Normal, fast & flexible
Virtual instructor Lead (online)
The CCISO Certification is an industry-leading program that recognizes the real-world experience necessary to succeed at the highest executive levels of information security.
Computer hacking forensic investigation is the process of detecting hacking attacks and properly extracting evidence to report the crime and conduct audits to prevent future attacks.
The purpose of the CHFI credential is to:
Validate the candidate’s skills to identify an intruder’s footprints and to properly gather the necessary evidence to prosecute in the court of law.
The Certified Network Defender (CND) certification program focuses on creating Network Administrators who are trained on protecting, detecting and responding to the threats on the network. Network administrators are usually familiar with network components, traffic, performance and utilization, network topology, location of each system, security policy, etc. A CND will get the fundamental understanding of the true construct of data transfer, network technologies, software technologies so that the they understand how networks operate, understand what software is automating and how to analyze the subject material. In addition, network defense fundamentals, the application of network security controls, protocols, perimeter appliances, secure IDS, VPN and firewall configuration, intricacies of network traffic signature, analysis and vulnerability scanning are also covered which will help the Network Administrator design greater network security policies and successful incident response plans.
CND is a skills-based, lab intensive program based on a job-task analysis and cybersecurity education framework presented by the National Initiative of Cybersecurity Education (NICE).
The Purpose of the CND credential is to:
Validate the skills that will help the Network Administrators foster resiliency and continuity of operations during attacks.
A Certified Ethical Hacker is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system(s). The CEH credential certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective.
The purpose of the CEH credential is to:
- Establish and govern minimum standards for credentialing professional information security specialists in ethical hacking measures.
- Inform the public that credentialed individuals meet or exceed the minimum standards.
- Reinforce ethical hacking as a unique and self-regulating profession.
The ECIH program focuses on a structured approach for performing the incident handling and response (IH&R) process. The IH&R process includes stages like incident handling and response preparation, incident validation and prioritization, incident escalation and notification, forensic evidence gathering and analysis, incident containment, systems recovery, and incident eradication. This systematic incident handling and response process creates awareness among incident responders in knowing how to respond to various types of security incidents.
The EDRP certification is aimed at educating and validating a candidate’s ability to plan, strategize, implement, and maintain a business continuity and disaster recovery plan.
EDRP provides the professionals with a strong understanding of business continuity and disaster recovery principles, including conducting business impact analysis, assessing of risks, developing policies and procedures, and implementing a plan. It also teaches professionals how to secure data by putting policies and procedures in place, and how to recover and restore their organization’s critical data in the aftermath of a disaster.
The ECSA program offers a seamless learning progress, continuing where the CEH program left off.Unlike most other pen-testing programs that only follow a generic kill chain methodology; the ECSA presents a set of distinguishable comprehensive methodologies that are able to cover different pentesting requirements across different verticals.
The ECSA course is a fully hands-on program with labs and exercises that cover real world scenarios. By practicing the skills that are provided to you in the ECSA class, we are able to bring you up to speed with the skills to uncover the security threats that organizations are vulnerable to.
CompTIA A+ is the preferred qualifying credential for technical support and IT operational roles. It is about much more than PC repair.
- Candidates are better prepared to troubleshoot and problem solve.
- Technicians understand a wide variety of issues ranging from networking and operating systems to mobile devices and security.
- A+ supports the ability to connect users to the data they need to do their jobs regardless of the devices being used.
Network+ (Network Plus) is a mid-level certification for network technicians. This certification is designed to test the competency of a mid-level network technician in supporting and configuring TCP/IP clients in terms of network design, cabling, hardware setup, configuration, installation, support, and troubleshooting.
CompTIA Cloud+ shows you have the expertise needed for data center jobs.
CompTIA Cloud+ validates the skills you need to maintain and optimize cloud infrastructure services.
Cloud+ covers the increased diversity of knowledge, skills and abilities required of system administrators to validate what is necessary to perform effectively in data center jobs.
CompTIA Cloud+ views cloud-based infrastructure services as an increasingly important piece of an organization’s IT systems.
It is the only vendor-neutral, performance-based certification covering more than a specific vendor or a single function like security or networking to help you better realize the return on investment of cloud infrastructure services.
CompTIA Linux+ validates the competencies required of an early career system administrator supporting Linux systems.
