer and network security. It helps to enhance knowledge and skills in digital investigations and network integrity
Eric Reed
Eric Reed has over 12 years of experience in IT consulting, specializing in security. Since 2005, he has consulted and delivered custom training to the U.S. military and numerous Fortune 100 and Fortune 500 companies. He has delivered CEH, CHFI, and ECSA/LPT training for the last seven years, with a 95 percent pass rating. Reed was awarded the EC Council Instructor of the Year in 2009 and 2012, as well as the Circle of Excellence in 2006, 2007, and 2010.
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.
This computer forensics certification course is designed to equip you with the necessary skills to pass the EC-Council's Computer Hacking Forensic Investigator (CHFI) Certification exam. By achieving this credential, you will be able to demonstrate your proficiency in digital forensic tools and techniques that are crucial in today's cybersecurity industry.
Our digital forensics certification course takes a comprehensive and meticulous approach to computer forensics and evidence analysis. You will learn how to identify an intruder's traces, collect the appropriate evidence for prosecution, and prevent future attacks.
Taught by a skilled digital forensics professional, in this CHFI certification program, you will learn a reliable method for conducting forensic investigations, which includes templates for collecting evidence, maintaining the chain of custody, and creating final investigation reports. Additionally, you will have access to cloud-based virtual labs on advanced Cyber Ranges, allowing you to practice different investigation techniques in realistically simulated environments.
Note: This computer forensics certification is an ANSI 17024 accredited program, mapped to the NICE 2.0 framework and recognized and approved by the DoD under Directive 8570. Course enrollment includes a voucher that covers the certification exam fee upon eligibility. You can take the exam remotely through a proctor function—ensuring scheduling and testing are convenient.
|
|
|
Computer Networking Suite Offered in partnership with ed2go
-
Fee: $350.00
Hours: 72
Learn the fundamentals of networking and prepare for a career in an exciting and fast-growing field.
|
|
|
Cybersecurity Boot Camp
- Cybersecurity Boot Camp
-
Fee: $4,275.00
Dates: 4/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Location:
Building:
Room:
Instructor:
Discover an accelerated training cybersecurity boot camp with a focus on creating the next generation of cybersecurity professionals. You will master key security concepts and fundamentals while preparing for the CompTIA Security+ certification exam. Requirements:
Hardware Requirements:
- This course must be taken on a PC. Macs are not compatible.
- This course should be taken on a Windows Machine (Desktop/Laptop). MAC machines with the m1 chip are not supported.
Software Requirements:
- PC: Windows 11 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge is also compatible.
- Adobe Acrobat Reader
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment and will be available online. The digital textbooks can be accessed via links in the course lessons.
- CompTIA Network+ Guide to Networks, 10th Edition
- CompTIA Security+ Guide to Network Security Fundamentals, 8th Edition
According to Gartner, the global cybersecurity market size is projected to reach $212 billion in 2025, representing a significant growth rate of around 15%. To meet increased demand, the industry needs more qualified cybersecurity professionals who are trained and certified to join the workforce. This six-month beginner cybersecurity boot camp will help you understand the foundations of cybersecurity and learn the skills required to enter the field with no prior experience.
The cybersecurity course curriculum features 17 engaging lessons across four key sections. Each section includes hands-on activities and a project that allows you to implement and test your newly acquired skills. You will begin by gaining an in-depth introduction to the fundamentals of cybersecurity as well as an exploration of its main certifications, job titles, and career opportunities. Next, you will dive into identifying security threats and vulnerabilities, and how to manage and prevent attacks. You will also review essential security operation principles and technologies, concepts, and operating systems. In addition, you will also gain access to the Infosec Skills platform to leverage their extensive knowledge base to further your training.
With a 15-25 hour per week commitment to master the material, by the end of this self-paced cybersecurity training, you will fully understand what role in cybersecurity best aligns with your career goals and be prepared to navigate challenging job interview questions. The capstone project and final lessons of this course will help you find your first cybersecurity position and finalize your professional portfolio.
Employers look for specific qualifications when reviewing job applications, including IT experience, industry-recognized certifications, and the ability to perform security tasks. This computer security course will help you demonstrate your abilities through your completed projects, detailed explanations of job responsibilities, and practice exams to help you prepare for the CompTIA Security+ certification exam.
Upon successful cybersecurity course completion, you will be provided with a voucher for the CompTIA Security+ certification exam, which covers the cost to sit for the certifying exam upon eligibility.
- Introduction to Cybersecurity
- Exploring a career in Cybersecurity
- Certifications
- Security Fundamentals
- Network Security Fundamentals
- Operating System Security
- Cyber Threats and Attack
- Cryptography
- Web Application Security
- Ethical Hacking
- Security in Network Design
- Security Policies and Compliance
- Risk Management and Data Privacy
- Incident Preparation, Response, and Investigation
- Cloud and Virtualization Security
- Mobile, Embedded and Specialized Device Security
- Employment and the Future of Cybersecurity
What you will learn
- Describe the field of cybersecurity and understand the pathways for navigating entry into a career in cybersecurity
- Explain ethical hacking principles and practices and analyze risk management concepts for cybersecurity
- Identify security threats and vulnerabilities and explain malware and application attacks
- Protect operating systems by addressing threats, enforcing policies, and exploring emerging technologies using security principles
- Apply cybersecurity concepts in safe environments like sandboxes, virtual machines, and simulations
- Apply network and web security principles and technologies, including mitigating vulnerabilities, implementing secure practices, and preparing for evolving threats and incidents
- Manage security for data, applications, and hosts in mobile and specialized devices, as well as implement cloud and virtual security networks
- Learn to troubleshoot and manage security incidents and how to plan for business continuity and disaster recovery
How you will benefit
- Become prepared to pass the CompTIA Security+ certification exam with content coverage and practice exams
- Obtain a voucher for CompTIA Security+ with your boot camp enrollment
- Align your career goals through the exploration of various roles in cybersecurity, including cybersecurity analyst, SOC analyst, system and network administrator
- Get a 6-month access to Infosec Skills platform with hundreds of hours of cyber content
Marcelo Guerra Hahn
Marcelo Guerra Hahn is an experienced educator and technology leader with a strong background in software engineering, data analytics, and cybersecurity. With over a decade of teaching experience at institutions like the University of Washington and Lake Washington Institute of Technology, Marcelo has developed and delivered courses on critical topics, including IT project management, quality assurance, and algorithms.
Marcelo's engineering career includes leadership roles at Microsoft, Tableau Software, and SoundCommerce, where he managed teams and implemented robust systems to enhance security, efficiency, and scalability. He has extensive certifications in Microsoft Azure, AWS, Google Cloud, and advanced cybersecurity frameworks, combined with his practical experience. A published author and speaker, Marcelo brings a dynamic, real-world perspective to his teaching, empowering students to tackle today's cybersecurity challenges confidently.
Brett Glines
Brett Glines holds a Bachelor of Science in Finance from BYU and an MBA from Emory University. Since 1995, he has excelled as a consultant and educator in the field of technical education, primarily specializing in IT applications, leadership development, and certification. He has helped thousands transition into IT careers and holds certifications in CompTIA A+, Network+, and Security+.
Brett is a master at leveraging online environments for learning and has been training online exclusively since 2015. He focuses on engaging students, ensuring they understand and remember what they learn. He uses practical examples, everyday analogies, and recall techniques to make learning easier and more effective.
Sara Perrott
Sara Perrott has been working in the information technology field for 20+ years and has devoted the last 10 of those to focusing on cybersecurity. She is a published author and a former college professor, and she is passionate about teaching the next generation of cybersecurity professionals. Sara has a Master of Science in Cybersecurity and Information Assurance from Western Governors University Washington and a Bachelor of Science in Information Systems Security from the University of Phoenix.
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.
According to Gartner, the global cybersecurity market size is projected to reach $212 billion in 2025, representing a significant growth rate of around 15%. To meet increased demand, the industry needs more qualified cybersecurity professionals who are trained and certified to join the workforce. This six-month beginner cybersecurity boot camp will help you understand the foundations of cybersecurity and learn the skills required to enter the field with no prior experience.
The cybersecurity course curriculum features 17 engaging lessons across four key sections. Each section includes hands-on activities and a project that allows you to implement and test your newly acquired skills. You will begin by gaining an in-depth introduction to the fundamentals of cybersecurity as well as an exploration of its main certifications, job titles, and career opportunities. Next, you will dive into identifying security threats and vulnerabilities, and how to manage and prevent attacks. You will also review essential security operation principles and technologies, concepts, and operating systems. In addition, you will also gain access to the Infosec Skills platform to leverage their extensive knowledge base to further your training.
With a 15-25 hour per week commitment to master the material, by the end of this self-paced cybersecurity training, you will fully understand what role in cybersecurity best aligns with your career goals and be prepared to navigate challenging job interview questions. The capstone project and final lessons of this course will help you find your first cybersecurity position and finalize your professional portfolio.
Employers look for specific qualifications when reviewing job applications, including IT experience, industry-recognized certifications, and the ability to perform security tasks. This computer security course will help you demonstrate your abilities through your completed projects, detailed explanations of job responsibilities, and practice exams to help you prepare for the CompTIA Security+ certification exam.
Upon successful cybersecurity course completion, you will be provided with a voucher for the CompTIA Security+ certification exam, which covers the cost to sit for the certifying exam upon eligibility.
|
|
|
EC Council Certified Ethical Hacking Training Boot Camp
- EC Council Certified Ethical Hacking Training Boot Camp
-
Fee: $3,199.00
Dates: 4/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Location:
Building:
Room:
Instructor:
Discover vulnerabilities before the bad guys do! This ethical hacker training goes in-depth into the techniques used by malicious actors with attention-getting lectures and hands-on labs. Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
Software Requirements:
- PC: Windows 10 or later.
- Mac: macOS 10.6 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
- Microsoft Word Online
- Adobe Acrobat Reader
- Zoom
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment and will be available online. Delve into the tools and techniques used by cybercriminals over five days in this online ethical hacker certification boot camp. Gain in-depth training in ethical hacking methodologies through lectures and hands-on labs to ensure you have the skills to measure and access threats. Our cloud-hosted cyber range provides practical experience in reconnaissance, system access, vulnerability exploitation, and data exfiltration.
This Certified Ethical Hacker (CEH) boot camp covers everything from passive reconnaissance and OSINT to network scanning, exploitation, and web application attacks. You will delve into the depths of password security, social engineering, and physical security, learning the skills needed to identify vulnerabilities and cover tracks effectively.
Upon course completion, you will gain the knowledge needed to obtain your EC-Council Certified Ethical Hacker (CEH) certification. This certification validates your ability to assess and measure threats to information assets and identify vulnerabilities in your organization's systems. With this certification in hand and the training you receive in this CEH boot camp, you will be well-equipped to protect your organization from malicious actors.
With your enrollment in this CEH course, you will receive an exam voucher for the EC-Council CEH certification exam.
Our Certification Success Program, paired with our provided prep materials, boot camp sessions, and post-work, is designed to ease any concerns you may have when taking the certification exam. If your first attempt is unsuccessful, this program provides peace of mind that you may be eligible to take the certification exam a second time (if needed) at no additional fee.
*To qualify for a second certification exam voucher, students must:
- Attend at least 85% of each day of class
- Score a 90% or higher on their final practice exam
- Take the first exam within 90 days of class completion
- Upload your exam failure notice from your first exam attempt
- Day 1
- Introduction to ethical hacking
- Passive reconnaissance and OSINT
- Day 2
- Network scanning
- Target system identification, service enumeration and vulnerability scanning
- Day 3
- Exploitation
- Password security, social engineering, and physical security
- Day 4
- Deep target penetration and covering tracks
- Web application attacks
- Day 5
- Scripting
- Post-engagement activities
- Exam Review
- Take CEH exam
What you will learn
- Discover ways to use the tools and techniques used by cybercriminals to help protect your company against attacks
- Learn ethical hacking methodologies and hands-on hacking experience in a cloud-hosted cyber range
- Understand how to assess and measure threats to information assets
How you will benefit
- Practice your skills in the ethical hacking cyber range
- Access to hands-on labs brings you up to speed with the latest threats to which your organization is most vulnerable
- Review dozens of hands-on exercises and Capture the Flags (CTFs)
- Prepare to earn the EC-Council Certified Ethical Hacker (CEH) certification
Boot Camp
Boot camps are led by instructors that have years of industry experience and are recognized as subject matter experts.
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.
Delve into the tools and techniques used by cybercriminals over five days in this online ethical hacker certification boot camp. Gain in-depth training in ethical hacking methodologies through lectures and hands-on labs to ensure you have the skills to measure and access threats. Our cloud-hosted cyber range provides practical experience in reconnaissance, system access, vulnerability exploitation, and data exfiltration.
This Certified Ethical Hacker (CEH) boot camp covers everything from passive reconnaissance and OSINT to network scanning, exploitation, and web application attacks. You will delve into the depths of password security, social engineering, and physical security, learning the skills needed to identify vulnerabilities and cover tracks effectively.
Upon course completion, you will gain the knowledge needed to obtain your EC-Council Certified Ethical Hacker (CEH) certification. This certification validates your ability to assess and measure threats to information assets and identify vulnerabilities in your organization's systems. With this certification in hand and the training you receive in this CEH boot camp, you will be well-equipped to protect your organization from malicious actors.
With your enrollment in this CEH course, you will receive an exam voucher for the EC-Council CEH certification exam.
Our Certification Success Program, paired with our provided prep materials, boot camp sessions, and post-work, is designed to ease any concerns you may have when taking the certification exam. If your first attempt is unsuccessful, this program provides peace of mind that you may be eligible to take the certification exam a second time (if needed) at no additional fee.
*To qualify for a second certification exam voucher, students must:
- Attend at least 85% of each day of class
- Score a 90% or higher on their final practice exam
- Take the first exam within 90 days of class completion
- Upload your exam failure notice from your first exam attempt
|
|
|
Explore a Career in Cybersecurity Offered in partnership with ed2go
-
Fee: $129.00
Hours: 24
Getting into cybersecurity can be rewarding and lucrative! In fact, according to the U.S. Bureau of Labor Statistics, information security analysts can make over $100,000 per year. This course will give you the knowledge to help you decide whether a career in cybersecurity is right for you.
The course will start by introducing the basics of cybersecurity. You will learn the types of threats companies face daily and how a cybersecurity specialist can help prepare for and prevent those threats. Finally, the course will cover cybersecurity learning paths and different types of cybersecurity jobs and salaries.
|
|
|
Explore a Career in Cybersecurity (Self-Guided)
- Explore a Career in Cybersecurity (Self-Guided)
-
Fee: $129.00
Dates: 4/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Location:
Building:
Room:
Instructor:
This course will give you the knowledge to help you decide whether a career in cybersecurity is right for you. This course is designed to explore the basics of cybersecurity and the types of jobs found in the cybersecurity field. This course explores a career in cybersecurity and reviews various topics, including cybersecurity roles, job requirements, problem-solving techniques, and cybersecurity concepts. This course will help you decide whether a career in cybersecurity is something that aligns with your talents and interests and, if so, the best next steps to pursue this lucrative career path. Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
Software Requirements:
- PC: Windows 10 or later.
- Mac: macOS 10.6 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
- Microsoft Word Online
- Adobe Acrobat Reader
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
There are no instructional material requirements to take this course. Getting into cybersecurity can be rewarding and lucrative! In fact, according to the U.S. Bureau of Labor Statistics, information security analysts can make over $100,000 per year. This course will give you the knowledge to help you decide whether a career in cybersecurity is right for you.
The course will start by introducing the basics of cybersecurity. You will learn the types of threats companies face daily and how a cybersecurity specialist can help prepare for and prevent those threats. Finally, the course will cover cybersecurity learning paths and different types of cybersecurity jobs and salaries.
- Introduction to Cybersecurity
- Cybersecurity Roles and Industries
- Problem Solving
- Cybersecurity Basics
- Types of Information Security
- Common Concepts and Terminology
- Types of Threats
- Secure Coding
- Protecting the Business
- Developing a Security Awareness Program
- Employment and the Future of Cybersecurity
- Next Steps
What you will learn
- Explore cybersecurity as a career path
- Identify cybersecurity job roles and industries
- Describe the soft skills that cybersecurity professionals need
- Explain the threats that cyberattacks pose to modern businesses
- Explain the importance of securing information
- Define common cybersecurity terms and concepts
- Explain the role of secure coding in preventing cyberattacks
- Identify the ways that cybersecurity professionals protect a business
- Describe the key elements of a security awareness program
- Identify employment opportunities and career steps in the cybersecurity field
How you will benefit
- Learn if a career in cybersecurity is right for you
- Explore the basics of the cybersecurity industry
- Discover potential career paths in the cybersecurity field
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.
