EncartaLabs

Security (177 Courses)

CheckPoint

Check Point - CCMSE NGX Check Point - CCMSE NGX Plus VSX
Check Point - CPIS (Check Point Integrity) Check Point - Endpoint Security
Check Point GAiA - Essentials Check Point IPS
Check Point - IPSO Check Point Multi-Domain Security Management
Check Point Multi-Domain Security with VSX Check Point - Performance and Optimization
Check Point - Security Administration Check Point - Security Engineering
Check Point - Security Expert (CCSE) Check Point - Troubleshooting R75 Advanced
Check Point - Upgrade and Migration Check Point - VSX

Cyber Security

Certified Authorization Professional (CAP) Certified Cyber Forensics Professional (CCFP)
Certified Information Security Manager (CISM) Certified Information Systems Auditor (CISA)
Certified Information Systems Security Professional (CISSP) Certified Secure Software Lifecycle Professional (CSSLP)
CISSP-ISSAP CISSP-ISSEP
CISSP-ISSMP CompTIA Advanced Security Practitioner (CASP)
CompTIA Security+ Cyber Security Compliance & Mobility Course
Cyber Security Essentials Cyber Security Risk Assessment & Management
Cybersecurity Investigations and Network Forensics Analysis Cyberspace Operations Strategist and Planner
Defending the Perimeter from Cyber Attacks Defensive Cyber Operations Engineer
Digital Forensics Identity Management
Introduction to Cyber Warfare and Operations Design Social Media Security Professional (SMSP)
Systems Security Certified Practitioner (SSCP)

F5 Networks

Configuring and Administering F5 SDC Configuring F5 SSL Orchestrator
F5 - Administering BIGIP F5 - Automating BIG-IP with Ansible
F5 - Automating BIG-IP with AS3 F5 - Configuring BIG-IP on VIPRION
F5 - Configuring BIG-IQ F5 - Developing iRules for BIG-IP
F5 - Troubleshooting BIG-IP F5 Configuring BIG-IP - AAM (Application Acceleration Manager)
F5 Configuring BIG-IP - Advanced WAF F5 Configuring BIG-IP - AFM (Advanced Firewall Manager)
F5 Configuring BIG-IP - APM (Access Policy Manager) F5 Configuring BIG-IP - DNS (Domain Name System)
F5 Configuring BIG-IP - LTM (Local Traffic Manager) Securing Apps with F5 Solutions
Setting up F5 Advanced WAF

FireEye

FireEye Endpoint Security Administration FireEye Helix
FireEye Network Forensics FireEye Network Security Administration

Foundstone

Building Secure Software Forensics & Incident Response
Ultimate Hacking Ultimate Hacking: Expert
Ultimate Hacking: Web Ultimate Hacking: Windows Security
Ultimate Hacking: Wireless Writing Secure Code - ASP.NET (C#)
Writing Secure Code: Java (J2EE)

ISO & Information Security

ISO/IEC 27001 Information Security - Lead Auditor ISO/IEC 27002 Information Security Controls - Lead Manager
ISO/IEC 27005 Information Security - Lead Risk Manager ISO/IEC 27032 - Lead Cybersecurity Manager
ISO/IEC 27035 - Lead Incident Manager ISO/IEC 27701 Privacy Information Management System - Lead Auditor
ISO 27799 Information Security Management - Lead Manager Lead Computer Forensics Examiner
Lead Ethical Hacker Lead SCADA Security Manager

ISSA

Access Control, Authentication, and Public Key Infrastructure Auditing IT Infrastructures for Compliance
Fundamentals of Information Systems Security Legal Issues in Information Security
Managing Risk in Information Systems Network Security, Firewalls, and VPNs
Security Policies and Implementation Issues Security Strategies in Web Applications and Social Networking
Security Strategies in Windows Platforms and Applications Systems Forensics, Investigation, and Response

