|
- Certified AWS Cloud Practitioner (Voucher Included)
-
Fee: $1,995.00
Item Number: SP2CCTP48091
Dates: 1/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Building:
Room:
Instructor:
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.This course is intended for IT professionals who would like to better understand AWS Cloud concepts and core AWS services. Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
Software Requirements:
- PC: Windows 10 or later.
- Mac: macOS 10.6 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
- Virtual Labs included with the course
- Microsoft Word Online
- Adobe Acrobat Reader
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment and available online.
- Study guide
- Virtual labs
- Practice exams
This course is the first step in training for the industry-leading Amazon AWS product. It serves as a thorough introduction to the services and solutions possible with AWS. It is also the first certification in paths available for IT professionals looking to codify their knowledge and skills in AWS.
Anyone looking for exposure to AWS or the AWS Certified Cloud Practitioner should take this course. This course can be used to prepare for the AWS Certified Cloud Practitioner exam. This course offers enrollment with a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.
- Course Overview and AWS Introduction
- Introduction to AWS Certified Cloud Practitioner Course and Exam Objectives
- Introducing AWS and the Cloud
- AWS Well-Architected Framework
- The AWS Global Architecture (Regions, Availability Zones, and Edge Locations)
- AWS Pricing, Billing, Support Plans and Dashboards
- Accessing AWS Resources
- AWS Compute
- Amazon EC2
- EC2 Scaling and Load Balancing
- Amazon ECS, EKS, and Fargate
- AWS Lambda
- Elastic BeanStalk
- AWS Databases
- Database Overview and RDS
- Amazon Elasticache
- DynamoDB
- DocumentDB
- Amazon Redshift
- Amazon Neptune
- AWS Storage
- Instance and EBS Storage
- EFS, FSx for Windows and FSx for Lustre
- Simple Storage Service (S3)
- AWS Storage Gateway
- AWS Networking
- VPC Overview and Subnets
- VPC Internet Connectivity, Routing, and NAT
- VPC Security Groups and ACLs
- VPNs and Direct Connect
- CloudFront, Global Accelerator and Route53
- API Gateway
- AWS Messaging, Migration, and Translation
- SQS
- SNS and SES
- Snowcone, Snowball, Snowmobile
- AWS DataSync, AWS Transfer, AWS Database Migration Service
- AWS Translate and Transcribe
- Security
- Security Overview, IAM Users and Groups
- Permissions and Policies
- IAM Roles, Identity Federation and Cognito
- KMS, Secrets Manager, AWS Organizations and Compliance
- AWS WAF, Shield, Inspector, Macie, and GuardDuty
- Monitoring and Maintenance
- CloudWatch, CloudWatch Logs, and CloudWatch Events
- CloudTrail and Trusted Advisor
What you will learn
- Define what the AWS Cloud is and the basic global infrastructure
- Describe basic AWS Cloud architectural principles
- Describe the AWS Cloud value proposition
- Describe key services on the AWS platform and their common use cases (for example, compute and analytics)
- Describe basic security and compliance aspects of the AWS platform and the shared security model
- Define the billing, account management, and pricing models
- Identify sources of documentation or technical assistance (for example, whitepapers or support tickets)
- Describe basic/core characteristics of deploying and operating in the AWS Cloud
How you will benefit
- You will be prepared to sit for the AWS Certified Cloud Practitioner exam
- Complete the course in 3 months or less
- Improve your job opportunities and earning potential by increasing your AWS Cloud skills and knowledge
Raymond Lacoste
Raymond Lacoste is a highly recognized instructor and IT professional who holds the Cisco Sirius Instructor Award. He has authored Cisco Press publications on the Cisco ENARSI and Cisco TSHOOT exams.
Raymond's areas of expertise include Cisco Enterprise networking, Cisco Routing and Switching, Cisco Datacenter Networking, ITIL, and Amazon AWS. He also holds certifications in Cisco CCSI, Cisco CCNP Routing and Switching, Cisco CCNP Enterprise, ITIL Foundations, ITIL Practitioner, ITIL Intermediate, Amazon AWS System Operations, Amazon AWS Architect, Amazon AWS Developer, and CISSP.
In addition to his certifications and experience, Raymond's engaging instruction style makes even the most obscenely complicated or obtuse concepts relatable and understandable. Outside of class, he enjoys dominating both on the golf course and the basketball court.
This course is the first step in training for the industry-leading Amazon AWS product. It serves as a thorough introduction to the services and solutions possible with AWS. It is also the first certification in paths available for IT professionals looking to codify their knowledge and skills in AWS.
Anyone looking for exposure to AWS or the AWS Certified Cloud Practitioner should take this course. This course can be used to prepare for the AWS Certified Cloud Practitioner exam. This course offers enrollment with a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.
|
|
|
- Certified AWS Cloud Practitioner Developer Associate (Vouchers Included)
-
Fee: $3,995.00
Item Number: SP2CCTP48141
Dates: 1/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Building:
Room:
Instructor:
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.This course is intended for IT professionals who would like to better understand AWS Cloud concepts, core AWS services, and those looking to gain more knowledge into AWS's developing capabilities. Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
Software Requirements:
- PC: Windows 8 or later.
- Mac: macOS 10.6 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
- Virtual Labs included with the course
- Microsoft Word Online
- Adobe Acrobat Reader
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment and available online.
- Study guide
- Virtual labs
- Practice exams
This comprehensive course is the first step in training for the industry-leading Amazon AWS product. It serves as a thorough introduction to the services and solutions possible with AWS. It is also the first certification in paths available for IT professionals looking to codify their knowledge and skills in AWS.
You will learn how to use the AWS SDK to develop secure and scalable cloud applications. You will also explore how to interact with AWS using code and discuss key concepts, best practices, and troubleshooting tips.
This course can be used to prepare for the AWS Certified Cloud Practitioner - Foundational and AWS Certified Developer – Associate exams. This course offers enrollment with vouchers. The voucher is prepaid access to sit for the certifying exam upon eligibility.
