|
|
- AZ-500: Microsoft Azure Security Technologies (Voucher Included)
-
Fee: $1,995.00
Item Number: 202505CTP482751
Dates: 5/19/2025 - 8/24/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Building:
Room:
Instructor:
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.This course is intended for Azure and Microsoft server security professionals and those who are looking to take and pass the AZ-500: Microsoft Azure Security Technologies exam. Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
Software Requirements:
- PC: Windows 8 or later.
- Mac: macOS 10.6 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
- Microsoft Word Online
- Adobe Acrobat Reader
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment and will be available online. Take the next step towards getting your Azure security certification. In this online training course, you will gain the knowledge and skills needed to implement security controls, maintain the security posture, and identify and remediate vulnerabilities by using a variety of security tools. This course also covers scripting and automation, virtualization, and cloud N-tier architecture while you study for the AZ-500 certification.
By course completion, you will be prepared to sit for the AZ-500: Microsoft Azure Security Technologies Exam. This course offers enrollment with a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.
- Azure AD Identities
- Securing Access
- Securing Application Access
- Access Control
- Network Security
- Azure Security Center
- Azure Containers
- Azure Vulnerability
- Security Operations
- Secure Applications & Data
What you will learn
- Describe specialized data classifications on Azure
- Identify Azure data protection mechanisms
- Implement Azure data encryption methods
- Secure Internet protocols and how to implement them on Azure
- Describe Azure security services and features
How you will benefit
- You will be prepared for the AZ-500: Microsoft Azure Security Technologies Exam
- Grow your IT career and open new job opportunities
Doug Bassett
Doug Bassett is an IT instructor specializing in Microsoft Azure, Server 2016/19, and Exchange messaging. He holds many highly sought-after IT certifications, including Microsoft MCSE, Microsoft MCSA, CompTIA Network+, Cisco CCNA, and Microsoft MCT. In addition to his certifications, Doug has expert knowledge of Microsoft Server 2000, 2003, 2008/2012/2016/2019, Exchange Server and Exchange Online, and Networking structure and applications. As an instructor, Doug is deeply involved in helping his students understand complex concepts and loves to approach teaching a subject from multiple angles.
Take the next step towards getting your Azure security certification. In this online training course, you will gain the knowledge and skills needed to implement security controls, maintain the security posture, and identify and remediate vulnerabilities by using a variety of security tools. This course also covers scripting and automation, virtualization, and cloud N-tier architecture while you study for the AZ-500 certification.
By course completion, you will be prepared to sit for the AZ-500: Microsoft Azure Security Technologies Exam. This course offers enrollment with a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.
|
|
|
- AZ-900 & 500: Microsoft Azure Fundamental & Security Technologies (Vouchers Included)
-
Fee: $3,995.00
Hours: 90
The Microsoft Azure Fundamentals course is intended for entry-level Azure professionals and builds the groundwork needed for you to properly administer and subscribe to Microsoft Azure. From networking and cloud concepts to Azure workloads, cloud security, privacy, and more, you will master the training needed to take your career to the next level. By course completion, you will be prepared to achieve your Microsoft Azure certification.
The Microsoft Azure Security Technologies course will help you gain the knowledge and skills needed to implement security controls, maintain the security posture, and identify and remediate vulnerabilities by using a variety of security tools. This course also covers scripting and automation, virtualization, and cloud N-tier architecture. Upon completion, you will have the fundamental knowledge required of a Microsoft cloud app security professional.
The course will also prepare you to sit for the AZ-900: Microsoft Azure Fundamentals and the AZ-500: Microsoft Azure Security Technologies Exams. This course offers enrollment with vouchers. The vouchers are prepaid access to sit for the certifying exam upon eligibility.
This is a self-paced, on-demand course offered by Ed2Go. Class begins upon registration and completion of Student Enrollment Agreement in Ed2Go. Click on Course Title for complete course description.
|
|
|
- AZ-900 & 500: Microsoft Azure Fundamental & Security Technologies (Vouchers Included)
-
Fee: $3,995.00
Item Number: 202505CTP482781
Dates: 5/19/2025 - 8/24/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Building:
Room:
Instructor:
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.You will learn foundational level knowledge on cloud concepts; core Microsoft Azure services; security, privacy, compliance, and trust; and Azure pricing and support. You will also learn to manage Azure subscriptions and resources, implement and manage storage, deploy and manage virtual machines (VMs), configure and manage virtual networks, and manage identities. Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
Software Requirements:
- PC: Windows 8 or later.
- Mac: macOS 10.6 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
- Microsoft Word Online.
- Adobe Acrobat Reader.
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment and will be available online. The Microsoft Azure Fundamentals course is intended for entry-level Azure professionals and builds the groundwork needed for you to properly administer and subscribe to Microsoft Azure. From networking and cloud concepts to Azure workloads, cloud security, privacy, and more, you will master the training needed to take your career to the next level. By course completion, you will be prepared to achieve your Microsoft Azure certification.
The Microsoft Azure Security Technologies course will help you gain the knowledge and skills needed to implement security controls, maintain the security posture, and identify and remediate vulnerabilities by using a variety of security tools. This course also covers scripting and automation, virtualization, and cloud N-tier architecture. Upon completion, you will have the fundamental knowledge required of a Microsoft cloud app security professional.
The course will also prepare you to sit for the AZ-900: Microsoft Azure Fundamentals and the AZ-500: Microsoft Azure Security Technologies Exams. This course offers enrollment with vouchers. The vouchers are prepaid access to sit for the certifying exam upon eligibility.
- Microsoft Azure Fundamentals
- Using Cloud Services
- Differences between IaaS, PaaS, and SaaS
- Differences Between Public, Private, and Hybrid Clouds
- Core Azure Architecture Components
- Core Products Available and Subscriptions in Azure
- Azure Management and Monitoring Tools
- Securing Network Connectivity in Azure
- Core Azure Identity Services
- Security Tools and Features of Azure
- Azure Governance Methodologies
- Conditional Access
- Using Profiles
- Privacy Standards
- Azure Service Level Agreements (SLAs)
- Mobile Application Management (MDM)
- Windows Defender Tools
- Microsoft Azure Security Technologies
- Azure AD Identities
- Securing Access
- Securing Application Access
- Access Control
- Network Security
- Azure Security Center
- Azure Containers
- Azure Vulnerability
- Security Operations
- Secure Applications & Data
What you will learn
- Concepts of onsite networking
- Cloud and cloud-based networking concepts
- Azure workloads, security, and subscriptions
- Concepts of hybrid networking
- Azure application support
- How to manage and monitor Azure Services
- Describe specialized data classifications on Azure
- Identify Azure data protection mechanisms
- Implement Azure data encryption methods
- Secure Internet protocols and how to implement them on Azure
How you will benefit
- You will be prepared for the AZ-900: Microsoft Azure Fundamentals and AZ-500: Microsoft Azure Security Technologies Exams
- Expand your career opportunities as an IT professional
Will Panek
Will Panek is a worldwide recognized Microsoft instructor and author. Will is a 5-time Microsoft MVP and has published over 30 titles on Microsoft technologies. Will is a passionate and authoritative instructor and makes sure that his students can implement Microsoft technologies and get themselves certified along the way. Outside the class and authorship, you'd be likely to find Will at the forge smithing his latest creation.
Doug Bassett
Doug Bassett is an IT instructor specializing in Microsoft Azure, Server 2016/19, and Exchange messaging. He holds many highly sought-after IT certifications, including Microsoft MCSE, Microsoft MCSA, CompTIA Network+, Cisco CCNA, and Microsoft MCT. In addition to his certifications, Doug has expert knowledge of Microsoft Server 2000, 2003, 2008/2012/2016/2019, Exchange Server and Exchange Online, and Networking structure and applications. As an instructor, Doug is deeply involved in helping his students understand complex concepts and loves to approach teaching a subject from multiple angles.
The Microsoft Azure Fundamentals course is intended for entry-level Azure professionals and builds the groundwork needed for you to properly administer and subscribe to Microsoft Azure. From networking and cloud concepts to Azure workloads, cloud security, privacy, and more, you will master the training needed to take your career to the next level. By course completion, you will be prepared to achieve your Microsoft Azure certification.
The Microsoft Azure Security Technologies course will help you gain the knowledge and skills needed to implement security controls, maintain the security posture, and identify and remediate vulnerabilities by using a variety of security tools. This course also covers scripting and automation, virtualization, and cloud N-tier architecture. Upon completion, you will have the fundamental knowledge required of a Microsoft cloud app security professional.
The course will also prepare you to sit for the AZ-900: Microsoft Azure Fundamentals and the AZ-500: Microsoft Azure Security Technologies Exams. This course offers enrollment with vouchers. The vouchers are prepaid access to sit for the certifying exam upon eligibility.
|
|
|
- Certified Ethical Hacker (Voucher Included)
-
Fee: $2,895.00
Hours: 100
To be successful in beating a hacker, you need to think like one. This ethical hacking certification course immerses you in the hacker mindset and puts you in control with hands-on activities. As a certified ethical hacker (CEH), you use the same techniques as malicious hackers to assess security and identify weaknesses, but for ethical purposes. You will scan, test, hack, and secure your own systems to help prevent potentially catastrophic damage to your organization.
