CompTIA Security+ Pre-approved Training for CompTIA Security+ Continuing Education Units (CEUs)
|
|
- Eustacia Muriel Carter
- 8 years ago
- Views:
Transcription
1 CompTIA Security+ Pre-approved Training for CompTIA Security+ Continuing Education Units (CEUs) Note: Approved training courses in this document are subject to change without prior notification. Training submitted based on prior approval will remain valid. Training submitted after the date on this document must meet this documents training requirements. Training approved in this document is based on the CompTIA Security+ - SY0-401 objectives. Activity name to use when uploading CEUs into a certification record: Completed a Training Course Training formats accepted are Classroom-Based, Live Online, Private On-Site and Self-paced e-learning. CEU Required Documentation: The certified professional must upload a certificate of completion into their certification record as proof of attendance. The completion certification must contain the following information: 1. Name of training provider 2. Training course title 3. Name of the certified professional 4. Date the training was completed The course duration hours are to be used when entering CEU hours in a certification record. Please see the training provider course descriptions for durations. If a certified professional cannot provide proof of completion the training cannot be used for CEUs. CEU Activity Guidelines: If renewing a good for life certification the training must have been completed within 90 days prior to enrolling in the Continuing Education (CE) program or within the 3 year CE cycle. If renewing a ce certification, training must be completed within the 3 year CE cycle. To view pre-approved training for CompTIA Security+ CEUs click on any of the certification provider names below Apple Cisco CompTIA CWNP EC-Council GIAC ISACA ISC(2) Juniper Linux Microsoft Novell Red Hat Symantec VMware January 2015 CompTIA Security+ v1 1
2 APPLE MAVERICKS 101: OS X SUPPORT ESSENTIALS 10.9 MOUNTAIN LION 201: MAC OS X SERVER ESSENTIALS V10.8 MAVERICKS 201: OS X SERVER ESSENTIALS 10.9 CISCO INTERCONNECTING CISCO NETWORKING DEVICES PART 1 (ICND1) 1.0 INTERCONNECTING CISCO NETWORKING DEVICES, PART 1 (ICND1) 2.0 INTERCONNECTING CISCO NETWORKING DEVICES, PART 2 (ICND2) 2.0 INTERCONNECTING CISCO NETWORKING DEVICES PART 2 (ICND2) 1.0 INTERCONNECTING CISCO NETWORKING DEVICES: ACCELERATED (CCNAX) 1.0 INTERCONNECTING CISCO NETWORKING DEVICES: ACCELERATED (CCNAX) 2.0 INTRODUCING CISCO DATA CENTER NETWORKING (DCICN) 1.0 INTRODUCING CISCO DATA CENTER TECHNOLOGIES (DCICT) 1.0 IMPLEMENTING CISCO IOS NETWORK SECURITY (IINS) 2.0 IMPLEMENTING CISCO SECURE ACCESS SOLUTIONS (SISAS) 1.0 IMPLEMENTING CISCO EDGE NETWORK SECURITY SOLUTIONS (SENSS) 1.0 IMPLEMENTING CISCO SECURE MOBILITY SOLUTIONS (SIMOS) 1.0 IMPLEMENTING CISCO THREAT CONTROL SOLUTIONS (SITCS) 1.0 IMPLEMENTING CISCO UNIFIED WIRELESS MOBILITY SERVICES (IUWMS) 2.0 COMPTIA CWNP EC-COUNCIL GIAC IMPLEMENTING ADVANCED CISCO UNIFIED WIRELESS SECURITY (IAUWS) 2.0 COMPTIA ADVANCED SECURITY PRACTITIONER (CASP) (CAS-001) COMPTIA MOBILE APP SECURITY+ - IOS EDITION (IOS-001) COMPTIA MOBILE APP SECURITY+ - ANDROID EDITION (ADR-001) COMPTIA MOBILITY+ (MB0-001) COMPTIA SERVER+ (SK0-003) CWTS ENTERPRISE WI-FI FUNDAMENTALS CWNA ENTERPRISE WI-FI ADMINISTRATION CWSP ENTERPRISE WI-FI SECURITY CWDP ENTERPRISE WI-FI DESIGN CWAP ENTERPRISE WI-FI ANALYSIS & TROUBLESHOOTING CERTIFIED ETHICAL HACKER V8 (CEH) EC-COUNCIL CERTIFIED SECURITY ANALYST (ECSA) NETWORK SECURITY ADMINISTRATOR (ENSA) EC-COUNCIL CERTIFIED CHIEF INFORMATION SECURITY OFFICER CCISO ADVANCED NETWORK DEFENSE (CAST 614) HARDENING YOUR ENTERPRISE NETWORK EXPLOITATION CONCEPTS AND METHODS (CAST 618) (BOOTCAMP) NETWORK FORENSICS: IDENTIFYING AND CORRELATING EVENTS (CAST 619) (NETWORK FORENSICS) COMPUTER HACKING FORENSIC INVESTIGATOR (CHFI) CERTIFIED INCIDENT HANDLER (CIH) EC-COUNCIL CERTIFIED SECURE PROGRAMMER.NET (ECSP) CERTIFIED SECURE COMPUTER USER (CSCU) ADVANCED MOBILE HACKING & FORENSICS (CAST 612) ELEVATING MOBILE FORENSICS & INVESTIGATION TO AN ART FORM DIGITAL MEDIA FORENSICS (CAST 621) (BASIC DIGI MEDIA FORENSICS) DIGITAL MEDIA FORENSICS II (CAST 622) (ADVANCED DIGI MEDIA FORENSICS) UNDERSTANDING MACHINE ASSEMBLY LANGUAGE (CAST 623 ) (ASSEMBLY FUNDAMENTALS) PACKET AND TRAFFIC ANALYSIS (CAST 620) (WIRETAP) NETWARS - TOURNAMENT DFIR NETWARS TOURNAMENT HOSTED: EMBEDDED DEVICE SECURITY ASSESSMENTS FOR THE REST OF US HOSTED: (ISC)² CERTIFIED SECURE SOFTWARE LIFECYCLE PROFESSIONAL (CSSLP) CBK EDUCATION PROGRAM January 2015 CompTIA Security+ v1 2