Getting into cybersecurity can be rewarding and lucrative! In fact, according to the U.S. Bureau of Labor Statistics, information security analysts can make over $100,000 per year. This course will give you the knowledge to help you decide whether a career in cybersecurity is right for you.
The course will start by introducing the basics of cybersecurity. You will learn the types of threats companies face daily and how a cybersecurity specialist can help prepare for and prevent those threats. Finally, the course will cover cybersecurity learning paths and different types of cybersecurity jobs and salaries.
|
|
|
IC3 Certification in Digital Literacy GS6
- IC3 Certification in Digital Literacy GS6
-
Fee: $545.00
Dates: 4/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Location:
Building:
Room:
Instructor:
In today's technology-driven society, digital literacy isn't an option—it's a requirement. This course is designed to help you demonstrate your digital literacy through Certiport's updated IC3 GS6 certification program and corresponding three Global Standard Six certification exams. Requirements:
Hardware Requirements:
- This course can be taken on a PC, Chromebook, or Mac.
Software Requirements:
- PC: Windows 7 or later.
- Mac: macOS 10.6 or later.
- Browser: Chrome (all devices); Firefox (PCs only); Edge and Internet Explorer are not supported.
- Adobe Acrobat Reader.
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment and will be available online. This computer literacy course will teach you how to efficiently, effectively, and safely succeed in any environment that requires the use of computers, devices, or the Internet. The IC3 Digital Literacy Global Standard Six (GS6) certification is developed and administered by Certiport and designed to cover a range of concepts and skills that can apply to almost any school or career pathway, making it an ideal credential to validate your digital skills.
The IC3 GS6 certification program consists of three exams (Level 1-3) that cover the following objective domains in increasing detail and complexity: Technology Basics, Digital Citizenship, Information Management, Content Creation, Communication, Collaboration, and Safety & Security. This comprehensive set of certifications are stackable across seven digital literacy domains. They will validate your understanding of each domain at the basic, intermediate, and advanced levels, each awarding its own certificate. The IC3-GS6 Levels 1, 2, and 3 sections are structured to align 100% with the IC3 GS6 learning objectives—with no prior computer knowledge or skills needed.
This IC3 certification course is prescriptive and competency-based, meaning that pre-assessment results are mapped to the course table of contents. The "Custom Path" feature allows you to streamline the training process by skipping course lessons and exercises that correspond to skills or concepts passed in the pre-assessment—ensuring a personalized learning experience that is tailored to your needs and abilities.
Upon successfully passing all three Global Standard Six certification exams, you will be awarded the IC3 Digital Literacy Master Certification and a Master Badge. This demonstrates an advanced understanding of the concepts and principles within the IC3 Digital Literacy program objective domains and validates your digital skills in a wide range of settings, from educational institutions to various career paths.
- IC3-GS6-Level 1
- Introduction
- Basic Skills
- Computer Basics
- Word Processing
- Presentations
- The Internet
- IC3-GS6-Level 2
- Computer Essentials
- Word Processing Skills
- Spreadsheet Skills
- Presentations, Databases and App Culture
- Internet
- IC3-GS6-Level 3
- Computer Essentials
- Application Programs
- Internet
What you will learn
- Understand the seven digital literacy domains
- Experience a personalized learning path as you increase your digital literacy
- Upon completion of IC3-GS6 Level 1, you will have the foundational knowledge and basic competencies across the seven IC3 GS6 exam objective domains
- Upon completion of IC3-GS6 Level 2, you will have the ability to do essential tasks in an online environment and within core applications across the seven exam objective domains
- Upon completion of IC3-GS6 Level 3, you will demonstrate mastery of digital literacy and your ability to manage systems, collaborate, and troubleshoot while providing guidance to others
How you will benefit
- Successfully completing Levels 1, 2, and 3 IC3-GS6 courses will prepare you to pass the three IC3 GS6 exams and receive the IC3 certification
- IC3 preparation and certification provide you with a strong foundation of the computer knowledge and skills required for pursuing higher education and for success in today's workplace
- Obtaining the IC3 certification provides you with a global, industry-recognized credential for employment
Dave Paquin
Dave Paquin has been teaching computer skills in the classroom for over 15 years. He holds a Master of Science in Training and Learning Technology and has extensive experience as a Human Resources manager.
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.
This computer literacy course will teach you how to efficiently, effectively, and safely succeed in any environment that requires the use of computers, devices, or the Internet. The IC3 Digital Literacy Global Standard Six (GS6) certification is developed and administered by Certiport and designed to cover a range of concepts and skills that can apply to almost any school or career pathway, making it an ideal credential to validate your digital skills.
The IC3 GS6 certification program consists of three exams (Level 1-3) that cover the following objective domains in increasing detail and complexity: Technology Basics, Digital Citizenship, Information Management, Content Creation, Communication, Collaboration, and Safety & Security. This comprehensive set of certifications are stackable across seven digital literacy domains. They will validate your understanding of each domain at the basic, intermediate, and advanced levels, each awarding its own certificate. The IC3-GS6 Levels 1, 2, and 3 sections are structured to align 100% with the IC3 GS6 learning objectives—with no prior computer knowledge or skills needed.
This IC3 certification course is prescriptive and competency-based, meaning that pre-assessment results are mapped to the course table of contents. The "Custom Path" feature allows you to streamline the training process by skipping course lessons and exercises that correspond to skills or concepts passed in the pre-assessment—ensuring a personalized learning experience that is tailored to your needs and abilities.
Upon successfully passing all three Global Standard Six certification exams, you will be awarded the IC3 Digital Literacy Master Certification and a Master Badge. This demonstrates an advanced understanding of the concepts and principles within the IC3 Digital Literacy program objective domains and validates your digital skills in a wide range of settings, from educational institutions to various career paths.
|
|
|
IC3 Certification in Digital Literacy GS6 (Voucher Included)
- IC3 Certification in Digital Literacy GS6 (Voucher Included)
-
Fee: $595.00
Dates: 4/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Location:
Building:
Room:
Instructor:
In today's technology-driven society, digital literacy isn't an option—it's a requirement. This course is designed to help you demonstrate your digital literacy through Certiport's updated IC3 GS6 certification program and corresponding three Global Standard Six certification exams. Requirements:
Hardware Requirements:
- This course can be taken on a PC, Chromebook, or Mac.
Software Requirements:
- PC: Windows 7 or later.
- Mac: macOS 10.6 or later.
- Browser: Chrome (all devices); Firefox (PCs only); Edge and Internet Explorer are not supported.
- Adobe Acrobat Reader.
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment and will be available online. The workbooks for this course are provided in Adobe Acrobat and Word format.
- Gmetrix IC3 Practice Tests – provided upon completion of the voucher-included course is taken.
This computer literacy course will teach you how to efficiently, effectively, and safely succeed in any environment that requires the use of computers, devices, or the Internet. The IC3 Digital Literacy Global Standard Six (GS6) certification is developed and administered by Certiport and designed to cover a range of concepts and skills that can apply to almost any school or career pathway, making it an ideal credential to validate your digital skills.
The IC3 GS6 certification program consists of three exams (Level 1-3) that cover the following objective domains in increasing detail and complexity: Technology Basics, Digital Citizenship, Information Management, Content Creation, Communication, Collaboration, and Safety & Security. This comprehensive set of certifications are stackable across seven digital literacy domains. They will validate your understanding of each domain at the basic, intermediate, and advanced levels, each awarding its own certificate. The IC3-GS6 Levels 1, 2, and 3 sections are structured to align 100% with the IC3 GS6 learning objectives—with no prior computer knowledge or skills needed.
This IC3 certification course is prescriptive and competency-based, meaning that pre-assessment results are mapped to the course table of contents. The "Custom Path" feature allows you to streamline the training process by skipping course lessons and exercises that correspond to skills or concepts passed in the pre-assessment—ensuring a personalized learning experience that is tailored to your needs and abilities.
Upon successfully passing all three Global Standard Six certification exams, you will be awarded the IC3 Digital Literacy Master Certification and a Master Badge. This demonstrates an advanced understanding of the concepts and principles within the IC3 Digital Literacy program objective domains and validates your digital skills in a wide range of settings, from educational institutions to various career paths.
This digital literacy assessment course offers enrollment with or without vouchers. The vouchers cover the fees to sit for the IC3 GS6 certifying exams upon eligibility.
- IC3-GS6-Level 1
- Introduction
- Basic Skills
- Computer Basics
- Word Processing
- Presentations
- The Internet
- IC3-GS6-Level 2
- Computer Essentials
- Word Processing Skills
- Spreadsheet Skills
- Presentations, Databases and App Culture
- Internet
- IC3-GS6-Level 3
- Computer Essentials
- Application Programs
- Internet
What you will learn
- Understand the seven digital literacy domains
- Experience a personalized learning path as you increase your digital literacy
- Upon completion of IC3-GS6 Level 1, you will have the foundational knowledge and basic competencies across the seven IC3 GS6 exam objective domains
- Upon completion of IC3-GS6 Level 2, you will have the ability to do essential tasks in an online environment and within core applications across the seven exam objective domains
- Upon completion of IC3-GS6 Level 3, you will demonstrate mastery of digital literacy and your ability to manage systems, collaborate, and troubleshoot while providing guidance to others
How you will benefit
- Successfully completing Levels 1, 2, and 3 IC3-GS6 courses will prepare you to pass the three IC3 GS6 exams and receive the IC3 certification
- IC3 preparation and certification provide you with a strong foundation of the computer knowledge and skills required for pursuing higher education and for success in today's workplace
- Obtaining the IC3 certification provides you with a global, industry-recognized credential for employment
Dave Paquin
Dave Paquin has been teaching computer skills in the classroom for over 15 years. He holds a Master of Science in Training and Learning Technology and has extensive experience as a Human Resources manager.
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.
This computer literacy course will teach you how to efficiently, effectively, and safely succeed in any environment that requires the use of computers, devices, or the Internet. The IC3 Digital Literacy Global Standard Six (GS6) certification is developed and administered by Certiport and designed to cover a range of concepts and skills that can apply to almost any school or career pathway, making it an ideal credential to validate your digital skills.
The IC3 GS6 certification program consists of three exams (Level 1-3) that cover the following objective domains in increasing detail and complexity: Technology Basics, Digital Citizenship, Information Management, Content Creation, Communication, Collaboration, and Safety & Security. This comprehensive set of certifications are stackable across seven digital literacy domains. They will validate your understanding of each domain at the basic, intermediate, and advanced levels, each awarding its own certificate. The IC3-GS6 Levels 1, 2, and 3 sections are structured to align 100% with the IC3 GS6 learning objectives—with no prior computer knowledge or skills needed.
This IC3 certification course is prescriptive and competency-based, meaning that pre-assessment results are mapped to the course table of contents. The "Custom Path" feature allows you to streamline the training process by skipping course lessons and exercises that correspond to skills or concepts passed in the pre-assessment—ensuring a personalized learning experience that is tailored to your needs and abilities.
Upon successfully passing all three Global Standard Six certification exams, you will be awarded the IC3 Digital Literacy Master Certification and a Master Badge. This demonstrates an advanced understanding of the concepts and principles within the IC3 Digital Literacy program objective domains and validates your digital skills in a wide range of settings, from educational institutions to various career paths.
This digital literacy assessment course offers enrollment with or without vouchers. The vouchers cover the fees to sit for the IC3 GS6 certifying exams upon eligibility.
|
|
|
Information Security Training (Vouchers Included)
- Information Security Training (Vouchers Included)
-
Fee: $3,295.00
Dates: 4/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Location:
Building:
Room:
Instructor:
Prepare to learn key information security skills and train to take three globally recognized certifications: ISACA's Certified Information Systems Auditor (CISA) and Certified Information Security Manager (CISM), and (ISC)2's Certified Information Security Professional (CISSP). Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
Software Requirements:
- PC: Windows 8 or later.
- Mac: macOS 10.6 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
- Virtual Labs included with course
- Microsoft Word Online
- Adobe Acrobat Reader
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment. The following textbooks will be shipped to you approximately 7-10 business days after enrollment:
- Management of Information Security, 7th Edition
- (ISC)2 Certified Information Systems Security Professional (CISSP) Official Study Guide, 10th Edition
- CISA Official Review Manual, 28th Edition 2024
- Study guides and practice exams
Please note: You will receive a digital book if the physical book is on backorder. Cybersecurity is necessary for any organization to thrive and be protected from malicious attacks. The U.S. Bureau of Labor Statistics states that the employment of information security analysts is projected to grow 33% by 2033, with roughly 17,300 openings each year, on average. In this growing field, you can show you are qualified to lead security efforts by obtaining an industry-recognized information security certification.
Holding a certification from ISACA or (ISC)2 demonstrates your ability to identify, assess, and mitigate evolving security threats. This online information security course will prepare you for three globally recognized certifications: ISACA's Certified Information Systems Auditor (CISA) and Certified Information Security Manager (CISM), and (ISC)2's Certified Information Security Professional (CISSP).
During your training, you will learn CISA certification key areas such as governance and IT management, information systems acquisition, development, and implementation. The course curriculum dives into operation, maintenance, and support related to information systems as well as protection and information assets. You will also learn about CISM certification topics like information security governance, risk management, security program development, incident management, security and risk management, and more.
Essential CISSP certification-related details are thoroughly reviewed during the course, including asset security and risk management, security architecture and engineering, communication and network security, identity and access management, security assessment and testing, security operations, and software development security are also covered.
With your enrollment you will receive exam vouchers that cover the cost to sit for the (CISA) and (CISM) certifying exams upon eligibility. Proctor fees may apply, which are not included. A voucher for the (CISSP) exam is not included.
- Certified Information Systems Auditor (CISA)
- The Process of Auditing Information Systems
- Governance and Management of IT
- Information Systems Acquisition, Development, and Implementation
- Information Systems Operation, Maintenance, and Support
- Protection and Information Assets
- Certified Information Security Manager (CISM)
- Information Security Governance
- Information Risk Management
- Information Security Program Development & Management
- Information Security Incident Management
- Certified Information Systems Security Professional (CISSP)
- Security and Risk Management
- Asset Security
- Security Architecture and Engineering
- Communication and Network Security
- Identity and Access Management (IAM)
- Security Assessment and Testing
- Security Operations
- Software Development Security
What you will learn
- Demonstrate standard security practices to manage and assess enterprise cybersecurity networks and devices
- Specify the proper procedures to assess vulnerabilities, report on compliance, and establish controls within an enterprise
- Analyze security and risk management as well as safely manage security operations, assessments and testing, architectures, and assets
How you will benefit
- Obtain the Certified Information Systems Auditor (CISA) certification and confirm your ability to assess vulnerabilities, compliance, and instituting controls in an enterprise
- Achieve the Certified Information Security Manager (CISM) certification and demonstrate your knowledge of managing, assessing, designing, and overseeing enterprise information security functions
- Earn the Certified Information Security Professional (CISSP) certification and showcase your skills in security and risk management, asset security, security architecture, and network security
- Build confidence toward successfully completing the certification exams
- Stand out to future employers or achieve growth within your current organization
Derrick Coston
Derrick Coston is a blue-team cybersecurity professional. Derrick has run a team of cybersecurity professionals for a major financial institution. Outside of teaching classes such as CISA and CISSP, Derrick serves as a cybersecurity consultant and auditor for organizations, and performs security assessments for large organizations.
Raymond Lacoste
Raymond Lacoste is a highly recognized instructor and IT professional who holds the Cisco Sirius Instructor Award. He has authored Cisco Press publications on the Cisco ENARSI and Cisco TSHOOT exams.
Raymond's areas of expertise include Cisco Enterprise networking, Cisco Routing and Switching, Cisco Datacenter Networking, ITIL, and Amazon AWS. He also holds certifications in Cisco CCSI, Cisco CCNP Routing and Switching, Cisco CCNP Enterprise, ITIL Foundations, ITIL Practitioner, ITIL Intermediate, Amazon AWS System Operations, Amazon AWS Architect, Amazon AWS Developer, and CISSP.
