Online Courses

CompTIA Security+ (SY0-701)

Course Number: #SEC-701
Course Length: 4 days
Number of Exams: 1
Certifications: Security+

DoD Approved 8570: IAT Level II, IAM Level I
Grants (discounts) are available for multiple students for the same or different courses.
CompTIA Security+ is a global certification that validates the baseline skills necessary to perform core security functions and pursue an IT security career.

Why is it different?

More choose Security+ – chosen by more corporations and defense organizations than any other certification on the market to validate baseline security skills and for fulfilling the DoD 8570 compliance.

CompTIA CASP+ (CAS-004)

Course Number: #CAS-04
Course Length: 5 days
Number of Exams: 1
Certifications: CompTIA CASP+ DoD Approved 8570: IAT Level III, IAM Level II, IASAE Level I, IASAE Level II

Grants (discounts) are available for multiple students for the same or different courses.

CompTIA Advanced Security Practitioner (CASP+) CAS-004 is an advanced-level cybersecurity certification for security architects and senior security engineers charged with leading and improving an enterprise’s cybersecurity readiness.

Why is CASP+ Different?

CASP+ is the only hands-on, performance-based certification for advanced practitioners – not managers – at the advanced skill level of cybersecurity. While cybersecurity managers help identify what cybersecurity policies and frameworks could be implemented, CASP+ certified professionals figure out how to implement solutions within those policies and frameworks.

 

This course will provide an in-depth and relatable form of job instruction training that is solely based on the Risk Management Framework (RMF). The training includes in-class hands-on exercises and take-home assignments that will demonstrate the process for identifying, implementing, assessing, and authorizing information systems. The training is industry-driven, meaning, training will only cover process steps as identified in the RMF, and an employers’ expectation of the compliance professional.

Upon completing the training, trainees will be able to:

  • Understand the basics of Network Security and System Environment.
  • Understand FISMA/FedRAMP
  • Explain the RMF steps and processes
  • Perform Information System Security Officer (ISSO) responsibilities
  • Assessor responsibilities

VM – Vulnerability Management Course

Course Number: #VUL-01
Course Length: 3 days
Certifications: None

Vulnerability Management is the ongoing, regular process of identifying, assessing, reporting on, managing and remediating cyber vulnerabilities across endpoints, workloads, and systems. Typically, a security team will leverage a vulnerability management tool to detect vulnerabilities and utilize different processes to patch or remediate them.

 

EC-Council CTT Certification Training Course

EC-Council Certified Cybersecurity Technician (CCT)
Course Number: #CCT- 01
Course Length: 5 days
Number of Exams: 1
Certifications: EC-Council CCT

Grants (discounts) are available for multiple students for the same or different courses.

The Certified Cybersecurity Technician (CCT) is an entry-level cybersecurity program created by EC-Council,
the creator of the Certified Ethical Hacker (CEH) certification, to address the global demand for a qualified
cybersecurity workforce.

EC-Council developed the CCT to provide individuals starting their careers in IT and cybersecurity with a
certification that validates their hands-on technical skills.

What Are the Benefits of the CCT Credential?

  • Paves the way for a promising career in the realm of cybersecurity
  • Teaches the fundamental knowledge that cybersecurity professionals need
  • Improves employ ability by validating certification holders & skills as cybersecurity specialists who can strengthen organizational security
  • Provides extensive opportunities to practice the hands-on skills necessary for any technical role
    involving administrative privileges and cybersecurity considerations

 

CCT – Become a Responsible Cyber Operator in Any IT Role:
The CCT program allows individuals to eventually grow their skills into various roles, including penetration
testing, security consulting, auditor and administrator roles, and beyond. It establishes a foundation of technical skills required to create successful technologists who will advance across various work roles.


Job Description of a Cybersecurity Technician:
A professional who provides technical cybersecurity support, troubleshoots network security problems,
monitors alerts, and follows policies, procedures, and standards to protect information assets.
Job Opportunities & Job Roles for CCT Credential:
The Certified Cybersecurity Technician certification prepares IT and Cybersecurity professionals for a wide
range of complex issues that focus on securing software, networks, and IT systems while understanding
common threats and attacks. CCT offers a multifaceted approach to network defense, ethical hacking, and
security operations to ensure individuals use their strongest abilities to configure, analyze, and identify
problems within their organization. This course will prepare and enhance skills in the following roles:

  • IT Support Specialist
  • IT Networking Specialist
  • Cybersecurity Technicians
  • Network Engineers
  • SOC Analyst
  • IT Managers

 

Who Can Attend This Course?
The CCT course can be taken by students, IT professionals, IT managers, career changers, and any individual seeking a career in cybersecurity, or aspiring to advance their existing role. This course is ideal for those entering the cybersecurity workforce, providing foundational technician level, hands-on skills to solve the most common security issues organizations face today.