By completing this CEH training, you will learn the industry standards of ethical hacking developed by the EC-Council. This process involves five phases, namely Reconnaissance, Gaining Access, Enumeration, Maintaining Access, and Covering Your Tracks. With these skills, you will be able to assess the security posture of an organization and identify and fix weaknesses before malicious hackers can exploit them.
This unique credential sets you apart from other IT professionals and adds even more value to your organization. According to the EC-Council, one in every two professionals receive promotions after gaining their ethical hacking certification.
Gain advanced hacking tools and techniques while preparing to sit for the Certified Ethical Hacker Exam 312-50 with this accredited CEH course offered by the EC-Council. The exam voucher is included in the cost of your enrollment.
This is a self-paced, on-demand course offered by Ed2Go. Class begins upon registration and completion of Student Enrollment Agreement in Ed2Go. Click on Course Title for complete course description.
|
|
|
- Certified Ethical Hacker (Voucher Included)
-
Fee: $2,895.00
Item Number: 202505CTP481291
Dates: 5/19/2025 - 8/24/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Building:
Room:
Instructor:
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.This online Certified Ethical Hacker (CEH) course will teach you the valuable details that every information security professional needs to know. Requirements:
Hardware Requirements:
- This course can be taken on either a PC or Mac.
Software Requirements:
- PC: Windows 8 or later.
- Mac: macOS 10.10 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
- Adobe Acrobat Reader.
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment and will be available online. The materials are non-refundable upon registration.
- Certified Ethical Hacker, Ethical Hacking and Countermeasures (eBook)
To be successful in beating a hacker, you need to think like one. This ethical hacking certification course immerses you in the hacker mindset and puts you in control with hands-on activities. As a certified ethical hacker (CEH), you use the same techniques as malicious hackers to assess security and identify weaknesses, but for ethical purposes. You will scan, test, hack, and secure your own systems to help prevent potentially catastrophic damage to your organization.
By completing this CEH training, you will learn the industry standards of ethical hacking developed by the EC-Council. This process involves five phases, namely Reconnaissance, Gaining Access, Enumeration, Maintaining Access, and Covering Your Tracks. With these skills, you will be able to assess the security posture of an organization and identify and fix weaknesses before malicious hackers can exploit them.
This unique credential sets you apart from other IT professionals and adds even more value to your organization. According to the EC-Council, one in every two professionals receive promotions after gaining their ethical hacking certification.
Gain advanced hacking tools and techniques while preparing to sit for the Certified Ethical Hacker Exam 312-50 with this accredited CEH course offered by the EC-Council. The exam voucher is included in the cost of your enrollment.
- Introduction to Ethical Hacking
- Foot Printing and Reconnaissance
- Scanning Networks
- Enumeration
- Vulnerability Analysis
- System Hacking
- Malware Threats
- Sniffing
- Social Engineering
- Denial of Service
- Session Hijacking
- Evading IDS, Firewalls and Honeypots
- Hacking Web Servers
- Hacking Web Applications
- SQL Injection
- Hacking Wireless Networks
- Hacking Mobile Platforms
- IoT and OT Hacking
- Cloud Computing
- Cryptography
What you will learn
- Assess ethical and legal requirements for security assessment and penetration testing and develop a compliance strategy
- Analyze the different phases of hacking and determine the most effective ethical hacking strategy for assessing the security of information system components
- Identify vulnerabilities, threats, and attacks to information systems, and recommend countermeasures.
- Evaluate cryptography algorithms and encryption techniques and develop implementation strategies for securing information
- Evaluate network security techniques and tools, and implement appropriate information security controls based on evidence, information, and research
How you will benefit
- Prepare for Certified Ethical Hacker (CEH) Exam Number 312-50 with example CEH exam questions
- Obtain the CEH credential to unlock a number of career opportunities in the information security and cybersecurity industry
- Obtain a credential highly acknowledged and recognized by employers in the public and private sector
- Complete the most advanced, hands on ethical hacking program in the industry
Eric Reed
Eric Reed has over 12 years of experience in IT consulting, specializing in security. Since 2005, he has consulted and delivered custom training to the U.S. military and numerous Fortune 100 and Fortune 500 companies. He has delivered CEH, CHFI, and ECSA/LPT training for the last seven years, with a 95 percent pass rating. Reed was awarded the EC Council Instructor of the Year in 2009 and 2012, as well as the Circle of Excellence in 2006, 2007, and 2010.
To be successful in beating a hacker, you need to think like one. This ethical hacking certification course immerses you in the hacker mindset and puts you in control with hands-on activities. As a certified ethical hacker (CEH), you use the same techniques as malicious hackers to assess security and identify weaknesses, but for ethical purposes. You will scan, test, hack, and secure your own systems to help prevent potentially catastrophic damage to your organization.
By completing this CEH training, you will learn the industry standards of ethical hacking developed by the EC-Council. This process involves five phases, namely Reconnaissance, Gaining Access, Enumeration, Maintaining Access, and Covering Your Tracks. With these skills, you will be able to assess the security posture of an organization and identify and fix weaknesses before malicious hackers can exploit them.
This unique credential sets you apart from other IT professionals and adds even more value to your organization. According to the EC-Council, one in every two professionals receive promotions after gaining their ethical hacking certification.
Gain advanced hacking tools and techniques while preparing to sit for the Certified Ethical Hacker Exam 312-50 with this accredited CEH course offered by the EC-Council. The exam voucher is included in the cost of your enrollment.
|
|
|
- Cisco CCNP Security: SCOR & SISE
-
Fee: $3,295.00
Hours: 80
The CCNP Security: SCOR course provides you with the knowledge to implement and operate core Cisco security technologies. You will learn about common security vulnerabilities, Email Security Appliance (ESA), Web Security Appliance (WSA), Cloud Email Security (CES), mobile device management (MDM), VPN configuration, and more.
The Configuring Cisco Identity Services Engine (SISE) course provides you with the skills and knowledge to deploy and use the Cisco Identity Services Engine (ISE), policy enforcement, profiling services, web authentication and guest access services, BYOD, endpoint compliance services, and TACACS+ device administration. Crucial elements of this course include the ability to use Cisco ISE to gain visibility into what is happening in your network, streamline security policy management, and contribute to operational efficiency.
The course will prepare you to sit for the Cisco CCNP Security Core exam SCOR and the Cisco CCNP Security Concentration exam SISE. These exams in tandem will earn you the CCNP Security certification. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.
This is a self-paced, on-demand course offered by Ed2Go. Class begins upon registration and completion of Student Enrollment Agreement in Ed2Go. Click on Course Title for complete course description.
|
|
|
- Cisco CCNP Security: SCOR & SISE
-
Fee: $3,295.00
Item Number: 202505CTP482651
Dates: 5/19/2025 - 8/24/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Building:
Room:
Instructor:
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.This course is intended for network security engineers and those looking to attain their CCNP Security certification. Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
Software Requirements:
- PC: Windows 8 or later.
- Mac: macOS 10.6 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
- Microsoft Word Online
- Adobe Acrobat Reader
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment and will be available online. The CCNP Security: SCOR course provides you with the knowledge to implement and operate core Cisco security technologies. You will learn about common security vulnerabilities, Email Security Appliance (ESA), Web Security Appliance (WSA), Cloud Email Security (CES), mobile device management (MDM), VPN configuration, and more.
The Configuring Cisco Identity Services Engine (SISE) course provides you with the skills and knowledge to deploy and use the Cisco Identity Services Engine (ISE), policy enforcement, profiling services, web authentication and guest access services, BYOD, endpoint compliance services, and TACACS+ device administration. Crucial elements of this course include the ability to use Cisco ISE to gain visibility into what is happening in your network, streamline security policy management, and contribute to operational efficiency.
The course will prepare you to sit for the Cisco CCNP Security Core exam SCOR and the Cisco CCNP Security Concentration exam SISE. These exams in tandem will earn you the CCNP Security certification. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.
