Facebook

Cybersecurity Courses

Most popular
Trending

All Cybersecurity Courses

Cybersecurity Online Training Courses - Live

Cybersecurity is an ongoing challenge for today’s businesses. With new threats emerging every day, companies need a proactive approach towards identifying potential risks and vulnerabilities. It’s imperative IT professionals have the necessary skills to safeguard their organization against all security breaches. Our vast cybersecurity training portfolio can help you and your team develops cybersecurity skills at every level. We also offer prep courses for top industry-recognized certifications and product-specific courses targeting distinct skills. You and your team learn to approach cybersecurity offensively and defensively through real-world examples and exercises, hands-on labs, and expert instruction. You gain knowledge to close skill gaps, meet and maintain mandates, and sustain and retain a highly qualified workforce. CCS Learning Academy offers CISSP, CHFI, CEH, CCSP, Security +, and many more cybersecurity-related courses.
ISACA_partnerlogo

We found 3 courses available for you
See

CNSE-AWS Cloud Network Security Expert for AWS

26 Lessons
Intermediate

Course Description: Learn advanced concepts and develop skills needed to …

What you'll learn
Discuss AWS Platform Components and their relationship to Check Point CloudGuard Network Security.
Explain how to maintain a secure, efficient, and stable cloud environment.
Describe the components and constraints of a hub and spoke security environment.
Describe the function of the Cloud Management Extension.
Explain the purpose of identity and access controls and constraints in different cloud platforms.
Explain the steps required to configure Identity and Access controls in AWS.
Describe the purpose and function of the CloudGuard Controller, its processes, and how it is tied to the Identity Awareness feature.
Explain how to design and configure Cloud Adaptive Policies.
Discuss the purpose and function of Data Center Objects.
Describe the function and advantages of Cloud Service Provider (CSP) automation templates for instance and resource deployments.
Explain how CSP templates can be used for maintenance tasks in the cloud environment.
Discuss Third-Party Automation tools, how they can simplify deployment and maintenance tasks, and the constraints associated with them.
Discuss Scaling Solutions and Options for Cloud Environments.
Explain the Scaling Options in AWS.
Describe the workflow for configuring scaling solutions in AWS.
Discuss how ClusterXL operates and what elements work together to permit traffic failover.
Explain how ClusterXL functions differently in a Cloud Environment.
Describe how clusters are created and function in AWS.
Discuss the elements involved in Hybrid Data Center deployments, the advantages of them, and the constraints involved.
Explain the nature of a “Greenfield” deployment, the advantages of it, and the constraints involved.
Describe the components and constraint involved in deploying a Disaster Recovery Site in the cloud.
Discuss the steps required for troubleshooting automation in AWS.
Explain the steps required for troubleshooting Scaling Solution issues in AWS.
Describe the steps required for troubleshooting clusters in AWS.

GIAC Security Leadership (GSLC)

Intermediate

Course Description The GIAC Security Leadership (GSLC) certification validates a …

CCSE Check Point Certified Security Expert

13 Lessons
Intermediate

Course Description: Validate and enhance your skills and optimally manage …

What you'll learn
Articulate Gaia system management procedures.
Explain how to perform database migration procedures.
Articulate the purpose and function of Management High Availability.
Describe how to use Check Point API tools to perform management functions.
Articulate an understanding of Security Gateway cluster upgrade methods.
Discuss the process of Stateful Traffic inspection.
Articulate an understanding of the Check Point Firewall processes and debug procedures.
Describe advanced ClusterXL functions and deployment options.
Explain how the SecureXL acceleration technology enhances and optimizes Security Gateway performance.
Describe how the CoreXL acceleration technology enhances and improves Security Gateway performance.
Articulate how utilizing multiple traffic queues can make traffic handling more efficient.
Describe different Check Point Threat Prevention solutions for network attacks.
Explain how SandBlast, Threat Emulation, and Threat Extraction help to prevent security incidents.
Recognize alternative Check Point Site-to-Site deployment options.
Recognize Check Point Remote Access solutions and how they differ from each other.
Describe Mobile Access deployment options.