Most popular
CGEIT: Certified in the Governance of Enterprise IT
32 hours
Intermediate
What you'll learn
Follow the format and structure of the CGEIT Certification Exam
Identify the various topics and technical areas covered by the exam
Enable students to implement strategies, tips, and techniques for taking and passing the exam
Apply key learning to practice questions
CNSE-AWS Cloud Network Security Expert for AWS
26 Lessons
Intermediate
What you'll learn
Discuss AWS Platform Components and their relationship to Check Point CloudGuard Network Security.
Explain how to maintain a secure, efficient, and stable cloud environment.
Describe the components and constraints of a hub and spoke security environment.
Describe the function of the Cloud Management Extension.
Explain the purpose of identity and access controls and constraints in different cloud platforms.
Explain the steps required to configure Identity and Access controls in AWS.
Describe the purpose and function of the CloudGuard Controller, its processes, and how it is tied to the Identity Awareness feature.
Explain how to design and configure Cloud Adaptive Policies.
Discuss the purpose and function of Data Center Objects.
Describe the function and advantages of Cloud Service Provider (CSP) automation templates for instance and resource deployments.
Explain how CSP templates can be used for maintenance tasks in the cloud environment.
Discuss Third-Party Automation tools, how they can simplify deployment and maintenance tasks, and the constraints associated with them.
Discuss Scaling Solutions and Options for Cloud Environments.
Explain the Scaling Options in AWS.
Describe the workflow for configuring scaling solutions in AWS.
Discuss how ClusterXL operates and what elements work together to permit traffic failover.
Explain how ClusterXL functions differently in a Cloud Environment.
Describe how clusters are created and function in AWS.
Discuss the elements involved in Hybrid Data Center deployments, the advantages of them, and the constraints involved.
Explain the nature of a “Greenfield” deployment, the advantages of it, and the constraints involved.
Describe the components and constraint involved in deploying a Disaster Recovery Site in the cloud.
Discuss the steps required for troubleshooting automation in AWS.
Explain the steps required for troubleshooting Scaling Solution issues in AWS.
Describe the steps required for troubleshooting clusters in AWS.
CCSA Check Point Certified Security Administrator
25 Lessons
24 hours
Intermediate
What you'll learn
Interpret the concept of a Firewall and understand the mechanisms used for controlling network traffic.
Describe the key elements of Check Point’s unified Security Management Architecture.
Recognize SmartConsole features, functions and tools.
Understand Check Point deployment options.
Describe the basic functions of Gaia.
Describe the essential elements of a Security Policy.
Understand how traffic inspection takes place in a unified Security Policy.
Summarize how administration roles and permissions assist in managing policy.
Recall how to implement backup techniques.
Understand the Check Point policy layer concept.
Recognize Check Point security solutions and products and how they work to protect your network.
Understand licensing and contract requirements for Check Point security products.
Identify tools designed to monitor data, determine threats and recognize performance improvements.
Identify tools designed to respond quickly and efficiently to changes in gateways, tunnels, remote users, traffic flow patterns, and other activities.
Understand Site-to-Site and Remote Access VPN deployments and communities.
Understand how to analyze and interpret VPN traffic.
Recognize how to define users and user groups.
Understand how to manage user access for internal and external users.
Understand the basic concepts of ClusterXL technology and its advantages.
Understand how to perform periodic administrator tasks as specified in administrator job descriptions.
ISO 22301 Lead Implementer
5 Lessons
40 hours
Intermediate
What you'll learn
Gain a comprehensive understanding of the concepts, approaches, methods, and techniques used for the implementation and effective management of a BCMS
Learn how to interpret and implement the requirements of ISO 22301 in the specific context of an organization
Understand the operation of the business continuity management system and its processes based on ISO 22301
Acquire the necessary knowledge to support an organization in effectively planning, implementing, managing, monitoring, and continually improving a BCMS
CompTIA PenTest+
40 hours
Intermediate
What you'll learn
Plan and scope penetration tests.
Conduct passive reconnaissance.
Perform non-technical tests to gather information.
Conduct active reconnaissance.
Analyze vulnerabilities.
Penetrate networks.
Exploit host-based vulnerabilities.
Test applications.
Complete post-exploit tasks.
Analyze and report pen test results.
CC – Certified in Cybersecurity Training
24 Lessons
8 hours
All Levels
CCSE Check Point Certified Security Expert
13 Lessons
Intermediate
What you'll learn
Articulate Gaia system management procedures.
Explain how to perform database migration procedures.
Articulate the purpose and function of Management High Availability.
Describe how to use Check Point API tools to perform management functions.
Articulate an understanding of Security Gateway cluster upgrade methods.
Discuss the process of Stateful Traffic inspection.
Articulate an understanding of the Check Point Firewall processes and debug procedures.
Describe advanced ClusterXL functions and deployment options.
Explain how the SecureXL acceleration technology enhances and optimizes Security Gateway performance.
Describe how the CoreXL acceleration technology enhances and improves Security Gateway performance.