- Security Foundations
- Attacks against on-premises and cloud resources
- Common security vulnerabilities
- Cryptography concepts and applications
- Managing Cisco security devices via application programming interfaces (APIs)
- Implementing Security
- Security in common cloud environments
- Division of responsibility (shared responsibility model)
- DevSecOps, continuous integration, and orchestration
- Cloud Concepts and Security
- Configuring and Verifying VLANs
- Configuring and Verifying Trunks
- VLAN Trunking Protocol (VTP)
- STP Overview and Algorithm Deep Dive
- STP Convergence, Configuration and Manipulation
- STP PortFast, and BPDU Guard
- Multiple Spanning Tree Protocol (MSTP)
- EtherChannels
- Inter-VLAN Routing
- First-Hop Redundancy Protocol (FHRP)
- Application-Specific Security Tools
- Email Security Appliance (ESA)
- Web Security Appliance (WSA)
- Cloud Email Security (CES)
- Securing DNS with Cisco Umbrella
- Securing Endpoints
- Antimalware concepts
- Mobile device management (MDM)
- Multifactor authentication (MFA)
- Network access control
- Patch management
- Network Access Control and Visibility
- 802.1x, WebAuth, and MAB
- Network visibility and evasion techniques
- Cisco network analytics technologies
- Introducing Cisco ISE Architecture and Deployment
- Using Cisco ISE as a Network Access Policy Engine
- Cisco ISE Use Cases
- Describing Cisco ISE Functions
- Cisco ISE Deployment Models
- Context Visibility
- Cisco ISE Policy Enforcement
- Using 802.1X for Wired and Wireless Access
- Using MAC Authentication Bypass for Wired and Wireless Access
- Introducing Identity Management
- Configuring Certificate Services
- Introducing Cisco ISE Policy
- Implementing Third-Party Network Access Device Support
- Introducing Cisco TrustSec
- Cisco TrustSec Configuration
- Easy Connect
- Web Authentication and Guest Services
- Introducing Web Access with Cisco ISE
- Introducing Guest Access Components
- Configuring Guest Access Settings
- Configuring Sponsor and Guest Portals
- Cisco ISE Profiler
- Introducing Cisco ISE Profiler
- Profiling Deployment and Best Practices
- Cisco ISE BYOD
- Introducing the Cisco ISE BYOD Process
- Describing BYOD Flow
- Configuring the My Devices Portal
- Configuring Certificates in BYOD Scenarios
- Cisco ISE Endpoint Compliance Services
- Introducing Endpoint Compliance Services
- Configuring Client Posture Services and Provisioning in Cisco ISE
- Working with Network Access Devices
- Review TACACS+
- Cisco ISE TACACS+ Device Administration
- Configure TACACS+ Device Administration
- TACACS+ Device Administration Guidelines and Best Practices
- Migrating from Cisco ACS to Cisco ISE
What you will learn
SCOR
- Cisco security devices via an API
- Layer 2 and Layer 3+ security
- VPNs
- Cloud security concepts
- Email Security Appliance (ESA)
- Web Security Appliance (WSA)
- Cloud Email Security (CES)
- DNS with Cisco Umbrella
- Mobile device management (MDM)
- Multifactor authentication (MFA)
SISE
- Describe Cisco ISE deployments, including core deployment components and how they interact to create a cohesive security architecture
- Describe the advantages of such a deployment and how each Cisco ISE capability contributes to these advantages
- Describe concepts and configure components related to 802.1X and MAC Authentication Bypass (MAB) authentication, identity management, and certificate services
- Describe how Cisco ISE policy sets are used to implement authentication and authorization and how to leverage this capability to meet the needs of your organization
- Describe third-party Network Access Devices (NADs), Cisco TrustSec®, and Easy Connect
- Describe and configure web authentication, processes, operation, and guest services, including guest access components and various guest access scenarios
- Describe and configure Cisco ISE profiling services and understand how to monitor these services to enhance your situational awareness about network-connected endpoints
- Describe best practices for deploying this profiler service in your specific environment
- Describe BYOD challenges, solutions, processes, and portalsConfigure a BYOD solution and describe the relationship between BYOD processes and their related configuration components
- Describe and configure various certificates related to a BYOD solution
- Describe the value of the My Devices portal and how to configure this portal
- Describe endpoint compliance, compliance components, posture agents, posture deployment and licensing, and the posture service in Cisco ISE
- Describe and configure TACACS+ device administration using Cisco ISE, including command sets, profiles, and policy sets
- Understand the role of TACACS+ within the Authentication, Authentication, and Accounting (AAA) framework and the differences between the RADIUS and TACACS+ protocols
- Migrate TACACS+ functionality from Cisco Secure Access Control System (ACS) to Cisco ISE, using a migration tool
How you will benefit
- You will be prepared to sit for the Cisco CCNP Security core exam: 350-701 SCOR: Implementing and Operating Cisco Security Core Technologies
- You will be prepared to sit for the Cisco CCNP Security concentration exam: 300-715 SISE: Implementing and Configuring Cisco Identity Services Engine
Shane Sexton
Shane Sexton is a cybersecurity-focused instructor with a hunger for using technology to combat real-world challenges. He holds many professional IT certifications such as Citrix CCA, CompTIA A+, CompTIA Security+, CompTIA Linux+, CompTIA CySA+, ITIL Foundations, Cisco CCNA, AWS SysOps, and Cisco CCNP Security. Shane's extensive professional expertise includes Citrix Virtualization, Citrix Virtualization, Computer Hardware support, Cisco networking, Cybersecurity Blue Team, Cybersecurity Red Team, Cisco security, Amazon AWS, and ITIL. Inside the classroom, Shane makes the complicated seem approachable. Outside the classroom, Shane is a mad scientist with automation, coding, and scripting, tying them back to technologies he teaches in class. If he isn't watching the latest SpaceX launch, he can usually be found tinkering with something.
Doug Bassett
Doug Bassett is an IT instructor specializing in Microsoft Azure, Server 2016/19, and Exchange messaging. He holds many highly sought-after IT certifications, including Microsoft MCSE, Microsoft MCSA, CompTIA Network+, Cisco CCNA, and Microsoft MCT. In addition to his certifications, Doug has expert knowledge of Microsoft Server 2000, 2003, 2008/2012/2016/2019, Exchange Server and Exchange Online, and Networking structure and applications. As an instructor, Doug is deeply involved in helping his students understand complex concepts and loves to approach teaching a subject from multiple angles.
The CCNP Security: SCOR course provides you with the knowledge to implement and operate core Cisco security technologies. You will learn about common security vulnerabilities, Email Security Appliance (ESA), Web Security Appliance (WSA), Cloud Email Security (CES), mobile device management (MDM), VPN configuration, and more.
The Configuring Cisco Identity Services Engine (SISE) course provides you with the skills and knowledge to deploy and use the Cisco Identity Services Engine (ISE), policy enforcement, profiling services, web authentication and guest access services, BYOD, endpoint compliance services, and TACACS+ device administration. Crucial elements of this course include the ability to use Cisco ISE to gain visibility into what is happening in your network, streamline security policy management, and contribute to operational efficiency.
The course will prepare you to sit for the Cisco CCNP Security Core exam SCOR and the Cisco CCNP Security Concentration exam SISE. These exams in tandem will earn you the CCNP Security certification. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.
|
|
|
- Cisco CCNP Security: SCOR & SISE (Vouchers Included)
-
Fee: $3,995.00
Hours: 80
The CCNP Security: SCOR course provides you with the knowledge to implement and operate core Cisco security technologies. You will learn about common security vulnerabilities, Email Security Appliance (ESA), Web Security Appliance (WSA), Cloud Email Security (CES), mobile device management (MDM), VPN configuration, and more.
The Configuring Cisco Identity Services Engine (SISE) course provides you with the skills and knowledge to deploy and use the Cisco Identity Services Engine (ISE), policy enforcement, profiling services, web authentication and guest access services, BYOD, endpoint compliance services, and TACACS+ device administration. Crucial elements of this course include the ability to use Cisco ISE to gain visibility into what is happening in your network, streamline security policy management, and contribute to operational efficiency.
The course will prepare you to sit for the Cisco CCNP Security Core exam SCOR and the Cisco CCNP Security Concentration exam SISE. These exams in tandem will earn you the CCNP Security certification. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.
This is a self-paced, on-demand course offered by Ed2Go. Class begins upon registration and completion of Student Enrollment Agreement in Ed2Go. Click on Course Title for complete course description.
|
|
|
- Cisco CCNP Security: SCOR & SISE (Vouchers Included)
-
Fee: $3,995.00
Item Number: 202505CTP482661
Dates: 5/19/2025 - 8/24/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Building:
Room:
Instructor:
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.This course is intended for network security engineers and those looking to attain their CCNP Security certification. Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
Software Requirements:
- PC: Windows 8 or later.
- Mac: macOS 10.6 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
- Microsoft Word Online
- Adobe Acrobat Reader
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment and will be available online. The CCNP Security: SCOR course provides you with the knowledge to implement and operate core Cisco security technologies. You will learn about common security vulnerabilities, Email Security Appliance (ESA), Web Security Appliance (WSA), Cloud Email Security (CES), mobile device management (MDM), VPN configuration, and more.
The Configuring Cisco Identity Services Engine (SISE) course provides you with the skills and knowledge to deploy and use the Cisco Identity Services Engine (ISE), policy enforcement, profiling services, web authentication and guest access services, BYOD, endpoint compliance services, and TACACS+ device administration. Crucial elements of this course include the ability to use Cisco ISE to gain visibility into what is happening in your network, streamline security policy management, and contribute to operational efficiency.
