Description If you intend to pass the CompTIA Security+ (Exam SY0-701) certification examination, this course can be a significant part of your preparation. But certification is not the only key to professional success in the field of IT security. Today's job market demands individuals with demonstrable skills, and the information and activities in this course […]
Workforce Development
Events
Calendar of Events
|
Sunday
|
Monday
|
Tuesday
|
Wednesday
|
Thursday
|
Friday
|
Saturday
|
|---|---|---|---|---|---|---|
|
0 events,
|
5 events,
$2499
Description In this course you will cover electronic discovery and advanced investigation techniques. This course is essential to anyone encountering digital evidence while conducting an investigation. Students will be taught the methodology for conducting a computer forensic examination. Students will learn to use forensically sound investigative techniques in order to evaluate the scene, collect and […]
$3500
Description In this course you will cover the keys to being a Powershell hacker. Most companies have an Active Directory infrastructure that manages authentication and authorization to most devices and objects within the organization. Many use PowerShell to speed up and simplify management. Did you know that a large percentage of hacks over the last […]
$3000
Description In this course, students will learn to plan and execute an endpoint deployment strategy using contemporary deployment techniques and implementing update strategies. The course introduces essential elements of modern management, co-management approaches, and Microsoft Intune integration. It covers app deployment, management of browser-based applications, and key security concepts such as authentication, identities, access, and […]
$2899
Description In this course you will cover current significant threats, threat actors, and identification procedures so that cyber-security professionals can implement the best policies and procures for their organizational security posture. This course will help security professionals learn how to make good use of the many sources of threat intelligence. It will aid an individual […]
$3500
|
8 events,Description In this course, you will cover how to manage core Windows Server workloads and services using on-premises, hybrid, and cloud technologies. The course teaches IT Professionals how to implement and manage on-premises and hybrid solutions such as identity, management, compute, networking, and storage in a Windows Server hybrid environment. Objectives Use administrative techniques […]
$2399
Description This course provides students with the knowledge and skills to administer a SQL Server database infrastructure for cloud, on-premises, and hybrid relational databases and who work with the Microsoft PaaS relational database offerings. Additionally, it will be of use to individuals who develop applications that deliver content from SQL-based relational databases. Pre-Requisites In […]
$2399
-
Description In this course, students will learn the fundamentals of database concepts in a cloud environment, get basic skilling in cloud data services, and build their foundational knowledge of cloud data services within Microsoft Azure. Students will identify and describe core data concepts such as relational, non-relational, big data, and analytics, and explore how this […]
$579
|
8 events,Description This course will discuss the various methods and best practices that are in line with business and technical requirements for modeling, visualizing, and analyzing data with Power BI. The course will also show how to access and process data from a range of data sources including both relational and non-relational data. This course will […]
$1739
|
8 events, |
8 events,
-
Description In this course, you will cover incident response methods and procedures are taught in alignment with industry frameworks such as US-CERT’s NCISP (National Cyber Incident Response Plan), and Presidential Policy Directive (PPD) 41 on Cyber Incident Coordination Policy. It is ideal for candidates who have been tasked with managing compliance with state legislation and […]
$349
|
0 events,
|
|
0 events,
|
3 events,Description In this course you will cover 5 Key Elements of Pen Testing; Information Gathering, Scanning, Enumeration, Exploitation and Reporting. Plus, discover the latest vulnerabilities and the techniques malicious hackers are using to acquire and destroy data. Additionally, you will learn more about the business skills needed to identify protection opportunities, justify testing activities and […]
$3500
Description This course will provide you something you will not find in other class! The Cloud is being widely adopted today for a diverse set of reasons. However, many are finding that security in the cloud is a huge challenge. The C)CSO looks to fill the gap in cloud security education and give you the […]
$4000
Description In this course, you will learn the value of vulnerability assessments. Then, you will discover how to use those assessments to make powerful changes in an information system's security. Additionally, you will learn how malware and destructive viruses function and how to implement counter response and preventative measures when it comes to a network […]
$3000
|
4 events,Description In this course, you will cover governance, compute, application architecture, storage, data integration, authentication, networks, business continuity, and migrations. The course combines lecture with case studies to demonstrate basic architect design principles. Objectives Design a governance solution. Design a compute solution. Design an application architecture. Design storage, non-relational and relational. Design data integration […]
$2399
|
6 events,Description In this course, you will cover the tools an IT engineer needs to review an Information System. You will learn the importance of vulnerability assessments and how they are used to prevent serious cyber break-ins. Lessons include understanding malware and viruses and how they can infiltrate an organization's network. After you take this course, […]
$2500
-