- Course Overview and AWS Introduction
- Introduction to AWS Certified Cloud Practitioner Course and Exam Objectives
- Introducing AWS and the Cloud
- AWS Well-Architected Framework
- The AWS Global Architecture (Regions, Availability Zones, and Edge Locations)
- AWS Pricing, Billing, Support Plans, and Dashboards
- Accessing AWS Resources
- AWS Compute
- Amazon EC2
- EC2 Scaling and Load Balancing
- Amazon ECS, EKS, and Fargate
- AWS Lambda
- Elastic BeanStalk
- AWS Databases
- Database Overview and RDS
- Amazon Elasticache
- DynamoDB
- DocumentDB
- Amazon Redshift
- Amazon Neptune
- AWS Storage
- Instance and EBS Storage
- EFS, FSx for Windows and FSx for Lustre
- Simple Storage Service (S3)
- AWS Storage Gateway
- AWS Networking
- VPC Overview and Subnets
- VPC Internet Connectivity, Routing, and NAT
- VPC Security Groups and ACLs
- VPNs and Direct Connect
- CloudFront, Global Accelerator and Route53
- API Gateway
- AWS Messaging, Migration, and Translation
- SQS
- SNS and SES
- Snowcone, Snowball, Snowmobile
- AWS DataSync, AWS Transfer, AWS Database Migration Service
- AWS Translate and Transcribe
- Security
- Security Overview, IAM Users and Groups
- Permissions and Policies
- IAM Roles, Identity Federation, and Cognito
- KMS, Secrets Manager, AWS Organizations and Compliance
- AWS WAF, Shield, Inspector, Macie, and GuardDuty
- Monitoring and Maintenance
- CloudWatch, CloudWatch Logs, and CloudWatch Events
- CloudTrail and Trusted Advisor
- Course Overview and the AWS Global Infrastructure
- Introduction to AWS Developer Associate Course and Exam Objectives
- Regions, Availability Zones, and Edge Locations
- AWS Security
- IAM Users, Groups, Permissions
- Access Keys and IAM Roles
- Identity Federation and Cognito
- KMS, HSM, and Secrets Manager
- Networking and Compute
- VPC Overview and VPC Subnets
- VPC Internet Connectivity, Routing, and NAT
- VPC Security Groups and ACLs
- CloudFront and Global Accelerator
- EC2 Overview and Launching a Server
- EC2 Storage
- EC2 Auto Scaling
- EC2 Elastic Loadbalancing
- Elastic Container Service Overview
- Databases
- Database Overview and RDS
- RDS Multi-AZ and Read Replicas
- Amazon Aurora
- Elasticache
- DynamoDB Overview, Table Creation, Modes, and Encryption
- DynamoDB Access Controls, Scans, Queries, Indexes
- DynamoDB DAX, Global Tables, Streams, and Additional Considerations
- DocumentDB
- Simple Storage Service (S3)
- S3 Overview, Bucket Creation, Object Upload, Storage Classes, and Lifecycle Policies
- S3 Object Paths, Data Consistency, and Limits
- S3 Encryption, Permissions, and Pre-signed URLs
- S3 Versioning, MFA Delete, and Object Lock
- S3 CORs, Server Access Logging, Event Notifications, Replication
- S3 Static Website Hosting
- Lambda, API Gateway, Step Functions
- Lambda Overview and Examples
- Lambda Features, Limits, and Permissions
- Step Functions
- API Gateway
- Messaging
- SQS
- SNS
- SES
- Elastic Beanstalk and Kinesis
- Elastic Beanstalk Overview
- Elastic Beanstalk Versions and Deployment Options
- Kinesis
- Developer Tools
- Continuous Integration and Continuous Deployment Overview
- Code Commit, Artifact, Build, Deploy, and Pipeline
- CloudFormation and Sam
- SDKs, CLIs, and Simple Workflow Service
- Monitoring
- CloudWatch, CloudWatch Logs, and CloudWatch Events
- CloudTrail and X-Ray
What you will learn
- Define what the AWS Cloud is and the basic global infrastructure and basic AWS Cloud architectural principles
- Describe the AWS Cloud value proposition
- Describe key services on the AWS platform and their common use cases Describe basic security and compliance aspects of the AWS platform and the shared security model
- Define the billing, account management, and pricing models
- Identify sources of documentation or technical assistance (for example, whitepapers or support tickets)
- Describe basic/core characteristics of deploying and operating in the AWS Cloud
- Set up the AWS SDK and developer credentials for Java, C#/.NET, Python, and JavaScript
- Interact with AWS services and develop solutions by using the AWS SDK
- Use AWS Identity and Access Management (IAM) for service authentication
- Use Amazon Simple Storage Service (Amazon S3) and Amazon DynamoDB as datastores
- Integrate applications and data by using AWS Lambda, Amazon API Gateway, Amazon Simple Queue Service (Amazon SQS), Amazon Simple Notification Service (Amazon SNS), and AWS Step Functions
- Use Web Identity Framework and Amazon Cognito for user authentication
- Use Amazon ElastiCache to improve application scalability
- Use containers in the development process
- Leverage the CI/CD pipeline to deploy applications on AWS
How you will benefit
- You will be prepared to sit for the AWS Certified Cloud Practitioner exam
- You will be prepared to sit for the AWS Certified AWS Developer Associate: Associate Exam
- Gain valuable career skills that you can apply immediately
- Increase your earning potential
- Complete your program in 6 months or less
- Certificate of completion from the school or organization that you registered through (upon successfully passing the final exam)
Raymond Lacoste
Raymond Lacoste is a highly recognized instructor and IT professional who holds the Cisco Sirius Instructor Award. He has authored Cisco Press publications on the Cisco ENARSI and Cisco TSHOOT exams.
Raymond's areas of expertise include Cisco Enterprise networking, Cisco Routing, and Switching, Cisco Datacenter Networking, ITIL, and Amazon AWS. He also holds certifications in Cisco CCSI, Cisco CCNP Routing and Switching, Cisco CCNP Enterprise, ITIL Foundations, ITIL Practitioner, ITIL Intermediate, Amazon AWS System Operations, Amazon AWS Architect, Amazon AWS Developer, and CISSP.
In addition to his certifications and experience, Raymond's engaging instruction style makes even the most obscenely complicated or obtuse concepts relatable and understandable. Outside of class, he enjoys dominating both on the golf course and the basketball court.
This comprehensive course is the first step in training for the industry-leading Amazon AWS product. It serves as a thorough introduction to the services and solutions possible with AWS. It is also the first certification in paths available for IT professionals looking to codify their knowledge and skills in AWS.
You will learn how to use the AWS SDK to develop secure and scalable cloud applications. You will also explore how to interact with AWS using code and discuss key concepts, best practices, and troubleshooting tips.
This course can be used to prepare for the AWS Certified Cloud Practitioner - Foundational and AWS Certified Developer – Associate exams. This course offers enrollment with vouchers. The voucher is prepaid access to sit for the certifying exam upon eligibility.
|
|
|
- Certified AWS Cloud Practitioner Solutions Architect (Vouchers Included)
-
Fee: $3,995.00
Item Number: SP2CCTP48151
Dates: 1/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Building:
Room:
Instructor:
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.This course is intended for IT professionals who would like to better understand AWS Cloud concepts, core AWS services, Solutions Architects and Solution Design Engineers. Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
Software Requirements:
- PC: Windows 8 or later.
- Mac: macOS 10.6 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
- Virtual Labs included with the course
- Microsoft Word Online
- Adobe Acrobat Reader
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment and available online.
- Study guide
- Virtual labs
- Practice exams
This course is the first step in training for the industry-leading Amazon AWS product. It serves as a thorough introduction to the services and solutions possible with AWS. It is also the first certification in paths available for IT professionals looking to codify their knowledge and skills in AWS.
You will be taught the fundamental skills to architect your IT solutions on AWS. AWS Architect Associate is a course for system engineers and system developers. It will cover optimizing the AWS Cloud by understanding AWS services and how they fit into cloud-based solutions.
This course can be used to prepare for the AWS Certified Cloud Practitioner - Foundational and the AWS Certified Solutions Architect – Associate exams. This course offers enrollment with vouchers. The voucher is prepaid access to sit for the certifying exam upon eligibility.