The new CompTIA Linux+ is for the IT pro who will use Linux to manage everything from cars and smartphones to servers and supercomputers, as a vast number of enterprises use Linux in cloud, cybersecurity, mobile and web administration applications.
In the new CompTIA Linux+, candidates are only required to pass one exam for certification. However, the new certification is no longer eligible for the LPI 2-for-1 offer.
CompTIA Linux+ is the only job-focused Linux certification covering the latest foundational skills demanded by hiring managers.
Unlike other certifications, the new exam includes performance-based and multiple-choice questions to identify the employees who can do the job.
The exam covers tasks associated with all major distributions of Linux, setting the foundation for advanced vendor/distro-specific knowledge.
CompTIA Security+ is a global certification that validates the baseline skills you need to perform core security functions and pursue an IT security career.
Why is it different?
- No other certification that assesses baseline cybersecurity skills has performance-based questions on the exam. Security+ emphasizes hands-on practical skills, ensuring the security professional is better prepared to problem solve a wider variety of issues.
- More choose Security+ for DoD 8570 compliance than any other certification.
- Security+ focuses on the latest trends and techniques in risk management, risk mitigation, threat management and intrusion detection.
- The new Security+ certification covers the Junior IT Auditor/Penetration Tester job role, in addition to the previous job roles for Systems Administrator, Network Administrator, and Security Administrator.
CompTIA PenTest+ is for cybersecurity professionals tasked with penetration testing and vulnerability management.
The new CompTIA PenTest+ exam is available now!
Why is it different?
CompTIA PenTest+ is the only penetration testing exam taken at a Pearson VUE testing center with both hands-on, performance-based questions and multiple-choice, to ensure each candidate possesses the skills, knowledge, and ability to perform tasks on systems. PenTest+ exam also includes management skills used to plan, scope, and manage weaknesses, not just exploit them.
PenTest+ is unique because our certification requires a candidate to demonstrate the hands-on ability and knowledge to test devices in new environments such as the cloud and mobile, in addition to traditional desktops and servers.
CompTIA Cybersecurity Analyst (CySA+) is an IT workforce certification that applies behavioral analytics to networks and devices to prevent, detect and combat cybersecurity threats.
Why is it different?
CySA+ is the only intermediate high-stakes cybersecurity analyst certification with performance-based questions covering security analytics, intrusion detection and response. High-stakes exams are proctored at a Pearson VUE testing center in a highly secure environment. CySA+ is the most up-to-date security analyst certification that covers advanced persistent threats in a post-2014 cybersecurity environment.
ISO 27001 ISMS Lead Implementer training enables you to develop the necessary expertise to support an organization in establishing, implementing, managing and maintaining an Information Security Management System (ISMS) based on ISO/IEC 27001.
ISO 27001 ISMS Lead Auditor training enables you to develop the necessary expertise to perform an Information Security Management System (ISMS) audit by applying widely recognized audit principles, procedures and techniques
ISO 22301 BCMS Lead Implementer training course enables you to develop the necessary expertise to support an organization in establishing, implementing, managing and maintaining a Business Continuity Management System (BCMS) based on ISO 22301. During this training course, you will also gain a thorough understanding of the best practices of Business Continuity Management Systems and be able to provide a framework that allows the organization to continue operating efficiently during disruptive events.
ISO 22301 BCMS Lead Auditor training enables you to develop the necessary expertise to perform a Business Continuity Management System (BCMS) audit by applying widely recognized audit principles, procedures and techniques. During this training course, you will acquire the knowledge and skills to plan and carry out internal and external audits in compliance with ISO 19011 and ISO/IEC 17021-1 certification process.
ISO 31000 Risk Manager training enables you to gain comprehensive knowledge of the fundamental principles, framework and process of Risk Management based on ISO 31000.
During this training course, you will also gain a thorough understanding of the best practice of Risk Management and be able to effectively apply them in an organization in order to successfully implement a Risk management process.
After mastering all the necessary concepts of Risk Management, you can sit for the exam and apply for a “PECB Certified ISO 31000 Risk Manager” credential. By holding a PECB Certificate, you will demonstrate that you have the practical knowledge and skills to effectively manage a risk process in an organization.
