Virtual Instructor-Led Training
Get certified or simply improve your skills with our virtual Instructors.
Categories
- Agile
- AI/ML
- All Courseware
- Application & Infrastructure
- Application and Infrastructure
- Business Analysis
- Cloud
- Data & Analytics
- Design Multimedia
- Developer
- DevOps
- End User Application
- IT Service Management
- Leadership & Professional Development
- Modern Workplace
- Networking & Wireless
- Networking and Wireless
- Office Applications
- Programming
- Project Management
- Security
- Virtualization
- Workplace Fundamentals
Vendors
- Adobe
- Agile
- Amazon
- Business Analysis
- Business Process
- CertNexus
- Cisco
- CMMC
- CompTIA
- Crystal Reports
- CyberSecurity Professionals
- Development
- DevOps Institute
- EC-Council
- ISACA
- ISC2
- Java
- JavaScript
- Leadership & Professional Development
- Microsoft
- Microsoft Apps
- Microsoft Technical
- PeopleCert
- PMI
- Project Management
- Python
- Red Hat
- Scrum
- SHRM
- Six Sigma
- Tableau
- VMware
- Web Development
- Workplace Fundamentals
EC-Council
EC-Council
CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so you will be better positioned to setup your security infrastructure and defend against future attacks. An understanding of system weaknesses and vulnerabilities helps organizations strengthen their system security controls to minimize the risk of an incident. CEH was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to achieve the CEH credential. You will be exposed to an entirely different posture toward the responsibilities and measures required to be secure. Now in its 12th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies.- 5 Days Course
- Live Virtual
$4,735.90EC-Council
The CSCU program is designed to educate students on the safe operation of computers, devices, and networks by focusing on the more practical aspects of networking and security, allowing them to expand their skills. Students will develop a fundamental understanding of computer, device, and network security issues, including identity theft, credit card fraud, online banking phishing scams, malware, loss of sensitive information, and social engineering. This certification is an excellent complement to educational offerings for knowledge workers and end-users interested in becoming secure power users.- 2 Days Course
- Live Virtual
$1,483.78EC-Council
EC-Council’s C|HFI program prepares cybersecurity professionals with the knowledge and skills to perform effective digital forensics investigations and bring their organization into a state of forensic readiness. Establishing the forensics process, lab, evidence handling procedures, and investigation techniques are required to validate/triage incidents and point the incident response teams in the right direction. Forensic readiness is crucial as it can differentiate between a minor incident and a major cyber-attack that brings a company to its knees.
This intense hands-on digital forensics program immerses students in over 68 forensic labs, working on crafted evidence files utilizing the tools of the world’s top digital forensics professionals. Students will go beyond traditional hardware and memory forensics, covering current topics in cloud forensics, mobile and IoT, and investigating web application attacks and malware forensics. The C|HFI presents a methodological approach to computer forensics, including searching and seizing, chain-of-custody, acquisition, preservation, analysis, and reporting of digital evidence. Students learn various forensic investigation techniques and standard forensic tools. As they learn how to acquire and manage evidence through various operating environments, students also learn the chain of custody and legal procedures required to preserve evidence and ensure it is admissible in court, enabling the eventual prosecution of cyber criminals and containing liability on the victim organization.
- 5 Days Course
- Live Virtual