Virtual Instructor-Led Training

Get certified or simply improve your skills with our virtual Instructors.

Security

FILTER BY PRODUCT NAME

  • Microsoft Technical

    This three-day instructor-led course is aimed at modern device management professionals looking to manage their enterprise devices using Microsoft Intune. This course will cover Enrolment, Application Management, Endpoint Security and Windows Autopilot as well as Azure Active Directory Conditional Access and Identity Protection. The delegates will learn how to enroll devices, deploy applications and manage them to maximize user productivity and device security.
  • Microsoft Technical

    This course provides IT Security Professionals with the knowledge and skills needed to implement security controls, maintain an organization’s security posture, and identify and remediate security vulnerabilities. This course includes security for identity and access, platform protection, data and applications, and security operations.

    $5,277.92
  • ISC2

    The goal of the course is to prepare professionals for the challenging CCSP exam by covering the objectives of the exam based on the six domains as defined in the (ISC)2 CCSP common body of knowledge.
    $6,768.47
  • CMMC

    This course prepares students for the CMMC-AB Certified CMMC Professional (CCP) certification, which authorizes the holder to use the CMMC-AB Certified CMMC Professional logo, to participate as an Assessment Team Member under the supervision of a Certified CMMC Assessor, and to be listed in the CMMC-AB Marketplace. The CCP certification is also prerequisite for the other Certified CMMC Assessor certifications (CCA-1, CCA-3, and CCA-5).
    $4,058.37
  • ISACA

    The CRISC course is designed for those who have experience with risk identification, assessment, and evaluation; risk response; risk monitoring; information systems control design and implementation; and information systems control monitoring and maintenance.
    $3,922.87
  • ISACA

    Designed for IT professionals with technical Information risk management

    • Information security program development
    • Information security program management
    • Incident management and response
    • expertise and experience in IS/IT security and control looking to transition from team player to manager. CISM can add credibility and confidence to interactions with internal and external stakeholders, peers and regulators.

    This certification indicates expertise in information security governance, program development and management, incident management and risk management. If you are a mid-career IT professional aspiring to senior management roles in IT security and control, CISM can get you the visibility you need.

    $3,794.14
  • ISC2

    The CISSP certification preparatory course teaches students how to design, build and maintain a secure business IT architecture using globally approved security standards. Students learn about the eight domains of knowledge, as determined by (ISC)2, that form a critical part of the CISSP® exam. The course covers each knowledge domain in depth and explains how they relate to each other and other critical areas of information security.

    (ISC)² was founded in 1989 as the International Information System Security Certification Consortium, Inc., an international, nonprofit membership association for information security leaders. That same year, (ISC)² published the first Common Body of Knowledge (CBK) to document best practices, skills, and techniques for security professionals. Today the CISSP certification is internationally recognized and respected as the premier cybersecurity professional credential.

    CISSP certification is a unique IT certification because it requires a demonstrated fundamental understanding of the eight domains of cybersecurity and documented proof of experience in the information security and architecture field. This training course helps students acquire a broad range of cybersecurity skills, from developing security policies to managing risk to understanding technical security controls.
    $5,277.92
  • ISACA

    In this course, students will evaluate organizational policies, procedures, and processes to ensure that an organizations information systems align with its overall business goals and objectives.
    $5,277.92
  • ISACA

    COBIT 2019 builds on and integrates more than 25 years of development in this field, not only incorporating new insights from science, but also operationalizing these insights as practice. The heart of the COBIT framework updates COBIT principles while laying out the structure of the overall framework including: New concepts are introduced and terminology is explained—the COBIT Core Model and its 40 governance and management objectives provide the platform for establishing your governance program. The performance management system is updated and allows the flexibility to use maturity measurements as well as capability measurements. Introductions to design factors and focus areas offer additional practical guidance on flexible adoption of COBIT 2019, whether for specific projects or full implementation. From its foundation in the IT audit community, COBIT has developed into a broader and more comprehensive information and technology (I&T) governance and management framework and continues to establish itself as a generally accepted framework for I&T governance.
    $3,387.63
  • CompTIA

    In this course, students will examine advanced security concepts, principles, and implementations that pertain to enterprise level security.
    $5,691.21
  • CompTIA

    The course introduces tools and tactics to manage cybersecurity risks, identify various types of common threats, evaluate the organization’s security, collect and analyze cybersecurity intelligence, and handle incidents as they occur.
    $3,353.75
  • CompTIA

    Security remains one of the hottest topics in IT and other industries. It seems that each week brings news of some new breach of privacy or security. As organizations scramble to protect themselves and their customers, the ability to conduct penetration testing is an emerging skill set that is becoming ever more valuable to the organizations seeking protection, and ever more lucrative for those who possess these skills. In this course, you will be introduced to some general concepts and methodologies related to pen testing, and you will work your way through a simulated pen test for a fictitious company.
    $4,464.89