CompTIA Core Blockchain

CompTIA Core Blockchain

A CompTIA Micro Course 1 H 35 M

Our trainer discuss how blockchain has proliferated into both public and private industry sectors and give examples of how opportunities in those sectors continue to expand and influence business globally.

CompTIA Core Blockchain
Certified Information Systems Security Professional (UPDATED 2018)

Certified Information Systems Security Professional (UPDATED 2018)

CISSP 81 H 14 M

The Certified Information Systems Security Professional (CISSP) certification is the gold standard in the IT Security field. Security professionals that have achieved their CISSP designation are regarded as some of the most talented and knowledgeable people in their field. The certification demonstrates that the holder has been working in IT Security for over five years, has a broad range of knowledge in ten domains related to creating, supporting and maintaining a secure IT infrastructure and can implement things like risk management and risk identification.

Certified Information Systems Security Professional (UPDATED 2018)
MTA Security Fundamentals - 98-367 (2018)

MTA Security Fundamentals - 98-367 (2018)

Security Fundamentals 10 H 56 M

Welcome to the Microsoft MTA Security Fundamentals series. This series is intended to explore the topics necessary to prepare for the 98-367 exam. Here we cover many computer security related concepts such as exploring their best practices and practical application. This includes important topics like security layers, operating system security, network security, and security software.

MTA Security Fundamentals - 98-367 (2018)
GIAC Security Essentials (GSEC)

GIAC Security Essentials (GSEC)

GIAC GSEC 10 H 44 M

CyberSec First Responder(CFR) is a comprehensive certification designed to validate the knowledge and skills required to protect critical information systems before, during, and after an incident. In this training, trainer will quickly walk you through the details of the exam, how the series is structured, and what you can expect to get out of it.

GIAC Security Essentials (GSEC)
Accelerated CISSP (2018)

Accelerated CISSP (2018)

Certified Information Systems Security Professional 33 H 12 M

The Certified Information Systems Security Professional (CISSP) certification is the gold standard in the IT Security field. Security professionals that have achieved their CISSP designation are regarded as some of the most talented and knowledgeable people in their field. The certification demonstrates that the holder has been working in IT Security for over five years, has a broad range of knowledge in ten domains related to creating, supporting and maintaining a secure IT infrastructure and can implement things like risk management and risk identification.

Accelerated CISSP (2018)
CCNA Cyber Ops (210-250 SECFND)

CCNA Cyber Ops (210-250 SECFND)

Cisco Cybersecurity Fundamentals 25 H 34 M

The Cisco Cybersecurity Fundamentals show is based around the released exam objectives for SECFND Exam 210-250. The training will cover every exam objective to help prepare those interested in becoming CCNA CyberOps certified. The training aids those preparing for the first of two exams leading to that certification by helping understand cybersecurity basics, foundational networking and security knowledge and develop skills needed in preparation for the second (SECOPS) exam.

CCNA Cyber Ops (210-250 SECFND)
Business Continuity and Disaster Recovery

Business Continuity and Disaster Recovery

BCDR 5 H 22 M

In this series, trainers discuss what topics will be covered in the rest of the series. They do a high level overview of the who, what, when, where and why of business continuity disaster recovery.

Business Continuity and Disaster Recovery
CCNA Cyber Ops (210-255 SECOPS)

CCNA Cyber Ops (210-255 SECOPS)

Cisco Cybersecurity Operations 22 H 50 M

The Cisco Cybersecurity Operations (Exam 210-255) will help prepare someone preparing for the 2 exams of the CCNA Cyber Ops Certification. It also aids them to get ready to begin working as an associate level analyst within a Security Operations Center (SOC) and help the candidate handle the tasks, duties and responsibilities working as an analyst in the SOC. The series will focus on introductory-level skills of basic threat analysis, event correlation, identifying malicious activities and using a playbook for incident response.

CCNA Cyber Ops (210-255 SECOPS)
CompTIA Security+ (SY0-501)

CompTIA Security+ (SY0-501)

Vendor-neutral IT Security 27 H 44 M

This series is focused on CompTIA’s Security+ certifications. Security+ is a vendor-neutral certification that is recognized worldwide as a benchmark for information system security best practices. The series is intended for aspiring IT security professionals entering into security. The series follows the CompTIA specified objectives for the SY0-501 exam.