In addition to his certifications and experience, Raymond's engaging instruction style makes even the most obscenely complicated or obtuse concepts relatable and understandable. Outside of class, he enjoys dominating both on the golf course and the basketball court.
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.
Cybersecurity is necessary for any organization to thrive and be protected from malicious attacks. The U.S. Bureau of Labor Statistics states that the employment of information security analysts is projected to grow 33% by 2033, with roughly 17,300 openings each year, on average. In this growing field, you can show you are qualified to lead security efforts by obtaining an industry-recognized information security certification.
Holding a certification from ISACA or (ISC)2 demonstrates your ability to identify, assess, and mitigate evolving security threats. This online information security course will prepare you for three globally recognized certifications: ISACA's Certified Information Systems Auditor (CISA) and Certified Information Security Manager (CISM), and (ISC)2's Certified Information Security Professional (CISSP).
During your training, you will learn CISA certification key areas such as governance and IT management, information systems acquisition, development, and implementation. The course curriculum dives into operation, maintenance, and support related to information systems as well as protection and information assets. You will also learn about CISM certification topics like information security governance, risk management, security program development, incident management, security and risk management, and more.
Essential CISSP certification-related details are thoroughly reviewed during the course, including asset security and risk management, security architecture and engineering, communication and network security, identity and access management, security assessment and testing, security operations, and software development security are also covered.
With your enrollment you will receive exam vouchers that cover the cost to sit for the (CISA) and (CISM) certifying exams upon eligibility. Proctor fees may apply, which are not included. A voucher for the (CISSP) exam is not included.
|
|
|
Intermediate Networking Offered in partnership with ed2go
-
Fee: $129.00
Hours: 24
Gain a full understanding of almost every aspect of networking technology as you prepare for CCNA certification. This course will build your knowledge of networks and networking, with detailed treatments of TCP/IP, how switches and routers operate, DNS, and more with real-world applications for the concepts you learn.
|
|
|
Intermediate Networking (Self-Guided)
- Intermediate Networking (Self-Guided)
-
Fee: $129.00
Dates: 4/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Location:
Building:
Room:
Instructor:
Gain practical experience in a hot new career field. Topics include VPNs, security, and Internet connectivity. Learn real-world applications for the concepts you learned in Introduction to Networking. Continue to build your knowledge of networks and networking, with detailed treatments of TCP/IP, how switches and routers operate, DNS, and more.
You will gain a full understanding of almost every aspect of networking technology, including hot topics such as virtual private networks, security, Internet connectivity, and cloud computing. Completion of this course and its prerequisite should serve as a springboard for a career in computer networking or training for CCNA Certification. Requirements:
Hardware Requirements:
- This course can be taken on either a PC or Mac.
Software Requirements:
- PC: Windows 8 or later.
- Mac: macOS 10.6 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
- Adobe Acrobat Reader.
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment and will be available online. Gain practical experience in a hot new career field. Topics include VPNs, security, and Internet connectivity.
- Getting up to Speed
- Path of a Packet
- Routing
- Routing Protocols Explained
- TCP/IP in Detail
- Fundamentals of Networking Security
- Encryption
- Virtual Private Networks
- DNS Names, Concepts, and Components
- DNS Resource Records and Resolution
- Internet Servers and Services
- Understanding Servers
Self-Study
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.
Gain practical experience in a hot new career field. Topics include VPNs, security, and Internet connectivity.
|
|
|
Introduction to Cybersecurity
- Introduction to Cybersecurity
-
Fee: $129.00
Dates: 4/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Location:
Building:
Room:
Instructor:
This introductory course is for those with little to no cybersecurity experience that want to learn more about this growing industry. This self-paced course is designed to help you increase your knowledge of cybersecurity and technology fundamentals to fill knowledge gaps in your current role or pursue an entry-level career in this in-demand field. We answer questions around what cybersecurity is, what an operating system does and the most common types, cloud computing, and many other topics related to cybersecurity foundations.
You will have the opportunity to develop your foundational cybersecurity skills through hands-on demonstrations as you follow along with the instructor videos, learn time-saving tips to increase your efficiency, and establish best practices. Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
Software Requirements:
- PC: Windows 8 or later.
- Mac: macOS 10.6 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
- Microsoft Word Online
- Adobe Acrobat Reader
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
This course gives you the option of following along with the instructor on a few video-based exercises, allowing you to pause and replay until you are confident in your skillset. Should you wish to follow along, it is recommended that you have the following: Windows 10 environment, Wireshark, an AWS account (free tier), and a Windows 2016 VM (available in the AWS free tier).
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment and will be available online. The need for skilled cybersecurity professionals continues to grow year over year, making it a great time to enter this in-demand industry.
In this video-based learning course, you will learn fundamentals of cybersecurity such as concepts, commands, and tools from an experienced professional through lectures and follow-along demonstrations. You will also learn about cloud computing, networking, cybersecurity policy, and frameworks, as well as risk management and security auditing in a 100% online, self-paced training format.
By the completion of your course, you will have a firm understanding of cybersecurity foundations, including key concepts and best practices.
- Cybersecurity Foundations
- Operating Systems
- Windows Command Line Foundations
- Network Fundamentals
- Cloud Computing Fundamentals
- Cybersecurity Policy, Framework, and Guidelines
- Cybersecurity Audit Foundations
- Risk Management
- Penetration Testing - Demonstration
What you will learn
- Understand what cybersecurity entails
- Identify the three most common operating systems
- Execute simple commands
- Learn about cloud computing and networking
- Learn about cybersecurity policies, frameworks, audits, and risk management
How you will benefit
- Learn if a career in cybersecurity could be right for you
- Increase your baseline knowledge of foundational cybersecurity concepts
- Learn tips and tricks from a working cybersecurity professional
- Follow along with hands-on demonstrations to develop and practice your foundational skills
- Finish in three months or less
Self-Study
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.
The need for skilled cybersecurity professionals continues to grow year over year, making it a great time to enter this in-demand industry.
In this video-based learning course, you will learn fundamentals of cybersecurity such as concepts, commands, and tools from an experienced professional through lectures and follow-along demonstrations. You will also learn about cloud computing, networking, cybersecurity policy, and frameworks, as well as risk management and security auditing in a 100% online, self-paced training format.
By the completion of your course, you will have a firm understanding of cybersecurity foundations, including key concepts and best practices.
|
|
|
Introduction to Networking Offered in partnership with ed2go
-
Fee: $129.00
Hours: 24
Learn to perform basic computer networking tasks such as DSL connectivity, configuring connections to an ISP and creating a private network. This course explains computer networking basics in easy-to-understand terms, using concepts common to everyday, non-computing experience.
|
|
|
Introduction to Networking (Self-Guided)
- Introduction to Networking (Self-Guided)
-
Fee: $129.00
Dates: 4/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Location:
Building:
Room:
Instructor:
Learn to perform basic computer networking tasks such as DSL connectivity, configuring connections to an ISP and creating a private network. Businesses, schools, and other organizations rely on computer networks, which explains why employees and contributors with networking skills are in high demand.
Are you ready to learn the fundamentals of computer networking in terms you can easily understand? If so, the online Introduction to Networking course will help you understand why networks have become so important, how software and hardware make networking possible, and how networks function. This course will also give you the foundation to understand and get ahead in any career involving the world of computers, networks, the Internet, and the cloud. Requirements:
Hardware Requirements:
- This course can be taken on either a PC or Mac.
Software Requirements:
- PC: Windows 10 or later.
- Mac: macOS 10.6 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
- Adobe Acrobat Reader
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Learn to perform basic computer networking tasks such as DSL connectivity, configuring connections to an ISP and creating a private network. This course explains computer networking basics in easy-to-understand terms, using concepts common to everyday, non-computing experience. History of Networking
Have you ever wondered how networks started? We're surrounded by networks, whether they're computer networks, networks of roads, or the network of telephones that allow us to communicate every day. In our first lesson, you'll learn how networks have evolved over the last hundred years. You'll also find out why every additional device that connects to a network greatly increases the value of the network. By the time you've completed this lesson, you'll have a framework of knowledge that will take you through the rest of the course.
How Networks Operate
In this lesson, you'll jump right into networks and networking, and learn how they work. We'll use examples from our everyday experience. You'll learn how to tell the difference between a network and networking, and realize that computer networks are a lot like freeway networks. You'll never look at an interstate the same way again! You'll also find out why shipping your data from one computer to the next is a lot like sending your distant uncle a new cookie jar for his birthday. Believe it or not, freeways and shipped gifts have a direct correlation to how networks and networking operate!
Peer-to-Peer versus Client/Server
Have you ever heard someone refer to a computer as a server? Maybe you've heard someone talk about connecting computers in a peer-to-peer environment. Understanding the difference between client/server and peer-to-peer networks really helps you learn about computers and networking. So in this lesson, you'll learn how to tell the difference between client/server and peer-to-peer networks, and when to use one instead of the other.
Network Types and Topologies
Many people have heard of Ethernet, but what does that mean exactly? In this lesson, you'll learn all about Ethernet and a whole lot more. Here you'll learn the difference between a star topology and a bus topology, and the advantages of each. Is Ethernet or Token Ring the best modern network technology, and why? In this lesson you'll get those answers and many more!
Segmentation and Routing
In this lesson we'll explore how routers operate, and you'll see why routers operate a lot like how a receptionist in a growing company handles telephone calls. We'll build on information you learned in previous lessons, and then you'll find out how a single interconnected network (the Internet) can actually span the entire globe. A global network is an amazing feat, accomplished by interconnecting network segments and routing data! When you've completed this lesson, you'll understand how routing helps our data to cross the city, state, or an entire ocean.
Protocols
When people communicate they speak a language, such as English or French, to exchange information. Computers communicate similarly over a network, but instead of speaking a language they use something called a protocol. Protocols are similar to languages and in this lesson, you'll learn about the protocols used in networking. You'll also learn which protocol has emerged as the dominant computer protocol, and why!
TCP/IP
In this lesson you'll learn how the networking protocol TCP/IP operates. TCP/IP is a collection of protocols, and we'll discuss how TCP/IP divides its tasks. We'll go over how TCP/IP uses addresses to direct data to its rightful owner - it's similar to how we use street addresses.
Name Resolution and Services
Have you ever wondered how your computer converts a Web address into a website that appears on your screen? In this lesson you'll learn how the Domain Name System (DNS) translates names into numeric addresses, and how all that allows your favorite website, email, or file to appear on your computer screen. You'll also learn how the entire computer industry comes to a consensus about how the Internet should work.
Wide Area Networks (WANs)
We'll take a look at Wide Area Networks (WANs) and how they compare to Local Area Networks (LANs), and we'll discuss different types of modern WANs. You'll learn all about how data gets sent over long distances and how the Internet changed expensive, long-distance network connections. You'll also learn how VPNs secure those Internet connections from prying eyes.
Remote Access
If you connect to the Internet, you use remote access. In this lesson, we'll explore the traditional means of connecting to remote LANs and talk about exactly how DSL and cable Internet access works. Then we'll discuss other means by which many people connect to the Internet, including wireless and cellular networks.
Making Internet Connections
In this lesson you'll apply many of the concepts you've learned so far in this course. We'll walk through the process of building a network with many different wired and wireless devices. Each step of the way, you'll come to understand what's going on behind the scenes. From there we'll jump to connecting to the Internet using broadband connections, configuring a home router, and testing what you've done.
Review and Conclusion
In our final lesson we'll tie all the previous lessons together, clarifying how new information about networks and networking can be quickly understood. You'll learn three categories into which networking knowledge can be placed, and see examples to apply your newfound network categories. By the end of this lesson, your understanding of networking will be solid as a rock, and you'll be well-prepared for a lifetime of continued learning about networks and networking! What you will learn
- Learn how and why networks work rather than focusing on memorization of terms and numbers
- Be capable of performing basic computer networking tasks
- Understand the difference between client/server and peer-to peer networks
- Learn how routers operate
- Learn to connect to the Internet using broadband connections, configuring a home router, and testing what you've done
- Be well prepared to apply your newfound knowledge to future changes in networks and networking
How you will benefit
- Easily understand how and why computer networking works
- Have access to an instructor who completely understands networking and can convey that understanding to others
- Prove helpful in your day to day dealings with computer networks and the Internet
- Be well prepared for a lifetime of continued learning about networks and networking
Self-Study
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.
Learn to perform basic computer networking tasks such as DSL connectivity, configuring connections to an ISP and creating a private network. This course explains computer networking basics in easy-to-understand terms, using concepts common to everyday, non-computing experience.
|
|
|
Introduction to PC Security Offered in partnership with ed2go
-
Fee: $129.00
Hours: 24
Learn why you're at risk and what you can do to protect your precious personal and business data from the outside world. In this course, a security expert will teach you the fundamentals of PC and network security as you learn to install and configure a firewall to build an impenetrable moat around your computer or network.
|
|
|
Introduction to PC Security (Self-Guided)
- Introduction to PC Security (Self-Guided)
-
Fee: $129.00
Dates: 4/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Location:
Building:
Room:
Instructor:
Learn the fundamentals of PC and network security from this expert-developed course. Learn why you're at risk and what you can do to protect your precious personal and business data from the outside world. This online course, will quickly bring you up to speed on the fundamentals of PC and network security.
You will understand and explore the vulnerability of operating systems, software, and networks. Then, you will get into the minds of hackers and crackers, developing an understanding of the exploits they use to access your computer without your knowledge. You will find out why, where and how viruses, worms, and blended threats are created. You will learn a safe way to handle files and data across the Internet through a virtual private network. By the end of this course you will be able to install and configure a firewall to build an impenetrable moat around your computer or network. Requirements:
Hardware Requirements:
- This course can be taken on either a PC or Mac.
Software Requirements:
- PC: Windows 8 or later.
- Mac: macOS 10.6 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
- Adobe Acrobat Reader.
- Applications must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Learn the fundamentals of PC and network security from this expert-developed course. Introduction to PC Security
In your first lesson, you will learn both the facts and myths surrounding PC security. By the end of the lesson, you will also be able to assess your own risk, whether you're an individual or manage a network of any size. You will also perform a self-assessment to evaluate just how vulnerable you are to security flaws.
Your PC and Network
If you ever wondered what technical gurus are speaking about when they talk about LANs, WANs, VPNs, and P2P, you will find detailed answers in this lesson. Discover the basics of networks and how your PC connects to them.
PCs, Networks, and Software Demystified
Most of us don't stop to think about how a Mac can talk to a PC and vice versa. Yet, different types of machines talk to each other on a daily basis across networks. They also talk to printers, fax machines, and a host of other devices. The OSI model for network connections lets you accomplish this, and you will learn all about it in this lesson.
Viruses, Worms, Blended Threats, and More
Get ready to investigate the world of viruses, worms, and blended threats. You will learn what they are and the differences between all three. Of course, all this knowledge will also teach you how to protect yourself and your network from the hackers and crackers of the world.
The Family of Malware
This lesson introduces you to the ware family. What is the ware family? They are the products that download themselves onto your computer without your consent or knowledge—spyware, scumware, malware, and adware. You will meet them and learn all about where they live, places they frequent, and how to remove these unwelcome guests.
Exploits and Vulnerabilities
You may have heard of them: vulnerabilities, exploits, and exposure. But what are they? Have you ever wondered if someone really can control your computer without your knowledge? If you've been pondering these questions lately, then you will find your answers here, along with priceless information on protecting your computer and your network to keep your business and personal data private.
Network Attacks
Have you ever tried to access the web but received an error saying the page can't be displayed, you aren't connected, or you don't have access? Denial of Service attacks and SYN flooding are two types of network attacks that seem to go unnoticed on personal PCs and small networks. After this lesson, you will no longer be left wondering what happened to your Internet connection.
Everything You Wanted to Know About Firewalls. (Part One)
This lesson will introduce you to firewalls. Join me in this lesson, and you will soon start building an impenetrable moat around your network.
Everything You Wanted to Know About Firewalls. (Part Two)
Now that you have your moat built, it's time to arm up and defend yourself. In this lesson, you will learn how to configure your firewall and maximize your network security.
Laptops, Notebooks, Netbooks, and Wireless Networking
Laptops and wireless connectivity aren't as secure as they appear. You will understand why in this lesson.