Description The power of extracting value from data utilizing Artificial Intelligence, Data Science and Machine Learning exposes the learning differences between humans and machines. Humans can apply ethical principles throughout the decision-making process to avoid discrimination, societal harm, and marginalization to maintain and even enhance acceptable norms. Machines make decisions autonomously. So how do we […]
$349
|
6 events,
-
Description The ability to identify and respond to changing trends is a hallmark of a successful business. Whether those trends are related to customers and sales, or to regulatory and industry standards, businesses are wise to keep track of the variables that can affect the bottom line. In today's business landscape, data comes from numerous […]
$199
|
0 events,
|
|
|
0 events,
|
6 events,Description In this course, you will cover how to prepare an organization to create a complete end-to-end solution for monitoring, preventing, detecting, and mitigating threats as they arise in real-time. Do not fool yourself, this course is far more advanced than you may expect. It is fast paced and thorough, so you can enjoy a […]
$3500
Description This course will provide you something you will not find in other class! The Cloud is being widely adopted today for a diverse set of reasons. However, many are finding that security in the cloud is a huge challenge. The C)CSO looks to fill the gap in cloud security education and give you the […]
$4000
Description In this course, you will cover the implementation and analysis of the IS18 Top Controls. These controls have been identified as critical by leading government and private organizations with expertise in understanding attack techniques and mitigating risks. They are designed to prevent known attacks and minimize the impact of successful attacks. By adopting the […]
$3000
Description In this course, you will cover the process of certifying, reviewing, and accrediting an information system by IT professionals. This course was created as a standard to measure the set of skills that specific members of an organization are required to have for the practice of certifying, reviewing, and accrediting the security of information […]
$3250
Description CompTIA Cloud+ validates the skills needed to implement cloud solutions, maintain and optimize cloud environments, and troubleshoot issues encountered when working in the cloud. The major areas of emphasis include: Cloud architecture and design Security within the cloud Automation and virtualization Disaster recovery High availability The Cloud+ exam covers five major domains: Cloud Architecture […]
$2499
Description In this course, you will cover the knowledge and skills required to transform business requirements in support of data-driven decisions by mining data, manipulating data, applying basic statistical methods, and analyzing complex data sets while adhering to governance and quality standards throughout the entire data lifecycle. In addition, it will help prepare candidates to […]
$2499
|
9 events,Description This course presents an approach for dealing with security and privacy throughout the entire software development lifecycle. You will learn about vulnerabilities that undermine security, and how to identify and remediate them in your own projects. You will learn general strategies for dealing with security defects and misconfiguration, how to design software to deal […]
$1497
-
Description This course introduces fundamentals concepts related to artificial intelligence (AI), and the services in Microsoft Azure that can be used to create AI solutions. The course is not designed to teach students to become professional data scientists or software developers, but rather to build awareness of common AI workloads and the ability to identify […]
$579
-
Description This course will provide foundational level knowledge of cloud services and how those services are provided with Microsoft Azure. The course can be taken as an optional first step in learning about cloud services and Microsoft Azure, before taking further Microsoft Azure or Microsoft cloud services courses. The course will cover general cloud computing […]
$579
|
8 events,Description In today’s competitive job market, the Certified Scrum Developer credential can set you apart from the pack. A successful Scrum Developer is committed to continuous improvement. The coursework and dedication needed to achieve a CSD sharpens your skills and helps you become a better practitioner of Scrum. During the course, attendees will learn how […]
$1499
|
0 events,
|
||
|
0 events,
|
1 event,Description In this course, you will cover the tools to identify and manage common ethical risks in the development of emerging data-driven technologies. This course distills ethical theory, public regulations, and industry best practices into concrete skills and guidelines needed for the responsible development of digital products and services. By following the course's practical, problems-based […]
$2495
|
0 events,
|
0 events,
|
0 events,
|
||
|
0 events,
|
3 events,Description This course covers network defense and incident response methods, tactics, and procedures that are in alignment with industry frameworks such as NIST 800-61r2 (Computer Security Incident Handling Guide), US-CERT's National Cyber Incident Response Plan (NCIRP), and Presidential Policy Directive (PPD)-41 on Cyber Incident Coordination. It is ideal for candidates who have been tasked with […]
$2495
Description CompTIA A+ Core 1 is the first of two exams required to earn the industry-standard A+ certification, designed to launch your tech career. This exam focuses on foundational skills in hardware, networking, mobile devices, and troubleshooting. Passing Core 1 and Core 2 prepares you for roles like IT support specialist and help desk technician […]
$2395
Description In this course you will cover 20+ modules of network forensic topics. The C)NFE provides practical experience through our lab exercises that simulate real-world scenarios covering investigation and recovery of data in network. The C)NFE focuses on centralizing and investigating logging systems as well as network devices. Objectives Upon successful completion of this […]
$3500
|
0 events,
|