The course will prepare you to sit for the Cisco CCNP Security Core exam SCOR and the Cisco CCNP Security Concentration exam SISE. These exams in tandem will earn you the CCNP Security certification. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.
- Security Foundations
- Attacks against on-premises and cloud resources
- Common security vulnerabilities
- Cryptography concepts and applications
- Managing Cisco security devices via application programming interfaces (APIs)
- Implementing Security
- Security in common cloud environments
- Division of responsibility (shared responsibility model)
- DevSecOps, continuous integration, and orchestration
- Cloud Concepts and Security
- Configuring and Verifying VLANs
- Configuring and Verifying Trunks
- VLAN Trunking Protocol (VTP)
- STP Overview and Algorithm Deep Dive
- STP Convergence, Configuration and Manipulation
- STP PortFast, and BPDU Guard
- Multiple Spanning Tree Protocol (MSTP)
- EtherChannels
- Inter-VLAN Routing
- First-Hop Redundancy Protocol (FHRP)
- Application-Specific Security Tools
- Email Security Appliance (ESA)
- Web Security Appliance (WSA)
- Cloud Email Security (CES)
- Securing DNS with Cisco Umbrella
- Securing Endpoints
- Antimalware concepts
- Mobile device management (MDM)
- Multifactor authentication (MFA)
- Network access control
- Patch management
- Network Access Control and Visibility
- 802.1x, WebAuth, and MAB
- Network visibility and evasion techniques
- Cisco network analytics technologies
- Introducing Cisco ISE Architecture and Deployment
- Using Cisco ISE as a Network Access Policy Engine
- Cisco ISE Use Cases
- Describing Cisco ISE Functions
- Cisco ISE Deployment Models
- Context Visibility
- Cisco ISE Policy Enforcement
- Using 802.1X for Wired and Wireless Access
- Using MAC Authentication Bypass for Wired and Wireless Access
- Introducing Identity Management
- Configuring Certificate Services
- Introducing Cisco ISE Policy
- Implementing Third-Party Network Access Device Support
- Introducing Cisco TrustSec
- Cisco TrustSec Configuration
- Easy Connect
- Web Authentication and Guest Services
- Introducing Web Access with Cisco ISE
- Introducing Guest Access Components
- Configuring Guest Access Settings
- Configuring Sponsor and Guest Portals
- Cisco ISE Profiler
- Introducing Cisco ISE Profiler
- Profiling Deployment and Best Practices
- Cisco ISE BYOD
- Introducing the Cisco ISE BYOD Process
- Describing BYOD Flow
- Configuring the My Devices Portal
- Configuring Certificates in BYOD Scenarios
- Cisco ISE Endpoint Compliance Services
- Introducing Endpoint Compliance Services
- Configuring Client Posture Services and Provisioning in Cisco ISE
- Working with Network Access Devices
- Review TACACS+
- Cisco ISE TACACS+ Device Administration
- Configure TACACS+ Device Administration
- TACACS+ Device Administration Guidelines and Best Practices
- Migrating from Cisco ACS to Cisco ISE
What you will learn
SCOR
- Cisco security devices via an API
- Layer 2 and Layer 3+ security
- VPNs
- Cloud security concepts
- Email Security Appliance (ESA)
- Web Security Appliance (WSA)
- Cloud Email Security (CES)
- DNS with Cisco Umbrella
- Mobile device management (MDM)
- Multifactor authentication (MFA)
SISE
- Describe Cisco ISE deployments, including core deployment components and how they interact to create a cohesive security architecture
- Describe the advantages of such a deployment and how each Cisco ISE capability contributes to these advantages
- Describe concepts and configure components related to 802.1X and MAC Authentication Bypass (MAB) authentication, identity management, and certificate services
- Describe how Cisco ISE policy sets are used to implement authentication and authorization and how to leverage this capability to meet the needs of your organization
- Describe third-party Network Access Devices (NADs), Cisco TrustSec®, and Easy Connect
- Describe and configure web authentication, processes, operation, and guest services, including guest access components and various guest access scenarios
- Describe and configure Cisco ISE profiling services and understand how to monitor these services to enhance your situational awareness about network-connected endpoints
- Describe best practices for deploying this profiler service in your specific environment
- Describe BYOD challenges, solutions, processes, and portalsConfigure a BYOD solution and describe the relationship between BYOD processes and their related configuration components
- Describe and configure various certificates related to a BYOD solution
- Describe the value of the My Devices portal and how to configure this portal
- Describe endpoint compliance, compliance components, posture agents, posture deployment and licensing, and the posture service in Cisco ISE
- Describe and configure TACACS+ device administration using Cisco ISE, including command sets, profiles, and policy sets
- Understand the role of TACACS+ within the Authentication, Authentication, and Accounting (AAA) framework and the differences between the RADIUS and TACACS+ protocols
- Migrate TACACS+ functionality from Cisco Secure Access Control System (ACS) to Cisco ISE, using a migration tool
How you will benefit
- You will be prepared to sit for the Cisco CCNP Security core exam: 350-701 SCOR: Implementing and Operating Cisco Security Core Technologies
- You will be prepared to sit for the Cisco CCNP Security concentration exam: 300-715 SISE: Implementing and Configuring Cisco Identity Services Engine
Shane Sexton
Shane Sexton is a cybersecurity-focused instructor with a hunger for using technology to combat real-world challenges. He holds many professional IT certifications such as Citrix CCA, CompTIA A+, CompTIA Security+, CompTIA Linux+, CompTIA CySA+, ITIL Foundations, Cisco CCNA, AWS SysOps, and Cisco CCNP Security. Shane's extensive professional expertise includes Citrix Virtualization, Citrix Virtualization, Computer Hardware support, Cisco networking, Cybersecurity Blue Team, Cybersecurity Red Team, Cisco security, Amazon AWS, and ITIL. Inside the classroom, Shane makes the complicated seem approachable. Outside the classroom, Shane is a mad scientist with automation, coding, and scripting, tying them back to technologies he teaches in class. If he isn't watching the latest SpaceX launch, he can usually be found tinkering with something.
Doug Bassett
Doug Bassett is an IT instructor specializing in Microsoft Azure, Server 2016/19, and Exchange messaging. He holds many highly sought-after IT certifications, including Microsoft MCSE, Microsoft MCSA, CompTIA Network+, Cisco CCNA, and Microsoft MCT. In addition to his certifications, Doug has expert knowledge of Microsoft Server 2000, 2003, 2008/2012/2016/2019, Exchange Server and Exchange Online, and Networking structure and applications. As an instructor, Doug is deeply involved in helping his students understand complex concepts and loves to approach teaching a subject from multiple angles.
The CCNP Security: SCOR course provides you with the knowledge to implement and operate core Cisco security technologies. You will learn about common security vulnerabilities, Email Security Appliance (ESA), Web Security Appliance (WSA), Cloud Email Security (CES), mobile device management (MDM), VPN configuration, and more.
The Configuring Cisco Identity Services Engine (SISE) course provides you with the skills and knowledge to deploy and use the Cisco Identity Services Engine (ISE), policy enforcement, profiling services, web authentication and guest access services, BYOD, endpoint compliance services, and TACACS+ device administration. Crucial elements of this course include the ability to use Cisco ISE to gain visibility into what is happening in your network, streamline security policy management, and contribute to operational efficiency.
The course will prepare you to sit for the Cisco CCNP Security Core exam SCOR and the Cisco CCNP Security Concentration exam SISE. These exams in tandem will earn you the CCNP Security certification. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.
|
|
|
- Cisco CCNP Security: SCOR & SVPN
-
Fee: $3,295.00
Hours: 70
The CCNP Security: SCOR course provides you with the knowledge to implement and operate core Cisco security technologies. You will learn about common security vulnerabilities, Email Security Appliance (ESA), Web Security Appliance (WSA), Cloud Email Security (CES), mobile device management (MDM), VPN configuration, and more.
The Implementing Secure Solutions with Virtual Private Networks (SVPN) course focuses on implementing secure remote communications with Virtual Private Network (VPN) solutions, including secure communications, architectures, and troubleshooting on Cisco ASAs and Cisco IOS Routers.
The course will prepare you to sit for the Cisco CCNP Security Core exam SCOR and the Cisco CCNP Security Concentration exam SVPN. These exams in tandem will earn you the CCNP Security certification. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.
This is a self-paced, on-demand course offered by Ed2Go. Class begins upon registration and completion of Student Enrollment Agreement in Ed2Go. Click on Course Title for complete course description.
|
|
|
- Cisco CCNP Security: SCOR & SVPN
-
Fee: $3,295.00
Item Number: 202505CTP482671
Dates: 5/19/2025 - 8/24/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Building:
Room:
Instructor:
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.This course is intended for network security engineers and those looking to attain their CCNP Security certification. Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
Software Requirements:
- PC: Windows 8 or later.
