Most popular
ISO 31000 Lead Risk Manager
5 Lessons
40 hours
Intermediate
What you'll learn
Understand the risk management concepts, approaches, methods, and techniques
Learn how to interpret the ISO 31000 principles and framework in the context of an organization
Learn how to apply the ISO 31000 risk management process in an organization
Learn how to establish a risk recording and reporting process and an effective risk communication plan
Develop the ability to effectively manage, monitor, and review risk in an organization based on best practices
CGRC – Certified in Governance, Risk and Compliance
91 Lessons
40 hours
All Levels
What you'll learn
Information Security Risk Management Program.
Scope of the Information System.
Selection and Approval of Security and Privacy Controls.
Implementation of Security and Privacy Controls.
Assessment/Audit of Security and Privacy Controls.
Authorization/Approval of Information System.
Perform Continuous Monitoring.
CRISC: Certified Risk and Information Systems Control
27 Lessons
24 hours
Intermediate
What you'll learn
By the end of either the CRISC certification training or CRISC online training course, you will master the four CRISC domains.
Domain 1: IT Risk Identification
Domain 2: IT Risk Assessment
Domain 3: Risk Response and Mitigation
Domain 4: Risk Control, Monitoring, and Reporting
CCCS Check Point Certified Cloud Specialist – Administrator
18 Lessons
48 hours
Intermediate
What you'll learn
Explain the nature of the cloud environment
Describe the five pillars of cloud architecture
Explain the Basics of Cloud Infrastructure
Explain the Basics of Cloud Automation
Explain Check Point Security Management and How it Applies to CloudGuard
Describe CloudGuard Security Gateway offerings
Describe Cloud Load Balancers
Explain CloudGuard Licensing
Explain the different Deployment options and architectures for CloudGuard
Explain how and why CloudGuard is automated
Describe the functions of CloudGuard that can be automated
Describe the tools used to automate CloudGuard
Explain CloudGuard Automation Requirements
Explain basic troubleshooting techniques specific to Check Point Security Management Servers and Security Gateways
Describe the steps for Troubleshooting CloudGuard Network Installation
Explain the tools and techniques used to troubleshoot CloudGuard Network Automation
Explain the need for Cloud Security Posture Management
Describe the posture management tools available in CloudGuard
Explain methods for correcting Cloud Security Posture Management issues
CCMS Check Point Certified Multi-Domain Security Management Specialist
14 Lessons
16 hours
Intermediate
What you'll learn
Discuss challenges associated with securing large-scale business organizations with distributed network environments.
Describe the Check Point Multi-Domain Security Management solution and its benefits.
Understand the components of MDSM and how they work together to help administrators manage multiple network security environments within a single management framework.
Understand how to install and configure the Multi-Domain Security Management environment.
Describe how to implement Management High Availability within the MDSM environment.
Discuss the two types of log server options used to store logs in the Multi-Domain Security Management environment, and how they differ.
Understand how to manage and view Multi-Domain activity logs in SmartConsole.
Understand how to configure and implement Global Policy to manage rules for multiple domains.
Identify various MDSM command line tools commonly used to retrieve information and perform configuration changes on a MDSM Server.
Describe troubleshooting tools to use for addressing MDSM Server issues.
Understand how VSX works and how to integrate the technology within the MDSM environment.