What Are the Prerequisites for the CCT Program?
There are no specific prerequisites to take the CCT course and attempt the CCT certification exam. Although
this is an entry-level course, a working knowledge of IT networking and basic cybersecurity concepts will be
an advantage to anyone taking this course.


What Will You Learn
1. Key issues plaguing the cybersecurity industry (information security and network security)
2. Information security threats, vulnerabilities, and attacks
3. Different types of malware
4. Network security fundamentals
5. Identification, authentication, and authorization concepts
6. Network security controls 7. Network security assessment techniques and tools (threat hunting,
threat intelligence, vulnerability assessment, ethical hacking, penetration testing, and configuration
and asset management)
7. Application security design and testing techniques
8. Fundamentals of virtualization, cloud computing, and cloud security
9. Wireless network fundamentals, wireless encryption, and security measures
10. Fundamentals of mobile, IoT, and OT devices and their security measures
11. Cryptography and public key infrastructure concepts
12. Data security controls, data backup and retention methods, and data loss prevention techniques
13. Network troubleshooting, traffic monitoring, log monitoring, and analysis for suspicious traffic
14. Incident handling and response process
15. Computer forensics fundaments, digital evidence, and forensic investigation phases
Course Outline
Module 01: Information Security Threats and Vulnerabilities
Module 02: Information Security Attacks
Module 03: Network Security Fundamentals
Module 04: Identification, Authentication, and Authorization
Module 05: Network Security Controls – Administrative Controls
Module 06: Network Security Controls – Physical Controls
Module 07: Network Security Controls – Technical Controls
Module 08: Network Security Assessment Techniques and Tools
Module 09: Application Security

Module 10: Virtualization and Cloud Computing
Module 11: Wireless Network Security
Module 12: Mobile Device Security
Module 13: IoT and OT Security
Module 14: Cryptography
Module 15: Data Security
Module 16: Network Troubleshooting
Module 17: Network Traffic Monitoring
Module 18: Network Logs Monitoring and Analysis
Module 19: Incident Response
Module 20: Computer Forensics
Module 21: Business Continuity and Disaster Recovery
Module 22: Risk Management

EC-Council Certified Ethical Hacker (CEH)

Course Number: #CEH-01
Course Length: 5 days
Number of Exams: 1
Certifications: EC-Council Ethical Hacker

DoD Approved 8570: CSSP Analyst, CSSP Infrastructure Support, CSSP Incident Responder, CSSP Auditor

Grants (discounts) are available for multiple students for the same or different courses.

Build your career with the most in-demand cybersecurity certification in the world: THE CERTIFIED ETHICAL HACKER

Who is a Certified Ethical Hacker?
A Certified Ethical Hacker is a specialist typically working in a red team environment, focused on attacking computer systems and gaining access to networks, applications, databases, and other critical data on secured systems. A CEH® understands attack strategies, the use of creative attack vectors, and mimics the skills and creativity of malicious hackers. Unlike malicious hackers and actors,

Certified Ethical Hackers
operate with permission from the system owners and take all precautions to ensure the outcomes remain confidential. Bug bounty researchers are expert ethical hackers who use their attack skills to uncover vulnerabilities in the systems.

What is CEH® v12?
The Certified Ethical Hacker has been battle-hardened over the last 20 years, creating hundreds of thousands of Certified Ethical Hackers employed by top companies, militaries, and governments worldwide. In its 12th version, the Certified Ethical Hacker provides comprehensive training, handson learning labs, practice cyber ranges for engagement, certification assessments, cyber competitions, and opportunities for continuous learning into one comprehensive program curated through our new learning framework:

1. Learn
2. Certify

3. Engage ‘

4. Compete.
The CEH v12 also equips aspiring cybersecurity professionals with the tactics, techniques, and procedures (TTPs) to build ethical hackers who can uncover weaknesses in nearly any type of target system before cyber criminals do.


Course Outline
Module 01: Introduction to Ethical Hacking
Cover the fundamentals of key issues in the information security world, including the basics of ethical hacking, information security controls, relevant laws, and standard procedures.


