Global Knowledge Cybersecurity Training

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Global Knowledge Cybersecurity Training"

Transcription

1 Cybersecurity Training Your Solution for a Skilled Cyber Workforce Whether it s general cybersecurity awareness, secure network design and implementation, continuous monitoring, network forensics and analysis, or smart and effective incident response training, we can prepare you and your team to battle the latest cyber threats and attacks. Our broad cybersecurity training portfolio was developed as a result of listening to and understanding the needs and strategic goals of enterprises across countries and aligns to government and industry-issued standards and guidelines. Based on these standards and guidelines, we have created a logically organised map of high-level security disciplines, each including competencies and relevant courses to build IT security acumen. What do you have? What s coming at you? Security Disciplines Security Disciplines Who gets in? How do you handle failures? How do you manage the lifecycle? How do you plan for failures? From skills building to certification preparation, we offer training to meet every learning level and need. The corresponding competencies and sample of courses per discipline are highlighted in this document Training LLC. All rights reserved.

2 What do you have? To protect your assets, you must first know where they are and understand how they are tracked and managed: How are they secured? Who has access to them? Are they tracked and managed? Do you have processes and procedures in place to respond and recover from a security breach quickly? Cloud Cloud Computing Essentials RSA Cloud Security Fundamentals Data Center Infrastructure Management VMware vcloud Director: Install, Configure & Manage VMware vcloud: Overview Business Analysis Essentials Virtualisation VMware vsphere: Install, Configure, Manage VMware vcenter Configuration Manager for Virtual Infrastructure Enterprise Virtualisation using Microsoft Hyper-V Red Hat Enterprise Virtualisation Virtualisation Essentials Virtual Project Management Public Key Infrastructure (PKI) Security+ Prep Course Implementing Active Directory Federation Services 2.0 Information Assurance CSFI: Cyberspace Operations Strategist and Planning Acceptance Testing for Quality Success Cyber Security Compliance & Mobility Certification & Authorization Professional Prep Information Systems Security Engineering Professional Information Assurance Overview Cloud/Virtualisation Vendor Training Citrix, VMware, AppSense, Red Hat, Cisco, Microsoft, HP, IBM Secure Coding Foundstone Building Secure Software Foundstone Writing Secure Code Understanding Web Application Security Overview Secure Application Development Seminar Secure Web Application Development Seminar Secure Software Design Training LLC. All rights reserved.

3 What s coming at you? Assess your vulnerabilities, threats and risks. Work to mitigate this risk and use auditing and analysis to confirm your efforts. Humans can be your weakest link. Ensure they have received adequate training to stay one step ahead of the attack. Audit & Analysis Troubleshooting TCP/IP Networks with Wireshark CISA Prep Course CISM Prep Course Information Systems Security Engineering Professional Visualise, Prioritise and Secure your Network Cybersecurity Investigations and Network Forensics Analysis: Practical Techniques for Analysing Suspicious Network Traffic ITIL Service Capability: Operational Support and Analysis Risk Assessment and Mitigation Certified Authorization Professional Information Systems Security Engineering Professional RSA Archer Administration Risk Management Deploying Cisco ASA Firewall Solutions Implementing Cisco Intrusion Prevention System Cyber Security Compliance & Mobility Foundstone Risk Assessment Principles and Practices Threat Assessment CEH - Certified Ethical Hacker CHFI - Computer Hacking Forensic Investigator Cybersecurity Investigations and Network Forensics Analysis: Practical Techniques for Analysing Suspicious Network Traffic Practical Techniques for Analysing VoIP Traffic Practical Techniques for Analysing Wi-Fi Traffic Vulnerability Assessment Wireless LAN Security and Analysis Advanced VoIP: Securing UC Networks Foundstone Building Secure Software Foundstone Writing Secure Code Social Engineering Social Media Security Professional Social Media Engineering & Forensics Professional Social Media Management & Governance Professional Security+ Prep Course Cybersecurity Foundations Cyber Security Compliance & Mobility Training LLC. All rights reserved.

4 Who gets in? Control who has access by locking down your systems, including hosts, networks, applications and data flows. Communication Security Advanced VoIP: Securing UC Networks Wireless LAN Security and Analysis Troubleshooting TCP/IP Networks with Wireshark SIP Protocol Essentials Cisco Secure System Deploying Cisco ASA VPN Solutions Cisco Advanced SSL VPN Dell SonicWALL Secure Remote Access Basic Administrator (SRABA) IPv6 Security Migration HDI Knowledge Management Foundations: KCS Principles Cybersecurity Compliance & Mobility ITIL Service Lifecycle: Planning, Protection, and Optimisation Global Communications Remote Access Cisco Secure System Implementing Cisco IOS Network Security Deploying Cisco ASA VPN Solutions Check Point Security Expert R75 Junos Security Communication and Remote Access Vendors Cisco, Juniper,Blue Coat, F5, Checkpoint, Dell SonicWall, Citrix, Microsoft Logging and Monitoring Requirements Validation and Testing Unix Fundamentals ITIL Service Capability: Release, Control, and Validation Penetration Testing Certified Ethical Hacker Advanced VoIP: Securing UC Networks Foundstone Ultimate Hacking Cryptography Security+ Prep Course CISSP Foundstone Writing Secure Code IDS/IPS/IDP Implementing Cisco Intrusion Prevention System Training LLC. All rights reserved.

