Facebook

Cybersecurity Courses

Most popular
Trending

All Cybersecurity Courses

Cybersecurity Online Training Courses - Live

Cybersecurity is an ongoing challenge for today’s businesses. With new threats emerging every day, companies need a proactive approach towards identifying potential risks and vulnerabilities. It’s imperative IT professionals have the necessary skills to safeguard their organization against all security breaches. Our vast cybersecurity training portfolio can help you and your team develops cybersecurity skills at every level. We also offer prep courses for top industry-recognized certifications and product-specific courses targeting distinct skills. You and your team learn to approach cybersecurity offensively and defensively through real-world examples and exercises, hands-on labs, and expert instruction. You gain knowledge to close skill gaps, meet and maintain mandates, and sustain and retain a highly qualified workforce. CCS Learning Academy offers CISSP, CHFI, CEH, CCSP, Security +, and many more cybersecurity-related courses.
ISACA_partnerlogo

We found 56 courses available for you
See

C)IHE – Certified Incident Handling Engineer

40 hours
Intermediate

Course Description The Certified Incident Handling Engineer course, C)IHE, is …

C)DRE – Certified Disaster Recovery Engineer

32 hours
Intermediate

Course Description A Certified Disaster Recovery Engineer, C)DRE, is the …

C)DFE – Certified Digital Forensic Examiner

40 hours
Intermediate

Course Description The Certified Digital Forensics Examiner, C)DFE certification is …

C)CSO – Certified Cloud Security Officer

40 hours
Intermediate

Course Description Mile2’s Cloud Security Officer, C)CSO, course  will provide …

Featured

CC – Certified in Cybersecurity Training

24 Lessons
8 hours
All Levels

Things you will get to learn in our CC – …

CNSE-AWS Cloud Network Security Expert for AWS

26 Lessons
Intermediate

Course Description: Learn advanced concepts and develop skills needed to …

What you'll learn
Discuss AWS Platform Components and their relationship to Check Point CloudGuard Network Security.
Explain how to maintain a secure, efficient, and stable cloud environment.
Describe the components and constraints of a hub and spoke security environment.
Describe the function of the Cloud Management Extension.
Explain the purpose of identity and access controls and constraints in different cloud platforms.
Explain the steps required to configure Identity and Access controls in AWS.
Describe the purpose and function of the CloudGuard Controller, its processes, and how it is tied to the Identity Awareness feature.
Explain how to design and configure Cloud Adaptive Policies.
Discuss the purpose and function of Data Center Objects.
Describe the function and advantages of Cloud Service Provider (CSP) automation templates for instance and resource deployments.
Explain how CSP templates can be used for maintenance tasks in the cloud environment.
Discuss Third-Party Automation tools, how they can simplify deployment and maintenance tasks, and the constraints associated with them.
Discuss Scaling Solutions and Options for Cloud Environments.
Explain the Scaling Options in AWS.
Describe the workflow for configuring scaling solutions in AWS.
Discuss how ClusterXL operates and what elements work together to permit traffic failover.
Explain how ClusterXL functions differently in a Cloud Environment.
Describe how clusters are created and function in AWS.
Discuss the elements involved in Hybrid Data Center deployments, the advantages of them, and the constraints involved.
Explain the nature of a “Greenfield” deployment, the advantages of it, and the constraints involved.
Describe the components and constraint involved in deploying a Disaster Recovery Site in the cloud.
Discuss the steps required for troubleshooting automation in AWS.
Explain the steps required for troubleshooting Scaling Solution issues in AWS.
Describe the steps required for troubleshooting clusters in AWS.

CCCS Check Point Certified Cloud Specialist – Administrator

18 Lessons
48 hours
Intermediate

Course Description Learn basic concepts and develop skills necessary to …

What you'll learn
Explain the nature of the cloud environment
Describe the five pillars of cloud architecture
Explain the Basics of Cloud Infrastructure
Explain the Basics of Cloud Automation
Explain Check Point Security Management and How it Applies to CloudGuard
Describe CloudGuard Security Gateway offerings
Describe Cloud Load Balancers
Explain CloudGuard Licensing
Explain the different Deployment options and architectures for CloudGuard
Explain how and why CloudGuard is automated
Describe the functions of CloudGuard that can be automated
Describe the tools used to automate CloudGuard
Explain CloudGuard Automation Requirements
Explain basic troubleshooting techniques specific to Check Point Security Management Servers and Security Gateways
Describe the steps for Troubleshooting CloudGuard Network Installation
Explain the tools and techniques used to troubleshoot CloudGuard Network Automation
Explain the need for Cloud Security Posture Management
Describe the posture management tools available in CloudGuard
Explain methods for correcting Cloud Security Posture Management issues

Certified Penetration Testing Professional | CPENT

14 Lessons
120 hours
Intermediate

Course Description EC-Council’s Certified Penetration Tester (CPENT) program is all …