- Mac: macOS 10.6 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
- Microsoft Word Online
- Adobe Acrobat Reader
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment and will be available online. The CCNP Security: SCOR course provides you with the knowledge to implement and operate core Cisco security technologies. You will learn about common security vulnerabilities, Email Security Appliance (ESA), Web Security Appliance (WSA), Cloud Email Security (CES), mobile device management (MDM), VPN configuration, and more.
The Implementing Secure Solutions with Virtual Private Networks (SVPN) course focuses on implementing secure remote communications with Virtual Private Network (VPN) solutions, including secure communications, architectures, and troubleshooting on Cisco ASAs and Cisco IOS Routers.
The course will prepare you to sit for the Cisco CCNP Security Core exam SCOR and the Cisco CCNP Security Concentration exam SVPN. These exams in tandem will earn you the CCNP Security certification. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.
- Security Foundations
- Attacks against on-premises and cloud resources
- Common security vulnerabilities
- Cryptography concepts and applications
- Managing Cisco security devices via application programming interfaces (APIs)
- Implementing Security
- Security in common cloud environments
- Division of responsibility (shared responsibility model)
- DevSecOps, continuous integration, and orchestration
- Cloud Concepts and Security
- Configuring and Verifying VLANs
- Configuring and Verifying Trunks
- VLAN Trunking Protocol (VTP)
- STP Overview and Algorithm Deep Dive
- STP Convergence, Configuration and Manipulation
- STP PortFast, and BPDU Guard
- Multiple Spanning Tree Protocol (MSTP)
- EtherChannels
- Inter-VLAN Routing
- First-Hop Redundancy Protocol (FHRP)
- Application-Specific Security Tools
- Email Security Appliance (ESA)
- Web Security Appliance (WSA)
- Cloud Email Security (CES)
- Securing DNS with Cisco Umbrella
- Securing Endpoints
- Antimalware concepts
- Mobile device management (MDM)
- Multifactor authentication (MFA)
- Network access control
- Patch management
- Network Access Control and Visibility
- 802.1x, WebAuth, and MAB
- Network visibility and evasion techniques
- Cisco network analytics technologies
- Introduction to VPN Technologies
- Site-to-site and remote access VPNs
- Cryptography concepts
- Public Key Infrastructure (PKI)
- IPsec Concepts
- IKEv1 and IKEv2
- AH and ESP
- VPN Configuration
- Traditional crypto map IPsec configuration
- VTI configuration
- Configuring and troubleshooting DMVPN
- Deploying and troubleshooting FlexVPN
- Remote Access VPN Configuration
- SSL concepts
- Clientless AnyConnect deployments
- Client-based AnyConnect deployments
- Extended functionality with plugins
- Local, remote, and two-factor authentication
- Host scan and posture assessment
- AnyConnect troubleshooting
What you will learn
SCOR
- Cisco security devices via an API
- Layer 2 and Layer 3+ security
- VPNs
- Cloud security concepts
- Email Security Appliance (ESA)
- Web Security Appliance (WSA)
- Cloud Email Security (CES)
- DNS with Cisco Umbrella
- Mobile device management (MDM)
- Multifactor authentication (MFA)
SVPN
- Implement secure remote communications with Virtual Private Network (VPN) solutions including secure communications, architectures, and troubleshooting
- Implementing Site to Site IPsec VPN on Routers & ASA
- Implementing FlexVPN with IKEv2 on Cisco Routers
- Implementing DMVPN on Cisco Routers
- Implementing Cisco AnyConnect
How you will benefit
- You will be prepared to sit for the Cisco CCNP Security core exam: 350-701 SCOR: Implementing and Operating Cisco Security Core Technologies
- You will be prepared to sit for the Cisco CCNP Security concentration exam: 300-730 SVPN: Implementing Secure Solutions with Virtual Private Networks
Shane Sexton
Shane Sexton is a cybersecurity-focused instructor with a hunger for using technology to combat real-world challenges. He holds many professional IT certifications such as Citrix CCA, CompTIA A+, CompTIA Security+, CompTIA Linux+, CompTIA CySA+, ITIL Foundations, Cisco CCNA, AWS SysOps, and Cisco CCNP Security. Shane's extensive professional expertise includes Citrix Virtualization, Citrix Virtualization, Computer Hardware support, Cisco networking, Cybersecurity Blue Team, Cybersecurity Red Team, Cisco security, Amazon AWS, and ITIL. Inside the classroom, Shane makes the complicated seem approachable. Outside the classroom, Shane is a mad scientist with automation, coding, and scripting, tying them back to technologies he teaches in class. If he isn't watching the latest SpaceX launch, he can usually be found tinkering with something.
The CCNP Security: SCOR course provides you with the knowledge to implement and operate core Cisco security technologies. You will learn about common security vulnerabilities, Email Security Appliance (ESA), Web Security Appliance (WSA), Cloud Email Security (CES), mobile device management (MDM), VPN configuration, and more.
The Implementing Secure Solutions with Virtual Private Networks (SVPN) course focuses on implementing secure remote communications with Virtual Private Network (VPN) solutions, including secure communications, architectures, and troubleshooting on Cisco ASAs and Cisco IOS Routers.
The course will prepare you to sit for the Cisco CCNP Security Core exam SCOR and the Cisco CCNP Security Concentration exam SVPN. These exams in tandem will earn you the CCNP Security certification. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.
|
|
|
- Cisco CCNP Security: SCOR & SVPN (Vouchers Included)
-
Fee: $3,995.00
Hours: 70
The CCNP Security: SCOR course provides you with the knowledge to implement and operate core Cisco security technologies. You will learn about common security vulnerabilities, Email Security Appliance (ESA), Web Security Appliance (WSA), Cloud Email Security (CES), mobile device management (MDM), VPN configuration, and more.
The Implementing Secure Solutions with Virtual Private Networks (SVPN) course focuses on implementing secure remote communications with Virtual Private Network (VPN) solutions, including secure communications, architectures, and troubleshooting on Cisco ASAs and Cisco IOS Routers.
The course will prepare you to sit for the Cisco CCNP Security Core exam SCOR and the Cisco CCNP Security Concentration exam SVPN. These exams in tandem will earn you the CCNP Security certification. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.
This is a self-paced, on-demand course offered by Ed2Go. Class begins upon registration and completion of Student Enrollment Agreement in Ed2Go. Click on Course Title for complete course description.
|
|
|
- Cisco CCNP Security: SCOR & SVPN (Vouchers Included)
-
Fee: $3,995.00
Item Number: 202505CTP482681
Dates: 5/19/2025 - 8/24/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Building:
Room:
Instructor:
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.This course is intended for network security engineers and those looking to attain their CCNP Security certification. Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
Software Requirements:
- PC: Windows 8 or later.
- Mac: macOS 10.6 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
- Microsoft Word Online
- Adobe Acrobat Reader
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment and will be available online. The CCNP Security: SCOR course provides you with the knowledge to implement and operate core Cisco security technologies. You will learn about common security vulnerabilities, Email Security Appliance (ESA), Web Security Appliance (WSA), Cloud Email Security (CES), mobile device management (MDM), VPN configuration, and more.
The Implementing Secure Solutions with Virtual Private Networks (SVPN) course focuses on implementing secure remote communications with Virtual Private Network (VPN) solutions, including secure communications, architectures, and troubleshooting on Cisco ASAs and Cisco IOS Routers.
The course will prepare you to sit for the Cisco CCNP Security Core exam SCOR and the Cisco CCNP Security Concentration exam SVPN. These exams in tandem will earn you the CCNP Security certification. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.