5 How do you handle failures? Perform continuous monitoring with event management tools and maximise your ability to provide an immediate response. Use strong policies that are well communicated for a consistent and uniform reaction. Continuous Monitoring/Security Incident and Event Management (SIEM) CSFI - Cyberspace Operations Strategist and Planning Agile Project Management ITIL Service Capability: Operational Support and Analysis Leading Complex Projects Forensics Foundstone Forensics & Incident Response Computer Hacking Forensic Investigator Troubleshooting TCP/IP Networks with Wireshark Cybersecurity Investigations and Network Forensics Analysis: Practical Techniques for Analysing Suspicious Network Traffic Practical Techniques for Analysing VoIP Traffic Practical Techniques for Analysing Wi-Fi Traffic Incident Response Foundstone Forensics & Incident Response Computer Hacking Forensic Investigator Kepner Tregoe Foundation (Enterprise only) ITIL Service Capability: Operational Support and Analysis Enterprise Incident Response Management Advanced Memory Forensics in Incident Response Reverse Engineering Foundstone Forensic and Incident Response Hacking & Cyber Warfare Certified Ethical Hacker Foundstone Ultimate Hacking Database Hacking and Security Training: Securing Databases Training LLC. All rights reserved.

6 How do you manage the lifecycle? Continuously managing changes to the IT landscape of your organisation requires due diligence to ensure your systems are optimally organised and interconnected. Architecture & Design RSA Archer Administration Introduction to IPv6: Protocols, Services, and Migration Advanced IPv6 Migration IPv6 Security Migration IPv6 Fundamentals, Design, and Deployment Acceptance Testing for Quality Success ITIL Foundations ITIL Service Lifecycle: Service Design Application Security & Development Secure Software Design Building Secure Software Building a Quality Software Architecture Creating the Systems Architecture Understanding Secure SOA: A Technical Overview Change Management Schedules and Costs Controls Business Analysis Essentials Certification & Authorisation Professional Prep ITIL Service Lifecycle: Service Transition Operations Planning CSFI: Cyberspace Operations Strategist and Planning ITIL Foundations ITIL Service Capability: Service Offerings and Agreements CISSP Prep Course ITIL Service Lifecycle: Service Transition Security Testing Certified Ethical Hacker Acceptance Testing for Quality Success CISA Prep Course Adopting Agile Software Development Practices Business Alignment ITIL Service Lifecycle: Continual Service Improvement Business Process Analysis CISM Prep Course Training LLC. All rights reserved.

7 How do you plan for failures? Ensure your organisation has planned for continuity after an attack. Failures happen; how best do you respond? Business Impact Analysis Schedules and Cost Control Business Analysis Essentials ITIL Service Lifecycle: Service Design Communication Plan Disaster Recovery Data Domain System Administration Symantec Backup Exec 12.x for Windows Servers:Administration Performance Analysis on Data ONTAP Cybersecurity Foundations CISSP Prep Course ITIL Service Lifecycle: Continual Service Improvement Continuity of Operations Business Analysis Essentials Agile Project Management Certification Workshop ITIL Service Cabability: Planning, Protection, and Optimisation The courses listed are only a sample of what we can offer. To help you and your team build and maintain your expertise, we continually add premium content to our curriculum. Contact us today to learn more. Conclusion The constantly evolving cybersecurity landscape requires heavily armed IT security professionals whose skills are also constantly evolving. Our security curriculum is constantly evolving to keep pace with the threat landscape and the needs of organisations big or small. We are your source for IT security skills building and offer a robust security curriculum ranging from novice to expert. Couple this with premium content, expert instruction and training for every learning style and budget. Contact us today and we will develop a learning plan to best meet your needs for today and tomorrow. Learn More Training LLC. All rights reserved.

8 EMEA HQ - UK: Thames Valley Training Centre Mulberry Business Park, Fishponds Rd, Wokingham, Berkshire, RG41 2GY T +44 (0) F +44 (0) E Egypt: 16 Moustafa Refaat St. Block 1137, Sheraton Heliopolis, Cairo T or F E Saudi Arabia - Dammam Corniche Plaza Tower (Centre Point Building), Al Corniche Road, Al Jawhara Area Office 103 3rd Floor, Dammam P.O. BOX T or 7737 F E Austria: Gutheil-Schoder-Gasse 7a A-1101 Vienna T +43 (1) F +43 (1) E Abu Dhabi: Office 606A, Park Rotana Office Complex, Khalifa Park, Sector E-48, PO Box , Abu Dhabi T /19 F E France: 100, Avenue Albert 1er Rueil-Malmaison T +33 (0) F +33 (0) E Ireland: 3rd Floor Jervis House Millennium Walkway Dublin 1 T +353 (0) F +353 (0) E Saudi Arabia - Riyadh: Al Oruba street, Bldg,# 393, Al Worood, Riyadh P.O. Box Riyadh T F Ext: 3323 E Spain: Edificio Indocentro Calle de la Retama 7, 6a planta Madrid, ES T F E Belgium: Zandvoortstraat Mechelen T F E Netherlands: Iepenhoeve MR Nieuwegein T +31 (0) F +31 (0) E Sweden: Vretenvägen 13, plan 3 Box Solna (Stockholm) T F E Denmark: Stamholmen 110, 2650 Hvidovre T F E Dubai: Dubai Knowledge Village Block 2A, first floor, Office F-68, PO Box T /72 F E Norway: Grenseveien 97, N-0663 Oslo, Postboks 6256 Etterstad, N-0603 Oslo, Norway T F E UK: Thames Valley Training Centre Mulberry Business Park, Fishponds Rd, Wokingham, Berkshire, RG41 2GY T +44 (0) F +44 (0) E Copyright 2014 Training LLC. All rights reserved. reserves the right to change pricing, registration terms and conditions, course content, products or program, course events or cancel a course at any time without notice or liability. Whilst every effort has been made to ensure the accuracy of the information contained within the publication will not accept responsibility for any inadvertent errors. For complete terms and conditions, visit and the logo are trademarks of Training LLC. All other trademarks mentioned are the property of their respective owners.

