CompTIA CASP Pre-approved Training for CompTIA CASP Continuing Education Units (CEUs)

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "CompTIA CASP Pre-approved Training for CompTIA CASP Continuing Education Units (CEUs)"

Transcription

1 CompTIA CASP Pre-approved Training for CompTIA CASP Continuing Education Units (CEUs) Note: Approved training courses in this document are subject to change without prior notification. Training submitted based on prior approval will remain valid. Training submitted after the date on this document must meet this documents training requirements. Training approved in this document is based on the CompTIA CASP - CAS-001 objectives. Activity name to use when uploading CEUs into a certification record: Completed a Training Course Training formats accepted are Classroom-Based, Live Online, Private On-Site and Self-paced e-learning. CEU Required Documentation: The certified professional must upload a certificate of completion into their certification record as proof of attendance. The completion certification must contain the following information: 1. Name of training provider 2. Training course title 3. Name of the certified professional 4. Date the training was completed The course duration hours are to be used when entering CEU hours in a certification record. Please see the training provider course descriptions for durations. If a certified professional cannot provide proof of completion the training cannot be used for CEUs. CEU Activity Guidelines: If renewing a good for life certification the training must have been completed within 90 days prior to enrolling in the Continuing Education (CE) program or within the 3 year CE cycle. If renewing a ce certification, training must be completed within the 3 year CE cycle. To view pre-approved training for CompTIA CASP CEUs click on any of the certification provider names below. Cisco Citrix CWNP EC-Council GIAC ISACA ISC(2) Juniper Linux Microsoft Novell Red Hat Symantec VMware January 2015 CompTIA CASP v1 1

2 CISCO IMPLEMENTING CISCO IOS NETWORK SECURITY (IINS) 2.0 IMPLEMENTING CISCO SECURE ACCESS SOLUTIONS (SISAS) 1.0 IMPLEMENTING CISCO EDGE NETWORK SECURITY SOLUTIONS (SENSS) 1.0 IMPLEMENTING CISCO SECURE MOBILITY SOLUTIONS (SIMOS) 1.0 IMPLEMENTING CISCO THREAT CONTROL SOLUTIONS (SITCS) 1.0 IMPLEMENTING ADVANCED CISCO UNIFIED WIRELESS SECURITY (IAUWS) 2.0 CITRIX CBM CITRIX BYTEMOBILE T ADMINISTRATION AND OPTIMIZATION CWNP CWTS ENTERPRISE WI-FI FUNDAMENTALS CWNA ENTERPRISE WI-FI ADMINISTRATION CWSP ENTERPRISE WI-FI SECURITY CWDP ENTERPRISE WI-FI DESIGN CWAP ENTERPRISE WI-FI ANALYSIS & TROUBLESHOOTING EC-COUNCIL CERTIFIED ETHICAL HACKER V8 (CEH) EC-COUNCIL CERTIFIED SECURITY ANALYST (ECSA) COMPUTER HACKING FORENSIC INVESTIGATOR (CHFI) EC-COUNCIL CERTIFIED CHIEF INFORMATION SECURITY OFFICER CCISO CERTIFIED INCIDENT HANDLER (CIH) EC-COUNCIL CERTIFIED SECURE PROGRAMMER.NET (ECSP) CORE CONCEPTS IT SECURITY NETWORK SECURITY ADMINISTRATOR (ENSA) CERTIFIED SECURE COMPUTER USER (CSCU) ADVANCED MOBILE HACKING & FORENSICS (CAST 612) ELEVATING MOBILE FORENSICS & INVESTIGATION TO AN ART FORM ADVANCED NETWORK DEFENSE (CAST 614) HARDENING YOUR ENTERPRISE NETWORK EXPLOITATION CONCEPTS AND METHODS (CAST 618) (BOOTCAMP) NETWORK FORENSICS: IDENTIFYING AND CORRELATING EVENTS (CAST 619) (NETWORK FORENSICS) PACKET AND TRAFFIC ANALYSIS (CAST 620) (WIRETAP) GIAC FOR572: ADVANCED NETWORK FORENSICS AND ANALYSIS ICS410: ICS/SCADA SECURITY ESSENTIALS MGT305: TECHNICAL COMMUNICATION AND PRESENTATION SKILLS FOR SECURITY PROFESSIONALS MGT405: CRITICAL PROTECTION MGT414: SANS +S TRAINING PROGRAM FOR THE CISSP CERTIFICATION EXAM MGT415: A PRACTICAL INTRODUCTION TO RISK ASSESSMENT MGT433: SECURING THE HUMAN: HOW TO BUILD, MAINTAIN AND MEASURE A HIGH-IMPACT AWARENESS PROGRAM MGT512: SANS SECURITY LEADERSHIP ESSENTIALS FOR MANAGERS WITH KNOWLEDGE COMPRESSION MGT514: IT SECURITY STRATEGIC PLANNING, POLICY AND LEADERSHIP MGT525: IT PROJECT MANAGEMENT, EFFECTIVE COMMUNICATION, AND PMP EXAM PREP MGT535: INCIDENT RESPONSE TEAM MANAGEMENT SEC440: CRITICAL SECURITY CONTROLS: PLANNING, IMPLEMENTING AND AUDITING SEC480: TOP 4 MITIGATION STRATEGIES: IMPLEMENTING & AUDITING SEC501: ADVANCED SECURITY ESSENTIALS - ENTERPRISE DEFENDER SEC504: HACKER TOOLS, TECHNIQUES, EXPLOITS AND INCIDENT HANDLING SEC546: IPV6 ESSENTIALS SEC566: IMPLEMENTING AND AUDITING THE CRITICAL SECURITY CONTROLS - IN- DEPTH WEB APPLICATION SECURITY FOR AUDITORS - SEMINAR THE ESSENTIALS OF CLOUD COMPUTING FOR AUDIT PROFESSIONALS January 2015 CompTIA CASP v1 2 ISACA