Module 02: Foot Printing and Reconnaissance

Learn how to use the latest techniques and tools to perform foot printing and reconnaissance, a critical pre-attack phase of the ethical hacking process.

Module 03: Scanning Networks

Cover the fundamentals of key issues in the information security world, including the basics of ethical hacking, information security controls, relevant laws, and standard procedures.


Module 04: Enumeration
Learn various enumeration techniques, such as Border Gateway Protocol (BGP) and Network File Sharing (NFS) exploits, plus associated countermeasures.

Module 05: Vulnerability Analysis
Learn how to identify security loopholes in a target organization’s network, communication infrastructure,
and end systems.

Module 06: System Hacking
Learn about the various system hacking methodologies-including steganography, steganalysis attacks, and
covering tracks-used to discover system and network vulnerabilities.

Module 07: Malware Threats
Get an introduction to the different types of malware, such as Trojans, viruses, and worms, as well as system auditing for malware attacks, malware analysis, and countermeasures.

Module 08: Sniffing
Learn about packet-sniffing techniques and how to use them to discover network vulnerabilities, as well as countermeasures to defend against sniffing attacks.

Module 09: Social Engineering

Learn social engineering concepts and techniques, including how to identify theft attempts, audit human-level vulnerabilities, and suggest social engineering countermeasures.

Module 10: Denial-of-Service
Learn about different Denial-of-Service (DoS) and Distributed DoS (DDoS) attack techniques, as well as the tools used to audit a target and devise DoS and DDoS countermeasures and protections.

Module 11: Session Hijacking
Understand the various session hijacking techniques used to discover network-level session management, authentication, authorization, and cryptographic weaknesses and associated countermeasures.

Module 12: Evading IDS, Firewalls, and Honeypots
Get introduced to firewall, intrusion detection system, and honeypot evasion techniques; the tools used to audit a network perimeter for weaknesses; and countermeasures.

Module 13: Hacking Web Servers
Learn about web server attacks, including a comprehensive attack methodology used to audit vulnerabilities in web server infrastructures and countermeasures.

Module 14: Hacking Web Applications
Learn about web application attacks, including a comprehensive web application hacking methodology used to audit vulnerabilities in web applications and countermeasures.


Module 15: SQL Injection
Learn about SQL injection attack techniques, injection detection tools, and countermeasures to detect and defend against SQL injection attempts.


Module 16: Hacking Wireless Networks
Learn about wireless encryption, wireless hacking methodologies and tools, and Wi-Fi security tools


Module 17: Hacking Mobile Platforms
Learn about mobile platform attack vectors, Android vulnerability exploits, and mobile security guidelines and tools.


Module 18: IoT and OT Hacking
Learn about packet-sniffing techniques and how to use them to discover network vulnerabilities, as well as countermeasures to defend against sniffing attacks.

Module 19: Cloud Computing
Learn different cloud computing concepts, such as container technologies and server less computing, various cloud-based threats and attacks, and cloud security techniques and tools.


Module 20: Cryptography
In the final module, learn about cryptography and ciphers, public-key infrastructure, cryptography attacks, and cryptanalysis tools.

MD Tech’s Hacking Forensic Investigator (C|HFI) is the only comprehensive ANSI accredited, lab-focused program in the market that gives organizations vendor-neutral training in digital forensics. C|HFI provides its attendees with a firm grasp of digital forensics, presenting a detailed and methodological approach to digital forensics and evidence analysis that also pivots around Dark Web, IoT, and Cloud Forensics. The tools and techniques covered in this program will prepare the learner for conducting digital investigations using ground-breaking digital forensics technologies.

The program equips candidates with the necessary skills to proactively investigate complex security threats, allowing them to investigate, record, and report cybercrimes to prevent future attacks.

The course aligns with all the crucial forensic job roles across the globe.

It is an ANSI 17024 accredited Certification Program, mapped to the NICE 2.0 framework and Approved under U.S. Defense of Department (DoD) 8570.

Do you possess an analytical mind? Is critical thinking a part of who you are? Then you’ve come to the right place. A Certified Threat Intelligence Analyst (C|TIA) acts as a force multiplier for organizations looking to reinforce their cyber defense security measures. Threat intelligence is akin to what conventional intelligence agencies across the world engage in to perceive and neutralize threats before any harm can be done. As a certified threat intelligence analyst, you’ll be at the vanguard of your organization’s cybersecurity ecosystem, keeping a 360 degree vigil on existing and foreseen/unforeseen threats.

