Buy Courses & Training
Showing 33–48 of 55 results
-
K0820 Supplychain Risks
Purchasing or acquiring software and systems is an interaction with multiple vendors. We manage and maintain those systems through our business processes, custom immigrations, and lifecycle. Creating visibility into those organization is both a business and technical discussion.
Original price was: $15.00.$8.00Current price is: $8.00. -
K0835 Risk Assessment principles and practices
The technical process of risk assessments is more than qualitative and quantitative analysis. It includes project planning, technical automation, and a highly detailed technical inventory of assets, threats, controls.
Original price was: $15.00.$8.00Current price is: $8.00. -
K0863-1 Cloud Computing Governance
The share responsibilities model is only the beginning of governance for the cloud. Cloud rules and responsibilities must be well defined and understood both from a contractual standpoint and from an administrative and lifecycle standpoint.
Original price was: $15.00.$8.00Current price is: $8.00. -
K0863.2 Cloud Computing Architecture
The cloud computing architecture course considers how we fit: micro services, containers, orchestration, and cloud native functions in the design of cloud solutions for the enterprise.
Original price was: $15.00.$8.00Current price is: $8.00. -
K0898 Cloud Service Models and Frameworks
Basic definition of core cloud components are critical to understanding the services that you will purchase, the contractual requirements for business based on the shared responsibilities model, and how the internal roles and requirements will match to the external roles and requirements for your enterprise.
Original price was: $15.00.$8.00Current price is: $8.00. -
K0925 Wireless Communication tools and techniques
This super session contains most of the 802.11 standard communication fundamentals, radio frequency characteristics, antenna structures, layer 2 architectures and device deployment suggestions. Wireless testing, threats and controls complete your tools and techniques understanding for complete wireless.
Original price was: $15.00.$8.00Current price is: $8.00. -
K0936 Network Hardware threats and vulnerabilities
Consider the ability of our adversary to manufacture a complete look-alike and resell it as a used product. This is just one of the physical threats to our network and devices that we must manage and maintain to support all information technology.
Original price was: $15.00.$8.00Current price is: $8.00. -
K0942 Cryptology principles and practices
Cryptology is about defending and understanding attackers desire to reduce confidentiality, integrity, and non-repudiation. Our cryptographic tools have a lifespan that the organization must respect as they develop and consume,cryptographic algorithms. Best practices in cryptology today will be worst practices in the future.
Original price was: $15.00.$8.00Current price is: $8.00. -
K0955 Penetration Testing principles and practices
Whether you are building a penetration testing practice for yourself or designing one for your Enterprise this course will detail the scope of testing, business lifecycle and operations processes. If you are building a penetration test testing practice, you must know how to interact with business and go beyond technical
Read moreOriginal price was: $15.00.$8.00Current price is: $8.00. -
K0983 Computer Networking principles and practices
Go beyond the OSI model in modern networking. Be able to define the current protocols at each layer and what to expect in the network. Cloud implementations at all three service layers are critical to incorporate into your mental representation of the network.
Original price was: $15.00.$8.00Current price is: $8.00. -
K1014 Network Security principles and practices
Network security is about: business foundations, risk assessment, identities, ease of use, increased resiliency, reducing vulnerabilities, and designing with the cloud in mind. We combine those together with the security tools, and our assets to identify the principles and practices.
Original price was: $15.00.$8.00Current price is: $8.00. -
K1192 Organizational Privacy policies and procedures
The 20 step process on building a policy, requires the entire organization to support the effort. Privacy is an external requirement, privacy policy is a technical and policy management requirement.
Original price was: $15.00.$8.00Current price is: $8.00. -
K9901 introduction to threat and vulnerabilities
$15.00 -
Saturday- 25 min. Q&A
You must purchase 24 hours before the meeting or you will be in next week’s meeting. This is a rolling topic that happens weekly. Please be aware of your time zone this happens Saturday 11:30 central time zone. If no one new signs up for the week- This meeting will not run.
$10.00 -
Security plus
$250.00 -
Systems Administration 101 (451)
Systems Administration (IO-WRL-005) Knowledge of systems administration topics. Responsible for setting up and maintaining a system or specific components of a system in adherence with organizational security policies and procedures. Includes hardware and software installation, configuration, and updates; user account management; backup and recovery management; and security control implementation.
$1,200.00















