Cyber Security Online Courses

CompTIA Security+

CompTIA Security+ (Exam SYO-501) Certification
  • Identifying Security Fundamentals
  • Analyzing Risk
  • Identifying Security Threats
  • Conducting Security Assessments
  • Implementing Host and Software Security
  • Implementing Network Security
  • Managing Identity and Access
  • Implementing Cryptography
  • Implementing Operational Security
  • Addressing Security Issues
  • Ensuring Business Continuity

$198

CompTIA Security+ Certification
  • Security Fundamentals
  • Identifying Security Threats and Vulnerabilities
  • Managing Data, Application, and Host Security
  • Implementing Network Security
  • Implementing Access Control, Authentication, and Account Management
  • Managing Certificates
  • Implementing Compliance and Operational Security
  • Risk Management
  • Troubleshooting and Managing Security Incidents
  • Business Continuity and Disaster Recovery Planning

$198

CompTIA Advanced Security Practitioner (CASP)
  • The Enterprise Security Architecture
  • The Enterprise Security Technology
  • Enterprise Resource Technology
  • Security Design and Solutions
  • Managing Risk in Projects
  • Integrating Advanced Authentication and Authorization Techniques
  • Implementing Cryptographic Techniques
  • Integrating Hosts, Storage, Networks, and Applications in a Secure Enterprise Architecture
  • Security Research and Analysis
  • Disaster Recovery and Business Continuity
  • Responding to and Recovering from Incidents
  • Legal Issues
  • Judgment and Decision-Making

$198

Certification (CFR/CWNA/CWSP/CISA/OWASP..)

CyberSec First Responder: Threat Detection and Response (Exam CFR-210)
  • Assessing Information Security Risk
  • Analyzing the Threat Landscape
  • Analyzing Reconnaissance Threats to Computing and Network Environments
  • Analyzing Attacks on Computing and Network Environments
  • Analyzing Post-Attack Techniques
  • Evaluating the Organization’s Security Posture
  • Collecting Cybersecurity Intelligence
  • Analyzing Log Data
  • Performing Active Asset and Network Analysis
  • Responding to Cybersecurity Incidents
  • Investigating Cybersecurity Incidents

$198

Certified Wireless Network Administrator (CWNA)
  • Overview of Wireless Communications
  • Fundamentals of RF
  • Components and Measurements of RF
  • RF Signal and Antenna Concepts
  • IEEE 802.11
  • Spread Spectrum Technologies
  • WLAN Topologies
  • Wi-Fi Access
  • MAC Architecture
  • WLAN Architecture
  • WLAN Deployment
  • Troubleshooting
  • Security
  • Types of Wireless Attacks
  • Fundamentals of Site Surveys
  • Site Survey Tools
  • PoE
  • High Throughput (HT)
  • Very High Throughput (VHT)
  • BYOD

$198

Certified Wireless Security Professional (CWSP)
  • WLAN Security Overview
  • Legacy Security
  • Encryption Ciphers and Methods
  • 802.11 Authentication Methods
  • Dynamic Encryption Key Generation
  • SOHO 802.11 Security
  • Fast Secure Roaming
  • Wireless Security Risks
  • Wireless LAN Security Auditing
  • Wireless Security Monitoring
  • VPNs, Remote Access and Guest Access Services
  • WLAN Security Infrastructure
  • Wireless Security Policies

$198

Certified Information Systems Auditor (CISA)
  • The Process of Auditing Information Systems
  • Governance and Management of IT
  • Information Systems Acquisition, Development and Implementation
  • Information Systems Operations, Maintenance and Support
  • Protection of Information Assets

$198

Certified Information Security Manager (CISM)
  • Information Security Governance
  • Information Risk Management
  • Information Security Program Development
  • Information Security Incident Management

$198

Certified Information Systems Security Officer (CISSO)
  • Risk Management
  • Security Management
  • Authentication
  • Access Control
  • Security Models
  • Operations Security
  • Symmetric Cryptography and Hashing
  • Asymmetric Cryptography and PKI
  • Network Connections
  • Network Protocols and Devices
  • Telephony, VPNs and Wireless
  • Security Architecture
  • Software Development Security
  • Database Security and System Development
  • Malware and Software Attacks
  • Business Continuity
  • Disaster Recovery
  • Incident Management, Law, and Ethics
  • Physical

$198

Certified Information Systems Security Professional (CISSP 2019)
  • Security and Risk Management
  • Asset Management
  • Security Architecture and Engineering
  • Communication and Network Security
  • Identity and Access Management
  • Security Assessment and Testing
  • Security Operations
  • Software Development Security

$198

Certified Healthcare Information Systems Security Practitioner (CHISSP)
  • The Healthcare Industry
  • The Healthcare Regulatory Environment
  • Privacy and Security in Healthcare
  • Information Governance and Risk Management
  • Information Risk Assessment
  • Third-Party Risk Management

$198

Certified Disaster Recovery Engineer (CDRE)
  • Welcome to Disaster Recovery
  • Business Impact Analysis
  • Risk Analysis
  • BDP Strategies
  • IT Recovery Strategies
  • Implementation Phase
  • Testing and Exercise
  • Maintenance and Updating
  • Execution Phase

