Most popular
CyberSec First Responder® (CFR)
41 Lessons
40 hours
Intermediate
What you'll learn
Compare and contrast various threats and classify threat profile
Explain the purpose and use of attack tools and technique
Explain the purpose and use of post exploitation tools and tactic
Explain the purpose and use of social engineering tactic
Given a scenario, perform ongoing threat landscape research and use data to prepare for incident
Explain the purpose and characteristics of various data source Given a scenario, use appropriate tools to analyze log
Given a scenario, use regular expressions to parse log files and locate meaningful data
Given a scenario, use Windows tools to analyze incidents
Given a scenario, use Linux-based tools to analyze incidents
Summarize methods and tools used for malware analysis
Given a scenario, analyze common indicators of potential compromise
Explain the importance of best practices in preparation for incident response
Given a scenario, execute incident response process
Explain the importance of concepts that are unique to forensic analysis
Explain general mitigation methods and devices
Certified Network Defender | CND
20 Lessons
40 hours
Intermediate
ISO/IEC 27001 Lead Implementer
5 Lessons
40 hours
Intermediate
What you'll learn
Gain a comprehensive understanding of the concepts, approaches, methods, and techniques used for the implementation and effective management of an ISMS
Acknowledge the correlation between ISO/IEC 27001, ISO/IEC 27002, and other standards and regulatory frameworks
Understand the operation of an information security management system and its processes based on ISO/IEC 27001
Learn how to interpret and implement the requirements of ISO/IEC 27001 in the specific context of an organization
Acquire the necessary knowledge to support an organization in effectively planning, implementing, managing, monitoring, and maintaining an ISMS
CISSP Exam Preparation Course
328 Lessons
40 hours
Intermediate
What you'll learn
In-depth coverage of the eight domains required to pass the CISSP exam
Domain 1: Security and Risk Management
Domain 2: Asset Security
Domain 3: Security Engineering
Domain 4: Communications and Network Security
Domain 5: Identity and Access Management
Domain 6: Security Assessment and Testing
Domain 7: Security Operations
Domain 8: Software Development Security
Certified Incident Handler | ECIH
9 Lessons
40 hours
All Levels
What you'll learn
To enable individuals and organizations with the ability to handle and respond to different types of cybersecurity incidents in a systematic way.
To ensure that organization can identify, contain, and recover from an attack.
To reinstate regular operations of the organization as early as possible and mitigate the negative impact on the business operations.
To be able to draft security policies with efficacy and ensure that the quality of services is maintained at the agreed levels.
To minimize the loss and after-effects breach of the incident.
For individuals: To enhance skills on incident handling and boost their employability.
CCAS Check Point Certified Automation Specialist
13 Lessons
16 hours
Intermediate
What you'll learn
Explain how automation and orchestration work together
Understand the key drivers for incorporating automation and orchestration into security management
Execute a shell script that demonstrates how to build a comprehensive Security Policy.
Recognize how the Check Point API framework integrates with R80 Security Management to support automation and orchestration of daily tasks
Describe Check Point API tools and demonstrate how they are used to manage Check Point Security Management solutions
Demonstrate how to define new objects and modify existing ones by using the Check Point API
Demonstrate how to create API commands to efficiently maintain the Check Point Security Management Server database
Demonstrate how to use different methods to update the database with API commands
Become familiar with client-side and server-side scripting and scripting languages
Understand how to use the Bash shell to develop APIs
Recognize and describe many of the open source tools that are available to assist with API development
Demonstrate how to use a custom REST application to update the database of a Security Management Server
Demonstrate how to use Postman to manage the Security Policy database through the Check Point API
Understand what steps to take to troubleshoot and debug API scripts
Demonstrate basic troubleshooting techniques by reviewing debugging messages in various forms
Understand how to use self-service portal capabilities to provide general IT services
Recognize how automation tools work with Check Point APIs to automate security management tasks and orchestrate workflow behind service portals
Demonstrate common tasks that are automated in a Web portal to manage the Security Policy
ISO/IEC 27032 Lead Cybersecurity Manager
5 Lessons
40 hours
Intermediate
What you'll learn
Acquire comprehensive knowledge on the elements and operations of a Cybersecurity Program in conformance with ISO/IEC 27032 and NIST Cybersecurity framework
Acknowledge the correlation between ISO 27032, NIST Cybersecurity framework and other standards and operating frameworks
Master the concepts, approaches, standards, methods and techniques used to effectively set up, implement, and manage a Cybersecurity program within an organization
Learn how to interpret the guidelines of ISO/IEC 27032 in the specific context of an organization
Master the necessary expertise to plan, implement, manage, control and maintain a Cybersecurity Program as specified in ISO/IEC 27032 and NIST Cybersecurity framework
Acquire the necessary expertise to advise an organization on the best practices for managing Cybersecurity
CCSP – Certified Cloud Security Professional
40 hours
All Levels
What you'll learn
The CCSP certification training is designed to help you pass the CCSP exam on the first try.