Global Knowledge Cybersecurity Training

Global Knowledge Cybersecurity Training Cybersecurity Training Your Solution for a Skilled Cyber Workforce Whether it s general cybersecurity awareness, secure network design and implementation, continuous monitoring, network forensics and analysis,

More information

Security 2014 www.globalknowledge.com.sa www.globalknowledge.ae www.globalknowledge.com.eg

Security 2014 www.globalknowledge.com.sa www.globalknowledge.ae www.globalknowledge.com.eg Security 2014 www.globalknowledge.com.sa www.globalknowledge.ae www.globalknowledge.com.eg About Founded in 1995, is the largest privately held provider of training, enterprise learning services, and software

More information

Course Schedule. All in one place. Your guide to mapping your training-plan for the second half of 2015 with confidence...

Course Schedule. All in one place. Your guide to mapping your training-plan for the second half of 2015 with confidence... July - December 201 Course Schedule All in one place Your guide to mapping your training-plan for the second half of 201 with confidence... www.globalknowledge.com.sa www.globalknowledge.com.eg www.globalknowledge.ae

More information

www.globalknowledge.no

www.globalknowledge.no www.globalknowledge.no Contents 3 Certification Roadmap 4 Certification Details 9 Program Overview 10 Competencies / Roles 12 Locations has been providing IT training, business skills and consultancy services

More information

www.globalknowledge.net

www.globalknowledge.net www.globalknowledge.net HP training Contents Page About 2 The new HP ExpertOne program 2 HP ExpertOne networking certifications 3 Accredited Integration Specialist (AIS) 5 Accredited Systems Expert (ASE)

More information

Juniper training. www.globalknowledge.net

Juniper training. www.globalknowledge.net Juniper training www.globalknowledge.net Authorised Juniper Networks Training 4 5 Junos-based Certification 6 Additional Support Tracks 6 Additional Juniper Certification Tracks 10 Learning Delivery Methods

More information

www.globalknowledge.se

www.globalknowledge.se www.globalknowledge.se Contents 3 Certification Roadmap 4 Certification Details 9 Program Overview 10 Competencies / Roles 12 Locations has been providing IT training, business skills and consultancy services

More information

Formally known as: Cisco Advanced Services Education (ASE) www.globalknowledge.net

Formally known as: Cisco Advanced Services Education (ASE) www.globalknowledge.net Formally known as: Cisco Advanced Services Education (ASE) Cisco EMEAR Learning Partner of the Year Cisco EMEAR Collaboration Partner of the Year Contents 02 Cisco High-Touch Delivery Learning Services

More information

July 2014 - December 2014. Citrix Course Schedule

July 2014 - December 2014. Citrix Course Schedule July 2014 - December 2014 Citrix Course Schedule 2014 www.globalknowledge.com.sa www.globalknowledge.com.eg www.globalknowledge.ae Citrix Certifications Citrix credentials distinguish an elite set of IT

More information

Content. Class-Connect HD. See page 15 for more information

Content. Class-Connect HD. See page 15 for more information Content Cisco TelePresence Portfolio 03 Video Express 04 Video Advanced 05 Video Advanced Plus 06 Video Master 07 Course Overviews 08-09 Career Certifications 10-12 Specialist Courses 13-14 Class-Connect

More information

CompTIA CASP Pre-approved Training for CompTIA CASP Continuing Education Units (CEUs)

CompTIA CASP Pre-approved Training for CompTIA CASP Continuing Education Units (CEUs) CompTIA CASP Pre-approved Training for CompTIA CASP Continuing Education Units (CEUs) Note: Approved training courses in this document are subject to change without prior notification. Training submitted

More information

FedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

FedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov FedVTE Training Catalog SPRING 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk here or email the

More information

Citrix XenApp Design & Implementation Service

Citrix XenApp Design & Implementation Service Citrix XenApp Design & Implementation Service G-Cloud 7 November 2015 Citrix XenApp Design and Implementation Service Service Overview RealServe IT s XenApp Design and Implementation Service aims to analyse

More information

FedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

FedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov FedVTE Training Catalog SUMMER 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please

More information

Course and Service Portfolio Specialized IT courses for IT professional and organizations willing to take benefit from the competitive advantages

Course and Service Portfolio Specialized IT courses for IT professional and organizations willing to take benefit from the competitive advantages Course and Service Portfolio Specialized IT courses for IT professional and organizations willing to take benefit from the competitive advantages provided by international certifications Cyber & IT Governance

More information

Learning Tree Training Pre-approved Training for Continuing Education Units (CEUs)

Learning Tree Training Pre-approved Training for Continuing Education Units (CEUs) Learning Tree Training Pre-approved Training for Continuing Education Units (CEUs) Note: Approved training courses in this document are subject to change without prior notification. Training submitted

More information

Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program

Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program Cyber: The Catalyst to Transform the Security Program Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA A Common Language? Hyper Connected World Rapid IT Evolution Agile Targeted Threat

More information

Bridged Apps: specialise in the deployment of many well known apps, as well as building customer made apps, websites, and SEO.