- Course Overview and AWS Introduction
- Introduction to AWS Certified Cloud Practitioner Course and Exam Objectives
- Introducing AWS and the Cloud
- AWS Well-Architected Framework
- The AWS Global Architecture (Regions, Availability Zones, and Edge Locations)
- AWS Pricing, Billing, Support Plans and Dashboards
- Accessing AWS Resources
- AWS Compute
- Amazon EC2
- EC2 Scaling and Load Balancing
- Amazon ECS, EKS, and Fargate
- AWS Lambda
- Elastic BeanStalk
- AWS Databases
- Database Overview and RDS
- Amazon Elasticache
- DynamoDB
- DocumentDB
- Amazon Redshift
- Amazon Neptune
- AWS Storage
- Instance and EBS Storage
- EFS, FSx for Windows and FSx for Lustre
- Simple Storage Service (S3)
- AWS Storage Gateway
- AWS Networking
- VPC Overview and Subnets
- VPC Internet Connectivity, Routing, and NAT
- VPC Security Groups and ACLs
- VPNs and Direct Connect
- CloudFront, Global Accelerator and Route53
- API Gateway
- AWS Messaging, Migration, and Translation
- SQS
- SNS and SES
- Snowcone, Snowball, Snowmobile
- AWS DataSync, AWS Transfer, AWS Database Migration Service
- AWS Translate and Transcribe
- Security
- Security Overview, IAM Users and Groups
- Permissions and Policies
- IAM Roles, Identity Federation and Cognito
- KMS, Secrets Manager, AWS Organizations and Compliance
- AWS WAF, Shield, Inspector, Macie, and GuardDuty
- Monitoring and Maintenance
- CloudWatch, CloudWatch Logs, and CloudWatch Events
- CloudTrail and Trusted Advisor
- Course Overview and the AWS Global Infrastructure
- Introduction to AWS Architect Associate Course and Exam Objectives
- Regions, Availability Zones, and Edge Locations
- Compute
- EC2: Overview, Architecture, and Pricing
- EC2: Launching and Accessing a Linux and Windows Server
- EC2: AMIs and Instance Types
- EC2: Instance Store, EBS, EFS, FSx
- EC2: IP addressing, Network Interfaces, Security Groups and Placement Groups
- EC2: Auto Scaling
- EC2: Load Balancers
- ECS: Overview
- Serverless: Lambda
- Serverless: API Gateway
- Databases
- Databases: Overview
- RDS: Overview, Instances, Storage, Encryption and Backups
- RDS: Multi-AZ, and Read Replicas
- RDS: Amazon Aurora
- Elasticache: Overview
- DynamoDB: Overview
- Redshift: Overview
- Networking
- VPC: Overview, and VPC Subnets
- VPC: Internet Connectivity, Routing, and NAT
- VPC: Security Groups and ACLs
- VPC: VPNs, Direct Connect, Peering, Transit Gateways, and Endpoints
- CloudFront and Global Accelerator
- Route53
- Storage and Migration
- Storage: Overview and Review
- Storage: S3 Introduction, Storage Classes, Lifecyle Policies, and Static Websites
- Storage: S3 Security, Integrity, and Replication
- Storage: Storage Gateway and AWS Backup
- Migration: Snowcone, Snowball and Snowmobile
- Migration: AWS DataSync, AWS Transfer, AWS Database Migration Service
- Application Integration and Customer Engagement
- SQS, SNS, SES, Amazon MQ
- Security
- IAM: Users, Groups, Policies
- IAM: Temporary Credentials, Roles, Password Policies
- KMS and HSM
- Amazon Inspector, Macie, GuardDuty
- AWS Certificate Manager. Secrets Manager, WAF, Shield
- Monitoring and Management
- Amazon CloudWatch
- AWS CloudTrail, AWS Config
- AWS Organizations and AWS Resource Groups
- AWS Billing and Cost Management
What you will learn
- Define what the AWS Cloud is and the basic global infrastructure
- Describe basic AWS Cloud architectural principles
- Describe the AWS Cloud value proposition
- Describe key services on the AWS platform and their common use cases (for example, compute and analytics)
- Describe basic security and compliance aspects of the AWS platform and the shared security model
- Define the billing, account management, and pricing models
- Identify sources of documentation or technical assistance (for example, whitepapers or support tickets)
- Describe basic/core characteristics of deploying and operating in the AWS CloudMake architectural decisions based on AWS architectural principles and best practices
- Leverage AWS services to make your infrastructure scalable, reliable, and highly available
- Leverage AWS Managed Services to enable greater flexibility and resiliency in an infrastructure
- Make an AWS-based infrastructure more efficient to increase performance and reduce costs
- Use the Well-Architected Framework to improve architectures with AWS solutions
How you will benefit
- You will be prepared to sit for the AWS Certified Cloud Practitioner exam
- You will be prepared to sit for the AWS Solutions Architect: Associate Exam
- Gain valuable career skills that you can apply immediately
- Increase your earning potential
- Complete your program in 6 months or less
Raymond Lacoste
Raymond Lacoste is a highly recognized instructor and IT professional who holds the Cisco Sirius Instructor Award. He has authored Cisco Press publications on the Cisco ENARSI and Cisco TSHOOT exams.
Raymond's areas of expertise include Cisco Enterprise networking, Cisco Routing, and Switching, Cisco Datacenter Networking, ITIL, and Amazon AWS. He also holds certifications in Cisco CCSI, Cisco CCNP Routing and Switching, Cisco CCNP Enterprise, ITIL Foundations, ITIL Practitioner, ITIL Intermediate, Amazon AWS System Operations, Amazon AWS Architect, Amazon AWS Developer, and CISSP.
In addition to his certifications and experience, Raymond's engaging instruction style makes even the most obscenely complicated or obtuse concepts relatable and understandable. Outside of class, he enjoys dominating both on the golf course and the basketball court.
This course is the first step in training for the industry-leading Amazon AWS product. It serves as a thorough introduction to the services and solutions possible with AWS. It is also the first certification in paths available for IT professionals looking to codify their knowledge and skills in AWS.
You will be taught the fundamental skills to architect your IT solutions on AWS. AWS Architect Associate is a course for system engineers and system developers. It will cover optimizing the AWS Cloud by understanding AWS services and how they fit into cloud-based solutions.
This course can be used to prepare for the AWS Certified Cloud Practitioner - Foundational and the AWS Certified Solutions Architect – Associate exams. This course offers enrollment with vouchers. The voucher is prepaid access to sit for the certifying exam upon eligibility.
|
|
|
- Certified AWS Cloud Practitioner SysOps Administrator (Vouchers Included)
-
Fee: $3,995.00
Item Number: SP2CCTP48131
Dates: 1/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Building:
Room:
Instructor:
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.This course is intended for system administrators and software developers and other IT professionals who would like to better understand AWS Cloud concepts and core AWS services. Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
Software Requirements:
- PC: Windows 8 or later.
- Mac: macOS 10.6 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
- Virtual Labs included with the course
- Microsoft Word Online
- Adobe Acrobat Reader
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment and available online.