C)NFE – Certified Network Forensic Examiner
24 hours
Intermediate
ISO/IEC 27005 Lead Risk Manager
5 Lessons
40 hours
Intermediate
What you'll learn
Master the concepts, approaches, methods and techniques that enable an effective risk management process based on ISO/IEC 27005
Acknowledge the correlation between Information Security risk management and security controls
Learn how to interpret the requirements of ISO/IEC 27001 in Information Security Risk Management
Acquire the competence and skills to effectively advise organizations on Information Security Risk Management best practices
Acquire the knowledge necessary for the implementation, management and maintenance of an ongoing risk management program
CISA: Certified Information Systems Auditor
10 Lessons
40 hours
All Levels
What you'll learn
Learn the specific requirements for passing the CISA Exam and attaining your CISA certification
Review key concepts, tasks, and knowledge related to the duties of an IS auditor, which serve as the foundation of the CISA Exam
Learn successful methods of evaluating CISA Exam questions and answers, including analysis and explanations of what the CISA does
Review useful, proven information on study and exam time management
CGEIT: Certified in the Governance of Enterprise IT
32 hours
Intermediate
What you'll learn
Follow the format and structure of the CGEIT Certification Exam
Identify the various topics and technical areas covered by the exam
Enable students to implement strategies, tips, and techniques for taking and passing the exam
Apply key learning to practice questions
CNSE-AWS Cloud Network Security Expert for AWS
26 Lessons
Intermediate
What you'll learn
Discuss AWS Platform Components and their relationship to Check Point CloudGuard Network Security.
Explain how to maintain a secure, efficient, and stable cloud environment.
Describe the components and constraints of a hub and spoke security environment.
Describe the function of the Cloud Management Extension.
Explain the purpose of identity and access controls and constraints in different cloud platforms.
Explain the steps required to configure Identity and Access controls in AWS.
Describe the purpose and function of the CloudGuard Controller, its processes, and how it is tied to the Identity Awareness feature.
Explain how to design and configure Cloud Adaptive Policies.
Discuss the purpose and function of Data Center Objects.
Describe the function and advantages of Cloud Service Provider (CSP) automation templates for instance and resource deployments.
Explain how CSP templates can be used for maintenance tasks in the cloud environment.
Discuss Third-Party Automation tools, how they can simplify deployment and maintenance tasks, and the constraints associated with them.
Discuss Scaling Solutions and Options for Cloud Environments.
Explain the Scaling Options in AWS.
Describe the workflow for configuring scaling solutions in AWS.
Discuss how ClusterXL operates and what elements work together to permit traffic failover.
Explain how ClusterXL functions differently in a Cloud Environment.
Describe how clusters are created and function in AWS.
Discuss the elements involved in Hybrid Data Center deployments, the advantages of them, and the constraints involved.
Explain the nature of a “Greenfield” deployment, the advantages of it, and the constraints involved.
Describe the components and constraint involved in deploying a Disaster Recovery Site in the cloud.
Discuss the steps required for troubleshooting automation in AWS.
Explain the steps required for troubleshooting Scaling Solution issues in AWS.
Describe the steps required for troubleshooting clusters in AWS.
Trending
ISO 31000 Lead Risk Manager
5 Lessons
40 hours
Intermediate
What you'll learn
Understand the risk management concepts, approaches, methods, and techniques
Learn how to interpret the ISO 31000 principles and framework in the context of an organization
Learn how to apply the ISO 31000 risk management process in an organization
Learn how to establish a risk recording and reporting process and an effective risk communication plan
Develop the ability to effectively manage, monitor, and review risk in an organization based on best practices
CGRC – Certified in Governance, Risk and Compliance
91 Lessons
40 hours
All Levels
What you'll learn
Information Security Risk Management Program.
Scope of the Information System.
Selection and Approval of Security and Privacy Controls.
Implementation of Security and Privacy Controls.
Assessment/Audit of Security and Privacy Controls.
Authorization/Approval of Information System.
Perform Continuous Monitoring.
CRISC: Certified Risk and Information Systems Control
27 Lessons
24 hours
Intermediate
What you'll learn
By the end of either the CRISC certification training or CRISC online training course, you will master the four CRISC domains.