3 ISC(2) JUNIPER INFORMATION SECURITY MANAGEMENT INFORMATION SECURITY MANAGEMENT (ADVANCED) AUDIT & SECURITY OF FIREWALLS - SEMINAR SECURING & AUDITING MOBILE TECHNOLOGIES - SEMINAR SECURING & AUDITING WIRELESS & MOBILE TECHNOLOGIES - SEMINAR VIRTUALIZATION SECURITY & AUDIT - SEMINAR WINDOWS 8 SECURITY & AUDIT - SEMINAR CLOUD COMPUTING SECURITY & AUDIT - SEMINAR DATABASE SECURITY AND AUDIT - SEMINAR RISK-BASED APPROACH TO IT SECURITY & CONTROL ASSESSMENTS IT RISK MANAGEMENT ONLINE COBIT FOUNDATION COURSE V4.1 USING COBIT 5 IN IT ASSURANCE AND AUDIT COBIT 5 ASSESSOR COURSE COBIT 5 IMPLEMENTATION COURSE COBIT: STRATEGIES FOR IMPLEMENTING IT GOVERNANCE GOVERNANCE OF ENTERPRISE IT CGEIT EXAM REVIEW CISM EXAM REVIEW CISA EXAM REVIEW CRISC EXAM REVIEW MODULE 1 CISA: THE PROCESS OF AUDITING INFORMATION SYSTEMS MODULE 2 CISA'S ROLE IN IT GOVERNANCE MODULE 3 CISA'S ROLE IN SYSTEMS AND LIFE CYCLE MANAGEMENT MODULE 4 CISA'S ROLE IN IT SERVICE DELIVERY AND SUPPORT MODULE 5 CISA'S ROLE IN PROTECTION OF INFORMATION ASSETS COMPLETE CISA ONLINE REVIEW COURSE ALL 5 MODULES CGEIT EXAM REVIEW CISM EXAM REVIEW CISA EXAM REVIEW CRISC EXAM REVIEW MODULE 1 CISA: THE PROCESS OF AUDITING INFORMATION SYSTEMS (ISC) 2 TRAINING FOR CAP (ISC) 2 TRAINING FOR CISSP (ISC) 2 TRAINING FOR SSCP (ISC) 2 TRAINING FOR CISSP-ISSAP (ISC) 2 TRAINING FOR CISSP-ISSMP (ISC) 2 TRAINING FOR CSSLP (ISC) 2 TRAINING FOR CCFP (ISC) 2 TRAINING FOR HCISPP OWASP TOP 10 (ISC) 2 TRAINING FOR CISSP-ISSEP ACX SERIES UNIVERSAL ACCESS ROUTERS OVERVIEW AND DEPLOYMENT ADVANCED JUNIPER NETWORKS VPN IMPLEMENTATIONS (AJVI) ADVANCED JUNIPER NETWORKS WIRELESS LANS (AJWL) ADVANCED JUNOS ENTERPRISE ROUTING (AJER) ADVANCED JUNOS ENTERPRISE ROUTING TROUBLESHOOTING (AJERT) ADVANCED JUNOS ENTERPRISE SECURITY TROUBLESHOOTING (AJEST) ADVANCED JUNOS ENTERPRISE SWITCHING (AJEX) ADVANCED JUNOS ENTERPRISE SWITCHING TROUBLESHOOTING (AJEXT) January 2015 CompTIA CASP v1 3

4 ADVANCED JUNOS SECURITY (AJSEC) ADVANCED JUNOS SERVICE PROVIDER ROUTING (AJSPR) ADVANCED JUNOS SERVICE PROVIDER TROUBLESHOOTING (AJSPT) ATTACK PREVENTION WITH JUNIPER NETWORKS FIREWALLS (APJF) AX411 ACCESS POINT INSTALLATION AND CONFIGURATION BX7000 MULTI-ACCESS GATEWAY INSTALLATION AND INITIAL CONFIGURATION C SERIES (C2000 AND C4000) HARDWARE INSTALLATION AND CONFIGURATION C SERIES (C3000 AND C5000) CONTROLLER HARDWARE INSTALLATION AND CONFIGURATION CONFIGURING AND MONITORING CONTRAIL (CMC) CONFIGURING AND MONITORING QFABRIC SYSTEMS (CMQS) CONFIGURING AND MONITORING THE VGW VIRTUAL GATEWAY (CMVGW) CONFIGURING JUNIPER NETWORKS FIREWALL/IPSEC VPN PRODUCTS (CJFV) CONFIGURING SECURITY THREAT RESPONSE MANAGER (CSTRM) CONFIGURING STEEL-BELTED RADIUS CARRIER (CSBR) DATA CENTER SWITCHING (DCX) E-SERIES BROADBAND REMOTE ACCESS SERVER CONFIGURATION BASICS (BB) IMPLEMENTING JUNIPER NETWORKS SECURE ANALYTICS (IJSA) INTEGRATING JUNIPER NETWORKS FIREWALL/IPSEC VPN PRODUCTS INTO HIGH- PERFORMANCE NETWORKS (IFVH) INTRUSION DETECTION AND PREVENTION (IDP) SERIES HARDWARE INSTALLATION AND CONFIGURATION JNCIE ENTERPRISE BOOTCAMP (JNCIE-ENT) JNCIE SECURITY BOOTCAMP (JNCIE-SEC) JNCIE SERVICE PROVIDER BOOTCAMP (JNCIE-SP) JUNIPER NETWORKS LN2600 RUGGED SECURE ROUTER OVERVIEW AND DEPLOYMENT JUNOS EDGE SECURITY SERVICES (JESS) JUNOS ENTERPRISE SWITCHING USING ELS (JEX-ELS) JUNOS INTRUSION PREVENTION SYSTEMS (JIPS) JUNOS PULSE SECURE ACCESS (JPSA) JUNOS SECURITY (JSEC) JUNOS SPACE FOR THE ENTERPRISE (JS-ENT) SECURE ACCESS SERIES HARDWARE INSTALLATION AND CONFIGURATION LINUX LINUX SECURITY MICROSOFT INSTALLING AND CONFIGURING WINDOWS SERVER 2012 ADMINISTERING WINDOWS SERVER 2012 CONFIGURING ADVANCED WINDOWS SERVER 2012 SERVICES TROUBLESHOOTING WINDOWS SERVER 2008 ACTIVE DIRECTORY DOMAIN SERVICES TROUBLESHOOTING IDENTITY AND ACCESS SOLUTIONS WITH WINDOWS SERVER 2008 ACTIVE DIRECTORY WINDOWS SERVER 2008 NETWORK, CONFIGURING - CONFIGURING AND TROUBLESHOOTING A WINDOWS SERVER 2008 NETWORK WINDOWS SERVER 2008, SERVER ADMINISTRATOR - PLANNING AND IMPLEMENTING WINDOWS SERVER 2008 CONFIGURING ADVANCED WINDOWS SERVER 2012 SERVICES TROUBLESHOOTING WINDOWS SERVER 2008 ACTIVE DIRECTORY DOMAIN SERVICES January 2015 CompTIA CASP v1 4