Articulate how utilizing multiple traffic queues can make traffic handling more efficient.
Describe different Check Point Threat Prevention solutions for network attacks.
Explain how SandBlast, Threat Emulation, and Threat Extraction help to prevent security incidents.
Recognize alternative Check Point Site-to-Site deployment options.
Recognize Check Point Remote Access solutions and how they differ from each other.
Describe Mobile Access deployment options.
ISO 9001 Lead Implementer
5 Lessons
40 hours
Intermediate
What you'll learn
Acknowledge the correlation between ISO 9001 and other standards and regulatory frameworks
Master the concepts, approaches, methods and techniques used for the implementation and effective management of a QMS
Learn how to interpret the ISO 9001 requirements in the specific context of an organization
Learn how to support an organization to effectively plan, implement, manage, monitor and maintain a QMS
Acquire the expertise to advise an organization in implementing Quality Management System best practices
Trending
CGEIT: Certified in the Governance of Enterprise IT
32 hours
Intermediate
What you'll learn
Follow the format and structure of the CGEIT Certification Exam
Identify the various topics and technical areas covered by the exam
Enable students to implement strategies, tips, and techniques for taking and passing the exam
Apply key learning to practice questions
CNSE-AWS Cloud Network Security Expert for AWS
26 Lessons
Intermediate
What you'll learn
Discuss AWS Platform Components and their relationship to Check Point CloudGuard Network Security.
Explain how to maintain a secure, efficient, and stable cloud environment.
Describe the components and constraints of a hub and spoke security environment.
Describe the function of the Cloud Management Extension.
Explain the purpose of identity and access controls and constraints in different cloud platforms.
Explain the steps required to configure Identity and Access controls in AWS.
Describe the purpose and function of the CloudGuard Controller, its processes, and how it is tied to the Identity Awareness feature.
Explain how to design and configure Cloud Adaptive Policies.
Discuss the purpose and function of Data Center Objects.
Describe the function and advantages of Cloud Service Provider (CSP) automation templates for instance and resource deployments.
Explain how CSP templates can be used for maintenance tasks in the cloud environment.
Discuss Third-Party Automation tools, how they can simplify deployment and maintenance tasks, and the constraints associated with them.
Discuss Scaling Solutions and Options for Cloud Environments.
Explain the Scaling Options in AWS.
Describe the workflow for configuring scaling solutions in AWS.
Discuss how ClusterXL operates and what elements work together to permit traffic failover.
Explain how ClusterXL functions differently in a Cloud Environment.
Describe how clusters are created and function in AWS.
Discuss the elements involved in Hybrid Data Center deployments, the advantages of them, and the constraints involved.
Explain the nature of a “Greenfield” deployment, the advantages of it, and the constraints involved.
Describe the components and constraint involved in deploying a Disaster Recovery Site in the cloud.
Discuss the steps required for troubleshooting automation in AWS.
Explain the steps required for troubleshooting Scaling Solution issues in AWS.
Describe the steps required for troubleshooting clusters in AWS.
CCSA Check Point Certified Security Administrator
25 Lessons
24 hours
Intermediate
What you'll learn
Interpret the concept of a Firewall and understand the mechanisms used for controlling network traffic.
Describe the key elements of Check Point’s unified Security Management Architecture.
Recognize SmartConsole features, functions and tools.
Understand Check Point deployment options.
Describe the basic functions of Gaia.
Describe the essential elements of a Security Policy.
Understand how traffic inspection takes place in a unified Security Policy.
Summarize how administration roles and permissions assist in managing policy.
Recall how to implement backup techniques.
Understand the Check Point policy layer concept.
Recognize Check Point security solutions and products and how they work to protect your network.
Understand licensing and contract requirements for Check Point security products.
Identify tools designed to monitor data, determine threats and recognize performance improvements.
Identify tools designed to respond quickly and efficiently to changes in gateways, tunnels, remote users, traffic flow patterns, and other activities.
Understand Site-to-Site and Remote Access VPN deployments and communities.
Understand how to analyze and interpret VPN traffic.
Recognize how to define users and user groups.
Understand how to manage user access for internal and external users.
Understand the basic concepts of ClusterXL technology and its advantages.
Understand how to perform periodic administrator tasks as specified in administrator job descriptions.
ISO 22301 Lead Implementer
5 Lessons
40 hours
Intermediate
What you'll learn
Gain a comprehensive understanding of the concepts, approaches, methods, and techniques used for the implementation and effective management of a BCMS
Learn how to interpret and implement the requirements of ISO 22301 in the specific context of an organization
Understand the operation of the business continuity management system and its processes based on ISO 22301
Acquire the necessary knowledge to support an organization in effectively planning, implementing, managing, monitoring, and continually improving a BCMS
CompTIA PenTest+
40 hours
Intermediate
What you'll learn
Plan and scope penetration tests.
Conduct passive reconnaissance.
Perform non-technical tests to gather information.
Conduct active reconnaissance.
Analyze vulnerabilities.
Penetrate networks.