Bridged Apps: specialise in the deployment of many well known apps, as well as building customer made apps, websites, and SEO. Bridging The Gap Bridged Group is the Strategic partner of The Telstra Business Centre and Telstra Store. We are a Telstra Preferred Cloud Partner with over 35 years of experience between our senior staff

More information

Optimised Managed IT Services, Hosting and Infrastructure. Keep your business running at peak performance

Optimised Managed IT Services, Hosting and Infrastructure. Keep your business running at peak performance Optimised Managed IT Services, Hosting and Infrastructure Keep your business running at peak performance Managed Services from your Trusted Advisor Looking for comprehensive, expert support? As a trusted

More information

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1 2 Network + Technology + Customers = $$ 3 Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available

More information

CESG Certification of Cyber Security Training Courses

CESG Certification of Cyber Security Training Courses CESG Certification of Cyber Security Training Courses Supporting Assessment Criteria for the CESG Certified Training (CCT) Scheme Portions of this work are copyright The Institute of Information Security

More information

Microsoft Technologies

Microsoft Technologies NETWORK ENGINEERING TRACK Microsoft Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS Module 1 - Office Applications This subject enables users to acquire the necessary knowledge and skills to use

More information

SENIOR SYSTEMS ANALYST

SENIOR SYSTEMS ANALYST CITY OF MONTEBELLO 109 DEFINITION Under general administrative direction of the City Administrator, provides advanced professional support to departments with very complex computer systems, programs and

More information

AL RAFEE ENTERPRISES Solutions & Expertise.

AL RAFEE ENTERPRISES Solutions & Expertise. AL RAFEE ENTERPRISES Solutions & Expertise. Virtualization Al Rafee has strategically made substantial investment in building up a large end to end portfolio of Virtualization across the entire IT infrastructure

More information

IT Networking and Security

IT Networking and Security elearning Course Outlines IT Networking and Security powered by Calibrate elearning Course Outline CompTIA A+ 801: Fundamentals of Computer Hardware/Software www.medallionlearning.com Fundamentals of Computer

More information

HP Security Solutions for the Microsoft. Environment. Achieving a secure adaptive enterprise

HP Security Solutions for the Microsoft. Environment. Achieving a secure adaptive enterprise HP Security Solutions for the Microsoft Environment Achieving a secure adaptive enterprise How secure is your Microsoft environment? Enterprise boundaries are expanding, creating the need for faster, easier

More information

Bellevue University Cybersecurity Programs & Courses

Bellevue University Cybersecurity Programs & Courses Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320

More information

Linux Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS QUARTER 2 NETWORKING AND OPERATING SYSTEMS ESSENTIALS. Module 1 - Office Applications

Linux Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS QUARTER 2 NETWORKING AND OPERATING SYSTEMS ESSENTIALS. Module 1 - Office Applications NETWORK ENGINEERING TRACK Linux Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS Module 1 - Office Applications This subject enables users to acquire the necessary knowledge and skills to use Office

More information

We are Passionate about Total Security Management Architecture & Infrastructure Optimisation Review

We are Passionate about Total Security Management Architecture & Infrastructure Optimisation Review We are Passionate about Total Security Management Architecture & Infrastructure Optimisation Review The security threat landscape is constantly changing and it is important to periodically review a business

More information

Information Technology Cluster

Information Technology Cluster Network Systems Pathway Information Technology Cluster Assistant Network Technician -- This major prepares students to install, configure, operate, and connections to remote sites in a wide area network

More information

ABB s approach concerning IS Security for Automation Systems

ABB s approach concerning IS Security for Automation Systems ABB s approach concerning IS Security for Automation Systems Copyright 2006 ABB. All rights reserved. Stefan Kubik stefan.kubik@de.abb.com The problem Most manufacturing facilities are more connected (and

More information

Are you prepared to be next? Invensys Cyber Security

Are you prepared to be next? Invensys Cyber Security Defense In Depth Are you prepared to be next? Invensys Cyber Security Sven Grone Critical Controls Solutions Consultant Presenting on behalf of Glen Bounds Global Modernization Consultant Agenda Cyber

More information

SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles

SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles PNNL-24138 SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles March 2015 LR O Neil TJ Conway DH Tobey FL Greitzer AC Dalton PK Pusey Prepared for the

More information

F R O N T I E R B U S I N E S S S Y S T E M S

F R O N T I E R B U S I N E S S S Y S T E M S Engineering Comprehensive IT Infrastructure Solutions and Ser vices With its experience and expertise garnered over 14 years, in multiple technologies and domains, Frontier can efficiently design and execute

More information

Securing the Service Desk in the Cloud

Securing the Service Desk in the Cloud TECHNICAL WHITE PAPER Securing the Service Desk in the Cloud BMC s Security Strategy for ITSM in the SaaS Environment Introduction Faced with a growing number of regulatory, corporate, and industry requirements,

More information

Table of Contents. Introduction. Audience. At Course Completion

Table of Contents. Introduction. Audience. At Course Completion Table of Contents Introduction Audience At Course Completion Prerequisites Certified Professional Exams Student Materials Course Outline Introduction This four-day, instructor-led course provides students