3 HOSTED: OFFENSIVE COUNTERMEASURES: THE ART OF ACTIVE DEFENSES HOSTED: PHYSICAL PENETRATION TESTING - INTRODUCTION AUD507: AUDITING & MONITORING NETWORKS, PERIMETERS & SYSTEMS DEV522: DEFENDING WEB APPLICATIONS SECURITY ESSENTIALS DEV536: SECURE CODING: DEVELOPING DEFENSIBLE APPLICATIONS DEV541: SECURE CODING IN JAVA/JEE: DEVELOPING DEFENSIBLE APPLICATIONS DEV543: SECURE CODING IN C & C++ DEV544: SECURE CODING IN.NET: DEVELOPING DEFENSIBLE APPLICATIONS FOR572: ADVANCED NETWORK FORENSICS AND ANALYSIS MGT414: SANS +S TRAINING PROGRAM FOR THE CISSP CERTIFICATION EXAM MGT415: A PRACTICAL INTRODUCTION TO RISK ASSESSMENT MGT433: SECURING THE HUMAN: HOW TO BUILD, MAINTAIN AND MEASURE A HIGH-IMPACT AWARENESS PROGRAM MGT512: SANS SECURITY LEADERSHIP ESSENTIALS FOR MANAGERS WITH KNOWLEDGE COMPRESSION MGT514: IT SECURITY STRATEGIC PLANNING, POLICY AND LEADERSHIP LEG523: LAW OF DATA SECURITY AND INVESTIGATIONS SEC301: INTRO TO INFORMATION SECURITY SEC401: SECURITY ESSENTIALS BOOTCAMP STYLE SEC440: CRITICAL SECURITY CONTROLS: PLANNING, IMPLEMENTING AND AUDITING SEC480: TOP 4 MITIGATION STRATEGIES: IMPLEMENTING & AUDITING SEC501: ADVANCED SECURITY ESSENTIALS - ENTERPRISE DEFENDER SEC502: PERIMETER PROTECTION IN-DEPTH SEC503: INTRUSION DETECTION IN-DEPTH SEC504: HACKER TOOLS, TECHNIQUES, EXPLOITS AND INCIDENT HANDLING SEC511: CONTINUOUS MONITORING AND SECURITY OPERATIONS SEC524: CLOUD SECURITY FUNDAMENTALS SEC542: WEB APP PENETRATION TESTING AND ETHICAL HACKING SEC546: IPV6 ESSENTIALS SEC560: NETWORK PENETRATION TESTING AND ETHICAL HACKING SEC561: INTENSE HANDS-ON PEN TESTING SKILL DEVELOPMENT (WITH SANS NETWARS) SEC562: CYBERCITY HANDS-ON KINETIC CYBER RANGE EXERCISE SEC566: IMPLEMENTING AND AUDITING THE CRITICAL SECURITY CONTROLS - IN- DEPTH SEC573: PYTHON FOR PENETRATION TESTERS SEC575: MOBILE DEVICE SECURITY AND ETHICAL HACKING SEC579: VIRTUALIZATION AND PRIVATE CLOUD SECURITY SEC580: METASPLOIT KUNG FU FOR ENTERPRISE PEN TESTING SEC617: WIRELESS ETHICAL HACKING, PENETRATION TESTING, AND DEFENSES SEC642: ADVANCED WEB APP PENETRATION TESTING AND ETHICAL HACKING SEC760: ADVANCED EXPLOIT DEVELOPMENT FOR PENETRATION TESTERS SEC506: SECURING LINUX/UNIX SEC505: SECURING WINDOWS WITH THE CRITICAL SECURITY CONTROLS MGT535: INCIDENT RESPONSE TEAM MANAGEMENT MGT405: CRITICAL INFRASTRUCTURE PROTECTION ICS410: ICS/SCADA SECURITY ESSENTIALS FOR408: WINDOWS FORENSIC ANALYSIS FOR508: ADVANCED COMPUTER FORENSIC ANALYSIS AND INCIDENT RESPONSE FOR518: MAC FORENSIC ANALYSIS FOR526: MEMORY FORENSICS IN-DEPTH January 2015 CompTIA Security+ v1 3
4 ISACA ISC(2) JUNIPER WEB APPLICATION SECURITY FOR AUDITORS - SEMINAR THE ESSENTIALS OF CLOUD COMPUTING FOR AUDIT PROFESSIONALS INFORMATION SECURITY MANAGEMENT INFORMATION SECURITY MANAGEMENT (ADVANCED) AUDIT & SECURITY OF FIREWALLS - SEMINAR SECURING & AUDITING MOBILE TECHNOLOGIES - SEMINAR SECURING & AUDITING WIRELESS & MOBILE TECHNOLOGIES - SEMINAR VIRTUALIZATION SECURITY & AUDIT - SEMINAR WINDOWS 8 SECURITY & AUDIT - SEMINAR CLOUD COMPUTING SECURITY & AUDIT - SEMINAR DATABASE SECURITY AND AUDIT - SEMINAR RISK-BASED APPROACH TO IT INFRASTRUCTURE SECURITY & CONTROL ASSESSMENTS IT RISK MANAGEMENT CGEIT EXAM REVIEW CISM EXAM REVIEW CISA EXAM REVIEW CRISC EXAM REVIEW MODULE 1 CISA: THE PROCESS OF AUDITING INFORMATION SYSTEMS MODULE 5 CISA'S ROLE IN PROTECTION OF INFORMATION ASSETS MODULE 2 CISA'S ROLE IN IT GOVERNANCE MODULE 3 CISA'S ROLE IN SYSTEMS AND INFRASTRUCTURE LIFE CYCLE MANAGEMENT MODULE 4 CISA'S ROLE IN IT SERVICE DELIVERY AND SUPPORT COMPLETE CISA ONLINE REVIEW COURSE ALL 5 MODULES (ISC) 2 TRAINING FOR CAP (ISC) 2 TRAINING FOR CISSP (ISC) 2 TRAINING FOR SSCP (ISC) 2 TRAINING FOR CISSP-ISSAP (ISC) 2 TRAINING FOR CISSP-ISSMP (ISC) 2 TRAINING FOR CSSLP (ISC) 2 TRAINING FOR CCFP (ISC) 2 TRAINING FOR HCISPP OWASP TOP 10 (ISC) 2 TRAINING FOR CISSP-ISSEP ACX SERIES UNIVERSAL ACCESS ROUTERS OVERVIEW AND DEPLOYMENT ADVANCED JUNIPER NETWORKS VPN IMPLEMENTATIONS (AJVI) ADVANCED JUNIPER NETWORKS WIRELESS LANS (AJWL) ADVANCED JUNOS ENTERPRISE ROUTING (AJER) ADVANCED JUNOS ENTERPRISE ROUTING TROUBLESHOOTING (AJERT) ADVANCED JUNOS ENTERPRISE SECURITY TROUBLESHOOTING (AJEST) ADVANCED JUNOS ENTERPRISE SWITCHING (AJEX) ADVANCED JUNOS ENTERPRISE SWITCHING TROUBLESHOOTING (AJEXT) ADVANCED JUNOS SECURITY (AJSEC) ATTACK PREVENTION WITH JUNIPER NETWORKS FIREWALLS (APJF) AX411 ACCESS POINT INSTALLATION AND CONFIGURATION BX7000 MULTI-ACCESS GATEWAY INSTALLATION AND INITIAL CONFIGURATION CONFIGURING JUNIPER NETWORKS FIREWALL/IPSEC VPN PRODUCTS (CJFV) CONFIGURING SECURITY THREAT RESPONSE MANAGER (CSTRM) DATA CENTER SWITCHING (DCX) E-SERIES BROADBAND REMOTE ACCESS SERVER CONFIGURATION BASICS (BB) January 2015 CompTIA Security+ v1 4