- Security Foundations
- Attacks against on-premises and cloud resources
- Common security vulnerabilities
- Cryptography concepts and applications
- Managing Cisco security devices via application programming interfaces (APIs)
- Implementing Security
- Security in common cloud environments
- Division of responsibility (shared responsibility model)
- DevSecOps, continuous integration, and orchestration
- Cloud Concepts and Security
- Configuring and Verifying VLANs
- Configuring and Verifying Trunks
- VLAN Trunking Protocol (VTP)
- STP Overview and Algorithm Deep Dive
- STP Convergence, Configuration and Manipulation
- STP PortFast, and BPDU Guard
- Multiple Spanning Tree Protocol (MSTP)
- EtherChannels
- Inter-VLAN Routing
- First-Hop Redundancy Protocol (FHRP)
- Application-Specific Security Tools
- Email Security Appliance (ESA)
- Web Security Appliance (WSA)
- Cloud Email Security (CES)
- Securing DNS with Cisco Umbrella
- Securing Endpoints
- Antimalware concepts
- Mobile device management (MDM)
- Multifactor authentication (MFA)
- Network access control
- Patch management
- Network Access Control and Visibility
- 802.1x, WebAuth, and MAB
- Network visibility and evasion techniques
- Cisco network analytics technologies
- Introduction to VPN Technologies
- Site-to-site and remote access VPNs
- Cryptography concepts
- Public Key Infrastructure (PKI)
- IPsec Concepts
- IKEv1 and IKEv2
- AH and ESP
- VPN Configuration
- Traditional crypto map IPsec configuration
- VTI configuration
- Configuring and troubleshooting DMVPN
- Deploying and troubleshooting FlexVPN
- Remote Access VPN Configuration
- SSL concepts
- Clientless AnyConnect deployments
- Client-based AnyConnect deployments
- Extended functionality with plugins
- Local, remote, and two-factor authentication
- Host scan and posture assessment
- AnyConnect troubleshooting
What you will learn
SCOR
- Cisco security devices via an API
- Layer 2 and Layer 3+ security
- VPNs
- Cloud security concepts
- Email Security Appliance (ESA)
- Web Security Appliance (WSA)
- Cloud Email Security (CES)
- DNS with Cisco Umbrella
- Mobile device management (MDM)
- Multifactor authentication (MFA)
SVPN
- Implement secure remote communications with Virtual Private Network (VPN) solutions including secure communications, architectures, and troubleshooting
- Implementing Site to Site IPsec VPN on Routers & ASA
- Implementing FlexVPN with IKEv2 on Cisco Routers
- Implementing DMVPN on Cisco Routers
- Implementing Cisco AnyConnect
How you will benefit
- You will be prepared to sit for the Cisco CCNP Security core exam: 350-701 SCOR: Implementing and Operating Cisco Security Core Technologies
- You will be prepared to sit for the Cisco CCNP Security concentration exam: 300-730 SVPN: Implementing Secure Solutions with Virtual Private Networks
Shane Sexton
Shane Sexton is a cybersecurity-focused instructor with a hunger for using technology to combat real-world challenges. He holds many professional IT certifications such as Citrix CCA, CompTIA A+, CompTIA Security+, CompTIA Linux+, CompTIA CySA+, ITIL Foundations, Cisco CCNA, AWS SysOps, and Cisco CCNP Security. Shane's extensive professional expertise includes Citrix Virtualization, Citrix Virtualization, Computer Hardware support, Cisco networking, Cybersecurity Blue Team, Cybersecurity Red Team, Cisco security, Amazon AWS, and ITIL. Inside the classroom, Shane makes the complicated seem approachable. Outside the classroom, Shane is a mad scientist with automation, coding, and scripting, tying them back to technologies he teaches in class. If he isn't watching the latest SpaceX launch, he can usually be found tinkering with something.
The CCNP Security: SCOR course provides you with the knowledge to implement and operate core Cisco security technologies. You will learn about common security vulnerabilities, Email Security Appliance (ESA), Web Security Appliance (WSA), Cloud Email Security (CES), mobile device management (MDM), VPN configuration, and more.
The Implementing Secure Solutions with Virtual Private Networks (SVPN) course focuses on implementing secure remote communications with Virtual Private Network (VPN) solutions, including secure communications, architectures, and troubleshooting on Cisco ASAs and Cisco IOS Routers.
The course will prepare you to sit for the Cisco CCNP Security Core exam SCOR and the Cisco CCNP Security Concentration exam SVPN. These exams in tandem will earn you the CCNP Security certification. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.
|
|
|
- CompTIA A+ Certification Prep 3: Network/Security
-
Fee: $125.00
Start Date: 6/11/2025
Hours: 24
The CompTIA A+ Certification Prep 3: Networking/Security course focuses on keeping our networks and systems secure from outside threats and how to troubleshoot issues as they appear.
If you want to jumpstart your career with your first tech support job, this third and final course in our CompTIA prep series is a necessary component to prepare you for the A+ certification exam successfully.
According to CompTIA, getting your A+ certification can lead to a rewarding IT career—with average salaries ranging from $45,000-$60,000, depending on the role you pursue.
Note: Students need to complete CompTIA A+ Certification Prep 1: Hardware and CompTIA A+ Certification Prep 2: Software before attempting CompTIA A+ Certification Prep 3: Networking/Security to properly prepare to sit for the A+ certification exam.
This is an online course offered by Ed2Go. Click on Course Title for the complete course description.
|
|
|
- CompTIA A+ Certification Prep 3: Network/Security
-
Fee: $125.00
Start Date: 9/17/2025
Hours: 24
The CompTIA A+ Certification Prep 3: Networking/Security course focuses on keeping our networks and systems secure from outside threats and how to troubleshoot issues as they appear.
If you want to jumpstart your career with your first tech support job, this third and final course in our CompTIA prep series is a necessary component to prepare you for the A+ certification exam successfully.
According to CompTIA, getting your A+ certification can lead to a rewarding IT career—with average salaries ranging from $45,000-$60,000, depending on the role you pursue.
Note: Students need to complete CompTIA A+ Certification Prep 1: Hardware and CompTIA A+ Certification Prep 2: Software before attempting CompTIA A+ Certification Prep 3: Networking/Security to properly prepare to sit for the A+ certification exam.
This is an online course offered by Ed2Go. Click on Course Title for the complete course description.
|
|
|
- CompTIA A+ Certification Prep 3: Network/Security (Self-Guided)
-
Fee: $125.00
Hours: 24
The CompTIA A+ Certification Prep 3: Networking/Security course focuses on keeping our networks and systems secure from outside threats and how to troubleshoot issues as they appear.
If you want to jumpstart your career with your first tech support job, this third and final course in our CompTIA prep series is a necessary component to prepare you for the A+ certification exam successfully.
According to CompTIA, getting your A+ certification can lead to a rewarding IT career—with average salaries ranging from $45,000-$60,000, depending on the role you pursue.
Note: Students need to complete CompTIA A+ Certification Prep 1: Hardware and CompTIA A+ Certification Prep 2: Software before attempting CompTIA A+ Certification Prep 3: Networking/Security to properly prepare to sit for the A+ certification exam.
This is a self-paced, on-demand course offered by Ed2Go. Class begins upon registration and completion of Student Enrollment Agreement in Ed2Go. Click on Course Title for complete course description.
|
|
|
- CompTIA A+ Certification Prep 3: Network/Security (Self-Guided)
-
Fee: $125.00
Item Number: 202505ILC1016101
Dates: 5/19/2025 - 8/24/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Building:
Room:
Instructor:
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.Finish your CompTIA A+ certification prep by learning how to select, install, and service video, sound, and portable computers. In this final course needed in the three-part A+ certification series, you will learn how to network, secure, and troubleshoot. The CompTIA A+ Certification Prep 3: Networking/Security course focuses on fun and practical technology. You will learn how to select, install, and service sound and display components, and how to set up, maintain, and troubleshoot wired and wireless networks.
During this network/security training, you will also learn about many aspects of PC and network security and discover how to configure and troubleshoot tablets and smartphones.
Note: This CompTIA A+ Prep 3 course completes the three-course CompTIA A+ certification exam prep series that is needed to prepare you for both the 220-1101/1102 exams and your career as a certified technician. Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
- A Windows PC that you can experiment on. You will probably want to remove/install various devices, such as video, sound, and modems. Because of the dangers of electro-static discharge (to the machine, not the student), however, we do not require you to tear apart your own primary computer. This is a class that trains you to be a technician - having a machine to play with greatly helps your learning.
Software Requirements:
- PC: Windows 8 or later.
- Mac: macOS 10.6 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
- Adobe Acrobat Reader.
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment and will be available online. The CompTIA A+ Certification Prep 3: Networking/Security course focuses on keeping our networks and systems secure from outside threats and how to troubleshoot issues as they appear.
If you want to jumpstart your career with your first tech support job, this third and final course in our CompTIA prep series is a necessary component to prepare you for the A+ certification exam successfully.
According to CompTIA, getting your A+ certification can lead to a rewarding IT career—with average salaries ranging from $45,000-$60,000, depending on the role you pursue.
Note: Students need to complete CompTIA A+ Certification Prep 1: Hardware and CompTIA A+ Certification Prep 2: Software before attempting CompTIA A+ Certification Prep 3: Networking/Security to properly prepare to sit for the A+ certification exam.
- Video Technologies
- Multimedia
- Essentials of Networking
- Local Area Networking
- Wireless Networking
- Internet Connections and Cloud Computing
- Internet Protocols and Troubleshooting
- Facility and Workstation Security
- Authentication and Data Security
- Network Security
- Understanding Mobile Devices
- Care and Feeding of Mobile Devices
What you will learn
- Learn how to install and troubleshoot video technologies properly
- Understand how to upgrade, manage, maintain, and repair portable computing devices
- Learn the essentials of networking, including local area networking and wireless networking
- Discover the best ways to keep your network secure
- Understand how to work with mobile devices
How you will benefit
- Prepare for both the 1001/1002 CompTIA A+ Certification Exams
- Complete the third and final course needed to prepare for your CompTIA A+ certification
- Open the door to new opportunities as a technician once certification is achieved
Self-Study
The CompTIA A+ Certification Prep 3: Networking/Security course focuses on keeping our networks and systems secure from outside threats and how to troubleshoot issues as they appear.
If you want to jumpstart your career with your first tech support job, this third and final course in our CompTIA prep series is a necessary component to prepare you for the A+ certification exam successfully.