- Study guide
- Virtual labs
- Practice exams
This course is the first step in training for the industry-leading Amazon AWS product. It serves as a thorough introduction to the services and solutions possible with AWS. It is also the first certification in paths available for IT professionals looking to codify their knowledge and skills in AWS.
Students will then be taught how to create automatable and repeatable deployments of networks and systems on the AWS platform. AWS System Operations is a course for system administrators and developer operations personnel and will cover the specific AWS features and tools related to configuration and deployment, as well as common techniques used throughout the industry for configuring and deploying systems.
This course can be used to prepare for the AWS Certified Cloud Practitioner – Foundational and AWS Certified SysOps Administrator – Associate exams. This course offers enrollment with vouchers. The voucher is prepaid access to sit for the certifying exam upon eligibility.
- Course Overview and AWS Introduction
- Introduction to AWS Certified Cloud Practitioner Course and Exam Objectives
- Introducing AWS and the Cloud
- AWS Well-Architected Framework
- The AWS Global Architecture (Regions, Availability Zones, and Edge Locations)
- AWS Pricing, Billing, Support Plans, and Dashboards
- Accessing AWS Resources
- AWS Compute
- Amazon EC2
- EC2 Scaling and Load Balancing
- Amazon ECS, EKS, and Fargate
- AWS Lambda
- Elastic BeanStalk
- AWS Databases
- Database Overview and RDS
- Amazon Elasticache
- DynamoDB
- DocumentDB
- Amazon Redshift
- Amazon Neptune
- AWS Storage
- Instance and EBS Storage
- EFS, FSx for Windows and FSx for Lustre
- Simple Storage Service (S3)
- AWS Storage Gateway
- AWS Networking
- VPC Overview and Subnets
- VPC Internet Connectivity, Routing, and NAT
- VPC Security Groups and ACLs
- VPNs and Direct Connect
- CloudFront, Global Accelerator and Route53
- API Gateway
- AWS Messaging, Migration, and Translation
- SQS
- SNS and SES
- Snowcone, Snowball, Snowmobile
- AWS DataSync, AWS Transfer, AWS Database Migration Service
- AWS Translate and Transcribe
- Security
- Security Overview, IAM Users and Groups
- Permissions and Policies
- IAM Roles, Identity Federation, and Cognito
- KMS, Secrets Manager, AWS Organizations and Compliance
- AWS WAF, Shield, Inspector, Macie, and GuardDuty
- Monitoring and Maintenance
- CloudWatch, CloudWatch Logs, and CloudWatch Events
- CloudTrail and Trusted Advisor
- Course Overview and AWS Introduction
- Introduction to AWS Certified SysOps Administrator Associate Course and Exam Objectives
- Introducing AWS and the Cloud
- The AWS Global Architecture (Regions, Availability Zones, and Edge Locations)
- AWS Pricing, Billing, Support Plans, and Dashboards
- Accessing AWS Resources
- AWS Networking
- VPC Overview and VPC Subnets
- VPC Internet Connectivity, Routing, and NAT
- VPC Security Groups, ACLs, and Flow Logs
- VPC VPNs, Direct Connect, Peering, Transit Gateways, and Endpoints
- CloudFront, Global Accelerator and Route53
- AWS Compute
- EC2 Overview, Architecture, and Pricing
- EC2 Launching and Accessing a Linux and Windows Server
- EC2 AMIs, Instance Types, Features
- EC2 Instance Store, EBS, EFS, FSx, and S3 Storage
- EC2 IP addressing, Network Interfaces, Security Groups, and Placement Groups
- EC2 Auto Scaling
- EC2 Load Balancers
- ECS Overview
- Lambda Overview and Examples
- API Gateway
- AWS Databases
- Database Overview
- RDS Overview, Instances, Storage, Encryption, and Backups
- RDS Multi-AZ, and Read Replicas
- RDS Amazon Aurora
- Elasticache Overview
- DynamoDB Overview
- Redshift Overview
- AWS Storage
- Storage Overview and Review
- S3 Introduction, Storage Classes, and Lifecycle Policies
- S3 Security and Integrity
- S3 Replication, Event Notifications, Inventory, and Limits
- S3 Static Website Hosting
- Storage Gateway and AWS Backup
- AWS Migration and Messaging
- Snowcone, Snowball, Snowmobile
- AWS DataSync, AWS Transfer, AWS Database Migration Service
- SQS, SNS, and SES
- AWS Security
- Security Overview, IAM Users and Groups
- Permissions and Policies
- IAM Roles, Identity Federation, and Cognito
- KMS, Secrets Manager, Certificates Manager, and Compliance
- AWS WAF, Shield, Inspector, Macie, and GuardDuty
- Monitoring, Maintenance, and Management
- CloudWatch, CloudWatch Logs, and CloudWatch Events
- AWS CloudTrail, AWS Config, and Trusted Advisor
- CloudFormation and Service Catalog
- AWS Organizations and Control Towe
- AWS Systems Manager, Resource Groups, and Service/Personal Health Dashboards
- AWS Pricing, Billing, and Cost Management
What you will learn
- Define what the AWS Cloud is and the basic global infrastructure
- Describe basic AWS Cloud architectural principles, key services, and common use cases and the AWS Cloud value proposition
- Describe basic security and compliance aspects of the AWS platform and the shared security model
- Define the billing, account management, and pricing models
- Identify sources of documentation or technical assistance
- Describe basic/core characteristics of deploying and operating in the AWS Cloud
- Use standard AWS infrastructure features such as Amazon Virtual Private Cloud (VPC), Amazon Elastic Compute Cloud (EC2), Elastic Load Balancing, and Auto Scaling from the command line
- Use AWS CloudFormation and other automation technologies to produce stacks of AWS resources that can be deployed in an automated, repeatable fashion
- Build functioning virtual private networks with Amazon VPC from the ground up using the AWS Management Console
- Deploy Amazon EC2 instances using command line calls and troubleshoot the most common problems with instances
- Monitor the health of Amazon EC2 instances and other AWS services
- Manage user identity, AWS permissions, and security in the cloud
- Manage resource consumption in an AWS account using tools such as Amazon CloudWatch, tagging, and Trusted Advisor
- Select and implement the best strategy for creating reusable Amazon EC2 instances
- Configure a set of Amazon EC2 instances that launch behind a load balancer, with the system scaling up and down in response to demand
- Edit and troubleshoot a basic AWS CloudFormation stack definition
How you will benefit
- You will be prepared to sit for the AWS Certified Cloud Practitioner exam
- You will be prepared to sit for the AWS SysOps Administrator: Associate Exam
- Gain valuable career skills that you can apply immediately
- Increase your earning potential
- Complete your program in 6 months or less
- Certificate of completion from the school or organization that you registered through (upon successfully passing the final exam)
Raymond Lacoste
Raymond Lacoste is a highly recognized instructor and IT professional who holds the Cisco Sirius Instructor Award. He has authored Cisco Press publications on the Cisco ENARSI and Cisco TSHOOT exams.
