top of page

Microsoft Security Operations Analyst

Learn how to investigate, respond to, and hunt for threats using Microsoft Azure Sentinel, Azure Defender, and Microsoft 365 Defender. In this course you will learn how to mitigate cyberthreats using these technologies. Specifically, you will configure and use Azure Sentinel as well as utilize Kusto Query Language (KQL) to perform detection, analysis, and reporting. The course was designed for people who work in a Security Operations job role and helps learners prepare for the exam SC-200: Microsoft Security Operations Analyst.

Length (Days)

4

Price

$

2380

Microsoft Identity and Access Administrator

This course provides Identity and Access Management Professionals with the knowledge and skills needed to implement identity controls, maintain an organization�s identity & access posture, and identify and remediate identity vulnerabilities. This course includes topics for identity management and governance, access management for applications and device, and end-to-end authentication and access management operations.

Length (Days)

4

Price

$

2380

Microsoft Information Protection Administrator

Learn how to protect information in your Microsoft 365 deployment. This course focuses on data governance and information protection within your organization. The course covers implementation of data loss prevention policies, sensitive information types, sensitivity labels, data retention policies and Office 365 message encryption among other related topics. The course helps learners prepare for the Microsoft Information Protection Administrator exam (SC-400).

Length (Days)

2

Price

$

1190

Microsoft Security, Compliance, and Identity Fundamentals

This course provides foundational level knowledge on security, compliance, and identity concepts and related cloud-based Microsoft solutions.

Length (Days)

1

Price

$

595

Certified Internet of Things (loT) Practitioner

In this course, students will learn general strategies for planning, designing, developing, implementing, and maintaining an IoT system through various case studies and by assembling and configuring an IoT device to work in a sensor network. Students will create an IoT device based on an ESP8266 microcontroller, implementing various common IoT features, such as analog and digital sensors, a web-based interface, MQTT messaging, and data encryption.

Length (Days)

3

Price

$

2050

NIST Cyber Security Professional (NCSP) Foundation

This course is targeted at IT and Cybersecurity professionals looking to become certified on how to operationalize the NIST Cybersecurity Framework (NCSF) across an enterprise and its supply chain.

Length (Days)

1

Price

$

995

NIST Cyber Security Professional (NCSP) Practitioner

This course is targeted at IT and Cybersecurity professionals looking to become certified on how to operationalize the NIST Cybersecurity Framework (NCSF) across an enterprise and its supply chain. It assumes participants have successfully taken and passed the NCSF Foundation 2.0 course.

Length (Days)

4

Price

$

3295

CyberSecurity First Responder

This course covers the duties of those who are responsible for monitoring and detecting security incidents in information systems and networks, and for executing a proper response to such incidents. Depending on the size of the organization, this individual may act alone or may be a member of a cybersecurity incident response team (CSIRT). The course introduces tools and tactics to manage cybersecurity risks, identify various types of common threats, evaluate the organization's security, collect and analyze cybersecurity intelligence, and handle incidents as they occur. Ultimately, the course promotes a comprehensive approach to security aimed toward those on the front lines of defense.

Length (Days)

5

Price

$

2495

Healthcare Information Security and Privacy Practitioner (HCISPP)

This class is based on the six HCISPP domains of the (ISC)� Common Body of Knowledge (CBK), ensuring students successfully prepare for the HCISPP exam and enhance their overall competencies in healthcare security and privacy.

Length (Days)

3

Price

$

2037

EC-Council Certified Application Security Engineer (CASE).NET

The CASE credential tests the critical security skills and knowledge required throughout a typical software development life cycle (SDLC), focusing on the importance of the implementation of secure methodologies and practices in today�s insecure operating environment.

Length (Days)

3

Price

$

2095

Certified Cloud Security Professional (CCSP)

The goal of the course is to prepare professionals for the challenging CCSP exam by covering the objectives of the exam based on the six domains as defined in the (ISC)2 CCSP common body of knowledge.

Length (Days)

5

Price

$

4549

EC-Council Certified Ethical Hacker (CEH) v11

Students will learn how to scan, test, hack and secure target systems. The course covers the Five Phases of Ethical Hacking, diving into Reconnaissance, Gaining Access, Enumeration, Maintaining Access, and covering your tracks.

Length (Days)

5

Price

$

3395

EC-Council Computer Hacking Forensics Investigator (CHFI) v9.0

This course will provide participants the necessary skills to identify an intruder�s footprints and to properly gather the necessary evidence to prosecute in the court of law.

Length (Days)

5

Price

$

3495

Certified Information Privacy Professional (CIPP/US)

Principles of Privacy in the U.S. Private Sector covers U.S. privacy laws and regulations at federal and state levels, including breach notification and limits on various private sectors. You�ll leave with an understanding of the legal requirements for the responsible handling and transfer of personal data within industry and workplaces, including government access to private-sector data. The training is based on the body of knowledge for the IAPP�s ANSI-accredited Certified Information Privacy Professional/ U.S. (CIPP/US) certification program.

Length (Days)

2

Price

$

2575

Certified Information Systems Auditor

In this course, students evaluate organizational policies, procedures, and processes to ensure the organizations information systems align with its overall business goals and objectives.

Length (Days)

5

Price

$

3250

Certified Information Security Manager

Students establish processes to ensure that information security measures align with established business needs.

Length (Days)

3

Price

$

1995

EC-Council Certified Chief Information Security Officer (CISO)

Paticiants learn in-depth content in each of the 5 CCISO Domains. It's designed for the aspiring or sitting upper-level manager striving to advance his or her career by learning to apply their existing deep technical knowledge to business problems.

Length (Days)

5

Price

$

3495

Certified Information Systems Security Professional

This course is intended for experienced IT security-related practitioners, auditors, consultants, investigators, or instructors, including network or security analysts and engineers, network administrators, information security specialists, and risk management professionals, who are pursuing CISSP training and certification to acquire the credibility and mobility to advance within their current computer security careers or to migrate to a related career. Through the study of all eight CISSP Common Body of Knowledge (CBK) domains, students will validate their knowledge by meeting the necessary preparation requirements to qualify to sit for the CISSP certification exam. Additional CISSP certification requirements include a minimum of five years of direct professional work experience in two or more fields related to the eight CBK security domains, or a college degree and four years of experience.

Length (Days)

5

Price

$

3395

Certified Internet of Things (IoT) Security Practitioner

This course is designed for network security engineers and analysts who are tasked with designing secure network environments, implementing security policies and protocols related to IoT devices, and analyzing network systems for operational and security considerations, in addition to the security operations center (SOC) analysts who analyze and respond to security incidents, and develop organizational response processes. It is also beneficial to solutions architects, developers, and testers who design, develop, and test software solutions for their organizations. This certification is also relevant to operations engineers who deploy and maintain embedded and mission critical systems and perform organizational gap analysis.

Length (Days)

3

Price

$

1375

EC-Council Certified Network Defender (CND)

Certified Network Defender (CND) is a vendor-neutral comprehensive network security certification training program. It is a skills-based, lab intensive program based on a job-task analysis and cybersecurity education framework presented by the National Initiative of Cybersecurity Education (NICE).

Length (Days)

5

Price

$

3495

bottom of page