More information

Technical Manager / Fortinet Product Owner at Space Data Systems - Jordan (SDS) alzard_m@hotmail.com

Technical Manager / Fortinet Product Owner at Space Data Systems - Jordan (SDS) alzard_m@hotmail.com Mohammad Al-Zard alzard_m@hotmail.com Summary Hands-on experience in security consultation, measuring possible security vulnerabilities, implementing and customizing distributed IDPS systems. Planning

More information

Logicalis Managed Service Strategy & Support. Geraldine Moatti Proposition Manager, Services

Logicalis Managed Service Strategy & Support. Geraldine Moatti Proposition Manager, Services Logicalis Managed Service Strategy & Support Geraldine Moatti Proposition Manager, Services 1 I don t want to be a Technology Operator Or how do I deliver business differentiation? Support business growth

More information

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,

More information

BMS Consulting Cyber Security and IT Technology Team

BMS Consulting Cyber Security and IT Technology Team BMS Consulting Cyber Security and IT Technology Team Cyber Security and IT Technology Team Who we are High professional team from Ukraine which specializes on InfoSec and complex IT projects around the

More information

Injazat s Managed Services Portfolio

Injazat s Managed Services Portfolio Injazat s Managed Services Portfolio Overview Premium Managed Services to Transform Your IT Environment Injazat s Premier Tier IV Data Center is built to offer the highest level of security and reliability.

More information

C.R.I.S.P. LLC AND IT UNIVERSITY (ITU)

C.R.I.S.P. LLC AND IT UNIVERSITY (ITU) C.R.I.S.P. LLC AND IT UNIVERSITY (ITU) Course Listing 2 Cisco Complete Network Certification Training 3 Cisco 100-101: CCENT - ICND1 - Interconnecting Cisco Networking Devices Part 1 4 Cisco 200-101: CCNA

More information

HOSTING. Managed Security Solutions. Managed Security. ECSC Solutions

HOSTING. Managed Security Solutions. Managed Security. ECSC Solutions Managed Security Managed Security MANAGED SECURITY SOLUTIONS I would highly recommend for your company s network review... were by far the best company IT Manager, Credit Management Agency Presenting IT

More information

InfoSec Academy Application & Secure Code Track

InfoSec Academy Application & Secure Code Track Fundamental Courses Foundational Courses InfoSec Academy Specialized Courses Advanced Courses Certification Preparation Courses Certified Information Systems Security Professional (CISSP) Texas Security

More information

Course Venue :- Lab 302, IT Dept., Govt. Polytechnic Mumbai, Bandra (E)

Course Venue :- Lab 302, IT Dept., Govt. Polytechnic Mumbai, Bandra (E) Information Technology Department CEP on CLOUD COMPUTING (Starting from 3 rd Jan 2015) Module No Course No Course Title Duration Fees Module 1 Course 1 RHCSA (Red Hat certified System 3 Weeks Rs. 6000

More information

Logical Operations CyberSec First Responder: Threat Detection and Response (CFR) Exam CFR-110

Logical Operations CyberSec First Responder: Threat Detection and Response (CFR) Exam CFR-110 Logical Operations CyberSec First Responder: Threat Detection and Response (CFR) Exam CFR-110 Exam Information Candidate Eligibility: The CyberSec First Responder: Threat Detection and Response (CFR) exam

More information

IT Enterprise Services

IT Enterprise Services IT Enterprise Services Capita Virtual Workplace Agility & reliability for your future workplace Balancing freedom & control Virtual working is essential and you know the virtual workplace is possible.

More information

Implementing Cisco IOS Network Security v2.0 (IINS)

Implementing Cisco IOS Network Security v2.0 (IINS) Implementing Cisco IOS Network Security v2.0 (IINS) Course Overview: Implementing Cisco IOS Network Security (IINS) v2.0 is a five-day instructor-led course that is presented by Cisco Learning Partners

More information

INFORMATION SECURITY & GOVERNANCE SYSTEMS AND IT INFRASTRUCTURE INFOSEC & TECHNOLOGY TRAINING. forebrook

INFORMATION SECURITY & GOVERNANCE SYSTEMS AND IT INFRASTRUCTURE INFOSEC & TECHNOLOGY TRAINING. forebrook INFORMATION SECURITY & GOVERNANCE SYSTEMS AND IT INFRASTRUCTURE INFOSEC & TECHNOLOGY TRAINING forebrook Forebrook offers a range of information security, governance, IT systems and infrastructure related

More information

Introduction to Cyber Security / Information Security

Introduction to Cyber Security / Information Security Introduction to Cyber Security / Information Security Syllabus for Introduction to Cyber Security / Information Security program * for students of University of Pune is given below. The program will be

More information

Unified Cyber Security Monitoring and Management Framework By Vijay Bharti Happiest Minds, Security Services Practice

Unified Cyber Security Monitoring and Management Framework By Vijay Bharti Happiest Minds, Security Services Practice Unified Cyber Security Monitoring and Management Framework By Vijay Bharti Happiest Minds, Security Services Practice Introduction There are numerous statistics published by security vendors, Government

More information

CYBER SECURITY TRAINING SAFE AND SECURE

CYBER SECURITY TRAINING SAFE AND SECURE CYBER SECURITY TRAINING KEEPING YOU SAFE AND SECURE Experts in Cyber Security training. Hardly a day goes by without a cyber attack being reported. With this ever-increasing threat there is a growing need