Raymond's areas of expertise include Cisco Enterprise networking, Cisco Routing, and Switching, Cisco Datacenter Networking, ITIL, and Amazon AWS. He also holds certifications in Cisco CCSI, Cisco CCNP Routing and Switching, Cisco CCNP Enterprise, ITIL Foundations, ITIL Practitioner, ITIL Intermediate, Amazon AWS System Operations, Amazon AWS Architect, Amazon AWS Developer, and CISSP.
In addition to his certifications and experience, Raymond's engaging instruction style makes even the most obscenely complicated or obtuse concepts relatable and understandable. Outside of class, he enjoys dominating both on the golf course and the basketball court.
This course is the first step in training for the industry-leading Amazon AWS product. It serves as a thorough introduction to the services and solutions possible with AWS. It is also the first certification in paths available for IT professionals looking to codify their knowledge and skills in AWS.
Students will then be taught how to create automatable and repeatable deployments of networks and systems on the AWS platform. AWS System Operations is a course for system administrators and developer operations personnel and will cover the specific AWS features and tools related to configuration and deployment, as well as common techniques used throughout the industry for configuring and deploying systems.
This course can be used to prepare for the AWS Certified Cloud Practitioner – Foundational and AWS Certified SysOps Administrator – Associate exams. This course offers enrollment with vouchers. The voucher is prepaid access to sit for the certifying exam upon eligibility.
|
|
|
- Certified AWS Developer (Voucher Included)
-
Fee: $1,995.00
Item Number: SP2CCTP48111
Dates: 1/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Building:
Room:
Instructor:
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.The AWS Developer course is designed for intermediate-level software developers and those looking to learn more about AWS's developing capabilities. Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
Software Requirements:
- PC: Windows 8 or later.
- Mac: macOS 10.6 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
- Virtual Labs included with the course
- Microsoft Word Online
- Adobe Acrobat Reader
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment and available online.
- Study guide
- Virtual labs
- Practice exams
In this online training course, you will learn how to use the AWS SDK to develop secure and scalable cloud applications. You will also explore how to interact with AWS using code and discuss key concepts, best practices, and troubleshooting tips
This course can be used to prepare for the AWS Certified Developer – Associate exam. This course offers enrollment with a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.
- Introduction to Developing in Azure
- Getting Started with AWS
- Exploring IAM
- EC2
- EC2 Basics
- EC2 Instance Storage Section
- Load Balancing, Auto Scaling Groups, and EBSVolumes
- High Availability and Scalability
- Load Balancing
- Auto Scaling Groups
- RDS, Aurora, and Elasticache
- Relational Database Service
- Aurora
- Elasticache
- DNS and VPCs
- Route 53
- VPC primer
- Tier 3 Architecture
- Tier 3 Architecture
- Amazon Simple Storage Service
- Amazon S3
- Cross Origin Resource Sharing
- AWS Development
- Developing on AWS
- Development with Simple Storage Service
- CloudFront, Beanstalk, and Docker development
- CloudFront
- Elastic Beanstalk
- AWS ECS Essentials
- AWS CICD
- Introduction to AWS CICD
- AWS CodeBuild
- AWS CodeDeploy
- Other AWS CICD Services
- Managing Your Infrastructure as Code
- CloudFormation
- CloudFormation Functions
- AWS Monitoring, Troubleshooting & Audit
- CloudWatch
- AWS X-ray
- AWS CloudTrail
- AWS Integration and Messaging
- Amazon Simple Queue Service
- Amazon Simple Notification Service
- Kinesis
- AWS Lambda and DynamoDB
- Introduction to AWS Lambda
- Even More Lambda
- DynamoDB Basics
- Working with DynamoDB
- API Gateway
- API Gateway Basics
- API Tuning
- Working with the Serverless Application Model (SAM)
- Serverless Application Model
- AWS Cloud Development Kit
- Amazon Cognito
- Other Serverless Features
- Additional Security
- Advanced Identity Management
- AWS Security and Encryption
- Additional AWS Services
- Other AWS Services
What you will learn
- Set up the AWS SDK and developer credentials for Java, C#/.NET, Python, and JavaScript
- Interact with AWS services and develop solutions by using the AWS SDK
- Use AWS Identity and Access Management (IAM) for service authentication
- Use Amazon Simple Storage Service (Amazon S3) and Amazon DynamoDB as datastores
- Integrate applications and data by using AWS Lambda, Amazon API Gateway, Amazon Simple Queue Service (Amazon SQS), Amazon Simple Notification Service (Amazon SNS), and AWS Step Functions
- Use Web Identity Framework and Amazon Cognito for user authentication
- Use Amazon ElastiCache to improve application scalability
- Use containers in the development process
- Leverage the CI/CD pipeline to deploy applications on AWS
How you will benefit
- You will be prepared to sit for the AWS Certified AWS Developer Associate: Associate Exam
- Gain valuable career skills that you can apply immediately
- Increase your earning potential
- Complete your program in 3 months or less
- Certificate of completion from the school or organization that you registered through (upon successfully passing the final exam)
Raymond Lacoste
Raymond Lacoste is a highly recognized instructor and IT professional who holds the Cisco Sirius Instructor Award. He has authored Cisco Press publications on the Cisco ENARSI and Cisco TSHOOT exams.
Raymond's areas of expertise include Cisco Enterprise networking, Cisco Routing, and Switching, Cisco Datacenter Networking, ITIL, and Amazon AWS. He also holds certifications in Cisco CCSI, Cisco CCNP Routing and Switching, Cisco CCNP Enterprise, ITIL Foundations, ITIL Practitioner, ITIL Intermediate, Amazon AWS System Operations, Amazon AWS Architect, Amazon AWS Developer, and CISSP.
In addition to his certifications and experience, Raymond's engaging instruction style makes even the most obscenely complicated or obtuse concepts relatable and understandable. Outside of class, he enjoys dominating both on the golf course and the basketball court.
In this online training course, you will learn how to use the AWS SDK to develop secure and scalable cloud applications. You will also explore how to interact with AWS using code and discuss key concepts, best practices, and troubleshooting tips
This course can be used to prepare for the AWS Certified Developer – Associate exam. This course offers enrollment with a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.
|
|
|
- Certified AWS Solutions Architect (Voucher Included)
-
Fee: $1,995.00
Item Number: SP2CCTP48121
Dates: 1/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Building:
Room:
Instructor:
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.The AWS Architect Associate course is designed for solutions architects and solution design engineers who want to learn fundamental skills to architect their IT solutions on AWS and more. Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
Software Requirements:
- PC: Windows 8 or later.
- Mac: macOS 10.6 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
- Virtual Labs included with the course
- Microsoft Word Online
- Adobe Acrobat Reader
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment and available online.
- Study guide
- Virtual labs
- Practice exams
In this online training course, you will be taught the fundamental skills to architect your IT solutions on AWS. AWS Architect Associate is a course for system engineers and system developers that will cover how to optimize the AWS Cloud by understanding AWS services and how they fit into cloud-based solutions.
This course can be used to prepare for the AWS Certified Solutions Architect – Associate exam. This course offers enrollment with a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.
