Your cart is currently empty!
Buy Courses & Training
Showing 1–16 of 39 results
-
CEH – Certified Ethical Hacker v 13
$5,000.00 -
CISSP Full
$5,000.00 -
CISSP Killer Exam
$200.00 -
Friday- 25 min. Q&A
This is a rolling topic that happens weekly. Please be aware of your time zone this happens Friday 10:30 central time zone. If no one new signs up for the week- This meeting will not run.
$10.00 -
K0018 Encryption algorithms
Encryption algorithms is the first of three courses for cyber security professionals to understand how to maintain confidentiality, integrity, and the key exchange process.
Original price was: $15.00.$8.00Current price is: $8.00. -
K0480 Malware
Cyber security professionals need to understand malware from the historical terms standpoint so that we may communicate with non-technical leaders. This course explains in Laymans, terms the components of malware, attacks, bad Trojan building.
$15.00 -
K0674 Computer networking protocols
The core computer network protocols include IP, ICMP, TCP, UDP, DHCP, and DNS. How we deploy these in the enterprise requires a basic understanding of what the protocol does. How we protect these in the Enterprise requires us to go a step further.
Original price was: $15.00.$8.00Current price is: $8.00. -
K0675 Risk management processes
This risk management course focuses on decision support for management of the organization. The form of process that is used by many organizations can be updated to include quantitative’s assessment activities that permit management to make a simple decision for a complex problem. A key aspect of this course is
Read moreOriginal price was: $15.00.$8.00Current price is: $8.00. -
K0676 laws and regulations for cybersecurity
Cyber security professionals are not litigators, but we must apply controls that follow the applicable laws in our jurisdiction. This requires us to coordinate our efforts with professionals in our organization that may have no understanding of how control works. We must integrate these laws and regulations at all levels
Read moreOriginal price was: $15.00.$8.00Current price is: $8.00. -
K0677 Cyber security policies and procedures
Cyber security documentation requires technical professionals to maintain documentation that is read by non-technical professionals. These policies and procedures requires an 11 step methodology in order to be fully implemented and useful to everyone in the organization. Three example types of policies covered in this course are system control, program
Read moreOriginal price was: $15.00.$8.00Current price is: $8.00. -
K0681 Privacy principles and practices
In order to protect the privacy of individuals that interact with our organization, we must do a recurring privacy impact assessment. This includes: technical, operational, business, and lifecycle processes to be adjusted away from what is good for the organization and toward what is good for the individual.
Original price was: $15.00.$8.00Current price is: $8.00. -
K0682 Cybersecurity threats
The methodology for consuming threat data and building threat models requires an understanding of adversarial activities defined in a structured way. This structure will help us to calculate weaknesses in the context of our organization.
Original price was: $15.00.$8.00Current price is: $8.00. -
K0692 Vulnerability assessment tools and techniques
Vulnerability assessment is both a technical inventory and the business metrics to communicate that technical in inventory. The process includes: asset information, scanning, verifying results, and updating configuration management data.
Original price was: $15.00.$8.00Current price is: $8.00. -
K0697 Encryption algorithm capabilities and applications
Encryption algorithm capabilities must be matched to the business need. This requires an understanding of the operations and technical processes as well as the lifecycle of all encryption, algorithms deployed in the environment.
Original price was: $15.00.$8.00Current price is: $8.00. -
K0698 Cryptographic Key Management principles and practices
Deploying public key infrastructure and certificate authorities requires a clear understanding of business and operations processes along with the technical aspects of certificate lifecycle.
Original price was: $15.00.$8.00Current price is: $8.00. -
K0709 Business Continuity and Disaster Recovery policies and procedures
The seven phases of business continuity planning will build resiliency and redundancy across all technology assets protecting mission data. There are four major standards for business continuity planning that are accepted, globally. The three major components of the methodology include the business process analysis, business impact analysis, and finally the
Read moreOriginal price was: $15.00.$8.00Current price is: $8.00.