5 EX2200 AND EX2200-C ETHERNET SWITCHES INSTALLATION AND INITIAL CONFIGURATION EX3200, EX3300, AND EX4200 ETHERNET SWITCHES INSTALLATION AND INITIAL CONFIGURATION EX4500 ETHERNET SWITCH INSTALLATION AND INITIAL CONFIGURATION IC SERIES UNIFIED ACCESS CONTROL APPLIANCE INSTALLATION AND INITIAL CONFIGURATION IMPLEMENTING INTRUSION DETECTION AND PREVENTION PRODUCTS (IIDP) IMPLEMENTING JUNIPER NETWORKS SECURE ANALYTICS (IJSA) JNCIE ENTERPRISE BOOTCAMP (JNCIE-ENT) JNCIE SECURITY BOOTCAMP (JNCIE-SEC) JUNOS EDGE SECURITY SERVICES (JESS) JUNOS ENTERPRISE SWITCHING (JEX) JUNOS ENTERPRISE SWITCHING USING ELS (JEX-ELS) JUNOS INTRUSION PREVENTION SYSTEMS (JIPS) JUNOS MPLS AND VPNS (JMV) JUNOS PULSE MOBILE SECURITY SUITE (PMSS) JUNOS PULSE SECURE ACCESS (JPSA) JUNOS PULSE MOBILE SECURITY SUITE (PMSS) JUNOS PULSE SECURE ACCESS (JPSA) JUNOS SECURITY (JSEC) JUNOS SPACE-NETWORK DIRECTOR (JS-ND) JUNOS SPACE-SECURITY DIRECTOR (JS-SD) NETWORK AND SECURITY MANAGER FUNDAMENTALS (NSMF) STRM SERIES II SECURITY THREAT RESPONSE MANAGER HARDWARE INSTALLATION AND INITIAL CONFIGURATION M10I ROUTER INSTALLATION AND HARDWARE REPLACEMENT LINUX LINUX SECURITY LINUX SYSTEM ADMINISTRATION MICROSOFT SECURITY FUNDAMENTALS: MTA EXAM WINDOWS SERVER 2008 ACTIVE DIRECTORY, CONFIGURING - CONFIGURING AND TROUBLESHOOTING IDENTITY AND ACCESS SOLUTIONS WITH WINDOWS SERVER 2008 ACTIVE DIRECTORY WINDOWS SERVER ADMINISTRATION FUNDAMENTALS: MTA EXAM WINDOWS SERVER 2008, SERVER ADMINISTRATOR - PLANNING AND IMPLEMENTING WINDOWS SERVER 2008 NETWORKING FUNDAMENTALS: MTA EXAM INSTALLING AND CONFIGURING WINDOWS SERVER 2012 ADMINISTERING WINDOWS SERVER 2012 CONFIGURING ADVANCED WINDOWS SERVER 2012 SERVICES WINDOWS SERVER 2008 ACTIVE DIRECTORY, CONFIGURING - CONFIGURING AND TROUBLESHOOTING WINDOWS SERVER 2008 ACTIVE DIRECTORY DOMAIN SERVICES WINDOWS SERVER 2008 NETWORK INFRASTRUCTURE, CONFIGURING - CONFIGURING AND TROUBLESHOOTING A WINDOWS SERVER 2008 NETWORK INFRASTRUCTURE DESIGNING AND IMPLEMENTING A SERVER INFRASTRUCTURE IMPLEMENTING AN ADVANCED SERVER INFRASTRUCTURE OVERVIEW OF ACTIVE DIRECTORY RIGHTS MANAGEMENT SERVICES WITH WINDOWS SERVER 2008 R2 MICROSOFT JUMP START: WINDOWS SERVER 2008 R2, SERVER VIRTUALIZATION January 2015 CompTIA Security+ v1 5
6 UPDATING YOUR WINDOWS SERVER 2003 TECHNOLOGY SKILLS TO WINDOWS SERVER 2008 DEPLOYING WINDOWS SERVER 2008 CONFIGURING, MANAGING AND MAINTAINING WINDOWS SERVER 2008-BASED SERVERS FUNDAMENTALS OF WINDOWS SERVER 2008 CONFIGURING AND TROUBLESHOOTING INTERNET INFORMATION SERVICES IN WINDOWS SERVER 2008 DESIGNING WINDOWS SERVER 2008 NETWORK AND APPLICATIONS INFRASTRUCTURE IMPLEMENTING AND ADMINISTERING WINDOWS SHAREPOINT SERVICES 3.0 IN WINDOWS SERVER 2008 DESIGNING WINDOWS SERVER 2008 ACTIVE DIRECTORY INFRASTRUCTURE AND SERVICES CONFIGURING AND TROUBLESHOOTING WINDOWS SERVER 2008 APPLICATIONS INFRASTRUCTURE OVERVIEW OF ACTIVE DIRECTORY RIGHTS MANAGEMENT SERVICES WITH WINDOWS SERVER 2008 R2 NOVELL ZENWORKS FULL-DISK ENCRYPTION ADMINISTRATION AND TROUBLESHOOTING OPEN ENTERPRISE SERVER 11 ADMINISTRATION RED HAT RED HAT SERVER HARDENING (RH413) SYMANTEC SYMANTEC APP CENTER 4.1 ADMINISTRATION SYMANTEC APP CENTER 4.1.X INSTALLATION AND ADMINISTRATION SYMANTEC SECURITY INFORMATION MANAGER 4.7 VMWARE VMWARE NSX: INSTALL, CONFIGURE, MANAGE [6.0] VMWARE NSX FOR INTERNETWORKING EXPERTS FAST TRACK [V6.0] VSPHERE RESOURCE MANAGEMENT FUNDAMENTALS [V5.X] VSPHERE SECURITY FUNDAMENTALS [V5.X] VCLOUD NETWORKING AND SECURITY FUNDAMENTALS [V5.X] VMWARE MIRAGE: INSTALL, CONFIGURE, MANAGE [V5.0] GETTING STARTED DEVELOPING SECURITY SOLUTIONS WITH EPSEC VMWARE VSPHERE: MANAGE AND DESIGN FOR SECURITY [V4.1] January 2015 CompTIA Security+ v1 6
CompTIA CASP Pre-approved Training for CompTIA CASP Continuing Education Units (CEUs)