Virtual Private Networking (VPN)
This lesson explores the Virtual Private Network and how it's different from standard networks, how it works, how to secure it, and how to set up your own. You can share files with family across the miles by allowing them to connect remotely to your designated shared folders. You can share music files, family pictures, and anything else you choose to give them access to.
The Changing Face of Security
Now that you know what's out there, how can you possibly keep on top of security issues? There's so much information out there, how will you know what applies to you? You will learn about emerging security technology that will help make managing and securing your network easier. Finally, you can test yourself against the first security assessment to see how well you've secured your own PC or network. Self-Study
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.
Learn the fundamentals of PC and network security from this expert-developed course.
|
|
|
ISACA CISA Training Boot Camp
- ISACA CISA Training Boot Camp
-
Fee: $3,595.00
Dates: 4/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Location:
Building:
Room:
Instructor:
The Information Systems Audit and Control Association (ISACA) Certified Information Systems Auditor (CISA) Boot Camp is a five-day training course focused on preparing you for the ISACA CISA exam. You will leave with the knowledge and domain expertise needed to take the CISA exam. Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
- A microphone.
- Speakers.
- A webcam.
Software Requirements:
- PC: Windows 7 or later.
- Mac: macOS 10.7 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
- Microsoft Word Online
- Adobe Acrobat Reader
- Zoom Meetings
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The student materials required for this course are included in enrollment and will be available online. Information security is critical in today's fast-paced world, and that's led to a growing demand for professionals who understand how to measure the risk of an organization's data and systems and create and administer programs and policies to combat security breaches.
The ISACA CISA Boot Camp teaches you the skills necessary to develop, manage, and supervise programs to defend against unauthorized admittance to information. You will gain in-depth knowledge of auditing information systems and how it applies to real-world scenarios — and leave fully prepared to pass your CISA exam.
You will receive an exam voucher for the ISACA CISA certification exam with your enrollment.
Our Certification Success Program, paired with our provided prep materials, boot camp sessions, and post-work, is designed to ease any concerns you may have when taking the certification exam. If your first attempt is unsuccessful, this program provides peace of mind that you may be eligible to take the certification exam a second time (if needed) at no additional fee.
*To qualify for a second certification exam voucher, students must:
- Attend at least 85% of each day of class
- Score a 90% or higher on their final practice exam
- Take the first exam within 90 days of class completion
- Upload your exam failure notice from your first exam attempt
- The process of auditing information systems
- Executing risk-based IS audit strategy
- Plan specific audits
- Conduct audits in accordance with IT audit standards
- Governance of IT and management
- Corporate governance
- Governance of enterprise IT
- Information systems strategy
- Maturity and process improvement models
- IT investment and allocation practices
- Policies and procedures
- Risk management
- Information technology management practices
- IT organization structure and responsibilities
- Auditing IT governance structure and implementation
- Business continuity planning
- Auditing business continuity
- Information systems acquisition, development, and implementation
- Business realization
- Project management structure
- Project management practices
- Business application development
- Virtualization and cloud computing environments
- Business application systems
- Development methods
- Infrastructure development/acquisition practices
- Information systems maintenance practices
- System development tools and productivity aids
- Process improvement practices
- Application controls
- Auditing application controls
- Auditing systems development, acquisition and maintenance
- Information systems operations, maintenance, and services management
- Information systems operations
- IT asset management
- Information systems hardware
- IS architecture and software
- IS network infrastructure
- Auditing infrastructure and operations
- Disaster recovery planning
- Protection of information assets
- Information security management
- Logical access
- Network infrastructure security
- Auditing information security management framework
- Auditing network infrastructure security
- Environmental exposures and controls
- Physical access exposures and controls
- Mobile computing
- Peer-to-peer computing
- Instant messaging
- Social media
- Cloud computing
- Data leakage
- End-user computing security risk and controls
What you will learn
- Information systems auditing process
- Security principles and best practices
- Evaluating systems, operations, governance, and more
How you will benefit
- Obtain the skills necessary to develop, manage, and supervise programs to defend against unauthorized admittance to information
- Extensively prepares you for the CISA exam, which consists of 150 multiple-choice questions that cover the five information systems auditing areas
- Exam areas covered have been created from a CISA job practice analysis and reflect the work performed by information systems auditors, such as the process of auditing information systems, governance of IT and management, information systems acquisition, development and implementation, information systems operations, maintenance and services management, and protection of information assets
Boot camps are led by instructors that have years of industry experience and are recognized as subject matter experts.
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.
Information security is critical in today's fast-paced world, and that's led to a growing demand for professionals who understand how to measure the risk of an organization's data and systems and create and administer programs and policies to combat security breaches.
The ISACA CISA Boot Camp teaches you the skills necessary to develop, manage, and supervise programs to defend against unauthorized admittance to information. You will gain in-depth knowledge of auditing information systems and how it applies to real-world scenarios — and leave fully prepared to pass your CISA exam.
You will receive an exam voucher for the ISACA CISA certification exam with your enrollment.
Our Certification Success Program, paired with our provided prep materials, boot camp sessions, and post-work, is designed to ease any concerns you may have when taking the certification exam. If your first attempt is unsuccessful, this program provides peace of mind that you may be eligible to take the certification exam a second time (if needed) at no additional fee.
*To qualify for a second certification exam voucher, students must:
- Attend at least 85% of each day of class
- Score a 90% or higher on their final practice exam
- Take the first exam within 90 days of class completion
- Upload your exam failure notice from your first exam attempt
|
|
|
ISACA CISM Training Boot Camp
- ISACA CISM Training Boot Camp
-
Fee: $3,595.00
Dates: 4/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Location:
Building:
Room:
Instructor:
Infosec's Certified Information Security Manager (CISM) Boot Camp is a five-day training course focused on preparing you for the ISACA CISM exam. You will leave with the knowledge and domain expertise needed to pass the CISM exam the first time you take it. Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
- A microphone.
- Speakers.
- Webcam.
Software Requirements:
- PC: Windows 7 or later.
- Mac: macOS 10.7 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
- Microsoft Word Online.
- Adobe Acrobat Reader.
- Zoom.
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The student materials required for this course are included in enrollment and available online. This CISM Boot Camp is designed for experienced information security managers and other professionals who manage, design, oversee or assess an enterprise's information security.
The training prepares you for the CISM certification exam by testing your knowledge and your ability to apply it to real-world scenarios. You will gain in-depth knowledge of security governance, risk management, security program development and management, and security incident management.
The boot camp has been updated to align with the new CISM job practice areas and is designed to fully prepare you to pass the challenging CISM exam. You will receive an exam voucher for the ISACA CISM certification exam with your enrollment.
Our Certification Success Program, paired with our provided prep materials, boot camp sessions, and post-work, is designed to ease any concerns you may have when taking the certification exam. If your first attempt is unsuccessful, this program provides peace of mind that you may be eligible to take the certification exam a second time (if needed) at no additional fee.
*To qualify for a second certification exam voucher, students must:
- Attend at least 85% of each day of class
- Score a 90% or higher on their final practice exam
- Take the first exam within 90 days of class completion
- Upload your exam failure notice from your first exam attempt
- Information Security Governance
- Information security concepts
- Relationship between information security and business operations
- Techniques used to secure senior management commitment and support of information security management
- Methods of integrating information security governance into the overall enterprise governance framework
- Practices associated with an overall policy directive that captures senior management
- Level direction and expectations for information security in laying the foundation for information security management within an organization
- An information security steering group function
- Information security management roles, responsibilities and organizational structure
- Areas of governance (e.g., risk management, data classification management, network security, system access)
- Centralized and decentralized approaches to coordinating information security
- Legal and regulatory issues associated with internet businesses, global transmissions and transborder data flows (e.g., privacy, tax laws and tariffs, data import/export restrictions, restrictions on cryptography, warranties, patents, copyrights, trade secrets, national security)
- Common insurance policies and imposed conditions (e.g., crime or fidelity insurance, business interruption)
- Requirements for the content and retention of business records and compliance
- Process for linking policies to enterprise business objectives
- Function and content of essential elements of CISM details
- Techniques for developing an information security process improvement model for sustainable and repeatable information security policies and procedures
- Information security process improvement and its relationship to traditional process management, security architecture development and modeling, and security infrastructure
- Generally accepted international standards for information security management and related process improvement models
- The key components of cost benefit analysis and enterprise transformation/ migration plans (e.g., architectural alignment, organizational positioning, change management, benchmarking, market/competitive analysis)
- Methodology for business case development and computing enterprise value propositions
- Risk Management
- Information resources used in support of business processes
- Information resource valuation methodologies
- Information classification
- The principles of development of baselines and their relationship to risk-based assessments of control requirements
- Life-cycle-based risk management principles and practices
- Threats, vulnerabilities and exposures associated with confidentiality, integrity and availability of information resources
- Quantitative and qualitative methods used to determine sensitivity and criticality of information resources and the impact of adverse events
- Use of gap analysis to assess generally accepted standards of good practice for information security management against current state
- Recovery time objectives (RTO) for information resources and how to determine RTO
- RTO and how it relates to business continuity and contingency planning objectives and processes
- Risk mitigation strategies used in defining security requirements for information resources supporting business applications
- Cost benefit analysis techniques in assessing options for mitigating risks threats and exposures to acceptable levels
- Managing and reporting status of identified risks
- Information Security Program Development & Management
- Methods to develop an implementation plan that meets security requirements identified in risk analyses
- Project management methods and techniques
- The components of an information security governance framework for integrating security principles, practices, management and awareness into all aspects and all levels of the enterprise
- Security baselines and configuration management in the design and management of business applications and the infrastructure
- Information security architectures (e.g., single sign-on, rules-based as opposed to list-based system access control for systems, limited points of systems administration)
- Information security technologies (e.g., cryptographic techniques and digital signatures, enabling management to select appropriate controls)
- Security procedures and guidelines for business processes and infrastructure activities
- Systems development life cycle methodologies (e.g., traditional SDLC, prototyping)
- Planning, conducting, reporting and follow-up of security testing
- Assessing and authorizing the compliance of business applications and infrastructure to the enterprise's information security governance framework
- Types, benefits and costs of physical, administrative and technical controls
- Planning, designing, developing, testing and implementing information security requirements into an enterprise's business processes
- Security metrics design, development, and implementation
- Acquisition management methods and techniques (e.g., evaluation of vendor service level agreements, preparation of contracts)
- How to interpret information security policies into operational use
- Information security administration process and procedures
- Methods for managing the implementation of the enterprise's information security program through third parties, including trading partners and security services providers
- Continuous monitoring of security activities in the enterprise's infrastructure and business applications
- Methods used to manage success/failure in information security investments through data collection and periodic review of key performance indicators
- Change and configuration management activities
- Information security management due diligence activities and reviews of the infrastructure
- Liaison activities with internal/external assurance providers performing information security reviews
- Due diligence activities, reviews and related standards for managing and controlling access to information resources
- External vulnerability reporting sources, which provide information that may require changes to the information security in applications and infrastructure
- Events affecting security baselines that may require risk reassessments and changes to information security requirements in security plans, test plans and reperformance
- Information security problem management practices
- Information security manager facilitative roles as change agents, educators and consultants
- Ways in which cultural and socially acceptable differences affect the behavior of staff
- Activities that can change cultural and socially acceptable behavior of staff
- Methods and techniques for security awareness training and education
- Information Security Incident Management
- Components of an incident response capability
- Information security emergency management practices (e.g., production change control activities, development of computer emergency response team)
- Disaster recovery planning and business recovery processes
- Disaster recovery testing for infrastructure and critical business applications
- Escalation processes for effective security management
- Intrusion detection policies and processes
- Help desk processes for identifying security incidents reported by users and distinguishing them from other issues dealt with the help desks
- Notification process in managing security incidents and recovery (e.g., automated notice and recovery mechanisms in response to virus alerts in a real-time fashion)
- Requirements for collecting and presenting evidence: rules for evidence, admissibility of evidence, quality and completeness of evidence
- Post-incident reviews and follow-up procedures
What you will learn
- Information security governance
- Security metrics and measuring the effectiveness
- Managing acquisitions, implementations, incidents, and more
How you will benefit
- Prepare for the CISM examination
- Gain in-depth knowledge of industry concepts and best practices
- Accelerate your career growth by getting an in-demand credential that employers desire
Boot camps are led by instructors that have years of industry experience and are recognized as subject matter experts.
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.
This CISM Boot Camp is designed for experienced information security managers and other professionals who manage, design, oversee or assess an enterprise's information security.
The training prepares you for the CISM certification exam by testing your knowledge and your ability to apply it to real-world scenarios. You will gain in-depth knowledge of security governance, risk management, security program development and management, and security incident management.
The boot camp has been updated to align with the new CISM job practice areas and is designed to fully prepare you to pass the challenging CISM exam. You will receive an exam voucher for the ISACA CISM certification exam with your enrollment.
Our Certification Success Program, paired with our provided prep materials, boot camp sessions, and post-work, is designed to ease any concerns you may have when taking the certification exam. If your first attempt is unsuccessful, this program provides peace of mind that you may be eligible to take the certification exam a second time (if needed) at no additional fee.
*To qualify for a second certification exam voucher, students must:
- Attend at least 85% of each day of class
- Score a 90% or higher on their final practice exam
- Take the first exam within 90 days of class completion
- Upload your exam failure notice from your first exam attempt
|
|
|
ISC2 CCSP® Training Boot Camp
- ISC2 CCSP® Training Boot Camp
-
Fee: $4,199.00
Dates: 4/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Location:
Building:
Room:
Instructor:
Learn how to design, manage and secure assets in the cloud. This boot camp teaches you impactful best practices around cloud data, applications, and infrastructure—and prepares you to become a Certified Cloud Security Professional (CCSP). Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
- A microphone.
- Speakers.
- A webcam.
Software Requirements:
- PC: Windows 7 or later.
- Mac: macOS 10.7 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
- Microsoft Word Online
- Adobe Acrobat Reader
- Zoom Meetings
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment and will be available online.
You also have the option to purchase a physical copy of the text for an additional fee of $100.
- CCSP (ISC)² Certified Cloud Security Professional Official Study Guide (Sybex)
Certification Requirements:
In order to obtain the CCSP certification, you must have:
- At least five years of professional experience in the information technology field
- Three of those years must be in information security, and one year must include experience in one of the six CCSP domains
- Earning (ISC)²'s CISSP credential can be substituted for the entire CCSP experience requirement. However, you can become an Associate of (ISC)² by passing the exam without the required work experience.
Do you qualify to take the CCSP exam? View the experience requirements The ISC2 CCSP® Training Boot Camp is a comprehensive program designed to build your skills around securing cloud-based environments. You will learn about cloud architecture and design requirements, operational and compliance issues, and the security of cloud data, applications, and infrastructure.
You will leave the boot camp fully prepared to earn your CCSP certification, one of the most in-demand certifications focused on cloud security.
The exam cost for the ISC2 CCSP® certification exam is included with your enrollment.
Our Certification Success Program, paired with our provided prep materials, boot camp sessions, and post-work, is designed to ease any concerns you may have when taking the certification exam. If your first attempt is unsuccessful, this program provides peace of mind that you may be eligible to take the certification exam a second time (if needed) at no additional fee.
