Security (146 Courses)

Blue Coat & VMware

Blue Coat PacketShaper Pro Blue Coat PacketShaper Pro - Admin
Blue Coat ProxySG Professional Blue Coat ProxySG Administrator
VMware vSphere Security Design


CheckPoint Endpoint Security CheckPoint GAiA Essentials
CheckPoint IPS CheckPoint IPSO
CheckPoint Multi-Domain Security Management Checkpoint Multi-Domain Security with VSX
CheckPoint Security Administration CheckPoint Security Engineering
CheckPoint Security Expert (CCSE)

Cyber Security

Certified Authorization Professional (CAP) Certified Cyber Forensics Professional (CCFP)
Certified Information Security Manager (CISM) Certified Information Systems Auditor (CISA)
Certified Information Systems Security Professional (CISSP) Certified SCADA Cyberspace Operations Engineer (CSCOE)
Certified Secure Software Lifecycle Professional (CSSLP) CISSP-ISSAP
CompTIA Advanced Security Practitioner (CASP) CompTIA Security+
Cyber Security Compliance & Mobility Course Cyber Security Essentials
Cyber Security Risk Assessment & Management Cybersecurity Foundations
Cybersecurity Investigations and Network Forensics Analysis Cyberspace Operations Strategist and Planner
Defending the Perimeter from Cyber Attacks Defensive Cyber Operations Engineer
Digital Forensics Identity Management
Introduction to Cyber Warfare and Operations Design Social Media Security Professional (SMSP)
Systems Security Certified Practitioner (SSCP)


Building Secure Software Forensics & Incident Response
Ultimate Hacking Ultimate Hacking: Expert
Ultimate Hacking: Web Ultimate Hacking: Windows Security
Ultimate Hacking: Wireless Writing Secure Code - ASP.NET (C#)
Writing Secure Code: Java (J2EE)


Access Control, Authentication, and Public Key Infrastructure Auditing IT Infrastructures for Compliance
Fundamentals of Information Systems Security Legal Issues in Information Security
Managing Risk in Information Systems Network Security, Firewalls, and VPNs
Security Policies and Implementation Issues Security Strategies in Web Applications and Social Networking
Security Strategies in Windows Platforms and Applications Systems Forensics, Investigation, and Response


Advanced Juniper Networks VPN Implementations (AJVI) Advanced Junos Security (AJSEC)
Attack Prevention with Juniper Networks Firewalls (APJF) Configuring and Monitoring the vGW Virtual Gateway (CMvGW)
Configuring Juniper Networks Firewall/IPSec VPN Products (CJFV) Implementing Intrusion Detection and Prevention Products (IIDP)
Integrating Juniper Networks Firewall/IPSec VPN Products into High-Performance Networks (IFVH) Juniper Advanced Junos Enterprise Security Troubleshooting (AJEST)
Junos Edge Security Services (JESS) Junos Intrusion Prevention Systems (JIPS)
Junos Pulse Access Control (JPAC) Junos Pulse Secure Access (JPSA)
Junos Security (JSEC) Junos Space for the Enterprise (JS-ENT)
Junos Unified Threat Management (JUTM)

Mobility, Telecom & Networks

Android Security Architecture CompTIA Mobile App Security+ - Android Edition
CompTIA Mobile App Security+ - iOS Edition CompTIA Mobility+
Dell SonicWALL Secure Mobile Access Advanced Administration (SMAAA) Dell SonicWALL Secure Mobile Access Basic Administration (SMABA)
GSM and GPRS Security IPv6 Security
Mobile Application Security Mobile Security
QRadar QRadar Administration
VoIP Security Wireless LAN Security

Palo Alto Networks

Palo Alto Networks Firewall - Installation Configuration and Management Firewall Troubleshooting - Advanced
Threat Management - Advanced Panorama Essentials


SAS Enterprise Case Management - Using the Interface SAS Fraud Framework - Implementing the SAS Social Network Analysis Interface
SAS Fraud Framework - Using the SAS Financial Crimes Monitor Interface SAS Fraud Framework - Using the Social Network Analysis Interface

Software Testing

Security Testing Web Application Security Testing
Web Security Testing Wireless Security


Altiris Client Management Suite - Administration NetBackup - Administration
Symantec Data Insight - Administration Symantec Data Loss Prevention
Symantec Endpoint Protection Symantec Endpoint Protection Administration
Symantec Enterprise Vault - Implementation and Deployment Symantec Enterprise Vault for File System Archiving - Administration
Symantec Ghost Solution Suite Symantec NetBackup for Windows - Administration
Symantec System Recovery - Administration Veritas Backup Exec - Administration
Veritas Cluster Server for UNIX Veritas InfoScale Availability for Linux - Administration
Veritas InfoScale Storage for Linux - Administration

Trend Micro, FortiGate and Microsoft Security Products

Forefront Threat Management Gateway 2010 Forefront Unified Access Gateway (UAG)
FortiGate Administration FortiGate Secured Network Deployment and IPSec VPN
Trend Micro - Deep Security Support Trend Micro - OfficeScan (OSCE) Support
Trend Micro - SecureCloud TCSM


Websense Data Security Suite Websense Email Security Gateway
Websense Web Security Gateway


BCS - Information Assurance Architecture BCS - Information Security Management Principles
Certified Information Systems Security Professional (CISSP) Dell SonicWALL Network Security Administration
Endpoint Security and Network Access Control HCISPP - HealthCare Information Security and Privacy Practitioner
Intrusion Detection, Attacks and CounterMeasures ISS - SiteProtector
IT Security Awareness for Non-Technical Personnel Network Defense and Countermeasures
Network Hacking and Security Network Security Essentials
PIX - ASA ( SNPA ) SCADA Security
Securing Web Applications with Spring Security Securing Web Applications, Services and Servers
SOA Security Vulnerability Assessment

Contact us for any other unlisted or customized Security Trainings