CompTIA CASP Pre-approved Training for CompTIA CASP Continuing Education Units (CEUs) Note: Approved training courses in this document are subject to change without prior notification. Training submitted
More informationCompTIA A+ Pre-approved Training for CompTIA A+ Continuing Education Units (CEUs)
CompTIA A+ Pre-approved Training for CompTIA A+ Continuing Education Units (CEUs) Note: Approved training courses in this document are subject to change without prior notification. Training submitted based
More informationLearning Tree Training Pre-approved Training for Continuing Education Units (CEUs)
Learning Tree Training Pre-approved Training for Continuing Education Units (CEUs) Note: Approved training courses in this document are subject to change without prior notification. Training submitted
More informationField of Study Area of Expertise Certification Vendor Course
Field of Study Area of Expertise Certification Vendor Course Advanced Security Certified Information Systems Security Professional (CISSP) ISC2 CISSP Advanced Security CompTIA Advanced Security Practitioner
More informationCourse and Service Portfolio Specialized IT courses for IT professional and organizations willing to take benefit from the competitive advantages
Course and Service Portfolio Specialized IT courses for IT professional and organizations willing to take benefit from the competitive advantages provided by international certifications Cyber & IT Governance
More informationJUNIPER NETWORKS LEARNING PATHS
JUNIPER NETWORKS LEARNING PATHS Revised July 0 Copyright 0 Juniper Networks, Inc. www.juniper.net/training JUNIPER NETWORKS CERTIFICATION PROGRAM FRAMEWORK Network Engineer Support Specialist Product/Technology
More informationPluralsight Training Pre-Approved for CompTIA CEUs
Pluralsight Training Pre-Approved for CompTIA CEUs Note: Approved training courses in this document are subject to change without prior notification. Training submitted based on prior approval will remain
More informationThe following chart indicates the Career Academy courses eligible for transfer credit by challenge exam.
American Business & Technology University currently provides for transfer credit from Career Academy courses completed within the last three years by challenge exam. A student may not transfer more than
More informationBrandman University. School of CCNA
Information Technology Certifications CCNA The Cisco CCNA Training Package (ICND: Parts 1 and 2) includes expert instructor-led training modules with customized presentations, practice exam simulators
More informationFedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov
FedVTE Training Catalog SPRING 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk here or email the
More informationClass Name Retail Price # Days Start Date End Date. Microsoft Microsoft Certification Boot Camps. $4,495 or $4,995 (w/ travel & lodging)
Microsoft Microsoft Certification Boot Camps Class Name Retail Price # Days Start Date End Date MCSA: Windows Server 2012 $4,495 or $4,995 (w/ travel & lodging) 9 7/7/14 7/15/14 Microsoft Database 10775:
More informationSkillsoft Pre-Approved for CompTIA CEUs
Skillsoft Pre-Approved for CompTIA CEUs Note: Approved training courses in this document are subject to change without prior notification. Training submitted based on prior approval will remain valid.
More informationFedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov
FedVTE Training Catalog SUMMER 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please
More informationBoost elearning IT Training INSTRUCTIONAL DESIGN, LEARNING PATHS, AND COURSE CATALOGUE
2016 Boost elearning IT Training INSTRUCTIONAL DESIGN, LEARNING PATHS, AND COURSE CATALOGUE Instructional Design Boost elearning Interactive IT Training Boost elearning's Interactive IT Training provides
More informationAccess FedVTE online at: fedvte.usalearning.gov
FALL 2015 Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk her e or email the Help Desk at support@usalearning.net. To speak with a Help Desk
More informationRenewing CompTIA Certifications With Achieving Other Vendor Certifications
Renewing CompTIA Certifications With Achieving Other Vendor Certifications Overview You may earn Continuing Education Units (CEUs) toward your certification renewal by earning other industry certifications.