More information

Remote Lab Price List

Remote Lab Price List CISCO ROUTING & SWITCHING LABS Hours Days Pods Student/Pod L-ICND1 Interconnecting Cisco Network Devices Part 1 40 5 8 2:1 1.290,- 299,- 108,- n/a n/a L-ICND2 Interconnecting Cisco Network Devices Part

More information

Boost elearning IT Training INSTRUCTIONAL DESIGN, LEARNING PATHS, AND COURSE CATALOGUE

Boost elearning IT Training INSTRUCTIONAL DESIGN, LEARNING PATHS, AND COURSE CATALOGUE 2016 Boost elearning IT Training INSTRUCTIONAL DESIGN, LEARNING PATHS, AND COURSE CATALOGUE Instructional Design Boost elearning Interactive IT Training Boost elearning's Interactive IT Training provides

More information

EARTHLINK BUSINESS. Simplify the Complex

EARTHLINK BUSINESS. Simplify the Complex EARTHLINK BUSINESS IT Simplify the Complex IS YOUR IT VENDOR A TRUSTED BUSINESS PARTNER? With all of the hype surrounding virtualization, cloud computing, and managed services, how do you assess the best

More information

CompTIA Security+ Pre-approved Training for CompTIA Security+ Continuing Education Units (CEUs)

CompTIA Security+ Pre-approved Training for CompTIA Security+ Continuing Education Units (CEUs) CompTIA Security+ Pre-approved Training for CompTIA Security+ Continuing Education Units (CEUs) Note: Approved training courses in this document are subject to change without prior notification. Training

More information

Expert Reference Series of White Papers. 10 Security Concerns for Cloud Computing

Expert Reference Series of White Papers. 10 Security Concerns for Cloud Computing Expert Reference Series of White Papers 10 Security Concerns for Cloud Computing 1-800-COURSES www.globalknowledge.com 10 Security Concerns for Cloud Computing Michael Gregg, Global Knowledge Instructor,

More information

PRESIDIO MANAGED SERVICES OVERVIEW

PRESIDIO MANAGED SERVICES OVERVIEW OVERVIEW VALUE AND COMMITMENT OUR COMMITMENT In our pursuit of excellence for Managed Services we dedicate our team to support the strategic business and IT drivers from our customers. Enabling you to

More information

(BDT) BDT/POL/CYB/Circular-002. +41 22 730 6057 +41 22 730 5484 cybersecurity@itu.int

(BDT) BDT/POL/CYB/Circular-002. +41 22 730 6057 +41 22 730 5484 cybersecurity@itu.int 2011 15 (BDT) BDT/POL/CYB/Circular-002 +41 22 730 6057 +41 22 730 5484 cybersecurity@itu.int 2008 2010 2010 International Telecommunication Union Place des Nations CH-1211 Geneva 20 Switzerland Tel: +41

More information

Field of Study Area of Expertise Certification Vendor Course

Field of Study Area of Expertise Certification Vendor Course Field of Study Area of Expertise Certification Vendor Course Advanced Security Certified Information Systems Security Professional (CISSP) ISC2 CISSP Advanced Security CompTIA Advanced Security Practitioner

More information

Access FedVTE online at: fedvte.usalearning.gov

Access FedVTE online at: fedvte.usalearning.gov FALL 2015 Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk her e or email the Help Desk at support@usalearning.net. To speak with a Help Desk

More information

Securely Yours LLC IT Hot Topics. Sajay Rai, CPA, CISSP, CISM sajayrai@securelyyoursllc.com

Securely Yours LLC IT Hot Topics. Sajay Rai, CPA, CISSP, CISM sajayrai@securelyyoursllc.com Securely Yours LLC IT Hot Topics Sajay Rai, CPA, CISSP, CISM sajayrai@securelyyoursllc.com Contents Background Top Security Topics What auditors must know? What auditors must do? Next Steps [Image Info]

More information

Guardian365. Managed IT Support Services Suite

Guardian365. Managed IT Support Services Suite Guardian365 Managed IT Support Services Suite What will you get from us? Award Winning Team Deloitte Best Managed Company in 2015. Ranked in the Top 3 globally for Best Managed Service Desk by the Service

More information

The Education Fellowship Finance Centralisation IT Security Strategy

The Education Fellowship Finance Centralisation IT Security Strategy The Education Fellowship Finance Centralisation IT Security Strategy Introduction This strategy outlines the security systems in place to optimise, manage and protect The Education Fellowship data and

More information

Our Cloud Offers You a Brighter Future

Our Cloud Offers You a Brighter Future Our Cloud Offers You a Brighter Future Qube Global Software Cloud Services are used by many diverse organisations including financial institutions, international service providers, property companies,

More information

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus National Cyber League Certified Ethical Hacker (CEH) TM Syllabus Note to Faculty This NCL Syllabus is intended as a supplement to courses that are based on the EC- Council Certified Ethical Hacker TM (CEHv8)

More information

Information Systems Security Certificate Program

Information Systems Security Certificate Program Information Technologies Programs Information Systems Security Certificate Program Accelerate Your Career extension.uci.edu/infosec University of California, Irvine Extension s professional certificate

More information

Assuria can help protectively monitor firewalls for PCI compliance. Assuria can also check the configurations of personal firewalls on host devices

Assuria can help protectively monitor firewalls for PCI compliance. Assuria can also check the configurations of personal firewalls on host devices The Payment Card Industry (PCI) Data Security Standard (DSS) provides an actionable framework for developing a robust payment card data security process. The Payment Application Data Security Standard

More information

CLOUD COMPUTING WE VE GOT CLOUD COVERED.