According to CompTIA, getting your A+ certification can lead to a rewarding IT career—with average salaries ranging from $45,000-$60,000, depending on the role you pursue.
Note: Students need to complete CompTIA A+ Certification Prep 1: Hardware and CompTIA A+ Certification Prep 2: Software before attempting CompTIA A+ Certification Prep 3: Networking/Security to properly prepare to sit for the A+ certification exam.
|
|
|
- CompTIA Security+ Certification Training (Voucher Included)
-
Fee: $1,995.00
Hours: 85
Boost your cybersecurity career and yearly income by obtaining your CompTIA Security+ certification! According to CompTIA, five of the top six security jobs have annual salaries of $90,000 or higher, with some exceeding $127,000. The Security+ certification is widely recognized and well-respected in the IT industry and it will validate your skills and help you gain top-paying employment.
The vendor-neutral CompTIA Security+ certification covers a broad range of security topics, including threat management, identity management, access control, cryptography, and network security. By completing this CompTIA Security+ course, learning key cybersecurity concepts and mastering accompanying quizzes and tests, you will be well-prepared to take the Security+ certification exam.
This online CompTIA Security+ training covers the essential knowledge and skills required to identify, assess, and mitigate security risks in modern IT environments. This course provides a comprehensive overview of the key concepts and best practices in cybersecurity, including the latest trends and emerging threats. It also teaches the fundamental principles of cybersecurity and enables students to implement security controls that protect against a wide range of attacks and vulnerabilities.
This Security+ certification course offers an exam voucher with enrollment. The voucher covers the cost to sit for the certifying exam upon eligibility. After completing the CompTIA Security+ course, you can set up your own exam dates and times at a nearby testing center.
This is a self-paced, on-demand course offered by Ed2Go. Class begins upon registration and completion of Student Enrollment Agreement in Ed2Go. Click on Course Title for complete course description.
|
|
|
- CompTIA Security+ Certification Training (Voucher Included)
-
Fee: $1,995.00
Item Number: 202505CTP481171
Dates: 5/19/2025 - 8/24/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Building:
Room:
Instructor:
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.Learn a broad range of security topics, including threat management, identity management, access control, cryptography, and network security. This course will teach you everything you need to take and successfully pass the CompTIA Security+ certification exam. Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
- Labs included in this program are not supported on mobile devices (i.e., phones and tablets).
Software Requirements:
- PC: Windows 10 or later.
- Mac: macOS 10.6 or later.
- Chromebook 113 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
- Microsoft Word. To complete your assignments, you may need Microsoft Word 2003 or higher, or an equivalent word-processing program, such as LibreOffice, which is available to download for free.
- Adobe Acrobat Reader.
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
- A reliable high-speed Internet connection
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment. The textbook for the Security+ course is accessed via links in the course lessons.
- CompTIA Security+ Guide to Network Security Fundamentals
Boost your cybersecurity career and yearly income by obtaining your CompTIA Security+ certification! According to CompTIA, five of the top six security jobs have annual salaries of $90,000 or higher, with some exceeding $127,000. The Security+ certification is widely recognized and well-respected in the IT industry and it will validate your skills and help you gain top-paying employment.
The vendor-neutral CompTIA Security+ certification covers a broad range of security topics, including threat management, identity management, access control, cryptography, and network security. By completing this CompTIA Security+ course, learning key cybersecurity concepts and mastering accompanying quizzes and tests, you will be well-prepared to take the Security+ certification exam.
This online CompTIA Security+ training covers the essential knowledge and skills required to identify, assess, and mitigate security risks in modern IT environments. This course provides a comprehensive overview of the key concepts and best practices in cybersecurity, including the latest trends and emerging threats. It also teaches the fundamental principles of cybersecurity and enables students to implement security controls that protect against a wide range of attacks and vulnerabilities.
This Security+ certification course offers an exam voucher with enrollment. The voucher covers the cost to sit for the certifying exam upon eligibility. After completing the CompTIA Security+ course, you can set up your own exam dates and times at a nearby testing center.
- Introduction to CompTIA
- Security Fundamentals
- Threat Management and Cybersecurity Resources
- Threats and Attacks on Endpoints
- Endpoint and Application Development Security
- Cryptography
- Public Key Infrastructure and Cryptographic Protocols
- Mobile, Embedded, and Specialized Device Security
- Networking Threats, Assessments, and Defenses
- Network Security Appliances and Technologies
- Cloud and Virtualization Security
- Network Threats, Assessments, and Defenses
- Authentication
- Incident Preparation, Response, and Investigation
- Cybersecurity Resilience
- Risk Management and Data Privacy
- Preparing for the Certificate Exam
- Exploring a Career in Cybersecurity
What you will learn
- Gain fundamental concepts of computer security
- Understand cybersecurity threats, vulnerabilities, and assessments
- Review incident preparations, response, and risk management
- Learn to monitor and secure hybrid environments, including cloud, mobile, Internet of Things (IoT), and operational technology
How you will benefit
- Prepare for the CompTIA Security+ certificate exam
- Utilize a variety of interactives, assignments, and assessments
- Review topics covering the most updated objectives found in the CompTIA Security+ exam
Linda Matthews
Linda Matthews has years of experience both in the classroom teaching technical material and in the field solving a myriad of technical issues.
Linda possesses the background to engage deeply with cybersecurity through teaching and intellectual focus. For the past eight years, she has lived with this vast and fascinating body of knowledge. Now, she regularly trains individuals in several of the most popular security courses from CompTIA and Microsoft. CompTIA's Security+ is the foundational course students need to begin an incredible journey into cybersecurity.
Linda has a strong love for teaching and igniting the spark that can set students on a most worthwhile and fulfilling path.
Sara Perrott
Sara Perrott has been working in the information technology field for 20+ years and has devoted the last 10 of those to focusing on cybersecurity. She is a published author and a former college professor, and she is passionate about teaching the next generation of cybersecurity professionals. Sara has a Master of Science in Cybersecurity and Information Assurance from Western Governors University Washington and a Bachelor of Science in Information Systems Security from the University of Phoenix.
Boost your cybersecurity career and yearly income by obtaining your CompTIA Security+ certification! According to CompTIA, five of the top six security jobs have annual salaries of $90,000 or higher, with some exceeding $127,000. The Security+ certification is widely recognized and well-respected in the IT industry and it will validate your skills and help you gain top-paying employment.
The vendor-neutral CompTIA Security+ certification covers a broad range of security topics, including threat management, identity management, access control, cryptography, and network security. By completing this CompTIA Security+ course, learning key cybersecurity concepts and mastering accompanying quizzes and tests, you will be well-prepared to take the Security+ certification exam.
This online CompTIA Security+ training covers the essential knowledge and skills required to identify, assess, and mitigate security risks in modern IT environments. This course provides a comprehensive overview of the key concepts and best practices in cybersecurity, including the latest trends and emerging threats. It also teaches the fundamental principles of cybersecurity and enables students to implement security controls that protect against a wide range of attacks and vulnerabilities.
This Security+ certification course offers an exam voucher with enrollment. The voucher covers the cost to sit for the certifying exam upon eligibility. After completing the CompTIA Security+ course, you can set up your own exam dates and times at a nearby testing center.
|
|
|
|
|
|
- Explore a Career in Cybersecurity (Self-Guided)
-
Fee: $129.00
Item Number: 202505ILC1018141
Dates: 5/19/2025 - 8/24/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Building:
Room:
Instructor:
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.This course will give you the knowledge to help you decide whether a career in cybersecurity is right for you. This course is designed to explore the basics of cybersecurity and the types of jobs found in the cybersecurity field. This course explores a career in cybersecurity and reviews various topics, including cybersecurity roles, job requirements, problem-solving techniques, and cybersecurity concepts. This course will help you decide whether a career in cybersecurity is something that aligns with your talents and interests and, if so, the best next steps to pursue this lucrative career path. Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
Software Requirements:
- PC: Windows 10 or later.
- Mac: macOS 10.6 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
- Microsoft Word Online
- Adobe Acrobat Reader
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
There are no instructional material requirements to take this course. Getting into cybersecurity can be rewarding and lucrative! In fact, according to the U.S. Bureau of Labor Statistics, information security analysts can make over $100,000 per year. This course will give you the knowledge to help you decide whether a career in cybersecurity is right for you.
The course will start by introducing the basics of cybersecurity. You will learn the types of threats companies face daily and how a cybersecurity specialist can help prepare for and prevent those threats. Finally, the course will cover cybersecurity learning paths and different types of cybersecurity jobs and salaries.
