Certified Ethical Hacker v8
Course Description CEHV8 comes with some remarkable updates, not just to the content, but to the content delivery systems and tools, making it an invaluable tool for organizations ranging from Fortune 500 companies to the world’s governments, preparing the next generation of cyber warriors to protect their networks like never before. Students can expect a strong focus on advanced hacking concepts, mobile platforms, tablet computer hacking techniques, and real time case studies. 100% of the concepts presented in the CEH V8 course are reinforced by hands-on exercises in EC-Councils newest cyber range. In addition CEHV8, is now an ANSI 17024 accredited professional certification. The newly updated CEH contains 20 of the most current security domains any ethical hacker will ever want to know when they are planning to beef up the information security posture of their organization. The revamped CEH v8 will contain many enhancements including: core content updates, well-organized content flow, diagrammatic representation of concepts and attacks showcasing the latest hacking techniques, pentesting components, updated labs and courseware and popular hacking and security tools videos. Here are a few of the latest advancements the CEH v8 will address and focus on: CEH v8 program focuses on addressing security issues to the latest operating systems including Windows 8 and Windows Server 2012It also focuses on addressing the existing threats to operating environments dominated by Windows 7 and other operating systems (backward compatibility)CEH v8 focuses on the latest hacking attacks targeted to mobile platform and tablet computers and covers countermeasures to secure mobile infrastructureCoverage of latest development in mobile and web technologies including Andriod OS 4.1 and Apps, iOS 6 and Apps, BlackBerry 7 OS, Windows Phone 8 and HTML 5 The goal of this course is to help students master an ethical hacking methodology that can be used in a penetration testing or ethical hacking situation. You walk out the door with hacking skills that are in high demand, as well as the internationally recognized Certified Ethical Hacker v8 certification!
Computer Hacking Forensic Investigation v8
Course Description The CHFI course will give participants the necessary skills to identify an intruder’s footprints and to properly gather the necessary evidence to prosecute. Many of today’s top tools of the forensic trade will be taught during this course, including software, hardware and specialized techniques. The need for businesses to become more efficient and integrated with one another, as well as the home user, has given way to a new type of criminal, the “cyber-criminal.” It is no longer a matter of “will your organization be comprised (hacked)?” but, rather, “when?” Today’s battles between corporations, governments, and countries are no longer fought only in the typical arenas of boardrooms or battlefields using physical force. Now the battlefield starts in the technical realm, which ties into most every facet of modern day life. If you or your organization requires the knowledge or skills to identify, track, and prosecute the cybercriminal, then this is the course for you.
ECC-Disaster Recovery Professional
Course Description The EDRP course teaches you the methods in identifying vulnerabilities and takes appropriate countermeasures to prevent and mitigate failure risks for an organization. It also provides the networking professional with a foundation in disaster recovery principles, including preparation of a disaster recoveryplan, assessment of risks in the enterprise, development of policies, and procedures, and understanding of the roles and relationships of various members of an organization, implementation of the plan, and recovering from a disaster.This EDRP course takes an enterprise-wide approach to developing a disaster recovery plan. Students will learn how to create a secure network by putting policies and procedures in place, and how to restore a network in the event of a disaster.
EC Council Certified Security Analyst
Introduction to the Premier Pen Testing Information Security Certification (Advanced Ethical Hacking) EC Council Certified Security Analyst, ECSA an advanced ethical hacking training certification that complements the Certified Ethical Hacker, CEH certification by exploring the analytical phase of ethical hacking. While the Certified Ethical Hacker certification exposes the learner to hacking tools and technologies, the Certified Security Analyst course takes it a step further by exploring how to analyze the outcome from these tools and technologies. Through groundbreaking network penetration testing training methods and techniques, this pen testing computer security certification helps students perform the intensive assessments required to effectively identify and mitigate risks to the information security of the infrastructure.
Comptia Linux Plus
Requirement CompTIA A+ certification, or the equivalent skills and knowledge, is helpful but not required. Details Duration : 30hours Location : SMT-CENTER Lab: Advanced Lab structure. OS: Linux Distributions Description: This course is intended for entry-level computer support professionals with basic knowledge of computer hardware, software, and operating systems, who wish to increase their knowledge and understanding of Linux concepts and skills to prepare for a career in Linux support or administration, or to prepare for the CompTIA Linux+ Powered by LPI (Exams LX0-01, LX0-102).
Redhat Administrator I
RED Hat System Administration I (RH124) is designed for IT professionals who are new to Linux and require core Red Hat Enterprise Linux skills. This course focuses on essential administration tasks that will be encountered in the workplace, including installing the operating system, establishing network connectivity, managing physical storage, and performing basic security administration Audience a foundation for students planning to continue to Red Hat System Administration II with the goal of becoming full-time Linux system administrators.. Early in the course, GUI-based tools will be featured to build upon the students' existing technical knowledge. As the course progresses, key command line concepts will be introduced to provide a foundation for students planning to continue to Red Hat System Administration II with the goal of becoming full-time Linux system administrators. Requirement Previous operating system administration experience is beneficial. IT professionals and system administrators, including Windows and network administrators who need to gain a core level of proficiency with Linux administrationNon-Linux IT professionals on the path to becoming full-time Linux system administrators.
Redhat Administrator II
A follow up course for students that have completed Red Hat System Administration I (RH124), Red Hat System Administration II with RHCSA Exam (RH135) is designed for IT professionals working to become full-time enterprise Linux system administrators. Building on the foundation of command line skills covered in System Administration I, students will dive deeper into Red Hat Enterprise Linux to broaden their toolkits of administration skills. By the end of this course, students will be able to administer and troubleshoot file systems and partitioning, logical volume management, access control, and package management. Students who attend Red Hat System Administration I & II will be fully prepared to take the Red Hat Certified System Administration (RHCSA) exam.
Redhat Administrator III
Course Description Red Hat System Administration III with RHCSA and RHCE Exams (RH255) is designed for experienced Linux administrators who require networking and security administration skills. With a heavy emphasis on practical, hands-on labs, this course is tightly aligned with experienced Linux administrators' job tasks and the skills required for advancement. Focus is placed on enhancing the students' automation skills to securely configure, deploy and manage network services including DNS, Apache, SMTP, and network file sharing. In addition, this course emphasizes security, including monitoring, packet filtering, access controls, and SELinux. At the completion of this course, students already familiar with the RHCT/RHCSA administration skills will have exposure to all competencies tested by the RHCSA and RHCE exams. This class includes the RHCSA and the RHCE exams.
RedHat Enterprise Virtualization
The EX318 Red Hat Certified Virtualization Administrator (RHCVA) exam continues the Red Hat tradition of benchmarking the skills of IT professionals through hands-on skills assessments. Individuals who earn the RHCVA credential have demonstrated the skills and knowledge to create, deploy, and manage Linux and Microsoft Windows virtual machines hosted on either Red Hat Enterprise Linux servers or dedicated hyper-visor nodes using Red Hat Enterprise Virtualization Manager. An RHCVA credential assures enterprises that their virtualization solutions are administered optimally and establishes credibility for service providers.