$198

Certified Digital Forensics Examiner (CDFE)
  • Introduction
  • Computer Forensic Incidents
  • Investigation Process
  • Disk Storage Concepts
  • Digital Acquisition & Analysis
  • Forensic Examination Protocols
  • Digital Evidence Protocols
  • CFI Theory
  • Digital Evidence Presentation
  • Computer Forensic Laboratory Protocols
  • Computer Forensic Processing
  • Digital Forensics Reporting
  • Specialized Artifact Recovery
  • e-Discovery and ESI
  • Cell Phone Forensics
  • USB Forensics
  • Incident Handling
  • PDA Forensics
  • Investigating Harassment

$198

Certified Incident Handling Engineer (CIHE)
  • Course Introduction
  • Threats, Vulnerabilities and Exploits
  • IH Preparation
  • Request Tracker for Incident Handling
  • Preliminary Response
  • Identification and Initial Response
  • Sysinternals
  • Containment
  • Eradication
  • Follow-up
  • Recovery
  • Virtualization Security
  • Malware Incident Handling

$198

Certified Professional Ethical Hacker (CPEH)
  • Security Fundamentals
  • Access Controls
  • Protocols
  • Cryptography
  • Why Vulnerability Assessments?
  • Vulnerability Tools of the Trade
  • Output Analysis and Reports
  • Reconnaisance, Enumeration and Scanning
  • Gaining Access
  • Maintaining Access
  • Covering Tracks
  • Malware
  • Buffer Overflows
  • Password Cracking

$198

Certified Penetration Testing Engineer (CPTE)
  • Logistics of Pen Testing
  • Linux Fundamentals
  • Information Gathering
  • Detecting Live Systems
  • Enumeration
  • Vulnerability Assessments
  • Malware Goes Undercover
  • Windows Hacking
  • Hacking UNIX/Linux
  • Advanced Exploitation Techniques
  • Pen Testing Wireless Networks
  • Networks, Sniffing and IDS
  • Injecting the Database
  • Attacking Web Technologies
  • Project Documentation

$198

Certified Secure Web Application Engineer (CSWAE)
  • Web Application Security
  • Secure SDLC
  • OWASP TOP 10
  • Risk Management
  • Threat Modeling
  • Authentication and Authorization Attacks
  • Session Management
  • Security Architecture
  • Input Validation and Data Sanitization
  • AJAX Security
  • Insecurity Code Discovery and Mitigation
  • Application Mapping
  • Cryptography
  • Testing Methodologies

$198

Certified Security Leadership Officer (CSLO)
  • Security Management
  • Risk Management
  • Encryption
  • Information Security – Access Control Concepts
  • Incident Handling and Evidence
  • Operations Security
  • Knowing Network Security

$198

Certified Security Sentinel (CSS)
  • Basic Security
  • User Awareness
  • Implementing Countermeasures
  • Certified Security Sentinel
  • Using the Internet at Work
  • Accessing the Company’s Network Through Your Assigned Computer
  • Accessing the Corporate Network Remotely
  • Social Engineering
  • Understanding and Manipulating our Target
  • Researching Our Target

$198

Certified Vulnerability Assessor (CVA)
  • Why Vulnerability Assessment
  • Vulnerability Types
  • Assessing the Network
  • Assessing Web Servers & Applications
  • Assessing Remote & VPN Services
  • Vulnerability Assessment Tools of the Trade
  • Output Analysis

$198

IS20 Controls
  • Inventory of Authorized and Unauthorized Devices
  • Inventory of Authorized and Unauthorized Software
  • Secure Configurations for Hardware and Software on Laptops, Workstations and Servers
  • Secure Configurations for Hardware Network Devices such as Firewalls, Routers and Switches
  • Boundary Defense
  • Maintenance, Monitoring, and Analysis of Audit Logs
  • Application Software Security
  • Controlled Use of Administrative Privileges
  • Controlled Access Based on Need to Know
  • Continuous Vulnerability Assessment and Remediation
  • Account Monitoring and Control
  • Malware Defenses
  • Limitation and Control of Network Ports, Protocols and Services
  • Wireless Device Control
  • Data Loss Prevention
  • Secure Network Engineering
  • Penetration Tests and Red Team Exercises
  • Incident Response Capability
  • Data Recovery Capability
  • Security Skills Assessment and Appropriate Training to Fill Gaps

$198

ISCAP
  • Introduction to the Risk Management Framework
  • The Software Development Life Cycle
  • Categorize Information System
  • Select Security Controls
  • Implement Security Controls
  • Assess Security Controls
  • Authorize Information System
  • Monitor Security Controls

$198

OWASP: Threats Fundamentals
  • Understanding Threats
  • Session Security
  • Security Misconfiguration
  • Data Exposure and Cryptography

$90

OWASP: Proactive Controls
  • Controls 1-5
  • Controls 6-10

$90

OWASP: Forgery and Phishing
  • Forgery and Phishing

$90

OWASP: Avoiding Hacker Tricks
  • Avoiding Hacker Tricks

$90

Basic Security

Digital Security Awareness Training for Business and Home Users
  • Course Overview
  • Types of Security Threats
  • Social Engineering
  • Identity Theft
  • Data Classification
  • Protecting Your Digital Information
  • Malware
  • Security from End-to-End
  • Piracy
  • Security Policies
  • Moving Forward

$90

Ethical Hacker
  • Overview
  • Reconnaissance
  • Protocols
  • Windows Hacking
  • Attacking Web Technologies
  • Pen Testing Wireless Networks

$90