5 WINDOWS SERVER 2008 NETWORK, CONFIGURING - CONFIGURING AND TROUBLESHOOTING A WINDOWS SERVER 2008 NETWORK DESIGNING AND IMPLEMENTING A SERVER IMPLEMENTING AN ADVANCED SERVER OVERVIEW OF ACTIVE DIRECTORY RIGHTS MANAGEMENT SERVICES WITH WINDOWS SERVER 2008 R2 MICROSOFT JUMP START: WINDOWS SERVER 2008 R2, SERVER VIRTUALIZATION UPDATING YOUR WINDOWS SERVER 2003 TECHNOLOGY SKILLS TO WINDOWS SERVER 2008 DEPLOYING WINDOWS SERVER 2008 CONFIGURING, MANAGING AND MAINTAINING WINDOWS SERVER 2008-BASED SERVERS FUNDAMENTALS OF WINDOWS SERVER 2008 CONFIGURING AND TROUBLESHOOTING INTERNET INFORMATION SERVICES IN WINDOWS SERVER 2008 DESIGNING WINDOWS SERVER 2008 NETWORK AND APPLICATIONS IMPLEMENTING AND ADMINISTERING WINDOWS SHAREPOINT SERVICES 3.0 IN WINDOWS SERVER 2008 CONFIGURING AND TROUBLESHOOTING WINDOWS SERVER 2008 APPLICATIONS DEVELOPING MICROSOFT AZURE SOLUTIONS IMPLEMENTING MICROSOFT AZURE SOLUTIONS DESIGNING AND DEVELOPING MICROSOFT AZURE APPLICATIONS NOVELL FILR ADMINISTRATION RED HAT RED HAT SERVER HARDENING (RH413) SYMANTEC SYMANTEC SECURITY INFORMATION MANAGER 4.7 VMWARE VMWARE NSX: INSTALL, CONFIGURE, MANAGE [6.0] VMWARE NSX FOR INTERNETWORKING EXPERTS FAST TRACK [V6.0] VSPHERE SECURITY FUNDAMENTALS [V5.X] VSPHERE DATA PROTECTION ADVANCED FUNDAMENTALS [V5.5] VCLOUD NETWORKING AND SECURITY FUNDAMENTALS [V5.X] SECURITY PRINCIPLES IN VIRTUALIZED DATA CENTERS GETTING STARTED DEVELOPING SECURITY SOLUTIONS WITH EPSEC January 2015 CompTIA CASP v1 5

CompTIA Security+ Pre-approved Training for CompTIA Security+ Continuing Education Units (CEUs)

CompTIA Security+ Pre-approved Training for CompTIA Security+ Continuing Education Units (CEUs) CompTIA Security+ Pre-approved Training for CompTIA Security+ Continuing Education Units (CEUs) Note: Approved training courses in this document are subject to change without prior notification. Training

More information

CompTIA A+ Pre-approved Training for CompTIA A+ Continuing Education Units (CEUs)

CompTIA A+ Pre-approved Training for CompTIA A+ Continuing Education Units (CEUs) CompTIA A+ Pre-approved Training for CompTIA A+ Continuing Education Units (CEUs) Note: Approved training courses in this document are subject to change without prior notification. Training submitted based

More information

JUNIPER NETWORKS LEARNING PATHS

JUNIPER NETWORKS LEARNING PATHS JUNIPER NETWORKS LEARNING PATHS Revised July 0 Copyright 0 Juniper Networks, Inc. www.juniper.net/training JUNIPER NETWORKS CERTIFICATION PROGRAM FRAMEWORK Network Engineer Support Specialist Product/Technology

More information

Course and Service Portfolio Specialized IT courses for IT professional and organizations willing to take benefit from the competitive advantages

Course and Service Portfolio Specialized IT courses for IT professional and organizations willing to take benefit from the competitive advantages Course and Service Portfolio Specialized IT courses for IT professional and organizations willing to take benefit from the competitive advantages provided by international certifications Cyber & IT Governance

More information

Field of Study Area of Expertise Certification Vendor Course

Field of Study Area of Expertise Certification Vendor Course Field of Study Area of Expertise Certification Vendor Course Advanced Security Certified Information Systems Security Professional (CISSP) ISC2 CISSP Advanced Security CompTIA Advanced Security Practitioner

More information

The following chart indicates the Career Academy courses eligible for transfer credit by challenge exam.

The following chart indicates the Career Academy courses eligible for transfer credit by challenge exam. American Business & Technology University currently provides for transfer credit from Career Academy courses completed within the last three years by challenge exam. A student may not transfer more than

More information

Pluralsight Training Pre-Approved for CompTIA CEUs

Pluralsight Training Pre-Approved for CompTIA CEUs Pluralsight Training Pre-Approved for CompTIA CEUs Note: Approved training courses in this document are subject to change without prior notification. Training submitted based on prior approval will remain

More information

Learning Tree Training Pre-approved Training for Continuing Education Units (CEUs)

Learning Tree Training Pre-approved Training for Continuing Education Units (CEUs) Learning Tree Training Pre-approved Training for Continuing Education Units (CEUs) Note: Approved training courses in this document are subject to change without prior notification. Training submitted

More information

FedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

FedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov FedVTE Training Catalog SPRING 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk here or email the

More information

FedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

FedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov FedVTE Training Catalog SUMMER 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please

More information

Renewing CompTIA Certifications With Achieving Other Vendor Certifications

Renewing CompTIA Certifications With Achieving Other Vendor Certifications Renewing CompTIA Certifications With Achieving Other Vendor Certifications Overview You may earn Continuing Education Units (CEUs) toward your certification renewal by earning other industry certifications.