Domain 1: IT Risk Identification
Domain 2: IT Risk Assessment
Domain 3: Risk Response and Mitigation
Domain 4: Risk Control, Monitoring, and Reporting
CCCS Check Point Certified Cloud Specialist – Administrator
18 Lessons
48 hours
Intermediate
What you'll learn
Explain the nature of the cloud environment
Describe the five pillars of cloud architecture
Explain the Basics of Cloud Infrastructure
Explain the Basics of Cloud Automation
Explain Check Point Security Management and How it Applies to CloudGuard
Describe CloudGuard Security Gateway offerings
Describe Cloud Load Balancers
Explain CloudGuard Licensing
Explain the different Deployment options and architectures for CloudGuard
Explain how and why CloudGuard is automated
Describe the functions of CloudGuard that can be automated
Describe the tools used to automate CloudGuard
Explain CloudGuard Automation Requirements
Explain basic troubleshooting techniques specific to Check Point Security Management Servers and Security Gateways
Describe the steps for Troubleshooting CloudGuard Network Installation
Explain the tools and techniques used to troubleshoot CloudGuard Network Automation
Explain the need for Cloud Security Posture Management
Describe the posture management tools available in CloudGuard
Explain methods for correcting Cloud Security Posture Management issues
CCMS Check Point Certified Multi-Domain Security Management Specialist
14 Lessons
16 hours
Intermediate
What you'll learn
Discuss challenges associated with securing large-scale business organizations with distributed network environments.
Describe the Check Point Multi-Domain Security Management solution and its benefits.
Understand the components of MDSM and how they work together to help administrators manage multiple network security environments within a single management framework.
Understand how to install and configure the Multi-Domain Security Management environment.
Describe how to implement Management High Availability within the MDSM environment.
Discuss the two types of log server options used to store logs in the Multi-Domain Security Management environment, and how they differ.
Understand how to manage and view Multi-Domain activity logs in SmartConsole.
Understand how to configure and implement Global Policy to manage rules for multiple domains.
Identify various MDSM command line tools commonly used to retrieve information and perform configuration changes on a MDSM Server.
Describe troubleshooting tools to use for addressing MDSM Server issues.
Understand how VSX works and how to integrate the technology within the MDSM environment.
C)NFE – Certified Network Forensic Examiner
24 hours
Intermediate
ISO/IEC 27005 Lead Risk Manager
5 Lessons
40 hours
Intermediate
What you'll learn
Master the concepts, approaches, methods and techniques that enable an effective risk management process based on ISO/IEC 27005
Acknowledge the correlation between Information Security risk management and security controls
Learn how to interpret the requirements of ISO/IEC 27001 in Information Security Risk Management
Acquire the competence and skills to effectively advise organizations on Information Security Risk Management best practices
Acquire the knowledge necessary for the implementation, management and maintenance of an ongoing risk management program
CISA: Certified Information Systems Auditor
10 Lessons
40 hours
All Levels
What you'll learn
Learn the specific requirements for passing the CISA Exam and attaining your CISA certification
Review key concepts, tasks, and knowledge related to the duties of an IS auditor, which serve as the foundation of the CISA Exam
Learn successful methods of evaluating CISA Exam questions and answers, including analysis and explanations of what the CISA does
Review useful, proven information on study and exam time management
CGEIT: Certified in the Governance of Enterprise IT
32 hours
Intermediate
What you'll learn
Follow the format and structure of the CGEIT Certification Exam
Identify the various topics and technical areas covered by the exam
Enable students to implement strategies, tips, and techniques for taking and passing the exam
Apply key learning to practice questions
CNSE-AWS Cloud Network Security Expert for AWS
26 Lessons
Intermediate
What you'll learn
Discuss AWS Platform Components and their relationship to Check Point CloudGuard Network Security.
Explain how to maintain a secure, efficient, and stable cloud environment.
Describe the components and constraints of a hub and spoke security environment.
Describe the function of the Cloud Management Extension.
Explain the purpose of identity and access controls and constraints in different cloud platforms.
Explain the steps required to configure Identity and Access controls in AWS.
Describe the purpose and function of the CloudGuard Controller, its processes, and how it is tied to the Identity Awareness feature.
Explain how to design and configure Cloud Adaptive Policies.
Discuss the purpose and function of Data Center Objects.
Describe the function and advantages of Cloud Service Provider (CSP) automation templates for instance and resource deployments.
Explain how CSP templates can be used for maintenance tasks in the cloud environment.
Discuss Third-Party Automation tools, how they can simplify deployment and maintenance tasks, and the constraints associated with them.
Discuss Scaling Solutions and Options for Cloud Environments.