CLOUD COMPUTING WE VE GOT CLOUD COVERED. CLOUD COMPUTING WE VE GOT CLOUD COVERED. Training to maximise your cloud solution We know the development and adoption of Cloud Computing technologies has been rapid. And that fast paced technological

More information

t +61 2 6100 7714 a Foresight Consulting, GPO Box 116, Canberra ACT 2601, AUSTRALIA e info@foresightconsulting.com.au foresightconsulting.com.

t +61 2 6100 7714 a Foresight Consulting, GPO Box 116, Canberra ACT 2601, AUSTRALIA e info@foresightconsulting.com.au foresightconsulting.com. e info@ Mr. James Kavanagh Chief Security Advisor Microsoft Australia Level 4, 6 National Circuit, Barton, ACT 2600 17 September 2014 Microsoft Azure IRAP Assessment Letter of Compliance Dear Mr. Kavanagh,

More information

Expert. Trusted. Effective. IT managed services tailored to you. From Modern Networks.

Expert. Trusted. Effective. IT managed services tailored to you. From Modern Networks. Expert. Trusted. Effective. IT managed services tailored to you. From Modern Networks. A Complete End-to-End Portfolio Established in 1999, Modern Networks is a managed service provider helping clients

More information

Protecting against cyber threats and security breaches

Protecting against cyber threats and security breaches Protecting against cyber threats and security breaches IBM APT Survival Kit Alberto Benavente Martínez abenaventem@es.ibm.com IBM Security Services Jun 11, 2015 (Madrid, Spain) 12015 IBM Corporation So

More information

MANAGED SECURITY SERVICES LEVEL 3 SECURE ACCESS AND MOBILITY SERVICES

MANAGED SECURITY SERVICES LEVEL 3 SECURE ACCESS AND MOBILITY SERVICES MANAGED SECURITY SERVICES LEVEL 3 SECURE ACCESS AND MOBILITY SERVICES BY 2015 IT IS EXPECTED THAT THE WORLD S MOBILE WORKER POPULATION WITH REACH 1.3 BILLION OR 37.2% OF THE TOTAL GLOBAL WORKFORCE. (IDC

More information

MCSA Windows 8 (Exam 70-687)

MCSA Windows 8 (Exam 70-687) MCSA Windows 8 (Exam 70-687) Configuring Windows 8 Length: 5 Days Location: 182, Broadway, Newmarket, Auckland Vendor: Microsoft Audience(s): IT Professionals Level: 200 Technology: Windows 8 Type: Corporate

More information

BMS Consulting LLC 2014. Portfolio, partners and benefits

BMS Consulting LLC 2014. Portfolio, partners and benefits BMS Consulting LLC 2014 Portfolio, partners and benefits 15 + years of history $70m + sales volume ISO 9000 450 + projects 80 + certified staff 60 + partners Our Evolution Reseller First MS LAR Box mover

More information

Michelle Govan & Anand Philip Network & Security Engineering

Michelle Govan & Anand Philip Network & Security Engineering Michelle Govan & Anand Philip Network & Security Engineering Network & Security Engineering Suite Dr Michelle Govan Anand Philip Programme Philosophy The philosophy of the programmes is unique to others

More information

Professional Services Overview

Professional Services Overview Professional Services Overview INFORMATION SECURITY ASSESSMENT AND ADVISORY NETWORK APPLICATION MOBILE CLOUD IOT Praetorian Company Overview HISTORY Founded in 2010 Headquartered in Austin, TX Self-funded

More information

N e t w o r k E n g i n e e r Position Description

N e t w o r k E n g i n e e r Position Description Position Title: Group/Division/Team Network Engineer Business Technology Services / IT Operations Division Date October 2011 Reports to Roles Reporting to This Primary Objective Decision Making Authority

More information

Current Vacancies. UK & South Africa. This document contains both Permanent & Contract roles.

Current Vacancies. UK & South Africa. This document contains both Permanent & Contract roles. Current Vacancies UK & South Africa This document contains both Permanent & Contract roles. To apply for any of the roles please email your CV and covering letter: Email: resourcing@ecs.co.uk Or call our

More information

Head Office: 0118 912 3456. Northern Office: 0113 234 4747. www.globalknowledge.co.uk

Head Office: 0118 912 3456. Northern Office: 0113 234 4747. www.globalknowledge.co.uk Head Office: 0118 912 3456 www.globalknowledge.co.uk Contents 4 MCSA SQL Server 2012 4 MCSE: Data Platform 5 MCSE: Business Intelligence 5 Advanced Certification MCSM 6 Frequently Asked Questions 7 Learning

More information

Pluralsight Training Pre-Approved for CompTIA CEUs

Pluralsight Training Pre-Approved for CompTIA CEUs Pluralsight Training Pre-Approved for CompTIA CEUs Note: Approved training courses in this document are subject to change without prior notification. Training submitted based on prior approval will remain

More information

Current Vacancies. UK & South Africa. This document contains both Permanent & Contract roles.