The Certified Threat Intelligence Analyst (C|TIA) program is designed and developed in collaboration with cybersecurity and threat intelligence experts across the globe. The aim is to help organizations hire qualified cyber intelligence trained professionals to identify and mitigate business risks by converting unknown internal and external threats into quantifiable threat entities and stop them in their tracks. Much like a ‘hunter-killer’ team, you’ll be deployed as a ‘Blue Team’ operative, tasked with threat identification, and asked to employ the tools at hand to thwart active and potential cyberattacks.

Certified Chief Information Security Officer (C|CISO) Program has certified leading information security professionals around the world. A core group of high-level information security executives, the C|CISO Advisory Board, formed the foundation of the program and outlined the content covered by the exam, body of knowledge, and training. Some members of the Board contributed as authors, others as exam writers, others as quality assurance checks, and still others as instructors. Each segment of the program was developed with the aspiring and sitting CISO in mind and looks to transfer the knowledge of seasoned executives to the next generation of leaders in the areas that are most critical in the development and maintenance of a successful information security program.

Learning Objectives

The five CCISO Domains are:

Domain 1: Governance, Risk, Compliance
Domain 2: Information Security Controls and Audit Management
Domain 3: Security Program Management & Operations
Domain 4: Information Security Core Competencies
Domain 5: Strategic Planning, Finance, Procurement, and Third-Party Management

The Certified Chief Information Security Officer program is the first of its kind certification that recognizes an individual’s accumulated skills in developing and executing an information security management strategy in alignment with organizational goals. C|CISO equips information security leaders with the most effective toolset to defend organizations from cyber-attacks. To rise to the role of the CISO, strong technical knowledge, and experience is more imperative now than ever before but it must be accompanied by the ability to communicate in business value.

Cloud technology has transformed the technology landscape and will continue to do so for years to come. EC-Council’s Certified Cloud Security Engineer (C|CSE) is a vendor-neutral course that focuses on cloud security practices, technologies, frameworks, and principles to deliver a well-balanced mix of the theoretical and practical skills you need to become a cloud security expert.

C|CSE was created with cloud security job roles in mind and is designed to help you meet the challenges of tomorrow. As cloud technology evolves, you should too – come learn the skills you need now to defend the technology of tomorrow.

Learn the skills that matter! EC-Council’s vendor-neutral network security certifications provide an unbiased approach to learning secure networking practices, as well as how to analyze and harden computing systems prevalent in the current IT infrastructure.

C|ND v2 has earned a reputation as the only program in the market that is 100% focused on network security and defense.

Certified Network Defender v2 has been designed by industry experts to help IT Professionals play an active role in the Protection of digital business assets and Detection and Response to Cyber Threats, while leveraging Threat Intelligence to Predict them before they happen. C|ND is a network security course designed to help organizations create and deploy the most comprehensive network defense system.

It is an ANSI 17024 accredited Certification Program, mapped to the NICE 2.0 framework and Approved under U.S. Defense of Department (DoD) 8570.

MD Tech’s Certified Penetration Testing Professional (C|PENT) program teaches you how to perform an effective penetration test in an enterprise network environment that must be attacked, exploited, evaded, and defended. If you have only been working in flat networks, C|PENT’s live practice range will teach you to take your skills to the next level by teaching you how to pen test IoT systems, OT systems, how to write your own exploits, build your own tools, conduct advanced binaries exploitation, double pivot to access hidden networks, and also customize scripts/exploits to get into the innermost segments of the network.

The heart of the (C|PENT) program is all about helping you master your pen testing skills by putting them to use on our live cyber ranges. The (C|PENT) ranges were designed to be dynamic in order to give you a real-world training program, so just as targets and technology continue to change in live networks, both the (C|PENT) practice and exam ranges will mimic this reality as our team of engineers continue to add targets and defenses throughout the (C|PENT) course’s lifetime.

The purpose of the C|SCU training program is to provide individuals with the necessary knowledge and skills to protect their information assets. This class will immerse students into an interactive environment where they will acquire a fundamental understanding of various computer and network security threats such as identity theft, credit card fraud, online banking phishing scams, virus and backdoors, emails hoaxes, sex offenders lurking online, loss of confidential information, hacking attacks and social engineering. More importantly, the skills learned from the class helps students take the necessary steps to mitigate their security exposure.