Explain the Scaling Options in AWS.
Describe the workflow for configuring scaling solutions in AWS.
Discuss how ClusterXL operates and what elements work together to permit traffic failover.
Explain how ClusterXL functions differently in a Cloud Environment.
Describe how clusters are created and function in AWS.
Discuss the elements involved in Hybrid Data Center deployments, the advantages of them, and the constraints involved.
Explain the nature of a “Greenfield” deployment, the advantages of it, and the constraints involved.
Describe the components and constraint involved in deploying a Disaster Recovery Site in the cloud.
Discuss the steps required for troubleshooting automation in AWS.
Explain the steps required for troubleshooting Scaling Solution issues in AWS.
Describe the steps required for troubleshooting clusters in AWS.
Featured Courses
CC – Certified in Cybersecurity Training
24 Lessons
8 hours
All Levels
Things you will get to learn in our CC – …
$749.00
CC – Certified in Cybersecurity Training
24 Lessons
8 hours
All Levels
Certified Ethical Hacker | CEH
40 hours
Intermediate
This Certified Ethical Hacker Certification is designed to teach students …
$3,095.00
Certified Ethical Hacker | CEH
40 hours
Intermediate
What you'll learn
Information security controls, laws, and standards.
Foot printing, foot printing tools, and countermeasures.
Network scanning techniques and scanning countermeasures.
Enumeration techniques and enumeration countermeasures.
Vulnerability analysis to identify security loopholes in the target organization’s network, communication infrastructure, and end systems.
System hacking methodology, steganography, stag analysis attacks, and covering tracks to discover system and network vulnerabilities.
Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures.
Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing.
Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures.
DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures.
Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures.
Web Server attacks and a comprehensive attack methodology to audit vulnerabilities in web server infrastructure, and countermeasures.
Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures.
SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures.
Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools.
Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools.
Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures.
Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools.
Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap.
Threats to IoT and OT platforms and defending IoT and OT devices.
Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools.
All Cybersecurity Courses
Cybersecurity Online Training Courses - Live
Cybersecurity is an ongoing challenge for today’s businesses. With new threats emerging every day, companies need a proactive approach towards identifying potential risks and vulnerabilities. It’s imperative IT professionals have the necessary skills to safeguard their organization against all security breaches. Our vast cybersecurity training portfolio can help you and your team develops cybersecurity skills at every level. We also offer prep courses for top industry-recognized certifications and product-specific courses targeting distinct skills. You and your team learn to approach cybersecurity offensively and defensively through real-world examples and exercises, hands-on labs, and expert instruction. You gain knowledge to close skill gaps, meet and maintain mandates, and sustain and retain a highly qualified workforce. CCS Learning Academy offers CISSP, CHFI, CEH, CCSP, Security +, and many more cybersecurity-related courses.Filter by category
Filter by Vendor
We found 2 courses available for you
CompTIA Cybersecurity Analyst (CySA+)
40 hours
Beginner
Participate in The High-Stake Cyber-Security Analyst Certification Course By participating …
$2,795.00
What you'll learn
Assess information security risk in computing and network environments.
Analyze reconnaissance threats to computing and network environments.
Analyze attacks on computing and network environments.
Analyze post-attack techniques on computing and network environments.
Implement a vulnerability management program.
Collect cybersecurity intelligence.
Analyze data collected from security and event logs.
Perform active analysis on assets and networks.
Respond to cybersecurity incidents.
Investigate cybersecurity incidents.
Address security issues with the organization’s technology architecture.
SSCP – Systems Security Certified Practitioner
40 hours
Beginner
Is SSCP A Good Certification Training? Professionals who work with …
$2,795.00
What you'll learn
In-depth coverage of the seven domains required to pass the SSCP exam.
Domain 1: Access Control
Domain 2: Security Operations and Administration
Domain 3: Risk Identification, Monitoring, and Analysis
Domain 4: Incident Response and Recovery
Domain 5: Cryptography
Domain 6: Networks and Communications Security
Domain 7: Systems and Application Security