More information

Class Name Retail Price # Days Start Date End Date. Microsoft Microsoft Certification Boot Camps. $4,495 or $4,995 (w/ travel & lodging)

Class Name Retail Price # Days Start Date End Date. Microsoft Microsoft Certification Boot Camps. $4,495 or $4,995 (w/ travel & lodging) Microsoft Microsoft Certification Boot Camps Class Name Retail Price # Days Start Date End Date MCSA: Windows Server 2012 $4,495 or $4,995 (w/ travel & lodging) 9 7/7/14 7/15/14 Microsoft Database 10775:

More information

Boost elearning IT Training INSTRUCTIONAL DESIGN, LEARNING PATHS, AND COURSE CATALOGUE

Boost elearning IT Training INSTRUCTIONAL DESIGN, LEARNING PATHS, AND COURSE CATALOGUE 2016 Boost elearning IT Training INSTRUCTIONAL DESIGN, LEARNING PATHS, AND COURSE CATALOGUE Instructional Design Boost elearning Interactive IT Training Boost elearning's Interactive IT Training provides

More information

Brandman University. School of CCNA

Brandman University. School of CCNA Information Technology Certifications CCNA The Cisco CCNA Training Package (ICND: Parts 1 and 2) includes expert instructor-led training modules with customized presentations, practice exam simulators

More information

Skillsoft Pre-Approved for CompTIA CEUs

Skillsoft Pre-Approved for CompTIA CEUs Skillsoft Pre-Approved for CompTIA CEUs Note: Approved training courses in this document are subject to change without prior notification. Training submitted based on prior approval will remain valid.

More information

Access FedVTE online at: fedvte.usalearning.gov

Access FedVTE online at: fedvte.usalearning.gov FALL 2015 Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk her e or email the Help Desk at support@usalearning.net. To speak with a Help Desk

More information

C.R.I.S.P. LLC AND IT UNIVERSITY (ITU)

C.R.I.S.P. LLC AND IT UNIVERSITY (ITU) C.R.I.S.P. LLC AND IT UNIVERSITY (ITU) Course Listing 2 Cisco Complete Network Certification Training 3 Cisco 100-101: CCENT - ICND1 - Interconnecting Cisco Networking Devices Part 1 4 Cisco 200-101: CCNA

More information

State of South Carolina InfoSec and Privacy Career Path Model

State of South Carolina InfoSec and Privacy Career Path Model State of South Carolina InfoSec and Privacy Career Path Model Start Introduction This Career Path Model for the State of South Carolina (State) is designed to help define the various career options available

More information

Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University

Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University Andreas Athanasoulias, CISM, CISSP Information Security Officer & Security Consultant Brief introduction My career path

More information

Event Length. Register for Events Online - http://www.etidaho.com/events.php. 10 minutes 1 Each Week 2 hrs 2 hrs 2 hrs 2 hrs 2 hrs.

Event Length. Register for Events Online - http://www.etidaho.com/events.php. 10 minutes 1 Each Week 2 hrs 2 hrs 2 hrs 2 hrs 2 hrs. 10051 W. Emerald Street, Boise, Idaho 83704 PHONE: (208) 327-0768 FAX: (208) 327-9589 http://www.etidaho.com ExecuTrain Exclusive Events Tips, Tricks and Answers - Webinar Tips, Tricks and Answers - etip

More information

Hackers are here. Where are you?

Hackers are here. Where are you? 1 2 What is EC-Council Certified Security Analyst Licensed Penetration Tester Program You are an ethical hacker. Your last name is Pwned. You dream about enumeration and you can scan networks in your sleep.

More information

Information Security Principles and Practices

Information Security Principles and Practices Information Security Principles and Practices by Mark Merkow and Jim Breithaupt Chapter 3: Certification Programs and the Common Body of Knowledge Certification & Information Security Industry standards,

More information

Global Knowledge Cybersecurity Training

Global Knowledge Cybersecurity Training Cybersecurity Training Your Solution for a Skilled Cyber Workforce Whether it s general cybersecurity awareness, secure network design and implementation, continuous monitoring, network forensics and analysis,

More information

Defense Cyber Investigations Training Academy (DCITA) Pre-Approved Training for CompTIA Continuing Education Units (CEUs)

Defense Cyber Investigations Training Academy (DCITA) Pre-Approved Training for CompTIA Continuing Education Units (CEUs) Defense Cyber Investigations Training Academy (DCITA) Pre-Approved Training for CompTIA Continuing Education Units (CEUs) Note: Approved training courses in this document are subject to change without

More information

Global Knowledge Cybersecurity Training

Global Knowledge Cybersecurity Training Cybersecurity Training Your Solution for a Skilled Cyber Workforce Whether it s general cybersecurity awareness, secure network design and implementation, continuous monitoring, network forensics and analysis,

More information

Social Media Security Training and Certifications. Stay Ahead. Get Certified. Ultimate Knowledge Institute. ultimateknowledge.com

Social Media Security Training and Certifications. Stay Ahead. Get Certified. Ultimate Knowledge Institute. ultimateknowledge.com Ultimate Knowledge Institute ultimateknowledge.com Social Media Security Training and Certifications Social Media Security Professional (SMSP) Social Media Engineering & Forensics Professional (SMEFP)

More information

Information Security solutions that protect your business

Information Security solutions that protect your business Information Security solutions that protect your business We deliver Information Security solutions that stabilize your organization helping you build a strong foundation to prevent potential security

More information

IT Networking and Security

IT Networking and Security elearning Course Outlines IT Networking and Security powered by Calibrate elearning Course Outline CompTIA A+ 801: Fundamentals of Computer Hardware/Software www.medallionlearning.com Fundamentals of Computer

More information

SkillSoft/SkillPort Training Pre-Approved for CompTIA CEUs

SkillSoft/SkillPort Training Pre-Approved for CompTIA CEUs SkillSoft/SkillPort Training Pre-Approved for CompTIA CEUs Note: Approved training courses in this document are subject to change without prior notification. Training submitted based on prior approval