*To qualify for a second certification exam voucher, students must:
- Attend at least 85% of each day of class
- Score a 90% or higher on their final practice exam
- Take the first exam within 90 days of class completion
- Upload your exam failure notice from your first exam attempt
- Day 1
- CCSP Overview and Cybersecurity Basics
- Cybersecurity Fundamentals
- Governance Principles
- Control Frameworks
- Cyber Security Framework (CSF)
- Amplification Framework
- Regulatory Compliance
- Cloud Concepts, Architecture and Design
- Cloud Computing Concepts
- Cloud Reference Architecture
- Deployment Models
- Security Aspects of Virtualization
- Principles of Secure Cloud Computing
- Design Requirements
- Cloud Model Boundaries
- Protecting Sensitive Information
- Threat Modeling
- Day 2
- Cloud Data Security
- Data Classification and Categorization
- Data Lifecyle
- Information Rights Management (IRM)/Digital Rights Management (DRM) Solutions
- Data Retention
- Data Audits
- Data Destruction/Disposal
- Day 3
- Cloud Platform and Infrastructure Security
- Cloud Storage Architectures
- Cloud Security Strategies
- Cloud Platform Risks and Responsibilities
- Disaster Recovery (DR) and Business Continuity Management (BCM)
- Day 4
- Cloud Application Security
- Cloud Secure Software Development Lifecycle (SDLC)
- Software Security Testing
- Application Architecture Elements of Cloud Services
- Auditing in the Cloud
- Cloud Security Operations
- Physical/Logical Operations
- Monitoring, Capacity and Maintenance
- Change and Configuration Management
- Managing Risks
- Security Training and Awareness
- Day 5
- Legal, Risk, Compliance
- Legal Concepts
- Intellectual Property
- Contract and Service-Level Agreements (SLA's)
- Assurance Frameworks and Certification
- CSA Security, Trust and Assurance Registry (STAR)
- CCSP – Test Essential Knowledge
- Domain 1
- Domain 2
- Domain 3
- Domain 4
- Domain 5
- Domain 6
What you will learn
- Identify and evaluate security risks for an organization's cloud environments
- Understand the fundamentals of the cloud computing architecture framework
- Select and implement appropriate controls to ensure secure cloud services
How you will benefit
- Increase your earning potential and career opportunities
- Become fully prepared to pass the CCSP exam, which is focused on six domain areas: cloud concepts, architecture and design, cloud data security, cloud platform and infrastructure security, cloud application security, cloud security operations, and legal, risk and compliance
- Understand how to design, manage and secure assets in the cloud
- Gain best practices around cloud data, applications and infrastructure
Boot camp
Boot camps are led by instructors that have years of industry experience and are recognized as subject matter experts.
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.
The ISC2 CCSP® Training Boot Camp is a comprehensive program designed to build your skills around securing cloud-based environments. You will learn about cloud architecture and design requirements, operational and compliance issues, and the security of cloud data, applications, and infrastructure.
You will leave the boot camp fully prepared to earn your CCSP certification, one of the most in-demand certifications focused on cloud security.
The exam cost for the ISC2 CCSP® certification exam is included with your enrollment.
Our Certification Success Program, paired with our provided prep materials, boot camp sessions, and post-work, is designed to ease any concerns you may have when taking the certification exam. If your first attempt is unsuccessful, this program provides peace of mind that you may be eligible to take the certification exam a second time (if needed) at no additional fee.
*To qualify for a second certification exam voucher, students must:
- Attend at least 85% of each day of class
- Score a 90% or higher on their final practice exam
- Take the first exam within 90 days of class completion
- Upload your exam failure notice from your first exam attempt
|
|
|
ISC2 CISSP® Training Boot Camp
- ISC2 CISSP® Training Boot Camp
-
Fee: $4,299.00
Dates: 4/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Location:
Building:
Room:
Instructor:
Take your career to the next level by earning one of the most in-demand cybersecurity certifications. This comprehensive boot camp provides you with a proven method for mastering the broad range of knowledge required to become a Certified Information Systems Security Professional (CISSP). Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
- A microphone.
- Speakers.
- A webcam.
Software Requirements:
- PC: Windows 7 or later.
- Mac: macOS 10.7 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
- Microsoft Word Online
- Adobe Acrobat Reader
- Zoom Meetings
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment and will be available online.
You also have the option to purchase a physical copy of the text for an additional fee of $100.
- CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide, (Sybex)
Earning your CISSP certification requires a broad range of cybersecurity skills, from developing security policies to managing risk to understanding technical security controls. Infosec's industry-leading approach to CISSP training provides the tools you need to master this knowledge, including becoming an information systems pro.
You will leave this training with the necessary skills and best practices to effectively create and execute enterprise-wide information security strategies — and the knowledge needed to pass your CISSP exam.
The exam cost for the ISC2 CISSP® certification is included with your enrollment.
Our Certification Success Program, paired with our provided prep materials, boot camp sessions, and post-work, is designed to ease any concerns you may have when taking the certification exam. If your first attempt is unsuccessful, this program provides peace of mind that you may be eligible to take the certification exam a second time (if needed) at no additional fee.
*To qualify for a second certification exam voucher, students must:
- Attend at least 85% of each day of class
- Score a 90% or higher on their final practice exam
- Take the first exam within 90 days of class completion
- Upload your exam failure notice from your first exam attempt
- Security & Risk Management
- Confidentiality, integrity and availability
- Security governance policies and their supporting counterparts
- Compliance
- Global information security
- Legal and regulatory policies
- Professional ethics
- Business continuity
- Personnel security
- Risk management
- Threat modeling
- Acquisition security
- Security awareness
- Asset Security
- Classify information
- Identify and document asset ownership
- Asset privacy concerns
- Asset retention policies
- Data security controls
- Handling requirements
- Security Engineering
- Secure engineering processes
- Review security engineering models
- Security architecture
- Web-based vulnerabilities
- Mobile vulnerabilities
- Embedded device vulnerabilities
- Cryptography components and their relationships
- Site and facility design
- Physical security
- Communication and Network Security
- Network architecture
- Network components
- Communication channels
- Handling network attacks
- Identity & Access Management
- Physical and logical access
- Authentication of people and devices
- Identity as service (cloud identity)
- Third-party identity
- Authorization mechanisms
- Access control attacks
- Provisioning life cycle
- Security Assessment and Testing
- Validate assessment
- Security control
- Management and operational controls
- Analyze and report test outputs
- Internal and third-party audits
- Security operations
- Handling investigations
- Investigation types
- Logging and monitoring
- Provisioning of resources
- Security Operations
- Resource protection
- Incident management
- Preventative measures
- Patch and vulnerability management
- Change management
- Disaster recovery
- Business continuity
- Managing physical security
- Personnel safety concerns
- Software Development Security
- Software development life cycle
- Security for development environments
- Software security
- Purchased software risk
What you will learn
The eight CISSP domain areas:
- Security and risk management
- Asset security
- Security engineering
- Communication and network security
- Identity and access management
- Security assessment and testing
- Security operations
- Software development security
How you will benefit
- Tools and expert instruction to increase your career opportunities as an information security analyst
- Obtain critical skills and best practices to create and execute enterprise-wide information security strategies effectively
- Prepare for your CISSP certification
Boot camp
Boot camps are led by instructors that have years of industry experience and are recognized as experts.
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.
Earning your CISSP certification requires a broad range of cybersecurity skills, from developing security policies to managing risk to understanding technical security controls. Infosec's industry-leading approach to CISSP training provides the tools you need to master this knowledge, including becoming an information systems pro.
You will leave this training with the necessary skills and best practices to effectively create and execute enterprise-wide information security strategies — and the knowledge needed to pass your CISSP exam.
The exam cost for the ISC2 CISSP® certification is included with your enrollment.
Our Certification Success Program, paired with our provided prep materials, boot camp sessions, and post-work, is designed to ease any concerns you may have when taking the certification exam. If your first attempt is unsuccessful, this program provides peace of mind that you may be eligible to take the certification exam a second time (if needed) at no additional fee.
*To qualify for a second certification exam voucher, students must:
- Attend at least 85% of each day of class
- Score a 90% or higher on their final practice exam
- Take the first exam within 90 days of class completion
- Upload your exam failure notice from your first exam attempt
|
|
|
ISC2 Governance, Risk, and Compliance Certification (CGRC™) Training Boot Camp (previously CAP®)
- ISC2 Governance, Risk, and Compliance Certification (CGRC™) Training Boot Camp (previously CAP®)
-
Fee: $3,999.00
Dates: 4/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Location:
Building:
Room:
Instructor:
Learn how to maintain and authorize information systems within the National Institute of Standards and Technology (NIST) Risk Management Framework (RMF). You will leave this boot camp with the knowledge and domain expertise needed to pass the ISC2 CGRC™ exam, previously known as CAP®. Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
- A microphone.
- Speakers.
- A webcam.
Software Requirements:
- PC: Windows 7 or later.
- Mac: macOS 10.7 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
- Microsoft Word Online
- Adobe Acrobat Reader
- Zoom Meetings
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The student materials required for this course are included in enrollment and will be available online. The ISC2 Certified in Governance, Risk, and Compliance (CGRC™), previously known as Certified Authorization Professional (CAP®), teaches you the best practices, policies, and procedures used to authorize and maintain information systems. You will learn how to use the Risk Management Framework (RMF) to support your organization's operations while complying with legal and regulatory requirements.
The CGRC certification is sought after by civilian, state, and local governments, as well as system integrators supporting these organizations. Additionally, you will learn about the purpose of information systems security authorization, describing and deciding when systems authorization is employed, and defining systems authorization, roles, and responsibilities.
Upon boot camp completion, you will have a firm understanding of the legal and regulatory requirements for Assessment and Authorization (A&A), maintaining systems documentation, and much more. You will leave with the knowledge and skills necessary to earn your ISC2 CGRC™ certification, which verifies your ability to set up the formal processes used to assess risk and establish security requirements.
The exam cost for the ISC2 CGRC™ certification exam is included with your enrollment.
Our Certification Success Program, paired with our provided prep materials, boot camp sessions, and post-work, is designed to ease any concerns you may have when taking the certification exam. If your first attempt is unsuccessful, this program provides peace of mind that you may be eligible to take the certification exam a second time (if needed) at no additional fee.
*To qualify for a second certification exam voucher, students must:
- Attend at least 85% of each day of class
- Score a 90% or higher on their final practice exam
- Take the first exam within 90 days of class completion
- Upload your exam failure notice from your first exam attempt
- Day 1
- Risk Management Framework
- Understanding the Risk Management Framework
- Categorization of information system
- Selection of security controls
- Security control implementation
- Security control assessment
- Information system authorization
- Monitoring of security controls
- Risk Management Framework Processes
- Day 2
- Categorize Information Systems
- Information system
- System security plan
- Categorize a system
- National security system
- Privacy activities
- System boundaries
- Register system
- Select Security Controls
- Establish the security control baseline
- Common controls and security controls inheritance
- Risk assessment as part of the Risk Management Framework (RMF)
- Day 3
- Implement Security Controls
- Implement selected security controls
- Tailoring of security controls
- Document security control implementation
- Assess Security Controls
- Prepare for security control assessment
- Establish security control assessment plan (SAP)
- Determine security control effectiveness and perform testing
- Develop initial security assessment report (SAR)
- Perform initial remediation actions
- Develop final security assessment report and addendum
- Authorize Information Systems
- Develop plan of action and milestones (POAM)
- Assemble security authorization package
- Determine risk
- Determine the acceptability of risk
- Obtain security authorization decision
- Monitor Security State
- Determine security impact of changes to system and environment
- Perform ongoing security control assessments
- Conduct ongoing remediation actions
- Update key documentation
- Perform periodic security status reporting
- Perform ongoing risk determination and acceptance
- Decommission and remove system
What you will learn
- Initiating the authorization process
- Establishing authorization boundaries
- Determining security categorization
- Performing initial risk assessment
- Selecting and refining security controls
- Documenting security control
- Performing certification phase
- Assessing security control
- Documenting results
- Conducting final risk assessments
- Generating and presenting an authorization report
- Performing continuous monitoring
- Monitoring security controls
- Monitoring and assessing changes that affect the information system
- Performing security impact assessment as needed
- Documenting and monitoring results of impact assessments
How you will benefit
- Learn how to use the RMF to support your organization's operations while complying with legal and regulatory requirements
- Focus on preparing for the CGRC certification exam through drill sessions, review of the entire CAP Body of Knowledge, and practical question and answer scenarios—all following a high-energy seminar approach
- The CGRC is the only certification under the DoD8570 mandate that aligns with each RMF step
- Show employers you have the advanced technical skills and knowledge to authorize and maintain information systems within the RMF using best practices, policies, and procedures
- The CGRC certification is sought after by civilian, state, and local governments, as well as system integrators supporting these organizations.
- Leave with the knowledge and skills necessary to earn your ISC2 CGRC certification, which verifies your ability to set up the formal processes used to assess risk and establish security requirements
Boot camp
Boot camps are led by instructors that have years of industry experience and are recognized as subject matter experts.
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.
The ISC2 Certified in Governance, Risk, and Compliance (CGRC™), previously known as Certified Authorization Professional (CAP®), teaches you the best practices, policies, and procedures used to authorize and maintain information systems. You will learn how to use the Risk Management Framework (RMF) to support your organization's operations while complying with legal and regulatory requirements.
The CGRC certification is sought after by civilian, state, and local governments, as well as system integrators supporting these organizations. Additionally, you will learn about the purpose of information systems security authorization, describing and deciding when systems authorization is employed, and defining systems authorization, roles, and responsibilities.
Upon boot camp completion, you will have a firm understanding of the legal and regulatory requirements for Assessment and Authorization (A&A), maintaining systems documentation, and much more. You will leave with the knowledge and skills necessary to earn your ISC2 CGRC™ certification, which verifies your ability to set up the formal processes used to assess risk and establish security requirements.
The exam cost for the ISC2 CGRC™ certification exam is included with your enrollment.
Our Certification Success Program, paired with our provided prep materials, boot camp sessions, and post-work, is designed to ease any concerns you may have when taking the certification exam. If your first attempt is unsuccessful, this program provides peace of mind that you may be eligible to take the certification exam a second time (if needed) at no additional fee.
*To qualify for a second certification exam voucher, students must:
- Attend at least 85% of each day of class
- Score a 90% or higher on their final practice exam
- Take the first exam within 90 days of class completion
- Upload your exam failure notice from your first exam attempt
|
|
|
ITIL v4 Foundation (Voucher Included)
- ITIL v4 Foundation (Voucher Included)
-
Fee: $1,295.00
Dates: 4/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Location:
Building:
Room:
Instructor:
This online training course will significantly benefit anyone seeking ITIL 4 certification and those interested in aligning IT with business, controlling or reducing IT costs, improving IT service quality, and balancing IT resources in the most effective manner. Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
Software Requirements:
- PC: Windows 8 or later.
- Mac: macOS 10.6 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
- Virtual Labs included with course
- Microsoft Word Online
- Adobe Acrobat Reader
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment. This exciting and dynamic online ITIL 4 Foundation certification course is designed for IT leaders, practitioners, support staff, and staff interfacing with the organization's digital and information systems functions. You will gain a practical understanding of the key concepts, common language, principles, and practices that enable successful management of modern IT-enabled services.
During this ITIL 4 certification training, dive into essential exam objectives like understanding the key components of ITIL v4 and its role in modern IT service management, exploring the Service Value System (SVS) and the 4 Dimensions of Service Management, and learning about the relationships between service providers and consumers. You will also familiarize yourself with the 7 Guiding Principles and the Continual Improvement Model.
After completing the course, you will be prepared for the ITIL 4 Foundation exam. This course offers enrollment with an ITIL 4 Foundation exam voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.
- Overview
- Introduction to ITIL v4 and Exam Objectives
- Overview of ITIL v4 and the Service Value System
- Framework
- The 4 Dimensions of Service Management
- What is Service
- Providers and Consumers
- Guiding Principles
- The 7 Guiding Principles
- The Continual Improvement Model
- Service Value
- The Service Value Chain
- ITIL Practices Overview
- Continual Improvement
- Practices
- Information Security Management
- Relationship Management
- Supplier Management
- Service Level Management
- Incident Management
- Problem Management
- Service Request Management
- Monitoring and Event Management
- Change Enablement
- Service Desk
- IT Asset Management
- Service Configuration Management
- Release Management
- Deployment Management
What you will learn
- Key IT service management concepts
- How ITIL guiding principles can help and organization to adopt and adapt service management
- The 4 Dimensions of Service Management
- The purpose and components of the service value system
- The activities of the service value chain and how they interconnect
- Know the purpose of key ITIL practices
How you will benefit
- Become prepared for the ITIL 4 Foundation exam
- Advance skills in IT service management
- Become more efficient in the delivery of quality digital services
Raymond Lacoste
Raymond Lacoste is a highly recognized instructor and IT professional who holds the Cisco Sirius Instructor Award. He has authored Cisco Press publications on the Cisco ENARSI and Cisco TSHOOT exams.
Raymond's areas of expertise include Cisco Enterprise networking, Cisco Routing and Switching, Cisco Datacenter Networking, ITIL, and Amazon AWS. He also holds certifications in Cisco CCSI, Cisco CCNP Routing and Switching, Cisco CCNP Enterprise, ITIL Foundations, ITIL Practitioner, ITIL Intermediate, Amazon AWS System Operations, Amazon AWS Architect, Amazon AWS Developer, and CISSP.