- Introduction to Cybersecurity
- Cybersecurity Roles and Industries
- Problem Solving
- Cybersecurity Basics
- Types of Information Security
- Common Concepts and Terminology
- Types of Threats
- Secure Coding
- Protecting the Business
- Developing a Security Awareness Program
- Employment and the Future of Cybersecurity
- Next Steps
What you will learn
- Explore cybersecurity as a career path
- Identify cybersecurity job roles and industries
- Describe the soft skills that cybersecurity professionals need
- Explain the threats that cyberattacks pose to modern businesses
- Explain the importance of securing information
- Define common cybersecurity terms and concepts
- Explain the role of secure coding in preventing cyberattacks
- Identify the ways that cybersecurity professionals protect a business
- Describe the key elements of a security awareness program
- Identify employment opportunities and career steps in the cybersecurity field
How you will benefit
- Learn if a career in cybersecurity is right for you
- Explore the basics of the cybersecurity industry
- Discover potential career paths in the cybersecurity field
Getting into cybersecurity can be rewarding and lucrative! In fact, according to the U.S. Bureau of Labor Statistics, information security analysts can make over $100,000 per year. This course will give you the knowledge to help you decide whether a career in cybersecurity is right for you.
The course will start by introducing the basics of cybersecurity. You will learn the types of threats companies face daily and how a cybersecurity specialist can help prepare for and prevent those threats. Finally, the course will cover cybersecurity learning paths and different types of cybersecurity jobs and salaries.
|
|
|
- Introduction to Cybersecurity
-
Fee: $129.00
Hours: 8
The need for skilled cybersecurity professionals continues to grow year over year, making it a great time to enter this in-demand industry.
In this video-based learning course, you will learn fundamentals of cybersecurity such as concepts, commands, and tools from an experienced professional through lectures and follow-along demonstrations. You will also learn about cloud computing, networking, cybersecurity policy, and frameworks, as well as risk management and security auditing in a 100% online, self-paced training format.
By the completion of your course, you will have a firm understanding of cybersecurity foundations, including key concepts and best practices.
This is a self-paced, on-demand course offered by Ed2Go. Class begins upon registration and completion of Student Enrollment Agreement in Ed2Go. Click on Course Title for complete course description.
|
|
|
- Introduction to Cybersecurity
-
Fee: $129.00
Item Number: 202505ILC1018021
Dates: 5/19/2025 - 8/24/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Building:
Room:
Instructor:
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.This introductory course is for those with little to no cybersecurity experience that want to learn more about this growing industry. This self-paced course is designed to help you increase your knowledge of cybersecurity and technology fundamentals to fill knowledge gaps in your current role or pursue an entry-level career in this in-demand field. We answer questions around what cybersecurity is, what an operating system does and the most common types, cloud computing, and many other topics related to cybersecurity foundations.
You will have the opportunity to develop your foundational cybersecurity skills through hands-on demonstrations as you follow along with the instructor videos, learn time-saving tips to increase your efficiency, and establish best practices. Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
Software Requirements:
- PC: Windows 8 or later.
- Mac: macOS 10.6 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
- Microsoft Word Online
- Adobe Acrobat Reader
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
This course gives you the option of following along with the instructor on a few video-based exercises, allowing you to pause and replay until you are confident in your skillset. Should you wish to follow along, it is recommended that you have the following: Windows 10 environment, Wireshark, an AWS account (free tier), and a Windows 2016 VM (available in the AWS free tier).
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment and will be available online. The need for skilled cybersecurity professionals continues to grow year over year, making it a great time to enter this in-demand industry.
In this video-based learning course, you will learn fundamentals of cybersecurity such as concepts, commands, and tools from an experienced professional through lectures and follow-along demonstrations. You will also learn about cloud computing, networking, cybersecurity policy, and frameworks, as well as risk management and security auditing in a 100% online, self-paced training format.
By the completion of your course, you will have a firm understanding of cybersecurity foundations, including key concepts and best practices.
- Cybersecurity Foundations
- Operating Systems
- Windows Command Line Foundations
- Network Fundamentals
- Cloud Computing Fundamentals
- Cybersecurity Policy, Framework, and Guidelines
- Cybersecurity Audit Foundations
- Risk Management
- Penetration Testing - Demonstration
What you will learn
- Understand what cybersecurity entails
- Identify the three most common operating systems
- Execute simple commands
- Learn about cloud computing and networking
- Learn about cybersecurity policies, frameworks, audits, and risk management
How you will benefit
- Learn if a career in cybersecurity could be right for you
- Increase your baseline knowledge of foundational cybersecurity concepts
- Learn tips and tricks from a working cybersecurity professional
- Follow along with hands-on demonstrations to develop and practice your foundational skills
- Finish in three months or less
Self-Study
The need for skilled cybersecurity professionals continues to grow year over year, making it a great time to enter this in-demand industry.
In this video-based learning course, you will learn fundamentals of cybersecurity such as concepts, commands, and tools from an experienced professional through lectures and follow-along demonstrations. You will also learn about cloud computing, networking, cybersecurity policy, and frameworks, as well as risk management and security auditing in a 100% online, self-paced training format.
By the completion of your course, you will have a firm understanding of cybersecurity foundations, including key concepts and best practices.
|
|
|
|
|
|
- Introduction to PC Security (Self-Guided)
-
Fee: $129.00
Item Number: 202505ILC1015281
Dates: 5/19/2025 - 8/24/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Building:
Room:
Instructor:
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.Learn the fundamentals of PC and network security from this expert-developed course. Learn why you're at risk and what you can do to protect your precious personal and business data from the outside world. This online course, will quickly bring you up to speed on the fundamentals of PC and network security.
You will understand and explore the vulnerability of operating systems, software, and networks. Then, you will get into the minds of hackers and crackers, developing an understanding of the exploits they use to access your computer without your knowledge. You will find out why, where and how viruses, worms, and blended threats are created. You will learn a safe way to handle files and data across the Internet through a virtual private network. By the end of this course you will be able to install and configure a firewall to build an impenetrable moat around your computer or network. Requirements:
Hardware Requirements:
- This course can be taken on either a PC or Mac.
Software Requirements:
- PC: Windows 8 or later.
- Mac: macOS 10.6 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
- Adobe Acrobat Reader.
- Applications must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Learn the fundamentals of PC and network security from this expert-developed course. Introduction to PC Security
In your first lesson, you will learn both the facts and myths surrounding PC security. By the end of the lesson, you will also be able to assess your own risk, whether you're an individual or manage a network of any size. You will also perform a self-assessment to evaluate just how vulnerable you are to security flaws.
Your PC and Network
If you ever wondered what technical gurus are speaking about when they talk about LANs, WANs, VPNs, and P2P, you will find detailed answers in this lesson. Discover the basics of networks and how your PC connects to them.
PCs, Networks, and Software Demystified
Most of us don't stop to think about how a Mac can talk to a PC and vice versa. Yet, different types of machines talk to each other on a daily basis across networks. They also talk to printers, fax machines, and a host of other devices. The OSI model for network connections lets you accomplish this, and you will learn all about it in this lesson.
Viruses, Worms, Blended Threats, and More
Get ready to investigate the world of viruses, worms, and blended threats. You will learn what they are and the differences between all three. Of course, all this knowledge will also teach you how to protect yourself and your network from the hackers and crackers of the world.
The Family of Malware
This lesson introduces you to the ware family. What is the ware family? They are the products that download themselves onto your computer without your consent or knowledge—spyware, scumware, malware, and adware. You will meet them and learn all about where they live, places they frequent, and how to remove these unwelcome guests.
Exploits and Vulnerabilities
You may have heard of them: vulnerabilities, exploits, and exposure. But what are they? Have you ever wondered if someone really can control your computer without your knowledge? If you've been pondering these questions lately, then you will find your answers here, along with priceless information on protecting your computer and your network to keep your business and personal data private.
Network Attacks
Have you ever tried to access the web but received an error saying the page can't be displayed, you aren't connected, or you don't have access? Denial of Service attacks and SYN flooding are two types of network attacks that seem to go unnoticed on personal PCs and small networks. After this lesson, you will no longer be left wondering what happened to your Internet connection.
Everything You Wanted to Know About Firewalls. (Part One)
This lesson will introduce you to firewalls. Join me in this lesson, and you will soon start building an impenetrable moat around your network.
Everything You Wanted to Know About Firewalls. (Part Two)
Now that you have your moat built, it's time to arm up and defend yourself. In this lesson, you will learn how to configure your firewall and maximize your network security.
Laptops, Notebooks, Netbooks, and Wireless Networking
Laptops and wireless connectivity aren't as secure as they appear. You will understand why in this lesson.
Virtual Private Networking (VPN)
This lesson explores the Virtual Private Network and how it's different from standard networks, how it works, how to secure it, and how to set up your own. You can share files with family across the miles by allowing them to connect remotely to your designated shared folders. You can share music files, family pictures, and anything else you choose to give them access to.
The Changing Face of Security
Now that you know what's out there, how can you possibly keep on top of security issues? There's so much information out there, how will you know what applies to you? You will learn about emerging security technology that will help make managing and securing your network easier. Finally, you can test yourself against the first security assessment to see how well you've secured your own PC or network. Self-Study
Learn the fundamentals of PC and network security from this expert-developed course.
|
|
|