All eLearning Courses by Practice Area Courses
Filter by Topic
Filter by Vendor
PECB Certified ISO 37001 Lead Auditor eLearning Training Course
As technological developments continue to increase day by day, the …
What you'll learn
Explain the fundamental concepts and principles of an antibribery management system (ABMS) based on ISO 37001
Interpret the ISO 37001 requirements for an ABMS from the perspective of an auditor
Evaluate the ABMS conformity to ISO 37001 requirements, in accordance with the fundamental audit concepts and principles
Plan, conduct, and close an ISO 37001 compliance audit, in accordance with ISO/IEC 17021-1 requirements, ISO 19011 guidelines, and other best practices of auditing
Plan, conduct, and close an ISO 37001 compliance audit, in accordance with ISO/IEC 17021-1 requirements, ISO 19011 guidelines, and other best practices of auditing
PECB Certified ISO 37001 Lead Implementer eLearning Training Course
As technological developments continue to increase day by day, the …
What you'll learn
Understand the concepts, approaches, methods, and techniques used for the implementation and effective management of an ABMS.
Learn how to interpret and implement the requirements of ISO 37001 in the specific context of an organization
Understand the operation of the anti-bribery management system and its processes based on ISO 37001
Learn how to interpret and implement the requirements of ISO 37001 in the specific context of an organization.
Certified Threat Intelligence Analyst | CTIA eLearning
Course Description Certified Threat Intelligence Analyst (CTIA) is designed and …
CC (Certified in Cybersecurity) Exam Prep | eLearning Bundle
Course Description Through self-paced learning content this course will cover …
CompTIA Server+ eLearning Bundle
CertMaster Learn+Labs Details What is CertMaster Learn integrated with CertMaster …
CompTIA Cloud+ eLearning Bundle
CertMaster Learn integrated with CertMaster Labs What is CertMaster Learn …
Certified Ethical Hacker | CEH eLearning
Course Description The Certified Ethical Hacker (CEH) provides an in-depth …
What you'll learn
Information security controls, laws, and standards.
Various types of footprinting, footprinting tools, and countermeasures.
Network scanning techniques and scanning countermeasures
Enumeration techniques and enumeration countermeasures
Vulnerability analysis to identify security loopholes in the target organization’s network, communication infrastructure, and end systems.
System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities.
Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures.
Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing.
Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures.
DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures.
Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures.
Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures.
Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures.
SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures.
Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools.
Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools.
Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures.
Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools.
Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap.
Threats to IoT and OT platforms and defending IoT and OT devices.
Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools.
Certified Incident Handler | CIH eLearning
Course Description The EC-Council Certified Incident Handler (ECIH) program focuses …