Security (146 Courses)


Check Point - CCMSE NGX Check Point - CCMSE NGX Plus VSX
Check Point - CPIS (Check Point Integrity) Check Point - Endpoint Security
Check Point GAiA - Essentials Check Point IPS
Check Point - IPSO Check Point Multi-Domain Security Management
Check Point Multi-Domain Security with VSX Check Point - Performance and Optimization
Check Point - Security Administration Check Point - Security Engineering
Check Point - Security Expert (CCSE) Check Point - Troubleshooting R75 Advanced
Check Point - Upgrade and Migration Check Point - VSX

Cyber Security

Certified Authorization Professional (CAP) Certified Cyber Forensics Professional (CCFP)
Certified Information Security Manager (CISM) Certified Information Systems Auditor (CISA)
Certified Information Systems Security Professional (CISSP)
Certified Secure Software Lifecycle Professional (CSSLP) CISSP-ISSAP
CompTIA Advanced Security Practitioner (CASP) CompTIA Security+
Cyber Security Compliance & Mobility Course Cyber Security Essentials
Cyber Security Risk Assessment & Management Cybersecurity Foundations
Cybersecurity Investigations and Network Forensics Analysis Cyberspace Operations Strategist and Planner
Defending the Perimeter from Cyber Attacks Defensive Cyber Operations Engineer
Digital Forensics Identity Management
Introduction to Cyber Warfare and Operations Design Social Media Security Professional (SMSP)
Systems Security Certified Practitioner (SSCP)


Building Secure Software Forensics & Incident Response
Ultimate Hacking Ultimate Hacking: Expert
Ultimate Hacking: Web Ultimate Hacking: Windows Security
Ultimate Hacking: Wireless Writing Secure Code - ASP.NET (C#)
Writing Secure Code: Java (J2EE)

ISO & Information Security

ISO/IEC 27001 Information Security - Lead Auditor ISO/IEC 27002 Information Security Controls - Lead Manager
ISO/IEC 27005 Information Security - Lead Risk Manager ISO/IEC 27032 - Lead Cybersecurity Manager
ISO/IEC 27035 - Lead Incident Manager ISO/IEC 27701 Privacy Information Management System - Lead Auditor
ISO 27799 Information Security Management - Lead Manager Lead Computer Forensics Examiner
Lead Ethical Hacker Lead SCADA Security Manager


Access Control, Authentication, and Public Key Infrastructure Auditing IT Infrastructures for Compliance
Fundamentals of Information Systems Security Legal Issues in Information Security
Managing Risk in Information Systems Network Security, Firewalls, and VPNs
Security Policies and Implementation Issues Security Strategies in Web Applications and Social Networking
Security Strategies in Windows Platforms and Applications Systems Forensics, Investigation, and Response


Advanced Juniper Networks VPN Implementations (AJVI) Advanced Junos Security (AJSEC)
Attack Prevention with Juniper Networks Firewalls (APJF) Configuring and Monitoring the vGW Virtual Gateway (CMvGW)
Configuring Juniper Networks Firewall/IPSec VPN Products (CJFV) Implementing Intrusion Detection and Prevention Products (IIDP)
Integrating Juniper Networks Firewall/IPSec VPN Products into High-Performance Networks (IFVH) Juniper Advanced Junos Enterprise Security Troubleshooting (AJEST)
Junos Edge Security Services (JESS) Junos Intrusion Prevention Systems (JIPS)
Junos Pulse Access Control (JPAC) Junos Pulse Secure Access (JPSA)
Junos Security (JSEC) Junos Space for the Enterprise (JS-ENT)
Junos Unified Threat Management (JUTM)

Mobility, Telecom & Networks

Android Security Architecture CompTIA Mobile App Security+ - Android Edition
CompTIA Mobile App Security+ - iOS Edition CompTIA Mobility+
Dell SonicWALL Secure Mobile Access Advanced Administration (SMAAA) Dell SonicWALL Secure Mobile Access Basic Administration (SMABA)
GSM and GPRS Security IPv6 Security
Mobile Application Security Mobile Security
QRadar QRadar Administration
VoIP Security Wireless LAN Security

Palo Alto Networks

Palo Alto Networks Firewall - Installation Configuration and Management Firewall Troubleshooting - Advanced
Threat Management - Advanced Panorama Essentials


SAS Enterprise Case Management - Using the Interface SAS Fraud Framework - Implementing the SAS Social Network Analysis Interface
SAS Fraud Framework - Using the SAS Financial Crimes Monitor Interface SAS Fraud Framework - Using the Social Network Analysis Interface

Software Testing

Security Testing Web Application Security Testing
Web Security Testing Wireless Security


Altiris Client Management Suite - Administration NetBackup - Administration
Symantec Data Insight - Administration Symantec Data Loss Prevention
Symantec Endpoint Protection Symantec Endpoint Protection Administration
Symantec Enterprise Vault - Implementation and Deployment Symantec Enterprise Vault for File System Archiving - Administration
Symantec Ghost Solution Suite Symantec NetBackup for Windows - Administration
Symantec System Recovery - Administration Veritas Backup Exec - Administration
Veritas Cluster Server for UNIX Veritas InfoScale Availability for Linux - Administration
Veritas InfoScale Storage for Linux - Administration

Trend Micro, FortiGate and Microsoft Security Products

Forefront Threat Management Gateway 2010 Forefront Unified Access Gateway (UAG)
FortiGate Administration FortiGate Secured Network Deployment and IPSec VPN
Trend Micro - Deep Security Support Trend Micro - OfficeScan (OSCE) Support
Trend Micro - SecureCloud TCSM


Websense Data Security Suite Websense Email Security Gateway
Websense Web Security Gateway


BCS - Information Assurance Architecture Certified Information Systems Security Professional (CISSP)
Cisco Web Security Appliance CyberArk
Dell SonicWALL Network Security Administration Endpoint Security and Network Access Control
HCISPP - HealthCare Information Security and Privacy Practitioner Intrusion Detection, Attacks and CounterMeasures
ISS - SiteProtector IT Security Awareness for Non-Technical Personnel
Network Defense and Countermeasures Network Hacking and Security
Network Security Essentials PIX - ASA ( SNPA )
SCADA Security Securing Web Applications with Spring Security
Securing Web Applications, Services and Servers SOA Security
Vulnerability Assessment VMware vSphere Security Design

Contact us for any other unlisted or customized Security Trainings