In addition to his certifications and experience, Raymond's engaging instruction style makes even the most obscenely complicated or obtuse concepts relatable and understandable. Outside of class, he enjoys dominating both on the golf course and the basketball court.
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.
This exciting and dynamic online ITIL 4 Foundation certification course is designed for IT leaders, practitioners, support staff, and staff interfacing with the organization's digital and information systems functions. You will gain a practical understanding of the key concepts, common language, principles, and practices that enable successful management of modern IT-enabled services.
During this ITIL 4 certification training, dive into essential exam objectives like understanding the key components of ITIL v4 and its role in modern IT service management, exploring the Service Value System (SVS) and the 4 Dimensions of Service Management, and learning about the relationships between service providers and consumers. You will also familiarize yourself with the 7 Guiding Principles and the Continual Improvement Model.
After completing the course, you will be prepared for the ITIL 4 Foundation exam. This course offers enrollment with an ITIL 4 Foundation exam voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.
|
|
|
Linux Foundation Certified System Administrator (LFCS) (Voucher Included)
- Linux Foundation Certified System Administrator (LFCS) (Voucher Included)
-
Fee: $2,195.00
Dates: 4/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Location:
Building:
Room:
Instructor:
This course will teach you the critical skills and knowledge needed to take the Linux Foundation Certified System Administrator (LFCS) exam—including all things involved with the Linux operating system. Requirements:
Hardware Requirements:
- This course can be taken on either a PC or Mac. Chromebooks are not compatible.
For Required Lab Exercises
- For hands-on lab exercises, access to a Linux server or Linux desktop/laptop is required. Access to a public cloud provider, or VirtualBox on your machine is also needed. Lab exercises in this course have been tested in a GCP environment.
- If using a cloud provider like GCP or AWS, you should be able to complete the lab exercises using the free tier or credits provided to you. However, you may incur charges if you exceed the credits initially allocated by the cloud provider.
Software Requirements:
- PC: Windows 7 or later.
- Mac: macOS 10.7 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
- Microsoft Word Online
- Adobe Acrobat Reader
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Exam Requirements:
- Exams are delivered online, and Candidates must provide their own computer with:
- Current version of Chrome or Chromium
- Reliable internet access
- Microphone
- Webcam
- All technical exam requirements should be tested and working prior to starting the exam.
- Candidates are not allowed to have other applications or browser windows running except the one on which the Exam is being shown.
- Candidates should run the compatibility check tool to verify that their hardware meets the minimum requirements.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment and will be available online. Interested in becoming a Linux system administrator? This online Linux foundation certification course will teach you to be a certified Linux systems administrator in six months or less! You will learn how to administer, configure, and upgrade Linux systems running one of the three major Linux distribution families (Red Hat, SUSE, Debian/Ubuntu). You will also learn all the tools and concepts you need to efficiently build and manage a production Linux infrastructure while becoming proficient with Linux commands.
The topics covered throughout your system administrator certification course are directly aligned with the knowledge domains tested by the Linux Foundation Certified Systems Administrator (LFCS) exam. They will substantially increase your ability to obtain your Linux system administrator certification.
With your Linux system administrator course enrollment, you will receive an exam voucher to sit for the Linux Foundation Certified System Administrator (LFCS) exam. The voucher covers the fee to sit for the certifying exam upon eligibility.
- Linux for Cloud Technicians Essentials
- Course Introduction
- System Configuration from the Graphical Interface
- Boot Process and System Initialization
- Command-line Operations
- User Accounts and Environment
- Text Operations
- File Operations
- Bash Shell Scripting
- Networking
- Working with Linux Filesystems
- Virtualization Overview
- Containers Overview
- Basic Troubleshooting
- Introduction to Git
- Using Git: An Example
- DevOps and GitOps
- Linux System Administration Essentials
- Course Introduction
- Linux Filesystem Tree Layout
- User Environment
- User Account Management
- Group Management
- File Permissions and Ownership
- Package Management Systems
- dpkg
- APT
- RPM
- dnf and yum
- zypper
- Introduction to Git
- Using Git: An Example
- Processes
- Process Monitoring
- Memory Monitoring, Usage and Configuring Swap
- I/O Monitoring and Tuning
- Virtualization Overview
- Containers Overview
- Linux Filesystems and the VFS
- Disk Partitioning
- Filesystem Features: Attributes, Creating, Checking, Usage and Mounting
- The ext4 Filesystem
- Logical Volume Management (LVM)
- Kernel Services and Configuration
- Kernel Modules
- Devices and udev
- Network Addresses
- Network Devices and Configuration
- LDAP
- Firewalls
- System Init: systemd, SystemV and Upstart
- Backup and Recovery Methods
- Linux Security Modules
- System Rescue
- Course Completion
- LFCS Exam Prep and Exam
What you will learn
- Administer, configure, and upgrade Linux systems running one of the three major Linux distribution families (Red Hat, SUSE, Debian/Ubuntu)
- Understand all the tools and concepts you need to efficiently build and manage a production Linux infrastructure while becoming proficient with Linux commands.
- Design, deploy, and maintain a network running under Linux
- Discover how to administer network services
- Gain skills to create and operate a network in any major Linux distribution
- Securely configure network interfaces
- Deploy and configure file, web, email, and name servers
- Become a Certified Linux System Administrator in six months or less
How you will benefit
- Earn a verifiable, respected badge
- Learn with hands-on labs and assignments
- Prepare for the Linux Foundation Certified Systems Administrator (LFCS) exam
Linux Instructors
This course does not have an assigned instructor, but you will have access to several Linux instructors and subject matter experts throughout the course.
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.
Interested in becoming a Linux system administrator? This online Linux foundation certification course will teach you to be a certified Linux systems administrator in six months or less! You will learn how to administer, configure, and upgrade Linux systems running one of the three major Linux distribution families (Red Hat, SUSE, Debian/Ubuntu). You will also learn all the tools and concepts you need to efficiently build and manage a production Linux infrastructure while becoming proficient with Linux commands.
The topics covered throughout your system administrator certification course are directly aligned with the knowledge domains tested by the Linux Foundation Certified Systems Administrator (LFCS) exam. They will substantially increase your ability to obtain your Linux system administrator certification.
With your Linux system administrator course enrollment, you will receive an exam voucher to sit for the Linux Foundation Certified System Administrator (LFCS) exam. The voucher covers the fee to sit for the certifying exam upon eligibility.
|
|
|
Management for IT Professionals
- Management for IT Professionals
-
Fee: $2,295.00
Dates: 4/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Location:
Building:
Room:
Instructor:
Learn leadership skills that will help you succeed as a manager in the IT field by exploring different decision-making techniques. This course focuses on developing a successful leadership style that facilitates team building, collaboration, and a corporate culture that promotes success. Requirements:
Hardware Requirements:
- This course can be taken on either a PC or Mac.
- A high-speed Internet connection
Software Requirements:
- PC: Windows 8 or later.
- Mac: macOS 10.6 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
- Microsoft Office or equivalent (not included in enrollment).
- Adobe Acrobat Reader.
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment. The following textbooks will be shipped to you approximately 7-10 business days after enrollment:
- Managing by the Numbers: A Commonsense Guide to Understanding and using your Company's Financials
- Strategic Planning - A Pragmatic Guide
Please note: You will receive a digital book if the physical book is on backorder. If you manage IT professionals, this course is for you! The leaders in an organization often set the tone and establish the benchmarks for success. In this course, you'll explore different decision-making techniques in the context of successful leadership styles. The focus is on developing a successful leadership style that facilitates team building, collaboration, and a corporate culture that promotes success.
The Management for IT Professionals Online Training course is particularly well suited for anyone in IT who has recently assumed management responsibilities, anyone who is managing IT professionals, or anyone who wants an introductory perspective on some of the unique issues facing the management of IT professionals. This course explores the developmental process and how to be successful in creating change. Since most business organizations are social systems, the Management for IT Professionals Online Training course will also focus on organizational culture and how it influences the way people work, so as to maximize the long-term health of the organization and its people. This course delivers essential leadership skills, business practices, budgeting strategies, communication skills, and more, all with the goal of helping you run your IT department better than ever before.
- Management Issues in the IT Environment
- Introduction and Components of a Successful Manager
- Organizational Culture and Change
- Power and Perceptions
- Leadership and Risk
- Strategies, Decision Making, Empowerment, and Accountability
- Customer Relationship Management and Quality
- Human Resource Management
- Financial Accountability
- Summary
- Collaborative Problem Solving
- Introduction
- Backgrounds, Management, and Leadership
- Communication, Motivation, and Development
- Summary
- Strategic Management in Operations
- Introduction and Overview
- Definitions and Business Models
- Categories of Strategies
- Strategic Planning Models
- Creating Strategic Alternatives
- Implementation
- Conclusion
- Business Best Practices
- Financial Accounting for IT Managers
- Introduction and Overview
- Importance of Financial Statements
- The Balance Sheet
- The Income Statement
- Statement of Cash Flows
- Financial Ratios
- Conclusion
- Legal Issues in Operations
- Introduction
- Sources of Law
- Agency and Employment Law
- Torts Law
- Sales and Products Liability
- Intellectual Property
- Ethics
- Summary
- Organizational Leadership and Decision Making
- Introduction and Overview
- What Is a Leader
- Sources of Power in Leadership
- Leadership Theories
- Transformational Leaders
- Decision Making and Empowerment
- Accountability
- Summary
- Organizational Development and Change
- Introduction and Overview
- The Culture of an Organization
- Types of Culture
- Organizational Change
- The Human Side of Change and Resistance
- Summary
- Negotiating Strategies
- Introduction
- Steps in Negotiating
- Tools in Negotiating
- Types of Negotiations
- Personality Types
- Preparing for Negotiations
- BATNA and Summary
- Seven Management Disciplines
- Introduction and Overview
- Strategy Management
- Human Resource Management
- Technology Management
- Production and Operations Management
- Sales and Marketing Management
- Customer Experience Management
- Financial Management
- Risk Management
- Summary
- Budgeting Essentials
- Introduction
- The Concept of Budgeting
- Activity Based Budgeting
- Factors to Consider in Budgeting
- Production Planning
- Inventory
- Sample Budget and Summary
- Persuasive Communication
- Introduction
- Fundamentals of Communication
- Knowing the Audience
- The Power of Listening
- Credibility of the Speaker
- Evidence in Persuasion
- Emotion in Persuasion
- Organizing the Argument
- Summary
What you will learn
- Learn to think about budgeting in a strategic, integrated manner
- Gain strategies to solve problems and challenges on a collaborative basis
- Understand the legal issues involved in operations, including agency and employment law
- Learn seven management disciplines
- Develop a foundation for negotiating with great awareness and effectiveness
- Learn about the key areas of business management
How you will benefit
- Begin your career as an IT professional or develop your existing skills to move up at your current job
- Learn to communicate and lead a team effectively
- Understand how to successfully run a department and what financial and legal regulations you'll be held to
- Discuss ways in which you can benefit your organization, from decision making to cultural shifts, that will make you an asset to any team
Katrina McBride
Katrina McBride's career reflects extensive experience in organizational leadership, marketing strategies, and market development in multi-national corporate environments. Her leadership abilities have been utilized to develop new programs and functional areas. In director-level positions for Nortel Networks, she led strategy for competitive intelligence, emerging markets, and lead generation. McBride holds an M.A. in organizational management and a B.S. in psychology.
Katherine Squires Pang
Katherine Squires Pang, J.D., LL.M., M.Ed has practiced law with since 1983. She has served as an adjunct faculty member in the Graduate School of Management at the University of Texas, Dallas, and has been an adjunct faculty member of many universities, including New York University and the University of California, Irvine. She received her B.A. in 1980 from Clark University, her J.D. from the University of Dayton Law School in 1982, her LL.M in Taxation from Georgetown University Law School in 1983, and her M.Ed from the University of Texas in 2001.
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.
If you manage IT professionals, this course is for you! The leaders in an organization often set the tone and establish the benchmarks for success. In this course, you'll explore different decision-making techniques in the context of successful leadership styles. The focus is on developing a successful leadership style that facilitates team building, collaboration, and a corporate culture that promotes success.
The Management for IT Professionals Online Training course is particularly well suited for anyone in IT who has recently assumed management responsibilities, anyone who is managing IT professionals, or anyone who wants an introductory perspective on some of the unique issues facing the management of IT professionals. This course explores the developmental process and how to be successful in creating change. Since most business organizations are social systems, the Management for IT Professionals Online Training course will also focus on organizational culture and how it influences the way people work, so as to maximize the long-term health of the organization and its people. This course delivers essential leadership skills, business practices, budgeting strategies, communication skills, and more, all with the goal of helping you run your IT department better than ever before.
|
|
|
MD-102: Endpoint Administrator (Voucher Included)
- MD-102: Endpoint Administrator (Voucher Included)
-
Fee: $1,695.00
Dates: 4/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Location:
Building:
Room:
Instructor:
This training course is created for Endpoint Administrators, Microsoft 365 Administrators, and Windows Administrators. It includes a deep dive into deploying Windows, managing identity and compliance, managing applications, implementing and managing endpoints via Microsoft Intune, Windows Autopilot, Microsoft Defender, and more. Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
Software Requirements:
- PC: Windows 8 or later.
- Mac: macOS 10.6 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
- Virtual Labs included with the course
- Microsoft Word Online
- Adobe Acrobat Reader
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment. Windows has over 73% of the market share worldwide! Obtaining proficiency in this essential and in-demand operating system is highly valuable in today's workforce. This Endpoint admin training is ideal for onboarding new junior systems admins, integrating into individual or team training plans, or serving as a comprehensive reference resource for Microsoft Windows 10 and 11 administrations.
This Microsoft Endpoint certification course is intended to prepare you to pass the MD-102 exam, which aligns with the MDAA (Modern Desktop Administrator Associate) certification. This MD-102 exam training includes a deep dive into deploying Windows, managing identity and compliance, managing applications, implementing and managing endpoints via Microsoft Intune, Windows Autopilot, and Microsoft Defender, and more. You will learn to deploy, configure, manage, and secure Windows 10 and Windows 11 devices on various devices, including PCs, laptops, tablets, smartphones, and in an enterprise environment.
Within your MD-102 exam training, you will gain an in-depth understanding of Microsoft operating systems and the applications and features that contribute to a modern desktop administration role. This MD-102 certification course offers an exam voucher with your enrollment, which is prepaid access to sit for the certifying exam upon eligibility.
- Preparing for a Windows client deployment
- Plan and implement a Windows client deployment by using Windows Autopilot
- Plan and implement a Windows client deployment by using the Microsoft Deployment Toolkit (MDT)
- Configure remote management
- Manage identity
- Implement compliance policies for all supported device platforms by using Intune
- Manage the device lifecycle in Intune
- Manage device configuration for all supported device platforms by using Intune
- Monitor devices
- Manage device updates for all supported device platforms by using Intune
- Implement endpoint protection for all supported device platforms
- Deploy and update apps for all supported device platforms
- Plan and implement app protection and app configuration policies
What you will learn
- Implement a Windows client deployment by using Windows Autopilot and Microsoft Deployment Toolkit (MDT)
- Implement compliance policies and manage devices in Intune
- Manage Microsoft Defender for Endpoint and in Windows client
- Deploy a Windows client
- Configure remote management
- Implement endpoint protection
- Deploy and update apps
- Implement app protection and configuration policies
How you will benefit
- Become prepared for the MD-102: Endpoint Administrator exam
- Begin a career as a Microsoft Administrator or broaden your skills if you are already working
- Become more efficient on the job and better able to manage Microsoft environments
Will Panek
Will Panek is a worldwide recognized Microsoft instructor and author. Will Panek is a 5-time Microsoft MVP and has published over 40 titles on Microsoft technologies. Will is a passionate and authoritative instructor and makes sure that his students can implement Microsoft technologies and get themselves certified along the way. Outside the class and authorship, you would be likely to find Will at the forge smithing his latest creation.
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.
Windows has over 73% of the market share worldwide! Obtaining proficiency in this essential and in-demand operating system is highly valuable in today's workforce. This Endpoint admin training is ideal for onboarding new junior systems admins, integrating into individual or team training plans, or serving as a comprehensive reference resource for Microsoft Windows 10 and 11 administrations.