CompTIA Security+ (SY0-501)
CyberPatriot

CyberPatriot

National Youth Cyber Education Program 11 H 21 M

This course is an introduction to the CyberPatriot national competition aimed at involving students with STEM and cyber security.

CyberPatriot
CompTIA Accelerated Security+ (SY0-501)

CompTIA Accelerated Security+ (SY0-501)

Vendor-neutral IT Security 11 H 5 M

This series is focused on CompTIA’s Security+ certifications. Security+ is a vendor-neutral certification that is recognized worldwide as a benchmark for information system security best practices. The series is intended for aspiring IT security professionals that have finished their training and want an accelerated version of the SY0-501 series. It is recommended that candidates used this content to round off their training prior to sitting for the SY0-501 exam.

CompTIA Accelerated Security+ (SY0-501)
CompTIA CySA+ (CS0-001)

CompTIA CySA+ (CS0-001)

CompTIA Cybersecurity Analyst 25 H 35 M

Welcome to the CompTIA CySA+ series. This series is intended to explore the topics necessary to prepare for the CySA+ exam. Here we cover many computer security related concepts and tools, exploring their best practices and practical application. This includes threats, threat management, reconnaissance, and countermeasures, common vulnerabilities, penetration testing, incident response, security architectures, and common tool sets.

CompTIA CySA+ (CS0-001)
Eliminating Malware

Eliminating Malware

Tools and Techniques for Malware Removal/Prevention 1 H 2 M

In this training, our trainer taught you what to do when you suspect that your computer might be infected with malware. They begin by explaining how to identify the symptoms of a malware infection. Then they demonstrate the ways in which you would quarantine the infected system followed by remediation using both built-in and 3rd-party antivirus/antimalware tools like HouseCall and Malwarebytes. Finally, they look at using bootable media with stand-alone antivirus software like Kaspersky Rescue Disk 10, for the most difficult cases.

Eliminating Malware
Cyber Secure Coder (CSC-110)

Cyber Secure Coder (CSC-110)

Security-Focused Programming 9 H 57 M

Cyber Secure Coder will aid in developing an appropriate understanding of secure development practices and how those practices protect against various types of vulnerabilities. You will learn the types of vulnerabilities, the exploits that can occur from those vulnerabilities, and the programming practices that will help prevent exploitation in an application.

Cyber Secure Coder (CSC-110)
CyberSec First Responder (CFR-310)

CyberSec First Responder (CFR-310)

Network Defense and Incident Response 13 H 18 M

This course covers network defense and incident response methods, tactics, and procedures that are in alignment with industry frameworks such as NIST 800-61r2 (Computer Security Incident Handling Guide), US-CERT’s National Cyber Incident Response Plan (NCIRP), and Presidential Policy Directive (PPD)-41 on Cyber Incident Coordination. It is ideal for candidates who have been tasked with the responsibility of monitoring and detecting security incidents in information systems and networks, and for executing standardized responses to such incidents.

CyberSec First Responder (CFR-310)
CompTIA CySA+ (CS0-002)

CompTIA CySA+ (CS0-002)

CompTIA Cybersecurity Analyst 25 H 6 M

Welcome to the CompTIA CySA+ series. This series is intended to explore the topics necessary to prepare for the CySA+ exam. Here we cover many computer security related concepts and tools, exploring their best practices and practical application. This includes threats, threat management, reconnaissance, and countermeasures, common vulnerabilities, penetration testing, incident response, security architectures, and common tool sets.

CompTIA CySA+ (CS0-002)
Email Encryption

Email Encryption

with OpenPGP 44 M

Email Encryption
CompTIA PenTest+ (PT0-001)

CompTIA PenTest+ (PT0-001)

Penetration testing and vulnerability management 34 H 16 M

In this series, we will take you through the material necessary to prepare for the CompTIA Pentest+ exam. Here we’ll taught you important and practical topics such as pentest pre-planning methods, legal concepts, and proper scoping tactics.

CompTIA PenTest+ (PT0-001)
End User Security Awareness

End User Security Awareness

Best Security Practices for the End User 3 H 4 M

In this training, trainer examine the characteristics that make up a high quality password. They identify weaknesses found in many passwords and demonstrate how attackers can take advantage of weak passwords. They then help the viewers by suggesting a few methods to easily create memorable, yet secure, passwords.

