Most popular
CISM: Certified Information Security Manager
38 Lessons
24 hours
Intermediate
What you'll learn
Our CISM certification training and CISM online course provide in-depth coverage of the four domains required to pass the CISM exam.
Domain 1: Information Security Governance
Domain 2: Information Risk Management and Compliance
Domain 3: Information Security Program Development and Management
Domain 4: Information Security Incident Management
Certified Penetration Testing Professional | CPENT
14 Lessons
120 hours
Intermediate
CCES Check Point Certified Endpoint Specialist
14 Lessons
16 hours
Intermediate
What you'll learn
Explain how Endpoint Security works to enforce corporate security compliance for end users and their devices.
Become familiar with the Check Point Endpoint Security Solution architecture and how it integrates with Check Point Network Security Management.
Identify and describe key elements of the SmartEndpoint Management console.
Discuss Endpoint Security Software Blade options and how they are managed from the SmartEndpoint Management console.
Explain how to create and assign security policies for Endpoint clients using Endpoint Security.
Understand deployment methods and server considerations for Endpoint Security Management installation.
Identify the different ways to install and configure Endpoint clients.
Recognize how to configure VPN connectivity to allow clients connecting outside of the network perimeter to securely access corporate resources.
Understand how Endpoint Security authenticates and verifies clients connecting to the Endpoint Security Management Server.
Describe additional server configurations that are available to help manage Endpoint clients.
Recognize the different types of data security protections available to deploy on end user machines.
Describe how Full Disk Encryption technology protects and recovers data accessed and stored on Endpoint computers.
Understand how to secure removable media devices.
Become familiar with the Remote Help tool and how it supports clients experiencing FDE and Media Encryption issues.
Recognize the types of threats that target Endpoint computers.
Describe Check Point SandBlast Agent and how to deploy it in the Endpoint Security environment.
Explain how SandBlast Agent technology prevents malware from infiltrating Endpoint machines and corporate resources.
Identify SmartEndpoint reporting tools used to monitor and respond quickly to security events.
Understand how to troubleshoot and debug issues
ISO 31000 Lead Risk Manager
5 Lessons
40 hours
Intermediate
What you'll learn
Understand the risk management concepts, approaches, methods, and techniques
Learn how to interpret the ISO 31000 principles and framework in the context of an organization
Learn how to apply the ISO 31000 risk management process in an organization
Learn how to establish a risk recording and reporting process and an effective risk communication plan
Develop the ability to effectively manage, monitor, and review risk in an organization based on best practices
CGRC – Certified in Governance, Risk and Compliance
91 Lessons
40 hours
All Levels
What you'll learn
Information Security Risk Management Program.
Scope of the Information System.
Selection and Approval of Security and Privacy Controls.
Implementation of Security and Privacy Controls.
Assessment/Audit of Security and Privacy Controls.
Authorization/Approval of Information System.
Perform Continuous Monitoring.
CRISC: Certified Risk and Information Systems Control
27 Lessons
24 hours
Intermediate
What you'll learn
By the end of either the CRISC certification training or CRISC online training course, you will master the four CRISC domains.
Domain 1: IT Risk Identification
Domain 2: IT Risk Assessment
Domain 3: Risk Response and Mitigation
Domain 4: Risk Control, Monitoring, and Reporting
CCCS Check Point Certified Cloud Specialist – Administrator
18 Lessons
48 hours
Intermediate
What you'll learn
Explain the nature of the cloud environment
Describe the five pillars of cloud architecture
Explain the Basics of Cloud Infrastructure
Explain the Basics of Cloud Automation
Explain Check Point Security Management and How it Applies to CloudGuard
Describe CloudGuard Security Gateway offerings
Describe Cloud Load Balancers
Explain CloudGuard Licensing
Explain the different Deployment options and architectures for CloudGuard
Explain how and why CloudGuard is automated
Describe the functions of CloudGuard that can be automated
Describe the tools used to automate CloudGuard
Explain CloudGuard Automation Requirements
Explain basic troubleshooting techniques specific to Check Point Security Management Servers and Security Gateways
Describe the steps for Troubleshooting CloudGuard Network Installation
Explain the tools and techniques used to troubleshoot CloudGuard Network Automation
Explain the need for Cloud Security Posture Management
Describe the posture management tools available in CloudGuard
Explain methods for correcting Cloud Security Posture Management issues
CCMS Check Point Certified Multi-Domain Security Management Specialist
14 Lessons
16 hours
Intermediate
What you'll learn
Discuss challenges associated with securing large-scale business organizations with distributed network environments.