Current Vacancies. UK & South Africa. This document contains both Permanent & Contract roles. Current Vacancies UK & South Africa This document contains both Permanent & Contract roles. To apply for any of the roles please email your CV and covering letter: Email: resourcing@ecs.co.uk Or call our

More information

IT Networking and Security

IT Networking and Security elearning Course Outlines IT Networking and Security powered by Calibrate elearning Course Outline CompTIA A+ 801: Fundamentals of Computer Hardware/Software powered by Calibrate www.medallionlearning.com

More information

IT Enterprise Services

IT Enterprise Services IT Enterprise Services Capita Private Cloud Agile Infrastructure-as-a-Service (IaaS) Cloud potential unleashed Cloud computing at its best Cloud is now an integral part of every IT strategy. It reduces

More information

NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense

NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense Cyber Investigations Data Management Systems Security Data Security Analysis Digital Forensics Health Care Security Industrial

More information

Learning Services Schedule

Learning Services Schedule Ireland s Most Comprehensive Training Schedule July 2012 - December 2012 SureSkills - Enabling Performance Learning Services Schedule Dublin 01 240 2222 Email: info@sureskills.com www.sureskills.com vmware

More information

Cloud Courses Description

Cloud Courses Description Courses Description 101: Fundamental Computing and Architecture Computing Concepts and Models. Data center architecture. Fundamental Architecture. Virtualization Basics. platforms: IaaS, PaaS, SaaS. deployment

More information

e2e Managed Customer Private Cloud Infrastructure Service Definition Document

e2e Managed Customer Private Cloud Infrastructure Service Definition Document e2e Managed Customer Private Cloud Infrastructure Service Definition Document Overview A range of Private Cloud infrastructure managed services where the customer buys or already owns the physical equipment

More information

Brandman University. School of CCNA

Brandman University. School of CCNA Information Technology Certifications CCNA The Cisco CCNA Training Package (ICND: Parts 1 and 2) includes expert instructor-led training modules with customized presentations, practice exam simulators

More information

Network Management Software Technology Roadmap

Network Management Software Technology Roadmap Networking Study: Wave 10 Network Management Software Technology Roadmap Capturing networking professionals adoption plans, projected spending and vendor short-lists, the indepth roadmap covers six technologies

More information

SECURITY OVERVIEW FOR MY.ENDNOTE.COM. In line with commercial industry standards, Thomson Reuters employs a dedicated security team to protect our

SECURITY OVERVIEW FOR MY.ENDNOTE.COM. In line with commercial industry standards, Thomson Reuters employs a dedicated security team to protect our ENDNOTE ONLINE SECURITY OVERVIEW FOR MY.ENDNOTE.COM In line with commercial industry standards, Thomson Reuters employs a dedicated security team to protect our servers from attacks and other attempts

More information

MCSE SYLLABUS. Exam 70-290 : Managing and Maintaining a Microsoft Windows Server 2003:

MCSE SYLLABUS. Exam 70-290 : Managing and Maintaining a Microsoft Windows Server 2003: MCSE SYLLABUS Course Contents : Exam 70-290 : Managing and Maintaining a Microsoft Windows Server 2003: Managing Users, Computers and Groups. Configure access to shared folders. Managing and Maintaining

More information

Cloud Courses Description

Cloud Courses Description Cloud Courses Description Cloud 101: Fundamental Cloud Computing and Architecture Cloud Computing Concepts and Models. Fundamental Cloud Architecture. Virtualization Basics. Cloud platforms: IaaS, PaaS,

More information

Unlimited Server 24/7/365 Support

Unlimited Server 24/7/365 Support Unlimited Server 24/7/365 Support Unlimited Server Support from System Architects covers your Windows servers, Linux servers and virtual machines. Your servers are monitored and managed 24 hours a day,

More information

Future Threat Landscape - How will technology evolve and what does it mean for cyber security?

Future Threat Landscape - How will technology evolve and what does it mean for cyber security? James Hanlon CISSP, CISM Security Strategist Office of the CTO EMEA Future Threat Landscape - How will technology evolve and what does it mean for cyber security? Think > What does the future of technology

More information

CURRICULUM VITAE. Swedish/American (dual citizenships)

CURRICULUM VITAE. Swedish/American (dual citizenships) CURRICULUM VITAE PERSONAL INFORMATION Name NICO DAVIS Address FURALLÉN 34 218 36 BUNKEFLOSTRAND E-mail Nationality SWEDEN nico@davis.se Date of birth 22 OCTOBER 1971 Microsoft Certified Professional ID

More information

foresightconsulting.com.au

foresightconsulting.com.au Mr. James Kavanagh National Security Officer Microsoft Australia Level 4, 6 National Circuit, Barton, ACT 2600 02 March 2015 Microsoft Office 365 IRAP Assessment Letter of Compliance Dear Mr. Kavanagh,

More information

167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College

167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College 167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College Information Security Certificate: Designed to introduce students to programming, security basics, network monitoring,

More information

Managed Secure Infrastructure Service

Managed Secure Infrastructure Service Managed Secure Infrastructure Service A constantly evolving security threat landscape, increased pressure around compliance and the potentially devastating impact of a security breach means that businesses

More information

RE Cloud from Richardson Eyres

RE Cloud from Richardson Eyres RE Cloud from Richardson Eyres Frequently asked Questions What is RE Cloud? RE Cloud is Richardson Eyres cloud computing service delivering virtualised, on demand multi tenant elastic computing resource.

More information