This Microsoft Endpoint certification course is intended to prepare you to pass the MD-102 exam, which aligns with the MDAA (Modern Desktop Administrator Associate) certification. This MD-102 exam training includes a deep dive into deploying Windows, managing identity and compliance, managing applications, implementing and managing endpoints via Microsoft Intune, Windows Autopilot, and Microsoft Defender, and more. You will learn to deploy, configure, manage, and secure Windows 10 and Windows 11 devices on various devices, including PCs, laptops, tablets, smartphones, and in an enterprise environment.
Within your MD-102 exam training, you will gain an in-depth understanding of Microsoft operating systems and the applications and features that contribute to a modern desktop administration role. This MD-102 certification course offers an exam voucher with your enrollment, which is prepaid access to sit for the certifying exam upon eligibility.
|
|
|
Microsoft Azure Dual Certification Boot Camp
- Microsoft Azure Dual Certification Boot Camp
-
Fee: $4,399.00
Dates: 4/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Location:
Building:
Room:
Instructor:
Learn how to implement, monitor, maintain, and secure Microsoft Azure solutions! This boot camp provides hands-on experience and prepares you to earn two Microsoft certifications: Azure Administrator Associate and Azure Security Engineer Associate. Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
- A microphone.
- Speakers.
- A webcam.
Software Requirements:
- PC: Windows 7 or later.
- Mac: macOS 10.7 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
- Microsoft Word Online.
- Adobe Acrobat Reader.
- Zoom Meetings.
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The student materials required for this course are included in enrollment and will be available online. The Microsoft Azure Dual Certification Boot Camp teaches you vital Microsoft Azure administration and security skills through hands-on labs and expert instruction. The intensive training prepares you to pass the two exams necessary to become a Microsoft Certified: Azure Administrator Associate and Microsoft Certified: Azure Security Engineer Associate.
You will build your knowledge through hands-on labs, simulations, and real-world application of skills. The combination of practical labs and expert instruction ensures you will leave the boot camp with skills that directly transfer to the workplace and what you need to obtain your Microsoft Azure certifications.
You will receive an exam voucher for the Microsoft: Azure Administrator (AZ-104) and the Microsoft: Azure Security Technologies (AZ-500) certification exams with your enrollment.
Our Certification Success Program, paired with our provided prep materials, boot camp sessions, and post-work, is designed to ease any concerns you may have when taking the certification exam. If your first attempt is unsuccessful, this program provides peace of mind that you may be eligible to take the certification exam a second time (if needed) at no additional fee.
*To qualify for a second certification exam voucher, students must:
- Attend at least 85% of each day of class
- Score a 90% or higher on their final practice exam
- Take the first exam within 90 days of class completion
- Upload your exam failure notice from your first exam attempt
- Azure Administrator Associate
- Identity
- Governance and compliance
- Azure administration
- Virtual Networking
- Intersite connectivity
- Network traffic management
- Azure storage
- Azure virtual machines
- Serverless computing
- Data protection
- Monitoring
- Azure Security Engineer Associate
- Identity and access
- Platform protection
- Security operations
- Data and applications
What you will learn
- Manage identity and access
- Implement platform protection
- Manage security operations
- Secure data and applications
How you will benefit
- Prepare for the AZ-104 and AZ-500 exams
- Exam vouchers included with boot camp purchase
- Apply what you learn through hands-on labs, simulations, and real-world application of skills
- Expert instruction and support
- Expand career opportunities with these in-demand Microsoft Azure certifications
Boot camps are led by instructors that have years of industry experience and are recognized as subject matter experts.
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.
The Microsoft Azure Dual Certification Boot Camp teaches you vital Microsoft Azure administration and security skills through hands-on labs and expert instruction. The intensive training prepares you to pass the two exams necessary to become a Microsoft Certified: Azure Administrator Associate and Microsoft Certified: Azure Security Engineer Associate.
You will build your knowledge through hands-on labs, simulations, and real-world application of skills. The combination of practical labs and expert instruction ensures you will leave the boot camp with skills that directly transfer to the workplace and what you need to obtain your Microsoft Azure certifications.
You will receive an exam voucher for the Microsoft: Azure Administrator (AZ-104) and the Microsoft: Azure Security Technologies (AZ-500) certification exams with your enrollment.
Our Certification Success Program, paired with our provided prep materials, boot camp sessions, and post-work, is designed to ease any concerns you may have when taking the certification exam. If your first attempt is unsuccessful, this program provides peace of mind that you may be eligible to take the certification exam a second time (if needed) at no additional fee.
*To qualify for a second certification exam voucher, students must:
- Attend at least 85% of each day of class
- Score a 90% or higher on their final practice exam
- Take the first exam within 90 days of class completion
- Upload your exam failure notice from your first exam attempt
|
|
|
MS-102: Microsoft 365 Administrator (Voucher Included)
- MS-102: Microsoft 365 Administrator (Voucher Included)
-
Fee: $1,695.00
Dates: 4/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Location:
Building:
Room:
Instructor:
This course is for Microsoft 365 administrators looking to prepare for the MS-102: Microsoft 365 Administrator exam. It provides a thorough exploration of the deployment and implementation of Microsoft 365 services, user identity and role management, access and authentication management, and planning for Office 365 workloads and applications. Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
Software Requirements:
- PC: Windows 8 or later.
- Mac: macOS 10.6 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
- Virtual Labs included with course
- Microsoft Word Online
- Adobe Acrobat Reader
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment. This Microsoft 365 administrator certification course is carefully designed for individuals seeking to pass the MS-102 exam and obtain their Microsoft 365 Certified Administrator Expert credential. This course is ideal for administrators responsible for deploying and managing Microsoft 365, as well as those handling tenant-level implementation and administration in cloud and hybrid environments.
You will gain extensive knowledge in deploying and implementing various Microsoft 365 services, effectively managing user identities and roles within the Microsoft 365 ecosystem, mastering the intricacies of access and authentication management for secure operations, and developing the skills to seamlessly plan and manage Office 365 workloads and applications.
This MS 365 administrator training offers an exam voucher with your enrollment, which is prepaid access to sit for the certifying exam upon eligibility. Upon course completion and successfully passing your certification, you will be a qualified and in-demand Microsoft 365 administrator, who can serve as the central hub for all Microsoft 365 workloads, coordinating and collaborating across multiple services, and working closely with architects and other administrators.
- Implement and manage a Microsoft 365 tenant
- Manage users and groups
- Manage roles in Microsoft 365
- Implement and manage identity synchronization with Azure AD
- Implement and manage authentication
- Implement and manage secure access
- Manage security reports and alerts by using the Microsoft 365 Defender portal
- Implement and manage email and collaboration protection by using Microsoft Defender for Office 365
- Implement and manage endpoint protection by using Microsoft Defender for Endpoint
- Implement Microsoft Purview information protection and data lifecycle management
- Implement Microsoft Purview data loss prevention (DLP)
What you will learn
- Deploy and manage a Microsoft 365 tenant
- Implement and manage identity and access in EntraID
- Manage security and threats by using Microsoft 365 Defender
- Manage compliance by using Microsoft Purview
How you will benefit
- Become prepared for the MS-102: Microsoft 365 Administrator exam
- Begin a career as a Microsoft 365 Administrator or broaden your skills if you are already working
- Become more efficient on the job and better able to manage Microsoft 365 environments
Spike Xavier
Spike Xavier is an experienced IT instructor and author. Spike has more than a decade of experience teaching topics, including computer hardware, networking, SharePoint, and Microsoft 365. He started an e-commerce company in 1998 and then a consulting company. He holds many certifications, including Microsoft Professional, Trainer, DeskTop, and Developer. As well as CompTIA IT Fundamentals, A+ and Network+. He also has experience writing code, in many different languages. His hobbies include being a musician, he plays several instruments. He also loves Jiu Jitsu and boxing.
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.
This Microsoft 365 administrator certification course is carefully designed for individuals seeking to pass the MS-102 exam and obtain their Microsoft 365 Certified Administrator Expert credential. This course is ideal for administrators responsible for deploying and managing Microsoft 365, as well as those handling tenant-level implementation and administration in cloud and hybrid environments.
You will gain extensive knowledge in deploying and implementing various Microsoft 365 services, effectively managing user identities and roles within the Microsoft 365 ecosystem, mastering the intricacies of access and authentication management for secure operations, and developing the skills to seamlessly plan and manage Office 365 workloads and applications.
This MS 365 administrator training offers an exam voucher with your enrollment, which is prepaid access to sit for the certifying exam upon eligibility. Upon course completion and successfully passing your certification, you will be a qualified and in-demand Microsoft 365 administrator, who can serve as the central hub for all Microsoft 365 workloads, coordinating and collaborating across multiple services, and working closely with architects and other administrators.
|
|
|
SSCP Systems Security Certified Practitioner
- SSCP Systems Security Certified Practitioner
-
Fee: $1,795.00
Dates: 4/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Location:
Building:
Room:
Instructor:
This online Systems Security Certified Practitioner (SSCP) course is ideal for individuals interested in advancing their knowledge of information and systems security. Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
Software Requirements:
- PC: Windows 10 or later.
- Mac: macOS 10.6 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
- Virtual Labs included with course
- Microsoft Word Online
- Adobe Acrobat Reader
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment.
- Study guide
- Practice exams
The following textbook(s) will also be shipped to you approximately 7-10 business days after enrollment:
- SSCP Systems Security Certified Practitioner All-in-One Exam Guide, 3rd Edition
The world of IT security is fast-paced and exciting, with the potential for high earnings—but it can also be competitive. To stay ahead, you will need a certification like the Systems Security Certified Practitioner (SSCP), a premier credential that is ideal for those wanting to begin or advance a career in computer networking or security. An SSCP exam prep course is a great way to ensure you have the knowledge to succeed—and take on more responsibility with your current or future employer.
You will learn crucial topics such as authentication, identity management, and network trusts. You will also master cloud computing security concepts, network data security, wireless security, and cellular technologies. This SSCP training course will explore and cover malware identification and mitigation, risk management, security assessment, incident handling, cryptography, encryption, PKI, certificates, security auditing, and systems monitoring and analysis.
This advanced, online SSCP certification course will prepare you for the industry-recognized certification exam offered by ISC2, the world's leading member association for cybersecurity professionals, and help you further your career as a network administrator or security administrator and help you stay up to date on your skills if you already work in the information technology (IT) sector.
The SSCP is one of the best cybersecurity certifications you can earn, especially as an entry-level professional. Note: You must possess a minimum of one year of full-time experience in one or more of the seven domains of the current SSCP Exam Outline.
- Security Operations and Administration
- What is ISC/SSCP
- Security Basics
- Segregation of duties
- Security controls
- Administrative controls
- Assessing compliance
- Types of security controls
- Asset management
- Change management lifecycle
- Access Controls
- Types of authentication
- Access Controls
- RBAC
- Rule Based Access Control
- MAC
- DAC
- Trust relationships
- Transitive
- Zero
- Identity management
- Authorization
- Risk Identification
- Definitions – risk, risk management, vulnerability
- Determining risk levels
- Key Risk Indicator
- Types of risk responses
- Acceptance
- Mitigation
- Identifying risks and vulnerabilities
- Creating baselines and anomalies
- Risk management frameworks (RMF) – enterprise level
- COBIT
- Vulnerability management planning
- Creating reports
- Remediation
- Continuous monitoring
- Slow performance of systems/crashing
- Network
- Metrics and data analysis
- Event triggers
- Legal restraints
- Incident Response
- Response plan
- Documenting a response plan
- First steps
- Recording any changes/moves made to secure data – chain of custody
- Contain damage (disconnect drives, etc)
- Next steps
- Plan on how to resolve issue
- Investigate source of incident – forensic investigation
- Begin recovery
- Document all actions
- After actions reporting
- Document future prevention plan
- Provide employee/personal training to avoid repeat scenario
- Backup planning
- Testing backups
- Emergency response plans
- Cryptography
- Laws and regulations
- ISO
- Data encryption
- Encryption during transit
- Encryption at rest
- Strength of encryptions
- What is Public Key Infrastructure (PKI)
- Certificate authority
- What uses PKI
- Key creation and destruction
- PGP
- GPG
- Blockchain
- Nonrepudiation
- Digital Signatures
- HMAC
- Security protocols
- SSL/TLS
- S/MIME
- DKIM
- Network and Communication Security
- Parts of a network
- Routers/switches
- Firewalls
- IDS/IPS
- TCP/IP model
- OSI Model
- Compare/contrast models side by side
- Important protocols in IP stack
- HTTP
- Email protocols
- Other common protocols – FTP, DNS
- Network topologies
- Bus
- Ring
- Hybrid
- Peer-to-peer
- Switches
- VLANs
- Switchport abilities
- Trunking
- Routers
- Routing protocols
- Load balancing
- RADIUS
- TACACS
- ACLs
- Remote access through VPN
- VPN
- Types
- Function
- VPN topology
- Firewalls
- Selecting an appropriate technology
- Best practices
- Firewall evasion
- Other devices
- Wireless topology
- Wireless Standards
- Encryption
- Authentication
- Threats
- Prevention
- Placement of APs/antennas
- Bluetooth
- NFC technology
- Systems and Applications Security
- Network attacks
- Ransomware
- Trojans
- Exploits
- Spyware/Adware
- Man in the Middle
- Rootkits
- Social Engineering attacks
- Whaling
- Password hacking
- System hardening
- Anti-Virus
- Host based IDS
- Host Based firewalls
- Utilities
- Common types
- Application whitelisting
- Mobile device management
- Encryption
- Mobile application management
- Restrictions
- DLP
- Disk encryption
- File level encryption
- Containerization
- Cloud security
- Data transmission
- Benefits/drawbacks of cloud
- Data ownership in cloud environments
- Virtualization
What you will learn
- Understand authentication, identity management, and network trusts
- Master cloud computing security concepts, as well as network data security
- Learn about wireless security and cellular technologies
- Explore malware identification and mitigation
- Discover risk management, security assessment, and incident handling
- Practice cryptography, encryption, PKI, and certificates
- Understand security auditing and systems monitoring and analysis
How you will benefit
- Become prepared to work as a Systems Security Certified Practitioner (SSCP)
- Prepare yourself for a career as an information security analyst, computer system analyst, security management specialist, or computer user support specialist
- Begin or advance your career in computer networking or security
Derrick Coston
Derrick Coston is a blue-team cybersecurity professional. Derrick has run a team of cybersecurity professionals for a major financial institution. Outside of teaching classes such as CISA and CISSP, Derrick serves as a cybersecurity consultant and auditor for organizations, and performs security assessments for large organizations.
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.
The world of IT security is fast-paced and exciting, with the potential for high earnings—but it can also be competitive. To stay ahead, you will need a certification like the Systems Security Certified Practitioner (SSCP), a premier credential that is ideal for those wanting to begin or advance a career in computer networking or security. An SSCP exam prep course is a great way to ensure you have the knowledge to succeed—and take on more responsibility with your current or future employer.
You will learn crucial topics such as authentication, identity management, and network trusts. You will also master cloud computing security concepts, network data security, wireless security, and cellular technologies. This SSCP training course will explore and cover malware identification and mitigation, risk management, security assessment, incident handling, cryptography, encryption, PKI, certificates, security auditing, and systems monitoring and analysis.
This advanced, online SSCP certification course will prepare you for the industry-recognized certification exam offered by ISC2, the world's leading member association for cybersecurity professionals, and help you further your career as a network administrator or security administrator and help you stay up to date on your skills if you already work in the information technology (IT) sector.
The SSCP is one of the best cybersecurity certifications you can earn, especially as an entry-level professional. Note: You must possess a minimum of one year of full-time experience in one or more of the seven domains of the current SSCP Exam Outline.
|
|
|
Understanding the Cloud Offered in partnership with ed2go
-
Fee: $129.00
Hours: 24
Learn everything you need to understand cloud computing. This course explores how the cloud works, what drives it, why it is so popular, and what it can do for you.
|
|
|
Understanding the Cloud (Self-Guided)
- Understanding the Cloud (Self-Guided)
-
Fee: $129.00
Dates: 4/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Location:
Building:
Room:
Instructor:
Learn everything you need to truly understand the cloud—including how it works, what drives it, why it's so popular, and how to make the cloud work for you. What is the cloud? If you have trouble answering this question, you are not alone. In this course, you will explore how the cloud works, what drives its incredible growth, and how you can use cloud services. You will start by looking at the building blocks of the cloud, where it started, and how it transitioned. You will gain a clear understanding of IaaS (infrastructure), SaaS (software), and PaaS (platforms), and examine why each may be attractive to some businesses, but not to others. You will learn about the different kinds of clouds (public, private, and hybrid).