Describe the Check Point Multi-Domain Security Management solution and its benefits.
Understand the components of MDSM and how they work together to help administrators manage multiple network security environments within a single management framework.
Understand how to install and configure the Multi-Domain Security Management environment.
Describe how to implement Management High Availability within the MDSM environment.
Discuss the two types of log server options used to store logs in the Multi-Domain Security Management environment, and how they differ.
Understand how to manage and view Multi-Domain activity logs in SmartConsole.
Understand how to configure and implement Global Policy to manage rules for multiple domains.
Identify various MDSM command line tools commonly used to retrieve information and perform configuration changes on a MDSM Server.
Describe troubleshooting tools to use for addressing MDSM Server issues.
Understand how VSX works and how to integrate the technology within the MDSM environment.
C)NFE – Certified Network Forensic Examiner
24 hours
Intermediate
Trending
CCSE Check Point Certified Security Expert
13 Lessons
Intermediate
What you'll learn
Articulate Gaia system management procedures.
Explain how to perform database migration procedures.
Articulate the purpose and function of Management High Availability.
Describe how to use Check Point API tools to perform management functions.
Articulate an understanding of Security Gateway cluster upgrade methods.
Discuss the process of Stateful Traffic inspection.
Articulate an understanding of the Check Point Firewall processes and debug procedures.
Describe advanced ClusterXL functions and deployment options.
Explain how the SecureXL acceleration technology enhances and optimizes Security Gateway performance.
Describe how the CoreXL acceleration technology enhances and improves Security Gateway performance.
Articulate how utilizing multiple traffic queues can make traffic handling more efficient.
Describe different Check Point Threat Prevention solutions for network attacks.
Explain how SandBlast, Threat Emulation, and Threat Extraction help to prevent security incidents.
Recognize alternative Check Point Site-to-Site deployment options.
Recognize Check Point Remote Access solutions and how they differ from each other.
Describe Mobile Access deployment options.
ISO 9001 Lead Implementer
5 Lessons
40 hours
Intermediate
What you'll learn
Acknowledge the correlation between ISO 9001 and other standards and regulatory frameworks
Master the concepts, approaches, methods and techniques used for the implementation and effective management of a QMS
Learn how to interpret the ISO 9001 requirements in the specific context of an organization
Learn how to support an organization to effectively plan, implement, manage, monitor and maintain a QMS
Acquire the expertise to advise an organization in implementing Quality Management System best practices
SSCP – Systems Security Certified Practitioner
40 hours
Beginner
What you'll learn
In-depth coverage of the seven domains required to pass the SSCP exam.
Domain 1: Access Control
Domain 2: Security Operations and Administration
Domain 3: Risk Identification, Monitoring, and Analysis
Domain 4: Incident Response and Recovery
Domain 5: Cryptography
Domain 6: Networks and Communications Security
Domain 7: Systems and Application Security
C)CSO – Certified Cloud Security Officer
40 hours
Intermediate
CCTA Check Point Troubleshooting Administration
19 Lessons
16 hours
Intermediate
What you'll learn
Understand how to use Check Point resources for support.
Understand how to perform packet captures using tcmdump and FW Monitor command tools.
Understand the basic process of kernel debugging, and how debug commands are structured.
Recognize how to use various Linux commands for troubleshooting system issues.
Recognize communication issues that may occur between SmartConsole and the SMS and how to resolve them.
Understand how to troubleshoot SmartConsole login and authentication issues.
Understand how to prevent and resolve licensing and contract issues.
Understand how to troubleshoot issues that may occur during policy installation.
Understand communication issues that may occur when collecting logs and how to resolve them.
Recall various tools to use when analyzing issues with logs.
Understand how to restore interrupted communications during heavy logging.
Understand how NAT works and how to troubleshoot issues.
Understand Client Side and Server Side NAT.
Understand how the Access Control Policy functions and how the access control applications work together.
Understand how to troubleshoot issues that may occur with Application Control and URL Filtering.
Understand how the HTTPS Inspection process works and how to resolve issues that may occur during the process.
Understand how to troubleshoot Content Awareness issues.
Recognize how to troubleshoot VPN-related issues.
Understand how to monitor cluster status and work with critical devices.
Recognize how to troubleshoot State Synchronization.
Understand how to troubleshoot communication issues between Identity Sources and Security Gateways.
Understand how to troubleshoot and debug issues with internal Identity Awareness processes.