- Course Overview
- Introduction to AWS Architect Associate Course and Exam Objectives
- The Well Architected Framework and the AWS Global Architecture
- AWS Well Architected Framework
- AWS Global Architecture
- Building a Server-based Architecture in AWS
- Virtual Private Cloud (VPC): Overview and Subnets
- Virtual Private Cloud (VPC): Internet Connectivity, Routing, NAT, Network Firewall
- Virtual Private Cloud (VPC): Security Groups and ACLs
- Virtual Private Cloud (VPC): VPNs, Direct Connect, Peering, Transit Gateways, and Endpoints
- Elastic Compute Cloud (EC2): Overview, Architecture and Pricing
- Elastic Compute Cloud (EC2): Launching and Accessing a Linux and Windows Server
- Elastic Compute Cloud (EC2): AMIs and Instance Types
- Elastic Compute Cloud (EC2): Storage: IS, EBS, EFS, FSx, S3
- Elastic Compute Cloud (EC2): IP addressing, Network Interfaces, Security Groups and Placement Groups
- Elastic Compute Cloud (EC2): Auto Scaling
- Application AutoScaling
- Elastic Compute Cloud (EC2): Elastic Load Balancers
- Elastic Container Service and Elastic Kubernetes Service
- Relational Database Service (RDS): Overview, Pricing, Instances, Storage, Encryption, and Backups
- Relational Database Service (RDS): Multi-AZ, Read Replicas, RDS Proxy
- Relational Database Service (RDS): Amazon Aurora
- Amazon Elasticache
- Architecting with Amazon S3 Storage
- Simple Storage Service (S3): Storage Review, S3 Overview, and Architecture
- Simple Storage Service (S3): Storage Classes, Lifecyle Policies and Performance
- Simple Storage Service (S3): Permissions, Encryption, Versioning, MFA Delete, and Object Lock
- Simple Storage Service (S3): Static Website Hosting
- Simple Storage Service (S3): Additional Services and Tools
- Improving Access and Reliability to your AWS Services
- Amazon CloudFront & AWS Global Accelerator
- Amazon Route 53
- Building a Server-based Architecture in AWS
- Introducing the Serverless Architecture
- Lambda and API Gateway
- AWS Step Functions
- Amazon DynamoDB
- DocumentDB, Redshift, Lake Formation, and Neptune
- Amazon SQS, Amazon SNS, Amazon SES, Amazon Pinpoint, and Amazon MQ
- Migrating, Transferring, and Syncing Data with Amazon S3
- AWS Storage Gateway and AWS Backup
- AWS Snowcone, Snowball and Snowmobile
- AWS DataSync, AWS Transfer, AWS Database Migration Service, and AWS Batch
- Authentication and Security in AWS
- Identity and Access Management: Users, Groups, and Roles
- Identity and Access Management: Permissions and Policies
- Identity Providers and Cognito
- AWS Certificate Manager, Secrets Manager, WAF, Shield
- AWS Key Management Service and AWS CloudHSM
- Amazon Inspector, Macie, and Guard Duty
- Managing and Monitoring in AWS
- AWS Systems Manager
- Amazon CloudWatch: Metrics, Logs, Alarms, Dashboards
- AWS CloudTrail and AWS Config
- Amazon EventBridge
- AWS Organizations, Control Tower, and Resource Groups
- AWS Billing, Cost Management, and Trusted Advisor
- Additional Services You Need to Know
- Amazon Translate, Transcribe, Textract, Comprehend, and Rekognition
- Amazon Athena, QuickSight, Glue, and AppFlow
- Amazon Kinesis and Amazon Elastic Beanstalk
- How to Approach Exam Questions and Course Wrap-Up!
- Practice Questions
- Course Wrap-Up!
What you will learn
- Make architectural decisions based on AWS architectural principles and best practices
- Leverage AWS services to make your infrastructure scalable, reliable, and highly available
- Leverage AWS Managed Services to enable greater flexibility and resiliency in an infrastructure
- Make an AWS-based infrastructure more efficient to increase performance and reduce costs
- Use the Well-Architected Framework to improve architectures with AWS solutions
How you will benefit
- You will be prepared to sit for the AWS Solutions Architect: Associate Exam
- Gain valuable career skills that you can apply immediately
- Increase your earning potential
- Complete your program in 3 months or less
- Certificate of completion from the school or organization that you registered through (upon successfully passing the final exam)
Raymond Lacoste
Raymond Lacoste is a highly recognized instructor and IT professional who holds the Cisco Sirius Instructor Award. He has authored Cisco Press publications on the Cisco ENARSI and Cisco TSHOOT exams.
Raymond's areas of expertise include Cisco Enterprise networking, Cisco Routing, and Switching, Cisco Datacenter Networking, ITIL, and Amazon AWS. He also holds certifications in Cisco CCSI, Cisco CCNP Routing and Switching, Cisco CCNP Enterprise, ITIL Foundations, ITIL Practitioner, ITIL Intermediate, Amazon AWS System Operations, Amazon AWS Architect, Amazon AWS Developer, and CISSP.
In addition to his certifications and experience, Raymond's engaging instruction style makes even the most obscenely complicated or obtuse concepts relatable and understandable. Outside of class, he enjoys dominating both on the golf course and the basketball court.
In this online training course, you will be taught the fundamental skills to architect your IT solutions on AWS. AWS Architect Associate is a course for system engineers and system developers that will cover how to optimize the AWS Cloud by understanding AWS services and how they fit into cloud-based solutions.
This course can be used to prepare for the AWS Certified Solutions Architect – Associate exam. This course offers enrollment with a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.
|
|
|
- Certified AWS SysOps Administrator (Voucher Included)
-
Fee: $1,995.00
Item Number: SP2CCTP48101
Dates: 1/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Building:
Room:
Instructor:
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.The AWS SysOps Administrator course is intended for system administrators and software developers who wish to learn related best practices and tools on the AWS platform for configuring and deploying systems. Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
Software Requirements:
- PC: Windows 8 or later.
- Mac: macOS 10.6 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
- Virtual Labs included with the course
- Microsoft Word Online
- Adobe Acrobat Reader
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment and available online.
- Study guide
- Virtual labs
- Practice exams
In this online training course, you will be taught how to create automatable and repeatable deployments of networks and systems on the AWS platform. AWS SysOps Administrator is a course for system administrators and developer operations personnel. It will cover the specific AWS features and tools related to configuration and deployment and common techniques used throughout the industry for configuring and deploying systems.
This course can be used to prepare for the AWS Certified SysOps Administrator – Associate exam. This course offers enrollment with a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.