End User Security Awareness
General Data Protection Regulation (GDPR)

General Data Protection Regulation (GDPR)

EU regulation on protecting personal data 8 H 31 M

In April of 2016, the European Commission published a data protection package to reform, modernize and harmonize European data protection law. The cornerstone of the package is the General Data Protection Regulation (GDPR) which will replace the 1995 Data Protection Directive and, in the UK, the Data Protection Act 1998. This overview highlights the key themes of the General Data Protection Regulation (GDPR) to help organizations understand the new legal framework in the EU. It is for those who have day-to-day responsibility for data protection.

General Data Protection Regulation (GDPR)
CompTIA CASP+ (CAS-003)

CompTIA CASP+ (CAS-003)

CompTIA Advanced Security Practitioner 63 H 55 M

CompTIA CASP+ (CAS-003)
Accredited ISO/IEC 27,001 Foundation

Accredited ISO/IEC 27,001 Foundation

ISO/IEC 27,001 Foundation 10 H 43 M

Accredited ISO/IEC 27,001 Foundation
Mobile Security

Mobile Security

Mobile device risks and mitigation 3 H 21 M

In this training, trainers discuss and demonstrate the exposure we have from unmanned mobile devices within a managed network. trainer describes some of the problems with them as well as the possible attacks. He then demonstrates the way built security is working to protect itself on an Apple device by segregating applications and isolatingthe communication between application and the iOS and not allowing direct communication between applications.

Mobile Security
OWASP 2017 Top 10

OWASP 2017 Top 10

Web Application Security 7 H 9 M

OWASP 2017 Top 10
Accredited Management of Risk® Foundation

Accredited Management of Risk® Foundation

Accredited Management of Risk® Foundation 23 H 1 M

Accredited Management of Risk® Foundation
Penetration Testing

Penetration Testing

Tools and techniques for verifying security integrity 9 H 19 M

In this series, our trainers discuss, explain, and demonstrate some of the common tools and techniques used by Penetrations Testers during a security audit. Watch as they explore topics like hacking platforms and test environments, creating BIND/REVERSE shells, discovering and exploiting Buffer Overflows, Cross Site Scripting attacks, Local and Remote File Inclusion attacks, SQL-Injection, Password attacks, Privilege Escalation, and Port Redirection.

Penetration Testing
pfSense 2.4.4: Open Source Firewall (2019)

pfSense 2.4.4: Open Source Firewall (2019)

pfSense 2.4.4: Open Source Firewall (2019) 14 H 46 M

This training covers the basics of pfSense, the “World’s Most Trusted Open Source Firewall”. It will help IT professionals to install, configure and manage & maintain the rich features in pfSense 2.4.4 for a production environment. It will also be helpful to the novice IT professional who needs to start working with a firewall.

pfSense 2.4.4: Open Source Firewall (2019)
Practical IT Security

Practical IT Security

Hands-On answers to security questions 17 H 16 M

Our trainers discuss the differences between single, dual, and Multi-Factor authentication. They also discuss how to setup Windows Hello on a stand alone Windows 10 machine.

Practical IT Security
Practical Pentesting: featuring Brad Stine

Practical Pentesting: featuring Brad Stine

Practical Pentesting 7 H 19 M
In this training, our trainers quickly explore what will be covered by the Practical Pentesting series. This includes topics like Pre-engagement activities, statements of work, authorization, and the different stages of assessment.
Practical Pentesting: featuring Brad Stine
Security Tech Skills (2017)

Security Tech Skills (2017)

 Commonly used penetration tools4 H 58 M
In this training, trainers explore common tools, techniques, and practices used in the pursuit of securing your environment. Here they specifically look at host discovery using the venerable Nmap scanner in both Linux and Windows.
Security Tech Skills (2017)
Wireshark 2.2.4

Wireshark 2.2.4

Network protocol analyzer 3 H 56 M

Wireshark 2.2.4 is a free and open source network packet sniffer and protocol analyzer developed as a first response tool. It is the most widely-used network protocol analyzer. I can be used to examine all network traffic because it’s a mini swiss army knife to network administrators who needs detailed visibility into the traffic on their network. It displays the raw data obtained by the sniffer and turns it into readable and meaningful data so that the user will be able to spot issues as well as correct network problems. It’s power lies in the ability to help an analyst find the proverbial “needle in a haystack” when the user is up to speed on what to look for and how to do it. This show helps the network professional get started with Wireshark!

Wireshark 2.2.4
Working with SSH

Working with SSH

SSH Tools and Tips 33 M

Working with SSH