ISO 27005 Risk Manager training enables you to develop the competence to master the risk management process related to all assets of relevance for Information Security using the ISO/IEC 27005 standard as a reference framework. During this training course, you will also gain a thorough understanding of best practices of risk assessment methods such as OCTAVE, EBIOS, MEHARI and harmonized TRA. This training course corresponds with the implementation process of the ISMS framework presented in the ISO/IEC 27001 standard.
After understanding all the necessary concepts of Information Security Risk Management based on ISO/IEC 27005, you can sit for the exam and apply for a “PECB Certified ISO/IEC 27005 Risk Manager” credential. By holding a PECB Risk Manager Certificate, you will be able to demonstrate that you have the necessary skills and knowledge to perform an optimal Information Security Risk Assessment and timely manage Information Security risks.
The occupational health and safety (OH&S) management system, ISO 45001 is a new international standard that provides a framework for an organization to manage risks and opportunities to help prevent work-related injury and ill health to workers. The intended outcome is to improve and provide a safe and healthy workplace. ISO 45001 is intended to help organizations, regardless of size or industry, in designing systems to proactively prevent injury and ill health. All of its requirements are designed to be integrated into an organization’s management and business processes
Regardless of what industry you are in, accidents that lead to injury or health related issues will always occur. Therefore, whether you are an employee, manager or business owner, you will always share the same goal- minimize the number of casualties at work. ISO 45001 provides you with a framework to identify, control and prevent work-related injuries.
By obtaining an ISO 45001 certification you will prove that you care about the well-being of employees and that you are continually making efforts to enhance their welfare. Furthermore, you will earn a globally recognized certificate on Occupational Health and Safety Management, which will prove that you are aware of the policies and processes needed to reduce work injuries. You will also gain a competitive advantage by improving your brand’s reputation and increasing your capacity.
The Certified Data Protection Officer training course enables you to develop the necessary knowledge, skills and competence to effectively implement and manage a compliance framework with regard to the protection of personal data.
After mastering all the necessary concepts of General Data Protection Regulation(GDPR), you can sit for the exam and apply for a “PECB Certified Data Protection Officer” credential. By holding a PECB Certified Data Protection Officer Certificate, you will be able to demonstrate that you have the practical knowledge and professional capabilities to assist organizations in applying data protection laws and regulations.
The ISO 20000 ITSMS Lead Implementer training course enables you to develop the necessary expertise to support an organization in establishing, implementing, managing and maintaining a Service Management System (SMS) based on the requirements of the ISO/IEC 20000-1 standard. During this training course, you will also explore the different components of an SMS, which help in improving the quality of the services provided and delivered by an organization, and thus increase its customer satisfaction and overall performance.
After mastering all the necessary concepts of a Service Management System based on the ISO/IEC 20000-1 standard, you can sit for the exam and, if you successfully pass the exam, you can apply for a “PECB Certified ISO/IEC 20000 Lead Implementer” credential. By holding a PECB Lead Implementer certificate, you will be able to demonstrate that you have the practical knowledge and professional capabilities to implement, manage and maintain an organization’s SMS based on the ISO/IEC 20000-1 standard.
Red Hat System Administration I is designed for IT professionals without previous Linux® system administration experience. The course provides students with Linux administration "survival skills" by focusing on core administration tasks. This curriculum also provides a foundation for students planning to become full-time Linux system administrators by introducing key command-line concepts and enterprise-level tools.
Red Hat System Administration II (RH135) is designed as the second part of the Red Hat® Certified System Administrator (RHCSA®) training track for IT professionals who have taken Red Hat System Administration I (RH124). The course goes deeper into core Linux® system administration skills, including storage configuration, security feature management, task control, and installation and deployment of Red Hat® Enterprise Linux.
Red Hat® System Administration III (RH254), related to Red Hat Enterprise Linux,® 7, is designed for experienced Linux system administrators who hold a Red Hat Certified System Administrator (RHCSA®) certification or equivalent skills and who want to broaden their ability to administer Linux systems at an enterprise level.
Certified in Risk Management and Information Systems Control CRISC (Exam Preparation) is the most current and rigorous assessment available to evaluate the risk management proficiency of IT professionals and other employees within an enterprise or financial institute.
Those who earn CRISC help enterprises to understand business risk, and have the technical knowledge to implement appropriate IS controls.