More information

SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles

SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles PNNL-24138 SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles March 2015 LR O Neil TJ Conway DH Tobey FL Greitzer AC Dalton PK Pusey Prepared for the

More information

MANAGEMENT DEVELOPMENT COURSES

MANAGEMENT DEVELOPMENT COURSES (FULL VIEW) MANAGEMENT DEVELOPMENT COURSES MANAGEMENT DEVELOPMENT COURSES LEADERSHIP DEVELOPMENT Developing Leadership Competencies 4 4 days 230,000 1-4 13-16 26-29 6-9 Critical Thinking: Tools for Problem

More information

Stacey Cumberbatch Commissi oner

Stacey Cumberbatch Commissi oner Stacey Cumberbatch Commissioner Fall 2015 Information Technology Catalog Cityw ide Training Center FALL 2015 COURSE DESCRIPTIONS AND SCHEDULE IT PROFESSIONAL/CERTIFICATION COURSES DATABASE CERTIFICATION

More information

Microsoft Technologies

Microsoft Technologies NETWORK ENGINEERING TRACK Microsoft Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS Module 1 - Office Applications This subject enables users to acquire the necessary knowledge and skills to use

More information

Certification and Training

Certification and Training Certification and Training CSE 4471: Information Security Instructor: Adam C. Champion Autumn Semester 2013 Based on slides by a former student (CSE 551) Outline Organizational information security personnel

More information

Juniper training. www.globalknowledge.net

Juniper training. www.globalknowledge.net Juniper training www.globalknowledge.net Authorised Juniper Networks Training 4 5 Junos-based Certification 6 Additional Support Tracks 6 Additional Juniper Certification Tracks 10 Learning Delivery Methods

More information

All about CPEs. David Gittens CISA CISM CISSP CRISC HISP

All about CPEs. David Gittens CISA CISM CISSP CRISC HISP All about CPEs David Gittens CISA CISM CISSP CRISC HISP The Designer David Gittens ISSA Barbados Past President Certified in ethical hacking and computer forensics Certified in security management and

More information

Linux Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS QUARTER 2 NETWORKING AND OPERATING SYSTEMS ESSENTIALS. Module 1 - Office Applications

Linux Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS QUARTER 2 NETWORKING AND OPERATING SYSTEMS ESSENTIALS. Module 1 - Office Applications NETWORK ENGINEERING TRACK Linux Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS Module 1 - Office Applications This subject enables users to acquire the necessary knowledge and skills to use Office

More information

E M P I R E C O L L E G E

E M P I R E C O L L E G E 34 E M P I R E C O L L E G E Specialized Associate Degree Information Technology Objective: The Specialized Associate Degree Information Technology program is intended to give the student knowledge of

More information

Microsoft : 03-2710 0038 : 03-7877 7505 : 04-6435 343 : 07-2268 869. Kuala Lumpur Petaling Jaya Penang Johor Bahru

Microsoft : 03-2710 0038 : 03-7877 7505 : 04-6435 343 : 07-2268 869. Kuala Lumpur Petaling Jaya Penang Johor Bahru Kuala Lumpur Petaling Jaya Penang Johor Bahru Website Email : 032710 0038 : 037877 7505 : 046435 343 : 072268 869 : www.iworldtechnology.com : sales@iworldtechnology.com Microsoft MCSA Windows Server 2012

More information

Diversen Interactief Centrum voor gerichte Training en Studie Edisonweg 14c, 1821 BN Alkmaar T: 072 511 12 23

Diversen Interactief Centrum voor gerichte Training en Studie Edisonweg 14c, 1821 BN Alkmaar T: 072 511 12 23 642-812 642-812 Building Converged Cisco Multilayer Switched Networks BCMSN 642-845 642-845 Optimizing Converged Cisco Networks ONT 642-901 642-901 Building Scalable Cisco Internetworks BSCI Building COM+

More information

Technical Manager / Fortinet Product Owner at Space Data Systems - Jordan (SDS) alzard_m@hotmail.com

Technical Manager / Fortinet Product Owner at Space Data Systems - Jordan (SDS) alzard_m@hotmail.com Mohammad Al-Zard alzard_m@hotmail.com Summary Hands-on experience in security consultation, measuring possible security vulnerabilities, implementing and customizing distributed IDPS systems. Planning

More information

Ranking Certifications

Ranking Certifications Cisco Red Hat Certification Cisco Architect (CCAr) Red Hat Architect (RHCA) 8 24 1 150.00 8 10 219.00 8 24 5 30.00 8 10 103.00 Exam Cost: Total cost is $15,000; $3,750 paid at time of initial application

More information

Hackers are here. Where are you?

Hackers are here. Where are you? 1 2 What is EC-Council Certified Security Analyst Licensed Penetration Tester Program You are an ethical hacker. Your last name is Pwned. You dream about enumeration and you can scan networks in your sleep.

More information

E-LEARNING BUSINESS COURSES

E-LEARNING BUSINESS COURSES E-LEARNING Computer Learning Centre offers online education and training for professional certification courses. E-learning courses have an accessability of 30Days BUSINESS COURSES Project Management Project

More information

Information Technology Cluster

Information Technology Cluster Network Systems Pathway Information Technology Cluster Assistant Network Technician -- This major prepares students to install, configure, operate, and connections to remote sites in a wide area network

More information

A Global Knowledge Special Report. 15 Top-Paying Certifications for 2015

A Global Knowledge Special Report. 15 Top-Paying Certifications for 2015 A Global Knowledge Special Report 15 Top-Paying Certifications for 2015 1-800-COURSES www.globalknowledge.com 15 Top-Paying Certifications for 2015 John Hales, Global Knowledge VMware, SDN, and SoftLayer

More information

INFORMATION SECURITY & GOVERNANCE SYSTEMS AND IT INFRASTRUCTURE INFOSEC & TECHNOLOGY TRAINING. forebrook

INFORMATION SECURITY & GOVERNANCE SYSTEMS AND IT INFRASTRUCTURE INFOSEC & TECHNOLOGY TRAINING. forebrook INFORMATION SECURITY & GOVERNANCE SYSTEMS AND IT INFRASTRUCTURE INFOSEC & TECHNOLOGY TRAINING forebrook Forebrook offers a range of information security, governance, IT systems and infrastructure related