More informationDefense Cyber Investigations Training Academy (DCITA) Pre-Approved Training for CompTIA Continuing Education Units (CEUs)
Defense Cyber Investigations Training Academy (DCITA) Pre-Approved Training for CompTIA Continuing Education Units (CEUs) Note: Approved training courses in this document are subject to change without
More informationState of South Carolina InfoSec and Privacy Career Path Model
State of South Carolina InfoSec and Privacy Career Path Model Start Introduction This Career Path Model for the State of South Carolina (State) is designed to help define the various career options available
More informationHackers are here. Where are you?
1 2 What is EC-Council Certified Security Analyst Licensed Penetration Tester Program You are an ethical hacker. Your last name is Pwned. You dream about enumeration and you can scan networks in your sleep.
More informationCybercrime & Cybersecurity: the Ongoing Battle International Hellenic University
Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University Andreas Athanasoulias, CISM, CISSP Information Security Officer & Security Consultant Brief introduction My career path
More informationInformation Security Principles and Practices
Information Security Principles and Practices by Mark Merkow and Jim Breithaupt Chapter 3: Certification Programs and the Common Body of Knowledge Certification & Information Security Industry standards,
More informationSocial Media Security Training and Certifications. Stay Ahead. Get Certified. Ultimate Knowledge Institute. ultimateknowledge.com
Ultimate Knowledge Institute ultimateknowledge.com Social Media Security Training and Certifications Social Media Security Professional (SMSP) Social Media Engineering & Forensics Professional (SMEFP)
More informationTrack 2: Introductory Track PREREQUISITE: BASIC COMPUTER EXPERIENCE
Anne Arundel Community College Tracks Anne Arundel Community College s computer technologies courses have been organized into 10 suggested tracks. The tracks are arranged to ensure that students have the
More informationSchedule Singapore 2015
Schedule Singapore 2015 FAST LANE > TRAINING FROM THE EXPERTS 1 Robinson Road #08-02 AIA Tower Singapore 048542 Tel +65 6338 3133 enquiry@fastlane-asia.com > www.fastlane-asia.com. Subject to modification
More informationEvent Length. Register for Events Online - http://www.etidaho.com/events.php. 10 minutes 1 Each Week 2 hrs 2 hrs 2 hrs 2 hrs 2 hrs.
10051 W. Emerald Street, Boise, Idaho 83704 PHONE: (208) 327-0768 FAX: (208) 327-9589 http://www.etidaho.com ExecuTrain Exclusive Events Tips, Tricks and Answers - Webinar Tips, Tricks and Answers - etip
More information300-208 - Implementing Cisco Secure AccessSolutions Exam
Implementing Cisco Secure Access Solutions Duration: 5 Days Course Code: SISAS Overview: This course has been designed to provide engineers with the foundational knowledge and skills required to implement
More informationIT Networking and Security
elearning Course Outlines IT Networking and Security powered by Calibrate elearning Course Outline CompTIA A+ 801: Fundamentals of Computer Hardware/Software www.medallionlearning.com Fundamentals of Computer
More informationStacey Cumberbatch Commissi oner
Stacey Cumberbatch Commissioner Fall 2015 Information Technology Catalog Cityw ide Training Center FALL 2015 COURSE DESCRIPTIONS AND SCHEDULE IT PROFESSIONAL/CERTIFICATION COURSES DATABASE CERTIFICATION
More informationCiscon koulutustarjonta arkkitehtuureittain 2015
Cisco Enterprise Networks Kurssit Routing & Switching Interconnecting Cisco Network Devices 1 (ICND1) Interconnecting Cisco Network Devices 2 (ICND2) Interconnecting Cisco Network Devices: Accelerated
More informationE M P I R E C O L L E G E
34 E M P I R E C O L L E G E Specialized Associate Degree Information Technology Objective: The Specialized Associate Degree Information Technology program is intended to give the student knowledge of
More informationMicrosoft : 03-2710 0038 : 03-7877 7505 : 04-6435 343 : 07-2268 869. Kuala Lumpur Petaling Jaya Penang Johor Bahru
Kuala Lumpur Petaling Jaya Penang Johor Bahru Website Email : 032710 0038 : 037877 7505 : 046435 343 : 072268 869 : www.iworldtechnology.com : sales@iworldtechnology.com Microsoft MCSA Windows Server 2012
More informationGlobal Knowledge Cybersecurity Training
Cybersecurity Training Your Solution for a Skilled Cyber Workforce Whether it s general cybersecurity awareness, secure network design and implementation, continuous monitoring, network forensics and analysis,
More informationPenetration testing & Ethical Hacking. Security Week 2014
Penetration testing & Ethical Hacking Security Week 2014 Agenda Penetration Testing Vulnerability Scanning Social engineering Security Services offered by Endava 2 3 Who I am Catanoi Maxim Information
More informationJuniper training. www.globalknowledge.net
Juniper training www.globalknowledge.net Authorised Juniper Networks Training 4 5 Junos-based Certification 6 Additional Support Tracks 6 Additional Juniper Certification Tracks 10 Learning Delivery Methods
More informationMicrosoft Technologies
NETWORK ENGINEERING TRACK Microsoft Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS Module 1 - Office Applications This subject enables users to acquire the necessary knowledge and skills to use
More informationEC-Council Certified Security Analyst (ECSA)
EC-Council Certified Security Analyst (ECSA) v8 Eğitim Tipi ve Süresi: 5 Days VILT 5 Day VILT EC-Council Certified Security Analyst (ECSA) v8 Learn penetration testing methodologies while preparing for
More informationHackers are here. Where are you?