- Course Overview and AWS Introduction
- Introduction to AWS Certified SysOps Administrator Associate Course and Exam Objectives
- Introducing AWS and the Cloud
- The AWS Global Architecture (Regions, Availability Zones, and Edge Locations)
- AWS Pricing, Billing, Support Plans and Dashboards
- Accessing AWS Resources
- AWS Networking
- VPC Overview and VPC Subnets
- VPC Internet Connectivity, Routing, and NAT
- VPC Security Groups, ACLs, and Flow Logs
- VPC VPNs, Direct Connect, Peering, Transit Gateways, and Endpoints
- CloudFront, Global Accelerator and Route53
- AWS Compute
- EC2 Overview, Architecture, and Pricing
- EC2 Launching and Accessing a Linux and Windows Server
- EC2 AMIs, Instance Types, Features
- EC2 Instance Store, EBS, EFS, FSx, and S3 Storage
- EC2 IP addressing, Network Interfaces, Security Groups and Placement Groups
- EC2 Auto Scaling
- EC2 Load Balancers
- ECS Overview
- Lambda Overview and Examples
- API Gateway
- AWS Databases
- Database Overview
- RDS Overview, Instances, Storage, Encryption and Backups
- RDS Multi-AZ, and Read Replicas
- RDS Amazon Aurora
- Elasticache Overview
- DynamoDB Overview
- Redshift Overview
- AWS Storage
- Storage Overview and Review
- S3 Introduction, Storage Classes, and Lifecyle Policies
- S3 Security, and Integrity
- S3 Replication, Event Notifications, Inventory, and Limits
- S3 Static Website Hosting
- Storage Gateway and AWS Backup
- AWS Migration and Messaging
- Snowcone, Snowball, Snowmobile
- AWS DataSync, AWS Transfer, AWS Database Migration Service
- SQS, SNS, and SES
- AWS Security
- Security Overview, IAM Users and Groups
- Permissions and Policies
- IAM Roles, Identity Federation and Cognito
- KMS, Secrets Manager, Certificates Manager, and Compliance
- AWS WAF, Shield, Inspector, Macie, and GuardDuty
- Monitoring, Maintenance, and Management
- CloudWatch, CloudWatch Logs, and CloudWatch Events
- AWS CloudTrail, AWS Config, and Trusted Advisor
- CloudFormation and Service Catalog
- AWS Organizations, and Control Towe
- AWS Systems Manager, Resource Groups, and Service/Personal Health Dashboards
- AWS Pricing, Billing, and Cost Management
What you will learn
- Use standard AWS infrastructure features such as Amazon Virtual Private Cloud (VPC), Amazon Elastic Compute Cloud (EC2), Elastic Load Balancing, and Auto Scaling from the command line
- Use AWS CloudFormation and other automation technologies to produce stacks of AWS resources that can be deployed in an automated, repeatable fashion
- Build functioning virtual private networks with Amazon VPC from the ground up using the AWS Management Console
- Deploy Amazon EC2 instances using command line calls and troubleshoot the most common problems with instances
- Monitor the health of Amazon EC2 instances and other AWS services
- Manage user identity, AWS permissions, and security in the cloud
- Manage resource consumption in an AWS account using tools such as Amazon CloudWatch, tagging, and Trusted Advisor
- Select and implement the best strategy for creating reusable Amazon EC2 instances
- Configure a set of Amazon EC2 instances that launch behind a load balancer, with the system scaling up and down in response to demand
- Edit and troubleshoot a basic AWS CloudFormation stack definition
How you will benefit
- You will be prepared to sit for the AWS SysOps Administrator: Associate Exam
- Gain valuable career skills that you can apply immediately
- Increase your earning potential
- Complete your program in 3 months or less
Raymond Lacoste
Raymond Lacoste is a highly recognized instructor and IT professional who holds the Cisco Sirius Instructor Award. He has authored Cisco Press publications on the Cisco ENARSI and Cisco TSHOOT exams.
Raymond's areas of expertise include Cisco Enterprise networking, Cisco Routing and Switching, Cisco Datacenter Networking, ITIL, and Amazon AWS. He also holds certifications in Cisco CCSI, Cisco CCNP Routing and Switching, Cisco CCNP Enterprise, ITIL Foundations, ITIL Practitioner, ITIL Intermediate, Amazon AWS System Operations, Amazon AWS Architect, Amazon AWS Developer, and CISSP.
In addition to his certifications and experience, Raymond's engaging instruction style makes even the most obscenely complicated or obtuse concepts relatable and understandable. Outside of class, he enjoys dominating both on the golf course and the basketball court.
In this online training course, you will be taught how to create automatable and repeatable deployments of networks and systems on the AWS platform. AWS SysOps Administrator is a course for system administrators and developer operations personnel. It will cover the specific AWS features and tools related to configuration and deployment and common techniques used throughout the industry for configuring and deploying systems.
This course can be used to prepare for the AWS Certified SysOps Administrator – Associate exam. This course offers enrollment with a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.
|
|
|
- Certified Ethical Hacker (Voucher Included)
-
Fee: $2,895.00
Item Number: SP2CCTP46701
Dates: 1/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Building:
Room:
Instructor:
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.This online Certified Ethical Hacker (CEH) course will teach you the valuable details that every information security professional needs to know. Requirements:
Hardware Requirements:
- This course can be taken on either a PC or Mac.
Software Requirements:
- PC: Windows 8 or later.
- Mac: macOS 10.10 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
- Adobe Acrobat Reader.
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment and will be available online. The materials are non-refundable upon registration.
- Certified Ethical Hacker, Ethical Hacking and Countermeasures (eBook)
To be successful in beating a hacker, you need to think like one. This ethical hacking certification course immerses you in the hacker mindset and puts you in control with hands-on activities. As a certified ethical hacker (CEH), you use the same techniques as malicious hackers to assess security and identify weaknesses, but for ethical purposes. You will scan, test, hack, and secure your own systems to help prevent potentially catastrophic damage to your organization.
By completing this CEH training, you will learn the industry standards of ethical hacking developed by the EC-Council. This process involves five phases, namely Reconnaissance, Gaining Access, Enumeration, Maintaining Access, and Covering Your Tracks. With these skills, you will be able to assess the security posture of an organization and identify and fix weaknesses before malicious hackers can exploit them.
This unique credential sets you apart from other IT professionals and adds even more value to your organization. According to the EC-Council, one in every two professionals receive promotions after gaining their ethical hacking certification.
Gain advanced hacking tools and techniques while preparing to sit for the Certified Ethical Hacker Exam 312-50 with this accredited CEH course offered by the EC-Council. The exam voucher is included in the cost of your enrollment.
- Introduction to Ethical Hacking
- Foot Printing and Reconnaissance
- Scanning Networks
- Enumeration
- Vulnerability Analysis
- System Hacking
- Malware Threats
- Sniffing
- Social Engineering
- Denial of Service
- Session Hijacking
- Evading IDS, Firewalls and Honeypots
- Hacking Web Servers
- Hacking Web Applications
- SQL Injection
- Hacking Wireless Networks
- Hacking Mobile Platforms
- IoT and OT Hacking
- Cloud Computing
- Cryptography
What you will learn
- Assess ethical and legal requirements for security assessment and penetration testing and develop a compliance strategy
- Analyze the different phases of hacking and determine the most effective ethical hacking strategy for assessing the security of information system components
- Identify vulnerabilities, threats, and attacks to information systems, and recommend countermeasures.
