Buy Courses & Training

  • CEH – Certified Ethical Hacker v 13

    $5,000.00
  • CISSP Full

    $5,000.00
  • CISSP Killer Exam

    $200.00
  • Friday- 25 min. Q&A

    This is a rolling topic that happens weekly. Please be aware of your time zone this happens Friday 10:30 central time zone. If no one new signs up for the week- This meeting will not run.

    $10.00
  • K0018 Encryption algorithms

    Encryption algorithms is the first of  three courses for cyber security professionals to understand how to maintain confidentiality, integrity, and the key exchange process.

    Original price was: $15.00.Current price is: $8.00.
  • K0480 Malware

    Cyber security professionals need to understand malware from the historical terms standpoint so that we may communicate with non-technical leaders. This course explains in Laymans, terms the components of malware, attacks, bad Trojan building.

    $15.00
  • K0674 Computer networking protocols

    The core computer network protocols include IP, ICMP, TCP, UDP, DHCP, and DNS. How we deploy these in the enterprise requires a basic understanding of what the protocol does. How we protect these in the Enterprise requires us to go a step further.

    Original price was: $15.00.Current price is: $8.00.
  • K0675 Risk management processes

    This risk management course focuses on decision support for management of the organization. The form of process that is used by many organizations can be updated to include quantitative’s assessment activities that permit management to make a simple decision for a complex problem. A key aspect of this course is

    Read more
    Original price was: $15.00.Current price is: $8.00.
  • K0676 laws and regulations for cybersecurity

    Cyber security professionals are not litigators, but we must apply controls that follow the applicable laws in our jurisdiction. This requires us to coordinate our efforts with professionals in our organization that may have no understanding of how control works. We must integrate these laws and regulations at all levels

    Read more
    Original price was: $15.00.Current price is: $8.00.
  • K0677 Cyber security policies and procedures

    Cyber security documentation requires technical professionals to maintain documentation that is read by non-technical professionals. These policies and procedures requires an 11 step methodology in order to be fully implemented and useful to everyone in the organization. Three example types of policies covered in this course are system control, program

    Read more
    Original price was: $15.00.Current price is: $8.00.
  • K0681 Privacy principles and practices

    In order to protect the privacy of individuals that interact with our organization, we must do a recurring privacy impact assessment. This includes: technical, operational, business, and lifecycle processes to be adjusted away from what is good for the organization and toward what is good for the individual.

    Original price was: $15.00.Current price is: $8.00.
  • K0682 Cybersecurity threats

    The methodology for consuming threat data and building threat models requires an understanding of adversarial activities defined in a structured way. This structure will help us to calculate weaknesses in the context of our organization.

    Original price was: $15.00.Current price is: $8.00.
  • K0692 Vulnerability assessment tools and techniques

    Vulnerability assessment is both a technical inventory and the business metrics to communicate that technical in inventory. The process includes: asset information, scanning, verifying results, and updating configuration management data.

    Original price was: $15.00.Current price is: $8.00.
  • K0697 Encryption algorithm capabilities and applications

    Encryption algorithm capabilities must be matched to the business need. This requires an understanding of the operations and technical processes as well as the lifecycle of all encryption, algorithms deployed in the environment.

    Original price was: $15.00.Current price is: $8.00.
  • K0698 Cryptographic Key Management principles and practices

    Deploying public key infrastructure and certificate authorities requires a clear understanding of business and operations processes along with the technical aspects of certificate lifecycle.

    Original price was: $15.00.Current price is: $8.00.
  • K0709 Business Continuity and Disaster Recovery policies and procedures

    The seven phases of business continuity planning will build resiliency and redundancy across all technology assets protecting mission data. There are four major standards for business continuity planning that are accepted, globally. The three major components of the methodology include the business process analysis, business impact analysis, and finally the

    Read more
    Original price was: $15.00.Current price is: $8.00.