1 2 What is EC-Council Certified Security Analyst Licensed Penetration Tester Program You are an ethical hacker. Your last name is Pwned. You dream about enumeration and you can scan networks in your sleep.
More informationIT Technical and Business Applications. Training Catalogue 2011
IT Technical and Business Applications Training Catalogue 2011 IT Technical and Business Applications Training Catalogue 2011 contents page 4 COURSE 7Safe Technical Training Business Applications Management
More information167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College
167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College Information Security Certificate: Designed to introduce students to programming, security basics, network monitoring,
More informationWORK PROCESS SCHEDULE COMPUTER SYSTEMS ANALYST O*NET-SOC CODE: 15-1121.00 RAPIDS CODE: 2017HY. Work Process and Classroom Training Duties and Hours
WORK PROCESS SCHEDULE COMPUTER SYSTEMS ANALYST O*NET-SOC CODE: 5-.00 RAPIDS CODE: 07HY Work Process and Classroom Training Duties and Hours Period General Practices - Foundations On-the- Job Learning Hours
More informationCyber Defense Operations Graduate Certificate
The SANS Technology Institute makes shorter groups of courses available to students who are unable to commit to a full master s degree program. These certificate programs will augment your skills, provide
More informationLINUX / INFORMATION SECURITY
LINUX / INFORMATION SECURITY CERTIFICATE IN LINUX SYSTEM ADMINISTRATION The Linux open source operating system offers a wide range of graphical and command line tools that can be used to implement a high-performance,
More informationSPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles
PNNL-24138 SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles March 2015 LR O Neil TJ Conway DH Tobey FL Greitzer AC Dalton PK Pusey Prepared for the
More information167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College
167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College Information Security Certificate: Designed to introduce students to programming, security basics, network monitoring,
More informationCRYPTOGEDDON: HEALTH CARE COMPROMISE. Todd Dow, CISA, PMP Founder, cryptogeddon.com @toddhdow, toddhdow@gmail.com
CRYPTOGEDDON: HEALTH CARE COMPROMISE Todd Dow, CISA, PMP Founder, cryptogeddon.com @toddhdow, toddhdow@gmail.com WHAT IS CRYPTOGEDDON? An online scavenger hunt using hacker tools Use infosec tools to solve
More informationGlobal Knowledge Cybersecurity Training
Cybersecurity Training Your Solution for a Skilled Cyber Workforce Whether it s general cybersecurity awareness, secure network design and implementation, continuous monitoring, network forensics and analysis,
More informationComputer Networking Technology
degree Computing Studies certificate Degree AS Network Security and Administration Certificate Cisco Network Associate Cisco Network Professional Computer Network Technician Computer Network Administration
More informationMontgomery County Community College Non-Credit Programs Winter/Spring 2016 TECHNOLOGY PROGRAMS
TECHNOLOGY PROGRAMS PROGRAM PAGE A+... 4 CISCO NETWORKING ACADEMY... 2 CITRIX IT ACADEMY... 3 COMPUTER AIDED DRAFTING... 8 COMPUTERIZED ACCOUNTING... 6 COMPUTERS... 5 CYBER SECURITY... 3 MICROSOFT ADMINISTRATION...
More informationCÓDIGO DESCRIPCIÓN LUGAR HORAS Ene Feb Mar Abr. CAT6KS Advanced Cisco Catalyst 6500 Switching Madrid 35-20-24 - -
www.cas-training.com C/ de la Basílica, 19 5º - 28020 Madrid Teléfono: 91 553 61 62 / Fax: 91 598 03 46 e-mail: info@cas-training.com Catálogo 2015 Redes y Comunicaciones Comunicaciones Cisco CAT6KS Advanced
More informationLinux Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS QUARTER 2 NETWORKING AND OPERATING SYSTEMS ESSENTIALS. Module 1 - Office Applications
NETWORK ENGINEERING TRACK Linux Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS Module 1 - Office Applications This subject enables users to acquire the necessary knowledge and skills to use Office
More informationAnalyze. Secure. Defend. Do you hold ECSA credential?
1 Analyze. Secure. Defend. Do you hold ECSA credential? TM E C S A EC-Council Certified Security Analyst 1 EC-Council Cyber Security Professional Path Threat Agent Application of Methodology So You Can
More informationGlobal Knowledge (Thailand) Co.,Ltd. Training Schedule for Jul -Dec 2015
Global Knowledge (Thailand) Co.,Ltd. Training Schedule for Jul -Dec 2015 ASSOCIATE LEVEL CISCO CERTIFIED DESIGN ASSOCIATE (CCDA) Code Days Fees (THB) Jul-15 Aug-15 Sep-15 Oct-15 Nov-15 Dec-15 Designing
More informationFedVTE Course Library
FedVTE Course Library Advanced PCAP Analysis and Signature Dev 1 Hour... 3 Artifact Analysis 1 Hour... 3 Basic Network Traffic Analysis 5 Hours... 3 CCNA Security 34 Hours... 4 Centaur SiLK Traffic Analysis
More informationInformation Technology Cluster
Network Systems Pathway Information Technology Cluster Assistant Network Technician -- This major prepares students to install, configure, operate, and connections to remote sites in a wide area network
More informationCourse Descriptions November 2014
Master of Science In Information Security Management Course Descriptions November 2014 Master of Science in Information Security Management The Master of Science in Information Security Management (MSISM)
More informationCH ENSA EC-Council Network Security Administrator Detailed Course Outline