Learning Objectives

Teaches the fundamental knowledge that cybersecurity

The Certified SOC Analyst (C|SA) program is the first step to joining a security operations center (SOC). It is engineered for current and aspiring Tier I and Tier II SOC analysts to achieve proficiency in performing entry-level and intermediate-level operations.

C|SA is a training and credentialing program that helps the candidate acquire trending and in-demand technical skills through instruction by some of the most experienced trainers in the industry. The program focuses on creating new career opportunities through extensive, meticulous knowledge with enhanced level capabilities for dynamically contributing to a SOC team. Being an intense 3-day program, it thoroughly covers the fundamentals of SOC operations, before relaying the knowledge of log management and correlation, SIEM deployment, advanced incident detection, and incident response. Additionally, the candidate will learn to manage various SOC processes and collaborate with CSIRT at the time of need. To read more about SOC and how they are important to many industries.

The Artificial Intelligence (AI) Specialist track is comprised of three modules. Module 1 provides essential coverage of artificial intelligence and neural networks in easy-to-understand, plain English. The course provides concrete coverage of the primary parts of AI, including learning approaches, functional areas that AI systems are used for and a thorough introduction to neural networks, how they exist, how they work and how they can be used to process information. The course establishes the five primary business requirements AI systems and neural networks are used for, and then maps individual practices, learning approaches, functionalities, and neural network types to these business categories and to each other, so that there is a clear understanding of the purpose and role of each topic covered. The course further establishes a step-by-step process for assembling an AI system, thereby illustrating how and when different practices and components of AI systems with neural networks need to be defined and applied. Finally, the course provides a set of key principles and best practices for AI projects. Module 2 covers a series of practices for preparing and working with data for training and running contemporary AI systems and neural networks. It further provides techniques for designing and optimizing neural networks, including approaches for measuring and tuning neural network model performance. The practices and techniques are documented as design patterns that can be applied individually or in different combinations to address a range of common AI system problems and requirements. The patterns are further mapped to the learning approaches, functional areas and neural network types that were introduced in Module 1: Fundamental Artificial Intelligence. The final course module consists of a series of lab exercises that require participants to apply their knowledge of the preceding courses in order to fulfill project requirements and solve real world problems. A Certified Artificial Intelligence Specialist has demonstrated proficiency in artificial intelligence (AI) approaches and algorithms, and proven skills for designing and validating AI solutions and modeling neural networks.

There are no prerequisites for the course required except for a general IT background.

The Blockchain Architect track is comprised of three modules. Module 1 provides a clear, end-to-end understanding of how blockchain works. It breaks down blockchain technology and architecture in easy-to-understand concepts, terms and building blocks. Industry drivers and impacts of blockchain are explained, followed by plain English descriptions of each primary part of a blockchain system and step-by-step descriptions of how these parts work together. Module 2 delves into blockchain technology architecture and the inner workings of blockchains by exploring a series of key design patterns, techniques and related architectural models, along with common technology mechanisms used to customize and optimize blockchain application designs in support of fulfilling business requirements. The final course module consists of a series of lab exercises that require participants to apply their knowledge of the preceding courses in order to fulfill project requirements and solve real world problems. A Certified Blockchain Architect has demonstrated proficiency in Blockchain functions, architecture and security and has acquired specialized skills to assess and design real-world Blockchain solutions.

There are no prerequisites for the course required except for a general IT background.

The Machine Learning Specialist track is comprised of three modules. Module 1 provides an easy-to-understand overview of machine learning for anyone interested in how it works, what it can and cannot do and how it is commonly utilized in support of business goals. The course covers common algorithm types and further explains how machine learning systems work behind the scenes. Module 2 delves into the many algorithms, methods, and models of contemporary machine learning practices to explore how a range of different business problems can be solved by utilizing and combining proven machine learning techniques. The final course module consists of a series of lab exercises that require participants to apply their knowledge of the preceding courses in order to fulfill project requirements and solve real world problems. A Certified Machine Learning Specialist has demonstrated proficiency in machine learning methods, models and algorithms and can design scalable machine learning systems capable of solving complex business problems.

There are no prerequisites for the course required except for a general IT background.

This course will prepare you for your ITIL Foundation certification.  Once certified, you will have the skills and certification to manage IT Services.  It enables candidates to look at IT service management through an end-to-end operating model for the creation, delivery and continual improvement of tech-enabled products and services.