ISO 9001 Lead Auditor
5 Lessons
40 hours
Intermediate
What you'll learn
Understand the operations of a Quality Management System (QMS) based on ISO 9001
Acknowledge the correlation between ISO 9001 and other standards and regulatory frameworks
Understand the auditor’s role to: plan, lead and follow-up on a management system audit in accordance with ISO 19011
Learn how to lead an audit and audit team
Learn how to interpret the requirements of ISO 9001 in the context of a QMS audit
Acquire the competencies of an auditor to: plan an audit, lead an audit, draft reports, and follow-up on an audit in compliance with ISO 19011
CSSLP – Certified Secure Software Lifecycle Professional
40 hours
All Levels
What you'll learn
The course on CSSLP teaches how to secure your applications. After having CSSLP certification from (ISC) ², your application security capability within the software development lifecycle will be authorized. In-depth coverage of the eight domains required to pass the CSSLP exam.
Domain 1: Secure Software Concepts
Domain 2: Security Software Requirements
Domain 3: Secure Software Design
Domain 4: Secure Software Implementation/Coding
Domain 5: Secure Software Testing
Domain 6: Software Acceptance
Domain 7: Software Deployment, Operation, Maintenance and Disposal
Domain 8: Supply Chain and Software Acquisition
C)DFE – Certified Digital Forensic Examiner
40 hours
Intermediate
Featured Courses
CC – Certified in Cybersecurity Training
24 Lessons
8 hours
All Levels
Things you will get to learn in our CC – …
$749.00
CC – Certified in Cybersecurity Training
24 Lessons
8 hours
All Levels
Certified Ethical Hacker | CEH
40 hours
Intermediate
This Certified Ethical Hacker Certification is designed to teach students …
$3,095.00
Certified Ethical Hacker | CEH
40 hours
Intermediate
What you'll learn
Information security controls, laws, and standards.
Foot printing, foot printing tools, and countermeasures.
Network scanning techniques and scanning countermeasures.
Enumeration techniques and enumeration countermeasures.
Vulnerability analysis to identify security loopholes in the target organization’s network, communication infrastructure, and end systems.
System hacking methodology, steganography, stag analysis attacks, and covering tracks to discover system and network vulnerabilities.
Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures.
Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing.
Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures.
DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures.
Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures.
Web Server attacks and a comprehensive attack methodology to audit vulnerabilities in web server infrastructure, and countermeasures.
Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures.
SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures.
Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools.
Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools.
Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures.
Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools.
Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap.
Threats to IoT and OT platforms and defending IoT and OT devices.
Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools.
All Cybersecurity Courses
Cybersecurity Online Training Courses - Live
Cybersecurity is an ongoing challenge for today’s businesses. With new threats emerging every day, companies need a proactive approach towards identifying potential risks and vulnerabilities. It’s imperative IT professionals have the necessary skills to safeguard their organization against all security breaches. Our vast cybersecurity training portfolio can help you and your team develops cybersecurity skills at every level. We also offer prep courses for top industry-recognized certifications and product-specific courses targeting distinct skills. You and your team learn to approach cybersecurity offensively and defensively through real-world examples and exercises, hands-on labs, and expert instruction. You gain knowledge to close skill gaps, meet and maintain mandates, and sustain and retain a highly qualified workforce. CCS Learning Academy offers CISSP, CHFI, CEH, CCSP, Security +, and many more cybersecurity-related courses.Filter by Vendor
We found 2 courses available for you
CompTIA Cybersecurity Analyst (CySA+)
40 hours
Beginner
Participate in The High-Stake Cyber-Security Analyst Certification Course By participating …
$2,795.00
What you'll learn
Assess information security risk in computing and network environments.
Analyze reconnaissance threats to computing and network environments.
Analyze attacks on computing and network environments.
Analyze post-attack techniques on computing and network environments.
Implement a vulnerability management program.
Collect cybersecurity intelligence.
Analyze data collected from security and event logs.
Perform active analysis on assets and networks.
Respond to cybersecurity incidents.
Investigate cybersecurity incidents.
Address security issues with the organization’s technology architecture.
SSCP – Systems Security Certified Practitioner
40 hours
Beginner
Is SSCP A Good Certification Training? Professionals who work with …
$2,795.00
What you'll learn
In-depth coverage of the seven domains required to pass the SSCP exam.
Domain 1: Access Control
Domain 2: Security Operations and Administration
Domain 3: Risk Identification, Monitoring, and Analysis
Domain 4: Incident Response and Recovery
Domain 5: Cryptography
Domain 6: Networks and Communications Security
Domain 7: Systems and Application Security