CH ENSA EC-Council Network Security Administrator Detailed Course Outline Summary Duration Vendor Audience 5 Days hands-on training EC-Council Security Professionals Level Technology Category Advance Ethical
More informationInformation Security solutions that protect your business
Information Security solutions that protect your business We deliver Information Security solutions that stabilize your organization helping you build a strong foundation to prevent potential security
More informationSecurity Architect s.r.l. Via Boccaccio, 6 70010 Casamassima (BA) www.securityarchitect.it tel. 080 671053 fax. 080 4531181
AREA SERVER MASTER MICROSOFT AREA SERVER 40349 98349 3 800,00 40365 98365 3 800,00 MTA IT Infrastructure Microsoft Technology Associate IT Infrastructure 40366 98366 3 800,00 40367 98367 3 800,00 4 600,00
More informationPrograma de Cursos 2013 Cisco
Cisco Routing & Switching Training ICND1 Interconnecting Cisco Network Devices Part 1 5 14 al 18 4 al 8 4 al 8 1 al 5 6 al 10 3 al 7 1 al 5 2 al 6 7 al 11 4 al 8 9 al 13 ICND2 Interconnecting Cisco Network
More informationCourse Venue :- Lab 302, IT Dept., Govt. Polytechnic Mumbai, Bandra (E)
Information Technology Department CEP on CLOUD COMPUTING (Starting from 3 rd Jan 2015) Module No Course No Course Title Duration Fees Module 1 Course 1 RHCSA (Red Hat certified System 3 Weeks Rs. 6000
More informationInformation Security Engineering
Master of Science In Information Security Engineering Course Descriptions November 2014 Master of Science in Information Security Engineering The program of study for the Master of Science in Information
More informationThere are a lot more hot pick courses available at Training Partners now. These courses are confirmed to run in September
There are a lot more hot pick courses available at Training Partners now. These courses are confirmed to run in September Course & code Date 2015 Course Fee (THB) Introducing Cisco Data Center Technologies
More informationDoD Directive (DoDD) 8570 & GIAC Certification
DoD Directive (DoDD) 8570 & GIAC Certification Date Updated: January 2014 National Account Manager 678-714-5712 Director 703-968-0103 What is DoDD 8570? Department of Defense Directive 8570 provides guidance
More informationInformation Systems Security Certificate Program
Information Technologies Programs Information Systems Security Certificate Program Accelerate Your Career extension.uci.edu/infosec University of California, Irvine Extension s professional certificate
More informationIT Networking and Security
elearning Course Outlines IT Networking and Security powered by Calibrate elearning Course Outline CompTIA A+ 801: Fundamentals of Computer Hardware/Software powered by Calibrate www.medallionlearning.com
More informationComputer Forensics and Security Institute
Computer Forensics and Security Institute Course Brochure 2015 www.cfsi.co #3 De Verteuil Terrace, Endeavour Road, Chaguanas, Trinidad, West Indies. Email: info@cfsi.co Tel: 1-868-684-0029 Find us on Facebook:
More informationCISCO LEARNING PARTNER DOMAIN SPECIFIC COURSE LIST
CISCO LEARNING PARTNER DOMAIN SPECIFIC COURSE LIST Routing and Switching 1 Designing Cisco Network Service Architectures (ARCH v2.1) 2 Advanced Routing and Switching for FEs (ARSFE v2.0) 3 Cisco Certified
More informationGuide to information security certifications. SearchSecurity.com's guide to vendor-neutral security certifications
SearchSecurity.com's IT security certifications guide 1 of 18 Check out the other guides in this series: Guide to information security certifications SearchSecurity.com's guide to vendor-neutral security
More informationKnowlogy Class Schedule
Knowlogy Class Schedule 2016 Updated 1/4/2016 Windows Server MS20410: Installing and Configuring Windows Server 2012 5 MS20411: Administering Windows Server 2012 5 MS20412: Configuring Advanced Windows
More informationLogical Operations CyberSec First Responder: Threat Detection and Response (CFR) Exam CFR-110
Logical Operations CyberSec First Responder: Threat Detection and Response (CFR) Exam CFR-110 Exam Information Candidate Eligibility: The CyberSec First Responder: Threat Detection and Response (CFR) exam
More informationRanking Certifications
Cisco Red Hat Certification Cisco Architect (CCAr) Red Hat Architect (RHCA) 8 24 1 150.00 8 10 219.00 8 24 5 30.00 8 10 103.00 Exam Cost: Total cost is $15,000; $3,750 paid at time of initial application
More informationInfoSec Academy Pen Testing & Hacking Track
Fundamental Courses Foundational Courses InfoSec Academy Specialized Courses Advanced Courses Certification Preparation Courses Certified Information Systems Security Professional (CISSP) Texas Security
More informationE-LEARNING BUSINESS COURSES
E-LEARNING Computer Learning Centre offers online education and training for professional certification courses. E-learning courses have an accessability of 30Days BUSINESS COURSES Project Management Project
More informationCertification and Training
Certification and Training CSE 4471: Information Security Instructor: Adam C. Champion Autumn Semester 2013 Based on slides by a former student (CSE 551) Outline Organizational information security personnel
More informationEC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led
EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led Certification: ENSA Exam 312-38 Course Description This course looks at the network security in defensive view.