More information

IT Networking and Security

IT Networking and Security elearning Course Outlines IT Networking and Security powered by Calibrate elearning Course Outline CompTIA A+ 801: Fundamentals of Computer Hardware/Software powered by Calibrate www.medallionlearning.com

More information

Networking: EC Council Network Security Administrator NSA

Networking: EC Council Network Security Administrator NSA coursemonster.com/uk Networking: EC Council Network Security Administrator NSA View training dates» Overview The EC-Council's NSA certification looks at network security from a defensive view. The NSA

More information

Diploma in Information Technology Network Integration Specialist COURSE INFO PACK

Diploma in Information Technology Network Integration Specialist COURSE INFO PACK Registered as a Private Higher Education Institution with the Department of Higher Education and Training in South Africa under the Higher Education Act 1997 Registration Nr. 2001/HE07/005 Diploma in Network

More information

SENIOR SYSTEMS ANALYST

SENIOR SYSTEMS ANALYST CITY OF MONTEBELLO 109 DEFINITION Under general administrative direction of the City Administrator, provides advanced professional support to departments with very complex computer systems, programs and

More information

EC-Council Certified Security Analyst (ECSA)

EC-Council Certified Security Analyst (ECSA) EC-Council Certified Security Analyst (ECSA) v8 Eğitim Tipi ve Süresi: 5 Days VILT 5 Day VILT EC-Council Certified Security Analyst (ECSA) v8 Learn penetration testing methodologies while preparing for

More information

Diploma in Information Technology Network Intergration Specialist COURSE INFORMATION PACK

Diploma in Information Technology Network Intergration Specialist COURSE INFORMATION PACK Diploma in Information Technology COURSE INFORMATION PACK REGISTRATION AND ACCREDITATION Prestige Academy (Pty) Ltd is a widely recognized and credible institution. Prestige Academy is registered with

More information

CH ENSA EC-Council Network Security Administrator Detailed Course Outline

CH ENSA EC-Council Network Security Administrator Detailed Course Outline CH ENSA EC-Council Network Security Administrator Detailed Course Outline Summary Duration Vendor Audience 5 Days hands-on training EC-Council Security Professionals Level Technology Category Advance Ethical

More information

Technology Approved Certifications

Technology Approved Certifications Date Approved Designation Certificate Name Points Microsoft Systems Engineering 04/16/2002 MCSE Microsoft Certified Systems Engineer 280 06/14/2007 MCSE: WIN 2003 Microsoft Certified Systems Engineer:

More information

Course Venue :- Lab 302, IT Dept., Govt. Polytechnic Mumbai, Bandra (E)

Course Venue :- Lab 302, IT Dept., Govt. Polytechnic Mumbai, Bandra (E) Information Technology Department CEP on CLOUD COMPUTING (Starting from 3 rd Jan 2015) Module No Course No Course Title Duration Fees Module 1 Course 1 RHCSA (Red Hat certified System 3 Weeks Rs. 6000

More information

Montgomery County Community College Non-Credit Programs Winter/Spring 2016 TECHNOLOGY PROGRAMS

Montgomery County Community College Non-Credit Programs Winter/Spring 2016 TECHNOLOGY PROGRAMS TECHNOLOGY PROGRAMS PROGRAM PAGE A+... 4 CISCO NETWORKING ACADEMY... 2 CITRIX IT ACADEMY... 3 COMPUTER AIDED DRAFTING... 8 COMPUTERIZED ACCOUNTING... 6 COMPUTERS... 5 CYBER SECURITY... 3 MICROSOFT ADMINISTRATION...

More information

Cybersecurity Workforce Training Partnership

Cybersecurity Workforce Training Partnership Cybersecurity Workforce Training Partnership NSA Cyber Command AACC @ Arundel Mills CAE-2Y NSA and DHS designated AACC as a National Center of Academic Excellence in Information Assurance 2-Year Education

More information

Analyze. Secure. Defend. Do you hold ECSA credential?

Analyze. Secure. Defend. Do you hold ECSA credential? 1 Analyze. Secure. Defend. Do you hold ECSA credential? TM E C S A EC-Council Certified Security Analyst 1 EC-Council Cyber Security Professional Path Threat Agent Application of Methodology So You Can

More information

WORK PROCESS SCHEDULE COMPUTER SYSTEMS ANALYST O*NET-SOC CODE: 15-1121.00 RAPIDS CODE: 2017HY. Work Process and Classroom Training Duties and Hours

WORK PROCESS SCHEDULE COMPUTER SYSTEMS ANALYST O*NET-SOC CODE: 15-1121.00 RAPIDS CODE: 2017HY. Work Process and Classroom Training Duties and Hours WORK PROCESS SCHEDULE COMPUTER SYSTEMS ANALYST O*NET-SOC CODE: 5-.00 RAPIDS CODE: 07HY Work Process and Classroom Training Duties and Hours Period General Practices - Foundations On-the- Job Learning Hours

More information

300-208 - Implementing Cisco Secure AccessSolutions Exam

300-208 - Implementing Cisco Secure AccessSolutions Exam Implementing Cisco Secure Access Solutions Duration: 5 Days Course Code: SISAS Overview: This course has been designed to provide engineers with the foundational knowledge and skills required to implement

More information

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports Building a Security Operation Center Agenda: Auditing Your Network Environment Selecting Effective Security

More information

Guide to information security certifications. SearchSecurity.com's guide to vendor-neutral security certifications

Guide to information security certifications. SearchSecurity.com's guide to vendor-neutral security certifications SearchSecurity.com's IT security certifications guide 1 of 18 Check out the other guides in this series: Guide to information security certifications SearchSecurity.com's guide to vendor-neutral security

More information

Penetration testing & Ethical Hacking. Security Week 2014

Penetration testing & Ethical Hacking. Security Week 2014 Penetration testing & Ethical Hacking Security Week 2014 Agenda Penetration Testing Vulnerability Scanning Social engineering Security Services offered by Endava 2 3 Who I am Catanoi Maxim Information

More information

Security 2014 www.globalknowledge.com.sa www.globalknowledge.ae www.globalknowledge.com.eg