This course focuses on of the six domains required to pass the CCSP exam
Domain 1: Architectural concepts and design requirements
Domain 2: Cloud data security
Domain 3: Cloud platform and infrastructure security
Domain 4: Cloud application security
Domain 5: Operations
Domain 6: Legal and compliance
Trending
CyberSec First Responder® (CFR)
41 Lessons
40 hours
Intermediate
What you'll learn
Compare and contrast various threats and classify threat profile
Explain the purpose and use of attack tools and technique
Explain the purpose and use of post exploitation tools and tactic
Explain the purpose and use of social engineering tactic
Given a scenario, perform ongoing threat landscape research and use data to prepare for incident
Explain the purpose and characteristics of various data source Given a scenario, use appropriate tools to analyze log
Given a scenario, use regular expressions to parse log files and locate meaningful data
Given a scenario, use Windows tools to analyze incidents
Given a scenario, use Linux-based tools to analyze incidents
Summarize methods and tools used for malware analysis
Given a scenario, analyze common indicators of potential compromise
Explain the importance of best practices in preparation for incident response
Given a scenario, execute incident response process
Explain the importance of concepts that are unique to forensic analysis
Explain general mitigation methods and devices
Certified Network Defender | CND
20 Lessons
40 hours
Intermediate
ISO/IEC 27001 Lead Implementer
5 Lessons
40 hours
Intermediate
What you'll learn
Gain a comprehensive understanding of the concepts, approaches, methods, and techniques used for the implementation and effective management of an ISMS
Acknowledge the correlation between ISO/IEC 27001, ISO/IEC 27002, and other standards and regulatory frameworks
Understand the operation of an information security management system and its processes based on ISO/IEC 27001
Learn how to interpret and implement the requirements of ISO/IEC 27001 in the specific context of an organization
Acquire the necessary knowledge to support an organization in effectively planning, implementing, managing, monitoring, and maintaining an ISMS
CISSP Exam Preparation Course
328 Lessons
40 hours
Intermediate
What you'll learn
In-depth coverage of the eight domains required to pass the CISSP exam
Domain 1: Security and Risk Management
Domain 2: Asset Security
Domain 3: Security Engineering
Domain 4: Communications and Network Security
Domain 5: Identity and Access Management
Domain 6: Security Assessment and Testing
Domain 7: Security Operations
Domain 8: Software Development Security
Certified Incident Handler | ECIH
9 Lessons
40 hours
All Levels
What you'll learn
To enable individuals and organizations with the ability to handle and respond to different types of cybersecurity incidents in a systematic way.
To ensure that organization can identify, contain, and recover from an attack.
To reinstate regular operations of the organization as early as possible and mitigate the negative impact on the business operations.
To be able to draft security policies with efficacy and ensure that the quality of services is maintained at the agreed levels.
To minimize the loss and after-effects breach of the incident.
For individuals: To enhance skills on incident handling and boost their employability.
CCAS Check Point Certified Automation Specialist
13 Lessons
16 hours
Intermediate
What you'll learn
Explain how automation and orchestration work together
Understand the key drivers for incorporating automation and orchestration into security management
Execute a shell script that demonstrates how to build a comprehensive Security Policy.