More informationDiploma in Information Technology Network Integration Specialist COURSE INFO PACK
Registered as a Private Higher Education Institution with the Department of Higher Education and Training in South Africa under the Higher Education Act 1997 Registration Nr. 2001/HE07/005 Diploma in Network
More informationExecuTrain Live Virtual Training Schedule. Sepetember December 2013
ExecuTrain Live Virtual Training Schedule Sepetember December 2013 What is a Live Virtual? Get Live Virtual, Instructor-led room Learning at your desktop or wherever your Internet connection allows you
More informationEC-Council Certified Security Analyst / License Penetration Tester (ECSA/LPT) v4.0 Bootcamp
EC-Council Certified Security Analyst / License Penetration Tester (ECSA/LPT) v4.0 Bootcamp ECSA/LPT is a security class like no other! Providing real world hands on experience, it is the only in-depth
More informationFedVTE Course Library
FedVTE Course Library Advanced PCAP Analysis and Signature Dev 1 Hour... 3 Artifact Analysis 1 Hour... 3 Basic Network Traffic Analysis 5 Hours... 3 CCNA Security 34 Hours... 4 Centaur SiLK Traffic Analysis
More informationRemote Lab Price List
CISCO ROUTING & SWITCHING LABS Hours Days Pods Student/Pod L-ICND1 Interconnecting Cisco Network Devices Part 1 40 5 8 2:1 1.290,- 299,- 108,- n/a n/a L-ICND2 Interconnecting Cisco Network Devices Part
More informationJuniper training. www.globalknowledge.co.uk. Head Office: 01189 123456. Northern Office: 0113 2344747
Juniper training www.globalknowledge.co.uk Authorised Juniper Networks Training 4 5 Junos-based Certification 4 5 Service Provider Courses 4 5 Routing & Switching Courses 4 5 Security Courses 6 Wireless
More informationImplementing Cisco IOS Network Security v2.0 (IINS)
Implementing Cisco IOS Network Security v2.0 (IINS) Course Overview: Implementing Cisco IOS Network Security (IINS) v2.0 is a five-day instructor-led course that is presented by Cisco Learning Partners
More informationNetworking: EC Council Network Security Administrator NSA
coursemonster.com/uk Networking: EC Council Network Security Administrator NSA View training dates» Overview The EC-Council's NSA certification looks at network security from a defensive view. The NSA
More informationNetwork Support. Technical Certificate. Program Outcomes: FOUNDATION COURSES. 1 of 7
1 of 7 Network Support This technical certificate program prepares the student for employment as PC Technician; Computer Support Specialist, and Network Support Technician systems and computer network
More informationDiploma in Information Technology Network Intergration Specialist COURSE INFORMATION PACK
Diploma in Information Technology COURSE INFORMATION PACK REGISTRATION AND ACCREDITATION Prestige Academy (Pty) Ltd is a widely recognized and credible institution. Prestige Academy is registered with
More informationPrograma de Cursos 2013 Cisco
Cisco Routing & Switching Training ICND1 Interconnecting Cisco Network Devices Part 1 5 14 al 18 18 al 22 20 al 24 16 al 20 11 al 15 ICND2 Interconnecting Cisco Network Devices Part 2 5 4 al 8 8 al 12
More informationIT Security Training. Why Security Certification? A Serious Business - Fear Drives the Demand High Demand Freedom to Make and Break Rules
IT Security Training Why Security Certification? A Serious Business - Fear Drives the Demand High Demand Freedom to Make and Break Rules Benefits of Certification Provides Assurance to Employers Certification
More informationCourse Title: Penetration Testing: Security Analysis
Course Title: Penetration Testing: Security Analysis Page 1 of 9 Course Description: The Security Analyst Series from EC-Council Press is comprised of five books covering a broad base of topics in advanced
More informationSecurity Transcends Technology
INTERNATIONAL INFORMATION SYSTEMS SECURITY CERTIFICATION CONSORTIUM, INC. Career Enhancement and Support Strategies for Information Security Professionals Paul Wang, MSc, CISA, CISSP Paul.Wang@ch.pwc.com
More informationFor more information, please contact Anne Arundel Community College s Center for Workforce Solutions at 410-777-2732.
Anne Arundel Community College is an academic partner in the Pathways to Cybersecurity Careers Consortium in the State of Maryland. The Pathways to Cybersecurity Consortium consists of workforce, academic,
More informationCCIE Exam Certification 9781587059803 CCIE Routing and Switching Exam Certification Guide dec-2009
ISBN-13 Title Pub Date Cisco Networking Academy Program CCNA 9781587132179 31 Days Before Your CCENT Certification jan-2008 9781587131974 31 Days Before Your CCNA Certification dec-2008 CCNA Exploration
More informationProfessional Services Overview
Professional Services Overview INFORMATION SECURITY ASSESSMENT AND ADVISORY NETWORK APPLICATION MOBILE CLOUD IOT Praetorian Company Overview HISTORY Founded in 2010 Headquartered in Austin, TX Self-funded
More informationFast Lane México presenta su calendario de cursos:
Communica ons & Services Certification & Recertification CI-CIERS1 Cisco Internetwork Expert Routing & Switching 1 14/05/2012 18/05/2012 CI-CIERS2 Cisco Internetwork Expert Routing & Switching 2 25/06/2012
More informationTechnical Manager / Fortinet Product Owner at Space Data Systems - Jordan (SDS) alzard_m@hotmail.com
Mohammad Al-Zard alzard_m@hotmail.com Summary Hands-on experience in security consultation, measuring possible security vulnerabilities, implementing and customizing distributed IDPS systems. Planning
More informationSecurity Certifications. Presentatie SecCert 101 Jordy Kersten MSc., ISC2 Ass., CEH, OSCP
Security Certifications Presentatie SecCert 101 Jordy Kersten MSc., ISC2 Ass., CEH, OSCP Wie ben ik? Jordy Kersten 26 jaar Communicatie Systemen HAN Arhnem Informatiekunde RU Nijmegen Security Consultant
More informationBUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports
BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports Building a Security Operation Center Agenda: Auditing Your Network Environment Selecting Effective Security
More informationCybersecurity Certificate Programs
Cybersecurity Certificate Programs Maryland Workforce Outlook Forum May 26th, 2016 Homer Minnick, Director, Cybersecurity Academy, UMBC Training Centers umbctraining.com 443-692-6600 About UMBC Training
More informationEC-Council. Certified Ethical Hacker. Program Brochure
EC-Council C Certified E Ethical Hacker Program Brochure Course Description The (CEH) program is the core of the most desired information security training system any information security professional
More informationHardening and Hacking vsphere and Private Cloud Everything you need to know about vsphere Security
Hardening and Hacking vsphere and Private Cloud Everything you need to know about vsphere Security Course Length: 5 days Course Delivery: Traditional Classroom Online Live Course Overview We are well aware
More informationInformation Security and Privacy. Lynn McNulty, CISSP. Advisory Board November 2008
Information Security and Privacy Lynn McNulty, CISSP Advisory Board November 2008 Global leaders in certifying and educating information security professionals with the CISSP and related concentrations,
More information