Juniper

Advanced Juniper Networks VPN Implementations (AJVI) Advanced Junos Security (AJSEC)
Attack Prevention with Juniper Networks Firewalls (APJF) Configuring and Monitoring the vGW Virtual Gateway (CMvGW)
Configuring Juniper Networks Firewall/IPSec VPN Products (CJFV) Implementing Intrusion Detection and Prevention Products (IIDP)
Integrating Juniper Networks Firewall/IPSec VPN Products into High-Performance Networks (IFVH) Juniper Advanced Junos Enterprise Security Troubleshooting (AJEST)
Junos Edge Security Services (JESS) Junos Intrusion Prevention Systems (JIPS)
Junos Pulse Access Control (JPAC) Junos Pulse Secure Access (JPSA)
Junos Security (JSEC) Junos Space for the Enterprise (JS-ENT)
Junos Unified Threat Management (JUTM)

Mobility, Telecom & Networks

Android Security Architecture CompTIA Mobile App Security+ - Android Edition
CompTIA Mobile App Security+ - iOS Edition CompTIA Mobility+
GSM and GPRS Security IPv6 Security
Mobile Application Security Mobile Security
QRadar QRadar Administration
VoIP Security Wireless LAN Security

Palo Alto Networks

Palo Alto Networks Firewall - Configuration & Management Palo Alto Networks Firewall - Optimizing Firewall Threat Prevention
Palo Alto Networks Firewall - Troubleshooting Palo Alto Networks Panorama - Managing Firewalls at Scale
Palo Alto Networks Panorama - Manage Multiple Firewalls Palo Alto Networks Traps - Endpoint Protection
Prisma Access SASE Security - Design & Operation Cortex XDR2 - Prevention, Analysis, and Response

SAS

SAS Enterprise Case Management - Using the Interface SAS Fraud Framework - Implementing the SAS Social Network Analysis Interface
SAS Fraud Framework - Using the SAS Financial Crimes Monitor Interface SAS Fraud Framework - Using the Social Network Analysis Interface

SonicWall

SonicWALL Network Security Administration (SNSA) SonicWALL Network Security Professional (SNSP)
SonicWALL Secure Mobile Access Administration (SMAA)

Symantec-Veritas

Altiris Client Management Suite - Administration NetBackup - Administration
Symantec Data Insight - Administration Symantec Data Loss Prevention
Symantec Endpoint Protection Symantec Endpoint Protection Administration
Symantec Enterprise Vault - Implementation and Deployment Symantec Enterprise Vault for File System Archiving - Administration
Symantec Ghost Solution Suite Symantec NetBackup for Windows - Administration
Symantec System Recovery - Administration Veritas Backup Exec - Administration
Veritas Cluster Server for UNIX Veritas InfoScale Availability for Linux - Administration
Veritas InfoScale Storage for Linux - Administration

Trend Micro, FortiGate and Microsoft Security Products

Forefront Threat Management Gateway 2010 Forefront Unified Access Gateway (UAG)
FortiGate Administration FortiGate Secured Network Deployment and IPSec VPN
Trend Micro - Deep Security Support Trend Micro - OfficeScan (OSCE) Support
Trend Micro - SecureCloud TCSM

WebSense

Websense Data Security Suite Websense Email Security Gateway
Websense Web Security Gateway

Zscaler

Zscaler Cloud Administrator - Internet Access Zscaler Cloud Administrator - Private Access

Miscellaneous

BCS - Information Assurance Architecture Certified Information Systems Security Professional (CISSP)
Cisco Web Security Appliance CyberArk
Endpoint Security and Network Access Control
HCISPP - HealthCare Information Security and Privacy Practitioner Intrusion Detection, Attacks and CounterMeasures
ISS - SiteProtector IT Security Awareness for Non-Technical Personnel
Network Defense and Countermeasures Network Hacking and Security
Network Security Essentials PIX - ASA ( SNPA )
SCADA Security Securing Web Applications with Spring Security
Securing Web Applications, Services and Servers SOA Security
Vulnerability Assessment VMware vSphere Security Design

Contact us for any other unlisted or customized Security Trainings


Top