The Certified Information Security Manager (CISM) Exam Preparation course helps the candidates to achieve the CISM certification. This course aims to validate the expertise and knowledge of the candidates regarding the relationship between an information security program and the broader business targets. The certification also validates that the candidate has the hands-on knowledge of developing, managing and implementing an information security program for an organization.
Certified Information Systems Auditor (CISA) Exam Preparation: The designation is the global standard for professionals who have a career in information systems, in particular, auditing, control, and security. CISA holders demonstrate to employers that they have the knowledge, technical skills, and proficiency to meet the dynamic challenges facing modern organizations.
The Practical Android Exploitation course Developed by Precise Thinking is a comprehensive course aimed to teach all about Android security. Students get hands on experience with the Android SDK/NDK and related toolchains and use that knowledge to write and analyze exploits and malware on Android. In this course participants will exploit userland and kernel Android vulnerabilities as well as discuss jailbreaks and the various attack surface of Android applications. This class is aimed to an indispensable training for mobile developers, forensics investigators, software security professionals, pen-testers, and others.
Secure Application Development is the process of writing secure code without errors and vulnerabilities that expose an application to cyber threats and attacks. Developing securely is a preventive measure that will help organizations avoid and/or mitigate attacks related to the applications that it develops. Since, software bugs and flaws in the rationale of a program are the constant cause for software vulnerabilities, secure application development is a very important part of an organization’s cybersecurity.
Data Center Fundamentals Course Developed by Precise Thinking cover everything from the fundamentals of Data Center technologies, architectures, challenges and solutions, to Design and Engineering, Infrastructure Management and more.
Social Engineering Professional (SEP) training: Unfortunately there is no tool available right now that can detect nor protect against Social Engineering Attacks. The only control that mitigates the risk of SE is training and awareness. Hence; it is the right time now to harden your company through Social Engineering Professional (SEP) training, the act of influencing or tricking someone to do something that might not be in your organization’s best interest, is one of the biggest cyber security threats and fastest growing security concerns today according to several industry –leading reports such as http://www.verizonenterprise.com/resources/reports/rp_Verizon-DBIR-2014_en_xg.pdf .
This training is designed to give all technicians and engineers the basic knowledge and troubleshooting skills required to design, implement, install, and troubleshoot CCTV Security Camera Systems. The training is composed of two parts: Practical and Theory for duration of 42 training hours where the concentration is on the practical part and troubleshooting. This training is delivered by highly qualified engineers who have been working in real projects for many years.
The Internet of Things (IoT) is one of the most disruptive suite of technologies the world has ever seen. It is fundamentally changing business processes and improving efficiencies in ways we have never seen.
With 20.4 billion devices expected to be connected by 2020, concerns over interoperability and security continue to increase, as well as the need for organizations to understand the impacts of IoT technology.
This course provides an overview of IoT technologies. It will look at each of the elements that compose their ecosystem, so you can identify the main IoT system components and understand how they interact. Plus you'll get an overview into the interoperability challenges, cybersecurity threats and where IoT can provide the greatest benefits.
In this course participants will learn the practical skills necessary to perform regular risk assessments for their organizations. The ability to perform risk management is crucial for organizations hoping to defend their systems. There are simply too many threats and too many potential vulnerabilities that could exist, and simply not enough resources to create an impregnable security infrastructure. Therefore every organization whether they do so in an organized manner or not, will make priority decision on how best to defend their valuable data assets. Risk Management should be the foundational tool used to facilitate thoughtful and purposeful defense strategies.
The ITIL (Information Technology Infrastructure Library) is a framework designed to standardize the selection, planning, delivery and maintenance of IT services within a business. The goal is to improve efficiency and achieve predictable service delivery.
Cryptography is an indispensable tool for protecting information in computer systems. In this course you will learn the inner workings of cryptographic systems and how to correctly use them in real-world applications. The course begins with a detailed discussion of how two parties who have a shared secret key can communicate securely when a powerful adversary eavesdrops and tampers with traffic. We will examine many deployed protocols and analyze mistakes in existing systems. The second half of the course discusses public-key techniques that let two parties generate a shared secret key. Throughout the course participants will be exposed to many exciting open problems in the field and work on fun (optional) programming projects.