Exploit host-based vulnerabilities.
Test applications.
Complete post-exploit tasks.
Analyze and report pen test results.
CC – Certified in Cybersecurity Training
24 Lessons
8 hours
All Levels
CCSE Check Point Certified Security Expert
13 Lessons
Intermediate
What you'll learn
Articulate Gaia system management procedures.
Explain how to perform database migration procedures.
Articulate the purpose and function of Management High Availability.
Describe how to use Check Point API tools to perform management functions.
Articulate an understanding of Security Gateway cluster upgrade methods.
Discuss the process of Stateful Traffic inspection.
Articulate an understanding of the Check Point Firewall processes and debug procedures.
Describe advanced ClusterXL functions and deployment options.
Explain how the SecureXL acceleration technology enhances and optimizes Security Gateway performance.
Describe how the CoreXL acceleration technology enhances and improves Security Gateway performance.
Articulate how utilizing multiple traffic queues can make traffic handling more efficient.
Describe different Check Point Threat Prevention solutions for network attacks.
Explain how SandBlast, Threat Emulation, and Threat Extraction help to prevent security incidents.
Recognize alternative Check Point Site-to-Site deployment options.
Recognize Check Point Remote Access solutions and how they differ from each other.
Describe Mobile Access deployment options.
ISO 9001 Lead Implementer
5 Lessons
40 hours
Intermediate
What you'll learn
Acknowledge the correlation between ISO 9001 and other standards and regulatory frameworks
Master the concepts, approaches, methods and techniques used for the implementation and effective management of a QMS
Learn how to interpret the ISO 9001 requirements in the specific context of an organization
Learn how to support an organization to effectively plan, implement, manage, monitor and maintain a QMS
Acquire the expertise to advise an organization in implementing Quality Management System best practices
Featured Courses
CC – Certified in Cybersecurity Training
24 Lessons
8 hours
All Levels
Things you will get to learn in our CC – …
$749.00
CC – Certified in Cybersecurity Training
24 Lessons
8 hours
All Levels
Certified Ethical Hacker | CEH
40 hours
Intermediate
This Certified Ethical Hacker Certification is designed to teach students …
$3,095.00
Certified Ethical Hacker | CEH
40 hours
Intermediate
What you'll learn
Information security controls, laws, and standards.
Foot printing, foot printing tools, and countermeasures.
Network scanning techniques and scanning countermeasures.
Enumeration techniques and enumeration countermeasures.
Vulnerability analysis to identify security loopholes in the target organization’s network, communication infrastructure, and end systems.
System hacking methodology, steganography, stag analysis attacks, and covering tracks to discover system and network vulnerabilities.
Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures.
Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing.
Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures.
DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures.
Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures.
Web Server attacks and a comprehensive attack methodology to audit vulnerabilities in web server infrastructure, and countermeasures.
Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures.
SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures.
Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools.
Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools.
Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures.
Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools.
Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap.
Threats to IoT and OT platforms and defending IoT and OT devices.
Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools.
All Cybersecurity Courses
Cybersecurity Online Training Courses - Live
Cybersecurity is an ongoing challenge for today’s businesses. With new threats emerging every day, companies need a proactive approach towards identifying potential risks and vulnerabilities. It’s imperative IT professionals have the necessary skills to safeguard their organization against all security breaches. Our vast cybersecurity training portfolio can help you and your team develops cybersecurity skills at every level. We also offer prep courses for top industry-recognized certifications and product-specific courses targeting distinct skills. You and your team learn to approach cybersecurity offensively and defensively through real-world examples and exercises, hands-on labs, and expert instruction. You gain knowledge to close skill gaps, meet and maintain mandates, and sustain and retain a highly qualified workforce. CCS Learning Academy offers CISSP, CHFI, CEH, CCSP, Security +, and many more cybersecurity-related courses.Filter by Vendor
We found 2 courses available for you
CompTIA Cybersecurity Analyst (CySA+)
40 hours
Beginner
Participate in The High-Stake Cyber-Security Analyst Certification Course By participating …
$2,795.00
What you'll learn
Assess information security risk in computing and network environments.
Analyze reconnaissance threats to computing and network environments.
Analyze attacks on computing and network environments.
Analyze post-attack techniques on computing and network environments.
Implement a vulnerability management program.
Collect cybersecurity intelligence.
Analyze data collected from security and event logs.
Perform active analysis on assets and networks.
Respond to cybersecurity incidents.
Investigate cybersecurity incidents.
Address security issues with the organization’s technology architecture.
SSCP – Systems Security Certified Practitioner
40 hours
Beginner
Is SSCP A Good Certification Training? Professionals who work with …
$2,795.00
What you'll learn
In-depth coverage of the seven domains required to pass the SSCP exam.
Domain 1: Access Control
Domain 2: Security Operations and Administration
Domain 3: Risk Identification, Monitoring, and Analysis
Domain 4: Incident Response and Recovery
Domain 5: Cryptography
Domain 6: Networks and Communications Security
Domain 7: Systems and Application Security