You will also look inside the engine rooms of the cloud: data centers. You will examine the concept of big data and how the cloud infrastructure enables data to zip across the globe at lightning speed. You will look at how Facebook and Twitter contribute to the cloud, and how apps go from idea to app store. You will gain an understanding of how mobile devices and major mobile ecosystems continue to shape the cloud. Whatever your technical background, by the end of this course, you will be thoroughly cloud-savvy. Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
Software Requirements:
- PC: Windows 8 or later.
- Mac: macOS 10.6 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
- Adobe Acrobat Reader.
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment and will be available online. Learn everything you need to truly understand the cloud—including how it works, what drives it, why it's so popular, and how to make the cloud work for you. What the Cloud Is
Confused about the cloud? You're in the right place! This first lesson will clear up some confusion and start with the basics. It will explain the building blocks of the cloud, and that will lead you to a durable definition of the cloud that you'll use as a foundation for the rest of the course. The lesson will also discuss what the cloud means to you, its impact on your life, and why it'll be helpful for you to understand how it works.
How the Cloud Started and What It Solves
So how did the cloud get started? In this lesson, you'll learn the history of the cloud and how it was a natural evolution of networked computers and Internet connectivity. The lesson will also discuss why the cloud is so important, and then you'll look at the business challenges and opportunities that the cloud addresses. By the end of the lesson, you'll have a solid understanding of how this technology got to where it is now and how business computing operated before the cloud.
Different Kinds of Clouds: Public, Private, Hybrid
Ever wonder why some people believe the cloud is simple, while others believe that it's complex? In this lesson, you'll learn why they're both right—and you'll learn how to think about the cloud from two perspectives. The lesson will also discuss the different types of clouds: public, private, and hybrid. You'll get a glimpse inside the big business technology world and find out why the cloud can be such a compelling move for large organizations.
How the Cloud Grows
What's the difference between the cloud and a collection of computers? A bunch—and much of that comes down to virtualization. In this lesson, you'll learn what virtualization is and why it's so fundamental in how the cloud operates. The lesson will also discuss scale and how it relates to virtualization. Finally, you'll see how endpoints make all the connections work.
Cloud Services
As you'll recall, "services" is one of the five building blocks in the definition of the cloud. In this lesson, you'll look at those services. Specifically, you'll look at three categories of cloud services: infrastructure (or Infrastructure as a Service, or IaaS), platforms (or Platform as a Service, or PaaS), and software (or Software as a Service, or SaaS). The lesson will discuss how these three categories compare and individuals and business can take advantage of them.
Data Centers: Where the Cloud Computes
All the computing power of the cloud needs to live somewhere, and it's not in the atmosphere. In this lesson, you'll learn all about data centers—how they operate, what they look like, where they're located, and what makes them tick. You'll also learn what makes one data center more efficient than another, and you'll get perspective on what it costs to make them operate. It's a fascinating tour, with a lot to learn and even more to explore!
Understanding Data, Including Big Data
Your experience in the cloud includes the storing and transmission of data, either across the hall or across the world. In this lesson, you'll understand how to think about data in terms of its importance in the cloud and learn why companies often leave worrying about data to someone else. The lesson will discuss how all the data in the cloud moves across continents, across the ocean, and over airwaves. Finally, you'll look at a clear definition of big data and see some examples of where big data may be headed.
Understanding Cloud Providers
Making sense of how cloud providers offer their services is an important step in truly understanding the cloud. In this lesson, you'll see how a well-established cloud provider organizes and presents its offerings. You'll go through each group of the cloud provider's offered services and map them to what you've already learned about the cloud and the categories you're familiar with.
Cloud Providers and Big Platforms
In this lesson, you'll learn where websites fit into the cloud and what other elements, offerings, or activities are driving the adoption and popularity of the cloud and its varied services. The lesson will also cover what it means to be a big provider, and you'll examine the largest platforms—and largest overall service providers—that are in the cloud today.
Getting Into the Cloud
Learn about what goes into creating a cloud app, and how the three (plus one) ecosystems dominate the world of cloud applications. In this lesson, you also learn about the different types of devices, how they are categorized, and how they align to the types of cloud apps that are available. You'll also learn about ecosystems, and why they define how cloud apps are created, distributed, and sold.
The Cloud and #You
In this lesson, you'll look at how social network sites like Facebook, LinkedIn, and Twitter work in the cloud and how users and organizations can create apps that connect with their huge base of users. You'll learn how social media sites let software developers interact with their sites, create apps and games that operate within and outside their sites, and why they do this. Also, you'll learn about social media tools on Facebook and in Twitter, including why the hashtag was created (#), how it's used, and how to use these sites yourself.
Conclusions, Connections, and the Future of the Cloud
This lesson ties together everything you've learned in this course. You'll learn how you can view the cloud from two primary perspectives—consumer and business—and about the primary benefits (and drivers) that have propelled cloud adoption from participants of both perspectives. The lesson will also discuss where these two perspectives share a common, clear force that continues to be the biggest benefit of the cloud. Finally, you'll look into the future of what the cloud may hold and what that future might mean. Self-Study
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.
Learn everything you need to truly understand the cloud—including how it works, what drives it, why it's so popular, and how to make the cloud work for you.
|
|
|
VMware vSphere ICM v7.0 for the Real World
- VMware vSphere ICM v7.0 for the Real World
-
Fee: $2,195.00
Dates: 4/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Location:
Building:
Room:
Instructor:
This course is intended for operators, system administrators, and system engineers responsible for ESXi and vCenter Servers. Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
Software Requirements:
- PC: Windows 8 or later.
- Mac: macOS 10.6 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
- Microsoft Word Online
- Adobe Acrobat Reader
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment and will be available online. This course features intensive hands-on training that focuses on installing, configuring, and managing VMware vSphere® 7.0, which includes VMware ESXi™ 7.0 and VMware vCenter Server® 7.0. This course prepares you to administer a vSphere infrastructure for an organization of any size. It is the foundation for most other VMware technologies in the software-defined data center.
- Introduction to Virtualization
- Intro to Virtualization
- Intro to VMware's virtualization solutions
- Licensing
- Installation of ESXi
- Installation
- DCUI configuration
- Host Client
- vCenter Server Installation and Configuration
- vCenter Server Installation
- vCenter Server Management interface
- Backing up vCenter Server
- vCenter Server Administration tour
- Virtual Machines
- Virtual Machine Introduction
- Virtual Machine Deployment
- Key Options of the VM
- VM Configuration Options
- Using Content Libraries
- Solutions Manager configurations
- Snapshot Management
- Using Limits, Shares, and Reservations
- Migrating Virtual Machines
- Installing VM Tools
- SR-IOV basics
- Networking
- Networking Basics
- Understanding Portgroups
- Creating and Managing Distributed Switches
- Port Group Options
- Using Network Policies
- Traffic Filtering and Marking
- Monitoring Networking
- Paravirtualization and IPv6 deployment
- Storage
- Storage Introduction
- Connecting to Storage
- Fibre Channel over Ethernet
- iSCSI
- NFS
- Intro to VMFS Datastores
- Security
- Securing vSphere
- Using Single Sign On
- Applying certificates
- Using Permissions
- Hardening your vSphere environment
- Resource Allocation
- Resource management
- Resource pools
- Understanding DRS
- Deploying a DRS cluster
- Understanding Distributed Power Management
- Storage DRS
- Host Profiles
- An overview of Host Profiles
- Working with Host Profiles
- Business Continuity
- Introduction to Business Continuity Solutions in VMware
- Using High Availability
- Troubleshooting HA
- Fault Tolerance explained
- Upgrade Process
- Upgrading vCenter Server
- Upgrading a Host
- Introduction to the lifecycle manager interface
What you will learn
- Describe the software-defined data center (SDDC)
- Explain the vSphere components and their function in the infrastructure
- Install and configure VMware ESXi hosts
- Deploy and configure VMware vCenter Server Appliance
- Use VMware vSphere Client to manage the vCenter Server inventory and the vCenter Server configuration
- Manage, monitor, back up, and protect vCenter Server Appliance
- Create virtual networks with vSphere standard switches
- Describe the storage technologies supported by vSphere
- Configure virtual storage using iSCSI and NFS storage
- Create and manage VMware vSphere VMFS datastores
- Use the vSphere Client to create virtual machines, templates, clones, and snapshots
- Create a content library and deploy virtual machines from templates in the library
- Manage virtual machine resource use
- Migrate virtual machines with VMware vSphere vMotion and VMware vSphere Storage vMotion
- Create and manage a vSphere cluster that is enabled with VMware vSphere High Availability
- Use the VMware vSphere Distributed Resource Scheduler
- Discuss solutions for managing the vSphere life cycle
- Use VMware vSphere Update Manager to apply patches and perform upgrades to ESXi hosts and virtual machines
How you will benefit
- This course helps prepare you to administer a vSphere infrastructure for an organization of any size
- Complete in 3 months or less
Russ Long
Russ Long is an experienced IT professional and instructor specializing in Cisco networking and VMware virtualization. He holds many reputable IT certifications, including Cisco CCSI, Cisco CCNA, Apple Certified Support Professional, VMware VCP-DCV, and VMware VCA-DCV. In addition to his certifications, Russ has extensive experience with Cisco routing and switching, Linus administration, Cybersecurity, VMware vSphere, VMware Workstation, Microsoft Hyper-V, and Apple Support. His approachable teaching style allows students to get a deeper understanding of technology by encouraging them to ask questions. Outside of class, Russ will get his party killed in MMOs and dominate in the pool hall.
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.
This course features intensive hands-on training that focuses on installing, configuring, and managing VMware vSphere® 7.0, which includes VMware ESXi™ 7.0 and VMware vCenter Server® 7.0. This course prepares you to administer a vSphere infrastructure for an organization of any size. It is the foundation for most other VMware technologies in the software-defined data center.
|
|
|
Wireless Networking Offered in partnership with ed2go
-
Fee: $129.00
Hours: 24
Learn how to plan, deploy, and connect wireless networks from an industry expert. This course removes the mystery behind wireless connections and provide a thorough overview of this fascinating and lucrative technology.
|
|
|
Wireless Networking (Self-Guided)
- Wireless Networking (Self-Guided)
-
Fee: $129.00
Dates: 4/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Location:
Building:
Room:
Instructor:
Industry expert shows you how wireless networking works, as well as how to plan, deploy, and connect to wireless networks. Wireless networking is one of the fastest growing segments of the computer industry. Every electronic device seems capable of wireless connections these days: computers, handhelds, cell phones, and even digital cameras are all capable of transmitting without a tether. To many people, those wireless connections are nothing short of technical wizardry. This course will remove the mystery and give you a thorough understanding of this fascinating and lucrative technology.
Becoming knowledgeable about wireless networking is easier than ever. With a practical and thoughtful approach to teaching and an emphasis on giving you a practical, hands-on understanding of how wireless works, this course will teach you everything you want to know about the world of wireless connectivity. Requirements:
Hardware Requirements:
- This course can be taken on either a PC or Mac.
Software Requirements:
- PC: Windows 8 or later.
- Mac: macOS 10.6 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
- Adobe Acrobat Reader.
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Learn how to plan, deploy, and connect wireless networks from an industry expert. This course removes the mystery behind wireless connections and provide a thorough overview of this fascinating and lucrative technology. Networking Basics
The first Internet connection was made at UCLA in September 1969 with a thick gray cable between two computers. Times sure have changed! Today, the Internet serves millions of emails and web pages every few minutes, connecting billions of users from all over the world. Don't forget about wireless networking, which is one of the hottest networking technology around. Learning how all those wireless networks operate is as interesting as the Internet itself. In this first lesson, you'll learn about basic network facts and operation, preparing you to expand your knowledge in subsequent lessons.
How Wireless Networking Works
Have you ever wondered how a radio turns invisible waves into music? Or why you can hear bass sounds from farther away than cymbals? Why does a radio station cut out when you go through a mountain tunnel or around a bend? Wireless networks have similar characteristics to radio music transmissions, but there are important differences. This lesson will explain how wireless networking actually works in simple everyday terms that make it easy to understand. You'll also learn about different methods used to pull computer data out of thin air.
Standards in the Wireless World
Why do some electronic devices gain widespread popularity while others sit on the shelf? In this lesson, you'll learn how standards in the networking world help drive the adoption of technology. You'll also get a firsthand look at how standards operate in every real-world business, like clothes and batteries and shampoo. In doing so, you'll learn why some wireless networking technologies have flourished while others have failed miserably (early wireless technologies were a flop!). By the end of this lesson, you'll know who makes the standards, how something becomes standardized, and why it's so important. You'll also see how all this applies to wireless networking standards and gain insight on why wireless networking is so popular today.
Wireless Devices
If you've considered buying wireless networking equipment, you know that there are lots of choices out there. How do you make sense of it all? Which technology is better? What do all of those extra features mean to you? In this lesson, you'll learn all about wireless network devices, what role each device plays, and how to make sense of it all! By the end of this chapter, you'll know exactly what each wireless networking device is capable of doing and which one is right for you.
Wireless Networks—Short Range
In this lesson, you'll investigate short-range wireless network technologies. You'll learn all about Bluetooth, Wi-Fi, and the details that make each technology unique. You'll also take a firsthand look at why one is better than the other and where each technology fits into the larger wireless networking picture.
Wireless Networks—Long Range
Would you consider a wireless networking technology capable of traveling 90,000 miles a long-range wireless technology? Probably so! In this lesson, you'll learn which wireless technology can go beyond your house, beyond your neighborhood, and even beyond the atmosphere. You'll also learn the drawbacks of having your data travel into space and back, and about some long-range wireless technologies that might give DSL or cable Internet access a run for their long-range money.
Creating a Wireless Network—Part 1
Now that you've learned all about wireless technologies, it's time to put your knowledge to work. In this lesson, you'll learn how to plan a wireless network. After all, once you learn about wireless networking, you'll want to get wireless working in your house or office! This lesson will walk you through each planning phase, complete with network drawings that depict how a real-life wireless network should be prepared.
Creating a Wireless Network—Part 2
In the previous lesson, you planned a network. In this lesson, you'll install a wireless access point (WAP) to get the wireless network up and running. You'll also learn about issues you should address when configuring a wireless network, including interference with neighboring networks and how to extend your network to reach far-off corners of your home or office.
Connecting to a Wireless Network—Part 1
Once you have a wireless network ready for computers to access, you're ready for the next step: connecting wireless devices. In this lesson, you'll learn how to outfit a computer with a wireless network card, how to connect that computer to your wireless network, and how to make sure that wireless network connection is properly configured. By the end of this lesson, you'll be ready to surf the Internet from your couch! Then, you'll look at the similarities and differences between Windows and Apple software.
Connecting to a Wireless Network—Part 2
Computers aren't the only devices capable of connecting to wireless networks these days. There are all sorts of wireless devices, like Personal Data Assistants (PDAs), that you can connect. In this lesson, you'll learn how to hook those other devices into the wireless network you created in previous lessons. Then you'll get a chance to explore how Bluetooth networks operate, how they differ from Wi-Fi, and how to go about connecting one Bluetooth device to another.
Security in Wireless Networks
You can't take the security of your computer (or network) for granted these days. In this lesson, you'll discover how wireless networks provide security for wireless devices that connect to them. You'll also learn how to make your own wireless network secure, ensuring that only the people you want to connect to your wireless network are capable of doing so. You'll also learn how to secure your wireless device, such as a computer or PDA, when you're roaming all those cool (but potentially unsafe) public access areas like coffee shops or downtown wireless districts.
Conclusions and the Future
What is the future of wireless networking? Is this as cool as it's going to get or will you see all sorts of new wireless technologies in the future? This lesson will discuss where the future of wireless networking is headed and what that future might have in store. You'll learn about the future of cellular networks, the future of answering the telephone on the Internet, and how power lines and broadband might be a match made in heaven! Of course, the future is uncertain, but it's fun to make some educated guesses based on history and how networking technology has moved in the past. Be prepared to add your own thoughts to the discussion on the future of networking—this will be an especially interesting and exciting lesson! Self-Study
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.
Learn how to plan, deploy, and connect wireless networks from an industry expert. This course removes the mystery behind wireless connections and provide a thorough overview of this fascinating and lucrative technology.
|
|
|