Recognize how the Check Point API framework integrates with R80 Security Management to support automation and orchestration of daily tasks
Describe Check Point API tools and demonstrate how they are used to manage Check Point Security Management solutions
Demonstrate how to define new objects and modify existing ones by using the Check Point API
Demonstrate how to create API commands to efficiently maintain the Check Point Security Management Server database
Demonstrate how to use different methods to update the database with API commands
Become familiar with client-side and server-side scripting and scripting languages
Understand how to use the Bash shell to develop APIs
Recognize and describe many of the open source tools that are available to assist with API development
Demonstrate how to use a custom REST application to update the database of a Security Management Server
Demonstrate how to use Postman to manage the Security Policy database through the Check Point API
Understand what steps to take to troubleshoot and debug API scripts
Demonstrate basic troubleshooting techniques by reviewing debugging messages in various forms
Understand how to use self-service portal capabilities to provide general IT services
Recognize how automation tools work with Check Point APIs to automate security management tasks and orchestrate workflow behind service portals
Demonstrate common tasks that are automated in a Web portal to manage the Security Policy
ISO/IEC 27032 Lead Cybersecurity Manager
5 Lessons
40 hours
Intermediate
What you'll learn
Acquire comprehensive knowledge on the elements and operations of a Cybersecurity Program in conformance with ISO/IEC 27032 and NIST Cybersecurity framework
Acknowledge the correlation between ISO 27032, NIST Cybersecurity framework and other standards and operating frameworks
Master the concepts, approaches, standards, methods and techniques used to effectively set up, implement, and manage a Cybersecurity program within an organization
Learn how to interpret the guidelines of ISO/IEC 27032 in the specific context of an organization
Master the necessary expertise to plan, implement, manage, control and maintain a Cybersecurity Program as specified in ISO/IEC 27032 and NIST Cybersecurity framework
Acquire the necessary expertise to advise an organization on the best practices for managing Cybersecurity
CCSP – Certified Cloud Security Professional
40 hours
All Levels
What you'll learn
The CCSP certification training is designed to help you pass the CCSP exam on the first try.
This course focuses on of the six domains required to pass the CCSP exam
Domain 1: Architectural concepts and design requirements
Domain 2: Cloud data security
Domain 3: Cloud platform and infrastructure security
Domain 4: Cloud application security
Domain 5: Operations
Domain 6: Legal and compliance
Featured Courses
CC – Certified in Cybersecurity Training
24 Lessons
8 hours
All Levels
Things you will get to learn in our CC – …
$749.00
CC – Certified in Cybersecurity Training
24 Lessons
8 hours
All Levels
Certified Ethical Hacker | CEH
40 hours
Intermediate
This Certified Ethical Hacker Certification is designed to teach students …
$3,095.00
Certified Ethical Hacker | CEH
40 hours
Intermediate
What you'll learn
Information security controls, laws, and standards.
Foot printing, foot printing tools, and countermeasures.
Network scanning techniques and scanning countermeasures.
Enumeration techniques and enumeration countermeasures.
Vulnerability analysis to identify security loopholes in the target organization’s network, communication infrastructure, and end systems.
System hacking methodology, steganography, stag analysis attacks, and covering tracks to discover system and network vulnerabilities.
Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures.
Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing.
Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures.
DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures.
Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures.
Web Server attacks and a comprehensive attack methodology to audit vulnerabilities in web server infrastructure, and countermeasures.
Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures.
SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures.
Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools.
Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools.
Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures.
Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools.
Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap.
Threats to IoT and OT platforms and defending IoT and OT devices.
Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools.
All Cybersecurity Courses
Cybersecurity Online Training Courses - Live
Cybersecurity is an ongoing challenge for today’s businesses. With new threats emerging every day, companies need a proactive approach towards identifying potential risks and vulnerabilities. It’s imperative IT professionals have the necessary skills to safeguard their organization against all security breaches. Our vast cybersecurity training portfolio can help you and your team develops cybersecurity skills at every level. We also offer prep courses for top industry-recognized certifications and product-specific courses targeting distinct skills. You and your team learn to approach cybersecurity offensively and defensively through real-world examples and exercises, hands-on labs, and expert instruction. You gain knowledge to close skill gaps, meet and maintain mandates, and sustain and retain a highly qualified workforce. CCS Learning Academy offers CISSP, CHFI, CEH, CCSP, Security +, and many more cybersecurity-related courses.Filter by Vendor
We found 2 courses available for you
CompTIA Cybersecurity Analyst (CySA+)
40 hours
Beginner
Participate in The High-Stake Cyber-Security Analyst Certification Course By participating …
$2,795.00
What you'll learn
Assess information security risk in computing and network environments.
Analyze reconnaissance threats to computing and network environments.
Analyze attacks on computing and network environments.
Analyze post-attack techniques on computing and network environments.
Implement a vulnerability management program.
Collect cybersecurity intelligence.
Analyze data collected from security and event logs.
Perform active analysis on assets and networks.
Respond to cybersecurity incidents.
Investigate cybersecurity incidents.
Address security issues with the organization’s technology architecture.
SSCP – Systems Security Certified Practitioner
40 hours
Beginner
Is SSCP A Good Certification Training? Professionals who work with …
$2,795.00
What you'll learn
In-depth coverage of the seven domains required to pass the SSCP exam.
Domain 1: Access Control
Domain 2: Security Operations and Administration
Domain 3: Risk Identification, Monitoring, and Analysis
Domain 4: Incident Response and Recovery
Domain 5: Cryptography
Domain 6: Networks and Communications Security
Domain 7: Systems and Application Security