Security 2014 www.globalknowledge.com.sa www.globalknowledge.ae www.globalknowledge.com.eg Security 2014 www.globalknowledge.com.sa www.globalknowledge.ae www.globalknowledge.com.eg About Founded in 1995, is the largest privately held provider of training, enterprise learning services, and software

More information

ISACA ON-SITE TRAINING DELIVERS EXPERT INSTRUCTION AT YOUR WORKPLACE

ISACA ON-SITE TRAINING DELIVERS EXPERT INSTRUCTION AT YOUR WORKPLACE create better trained employees. choose the best value in training. ISACA ON-SITE TRAINING DELIVERS EXPERT INSTRUCTION AT YOUR WORKPLACE PRODUCTIVE train your workforce on-site. save on employee downtime

More information

Remote Lab Price List

Remote Lab Price List CISCO ROUTING & SWITCHING LABS Hours Days Pods Student/Pod L-ICND1 Interconnecting Cisco Network Devices Part 1 40 5 8 2:1 1.290,- 299,- 108,- n/a n/a L-ICND2 Interconnecting Cisco Network Devices Part

More information

EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led

EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led Certification: ENSA Exam 312-38 Course Description This course looks at the network security in defensive view.

More information

Computer Forensics and Security Institute

Computer Forensics and Security Institute Computer Forensics and Security Institute Course Brochure 2015 www.cfsi.co #3 De Verteuil Terrace, Endeavour Road, Chaguanas, Trinidad, West Indies. Email: info@cfsi.co Tel: 1-868-684-0029 Find us on Facebook:

More information

Specialized Training Calendar May August 2015. Training for Professionals by Professionals

Specialized Training Calendar May August 2015. Training for Professionals by Professionals Specialized Training Calendar May August 2015 Training for Professionals by Professionals Course Titles Days Fees Training Dates NETWORKING / OPERATING SYSTEMS / SERVERS Cisco Certified Network Administrator

More information

CALGARY TRAINING & EDUCATION CALENDAR

CALGARY TRAINING & EDUCATION CALENDAR CALGARY TRAINING & EDUCATION CALENDAR NEW COURSE OFFERINGS FOR 2015 April - September, 2015 metaforetrainingcalgary@metafore.ca April 8th, 2015 ITIL CERTIFICATION INSTRUCTOR LED CLASSROOM TRAINING ITIL

More information

CRYPTOGEDDON: HEALTH CARE COMPROMISE. Todd Dow, CISA, PMP Founder, cryptogeddon.com @toddhdow, toddhdow@gmail.com

CRYPTOGEDDON: HEALTH CARE COMPROMISE. Todd Dow, CISA, PMP Founder, cryptogeddon.com @toddhdow, toddhdow@gmail.com CRYPTOGEDDON: HEALTH CARE COMPROMISE Todd Dow, CISA, PMP Founder, cryptogeddon.com @toddhdow, toddhdow@gmail.com WHAT IS CRYPTOGEDDON? An online scavenger hunt using hacker tools Use infosec tools to solve

More information

Diploma in Network (LAN/WAN) Administration

Diploma in Network (LAN/WAN) Administration Diploma in Network (LAN/WAN) Administration The Diploma in Network (LAN/WAN) Administration program prepares students to setup Local & Wide Area Networks using Cisco routers and Catalyst switches in a

More information

Available Upon Request

Available Upon Request Microsoft Windows Server Windows Server 2012 20409 Server Virtualization With Windows Server Hyper-V And System Center 5 - - 8-12 20410 Installing and Configuring Windows Server 2012 5 6-10 18-22 8-12

More information

LINUX / INFORMATION SECURITY

LINUX / INFORMATION SECURITY LINUX / INFORMATION SECURITY CERTIFICATE IN LINUX SYSTEM ADMINISTRATION The Linux open source operating system offers a wide range of graphical and command line tools that can be used to implement a high-performance,

More information

Academic Programs INFORMATION TECHNOLOGY

Academic Programs INFORMATION TECHNOLOGY Academic Programs INFORMATION TECHNOLOGY INFORMATION TECHNOLOGY The Information Systems programs at Tidewater Community College cover the essential areas of study in information systems technology. The

More information

Schedule Singapore 2015

Schedule Singapore 2015 Schedule Singapore 2015 FAST LANE > TRAINING FROM THE EXPERTS 1 Robinson Road #08-02 AIA Tower Singapore 048542 Tel +65 6338 3133 enquiry@fastlane-asia.com > www.fastlane-asia.com. Subject to modification

More information

Course Title: Penetration Testing: Security Analysis

Course Title: Penetration Testing: Security Analysis Course Title: Penetration Testing: Security Analysis Page 1 of 9 Course Description: The Security Analyst Series from EC-Council Press is comprised of five books covering a broad base of topics in advanced

More information

Global Knowledge (Thailand) Co.,Ltd. Training Schedule for Jul -Dec 2015

Global Knowledge (Thailand) Co.,Ltd. Training Schedule for Jul -Dec 2015 Global Knowledge (Thailand) Co.,Ltd. Training Schedule for Jul -Dec 2015 ASSOCIATE LEVEL CISCO CERTIFIED DESIGN ASSOCIATE (CCDA) Code Days Fees (THB) Jul-15 Aug-15 Sep-15 Oct-15 Nov-15 Dec-15 Designing

More information

Information Security Specialist Training on the Basis of ISO/IEC 27002

Information Security Specialist Training on the Basis of ISO/IEC 27002 Information Security Specialist Training on the Basis of ISO/IEC 27002 Natalia Miloslavskaya, Alexander Tolstoy Moscow Engineering Physics Institute (State University), Russia, {milmur, ait}@mephi.edu

More information

EC-Council Certified Security Analyst / License Penetration Tester (ECSA/LPT) v4.0 Bootcamp

EC-Council Certified Security Analyst / License Penetration Tester (ECSA/LPT) v4.0 Bootcamp EC-Council Certified Security Analyst / License Penetration Tester (ECSA/LPT) v4.0 Bootcamp ECSA/LPT is a security class like no other! Providing real world hands on experience, it is the only in-depth

More information

DoD Directive (DoDD) 8570 & GIAC Certification

DoD Directive (DoDD) 8570 & GIAC Certification DoD Directive (DoDD) 8570 & GIAC Certification Date Updated: January 2014 National Account Manager 678-714-5712 Director 703-968-0103 What is DoDD 8570? Department of Defense Directive 8570 provides guidance

More information

167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College

167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College 167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College Information Security Certificate: Designed to introduce students to programming, security basics, network monitoring,

More information

Fundamentals of Windows Server 2008 Network and Applications Infrastructure

Fundamentals of Windows Server 2008 Network and Applications Infrastructure Fundamentals of Windows Server 2008 Network and Applications Infrastructure MOC6420 About this Course This five-day instructor-led course introduces students to network and applications infrastructure

More information

THE CYBERSECURITY SKILL GAP: WHAT EMPLOYERS WANT YOU TO KNOW

THE CYBERSECURITY SKILL GAP: WHAT EMPLOYERS WANT YOU TO KNOW www.isaca.org/cyber THE CYBERSECURITY SKILL GAP: WHAT EMPLOYERS WANT YOU TO KNOW ROBERT E STROUD CGEIT CRISC INTERNATIONAL PRESIDENT ISACA & VP STRATEGY & INNOVATION CA TECHNOLOGIES February 2015 ISACA

More information

CYBERSECURITY: ISSUES AND ISACA S RESPONSE

CYBERSECURITY: ISSUES AND ISACA S RESPONSE CYBERSECURITY: ISSUES AND ISACA S RESPONSE June 2014 KEY TRENDS AND DRIVERS OF SECURITY Consumerization Emerging Trends Continual Regulatory and Compliance Pressures Mobile devices Social media Cloud services

More information

Network Security Administrator

Network Security Administrator Network Security Administrator Course ID ECC600 Course Description This course looks at the network security in defensive view. The ENSA program is designed to provide fundamental skills needed to analyze

More information

13 Courses Quick Guide

13 Courses Quick Guide 13 Courses Quick Guide Microsoft Network Infrastructure 2008 Microsoft Certified Solution Associate (MCSA 2012) MCSE 2012 (Private Cloud) MCSE Server infrastructure 2012 Administering & Configuring Microsoft

More information

CALGARY TRAINING & EDUCATION CALENDAR

CALGARY TRAINING & EDUCATION CALENDAR CALGARY TRAINING & EDUCATION CALENDAR NEW COURSE OFFERINGS FOR 2014 January June, 2015 metaforetrainingcalgary@metafore.ca January 7 th, 2015 NEW CITRIX TRAINING CNS-207 Implementing Citrix NetScaler 10

More information

Track 2: Introductory Track PREREQUISITE: BASIC COMPUTER EXPERIENCE

Track 2: Introductory Track PREREQUISITE: BASIC COMPUTER EXPERIENCE Anne Arundel Community College Tracks Anne Arundel Community College s computer technologies courses have been organized into 10 suggested tracks. The tracks are arranged to ensure that students have the

More information

Security Transcends Technology

Security Transcends Technology INTERNATIONAL INFORMATION SYSTEMS SECURITY CERTIFICATION CONSORTIUM, INC. Career Enhancement and Support Strategies for Information Security Professionals Paul Wang, MSc, CISA, CISSP Paul.Wang@ch.pwc.com

More information

InfoSec Academy Pen Testing & Hacking Track

InfoSec Academy Pen Testing & Hacking Track Fundamental Courses Foundational Courses InfoSec Academy Specialized Courses Advanced Courses Certification Preparation Courses Certified Information Systems Security Professional (CISSP) Texas Security

More information

2016 Course Release Schedule Updated 12/22/2015

2016 Course Release Schedule Updated 12/22/2015 2016 Course Release Schedule Updated 12/22/2015 January Course: MTA Mobility and Device Fundamentals Exam: 98-368 Description: The MTA Mobility and Device Fundamentals course will prepare users to take

More information

For more information, please contact Anne Arundel Community College s Center for Workforce Solutions at 410-777-2732.

For more information, please contact Anne Arundel Community College s Center for Workforce Solutions at 410-777-2732. Anne Arundel Community College is an academic partner in the Pathways to Cybersecurity Careers Consortium in the State of Maryland. The Pathways to Cybersecurity Consortium consists of workforce, academic,

More information

167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College

167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College 167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College Information Security Certificate: Designed to introduce students to programming, security basics, network monitoring,

More information

Network Support. Technical Certificate. Program Outcomes: FOUNDATION COURSES. 1 of 7

Network Support. Technical Certificate. Program Outcomes: FOUNDATION COURSES. 1 of 7 1 of 7 Network Support This technical certificate program prepares the student for employment as PC Technician; Computer Support Specialist, and Network Support Technician systems and computer network

More information

Logical Operations CyberSec First Responder: Threat Detection and Response (CFR) Exam CFR-110

Logical Operations CyberSec First Responder: Threat Detection and Response (CFR) Exam CFR-110 Logical Operations CyberSec First Responder: Threat Detection and Response (CFR) Exam CFR-110 Exam Information Candidate Eligibility: The CyberSec First Responder: Threat Detection and Response (CFR) exam

More information

VMware vcloud Air Security TECHNICAL WHITE PAPER

VMware vcloud Air Security TECHNICAL WHITE PAPER TECHNICAL WHITE PAPER The Shared Security Model for vcloud Air The end-to-end security of VMware vcloud Air (the Service ) is shared between VMware and the customer. VMware provides security for the aspects

More information

Learning Services Schedule

Learning Services Schedule Ireland s Most Comprehensive Training Schedule July 2012 - December 2012 SureSkills - Enabling Performance Learning Services Schedule Dublin 01 240 2222 Email: info@sureskills.com www.sureskills.com vmware

More information

Expert Reference Series of White Papers. 10 Security Concerns for Cloud Computing

Expert Reference Series of White Papers. 10 Security Concerns for Cloud Computing Expert Reference Series of White Papers 10 Security Concerns for Cloud Computing 1-800-COURSES www.globalknowledge.com 10 Security Concerns for Cloud Computing Michael Gregg, Global Knowledge Instructor,

More information