- Evaluate cryptography algorithms and encryption techniques and develop implementation strategies for securing information
- Evaluate network security techniques and tools, and implement appropriate information security controls based on evidence, information, and research
How you will benefit
- Prepare for Certified Ethical Hacker (CEH) Exam Number 312-50 with example CEH exam questions
- Obtain the CEH credential to unlock a number of career opportunities in the information security and cybersecurity industry
- Obtain a credential highly acknowledged and recognized by employers in the public and private sector
- Complete the most advanced, hands on ethical hacking program in the industry
Eric Reed
Eric Reed has over 12 years of experience in IT consulting, specializing in security. Since 2005, he has consulted and delivered custom training to the U.S. military and numerous Fortune 100 and Fortune 500 companies. He has delivered CEH, CHFI, and ECSA/LPT training for the last seven years, with a 95 percent pass rating. Reed was awarded the EC Council Instructor of the Year in 2009 and 2012, as well as the Circle of Excellence in 2006, 2007, and 2010.
To be successful in beating a hacker, you need to think like one. This ethical hacking certification course immerses you in the hacker mindset and puts you in control with hands-on activities. As a certified ethical hacker (CEH), you use the same techniques as malicious hackers to assess security and identify weaknesses, but for ethical purposes. You will scan, test, hack, and secure your own systems to help prevent potentially catastrophic damage to your organization.
By completing this CEH training, you will learn the industry standards of ethical hacking developed by the EC-Council. This process involves five phases, namely Reconnaissance, Gaining Access, Enumeration, Maintaining Access, and Covering Your Tracks. With these skills, you will be able to assess the security posture of an organization and identify and fix weaknesses before malicious hackers can exploit them.
This unique credential sets you apart from other IT professionals and adds even more value to your organization. According to the EC-Council, one in every two professionals receive promotions after gaining their ethical hacking certification.
Gain advanced hacking tools and techniques while preparing to sit for the Certified Ethical Hacker Exam 312-50 with this accredited CEH course offered by the EC-Council. The exam voucher is included in the cost of your enrollment.
|
|
|
- Certified Network Defender (CND) (Voucher Included)
-
Fee: $2,895.00
Item Number: SP2CCTP47751
Dates: 1/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Building:
Room:
Instructor:
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.This course prepares for the EC-Council Certified Network Defender (CND) exam. You will gain key skills that network engineers need to protect, detect and respond to the threats on their networks. Requirements:
Hardware Requirements:
- This course can be taken on either a PC or Mac.
Software Requirements:
- PC: Windows 8 or later.
- Mac: macOS 10.10 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
- Adobe Acrobat Reader.
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment and will be available online. The materials are non-refundable upon registration. This comprehensive online course is specifically designed to prepare network engineers for the Certified Network Defender (CND) certification exam offered by the EC-Council (ECC). The CND certification is globally recognized and validates your ability to protect networks and maintain operations during cyber-attacks effectively.
Throughout this CND course, you will delve into various modules that cover essential topics such as network security controls, protocols, and devices. You will learn how to strengthen security infrastructures by effectively implementing intrusion detection and prevention systems and troubleshooting network problems. The course also provides in-depth training on implementing secure virtual private networks (VPNs) for organizations and identifying and mitigating threats to wireless networks.
One of the key highlights of this CND training program is its alignment with global CND responsibilities and Department of Defense (DoD) job roles for system/network administrators. This ensures that the skills and knowledge you acquire are highly relevant and applicable in real-world scenarios. The course follows a vendor-neutral approach, allowing you to understand network security principles and practices comprehensively without being tied to any specific technology or platform.
Upon completing this course, you will receive a voucher covering the certifying exam's cost. This allows you to schedule and take the exam remotely using a proctor function, providing flexibility and convenience in the certification process.
By enrolling in this course and earning the CND certification, you will become proficient in network security, gain the necessary skills to protect networks from cyber breaches, and enhance your professional credibility in this high-demand field.
- Network Attacks and Defense Strategies
- Administrative Network Security
- Technical Network Security
- Network Perimeter Security
- Endpoint Security-Windows Systems
- Endpoint Security-Linux Systems
- Endpoint Security- Mobile Devices
- Endpoint Security-IoT Devices
- Administrative Application Security
- Data Security
- Enterprise Virtual Network Security
- Enterprise Cloud Network Security
- Enterprise Wireless Network Security
- Network Traffic Monitoring and Analysis
- Network Logs Monitoring and Analysis
- Incident Response and Forensic Investigation
- Business Continuity and Disaster Recovery
- Risk Anticipation with Risk Management
- Threat Assessment with Attack Surface Analysis
- Threat Prediction With Cyber Threat Intelligence
What you will learn
- Acquire knowledge of basic networking concepts, including network security controls, protocols, and devices, to design a robust networking infrastructure
- Evaluate potential vulnerabilities and threats to the network infrastructure, assess the potential impact of network security breaches, and analyze available countermeasures
- Explore various network security mechanisms, analyze available security controls, and develop plans for implementing and configuring these controls
- Recognize the significance of network security policies and develop comprehensive policies to protect the network infrastructure
- Gain an understanding of the functioning of different networking devices and devise secure configuration strategies for these devices
- Troubleshooting key network problems
- Learn how to implement a secure VPN for organizational use and engage in monitoring and signature analysis to detect attacks and policy violations
How you will benefit
- This course satisfies the exam eligibility requirements for the Certified Network Defender (CND)—exam number 312-38 and includes sample CND questions
- Gain the necessary technical knowledge to design a secure network, understand network operations, and analyze related materials
- Develop skills in designing effective network security policies and incident response plans, as well as building resiliency and ensuring continuity of operations during attacks
- Upon successfully passing the certification exam, you will earn the title of Certified Network Defender (CND)
Eric Reed
Eric Reed has over 15 years' experience in IT consulting. He has consulted and delivered certification and customized training to the U.S. military, and for many Fortune 100 and Fortune 500 companies. Eric has delivered CEH, CHFI, and ECSA/LPT for the last ten years and was named "EC-Council Instructor of the Year" seven times, as well as being the recipient of the Circle of Excellence Award in 2006, 2007 and 2010. Eric holds many industry certifications, including EC-Council's CND, CNDA, CHFI, ECSA, CEH and LPT.
This comprehensive online course is specifically designed to prepare network engineers for the Certified Network Defender (CND) certification exam offered by the EC-Council (ECC). The CND certification is globally recognized and validates your ability to protect networks and maintain operations during cyber-attacks effectively.
Throughout this CND course, you will delve into various modules that cover essential topics such as network security controls, protocols, and devices. You will learn how to strengthen security infrastructures by effectively implementing intrusion detection and prevention systems and troubleshooting network problems. The course also provides in-depth training on implementing secure virtual private networks (VPNs) for organizations and identifying and mitigating threats to wireless networks.
One of the key highlights of this CND training program is its alignment with global CND responsibilities and Department of Defense (DoD) job roles for system/network administrators. This ensures that the skills and knowledge you acquire are highly relevant and applicable in real-world scenarios. The course follows a vendor-neutral approach, allowing you to understand network security principles and practices comprehensively without being tied to any specific technology or platform.
Upon completing this course, you will receive a voucher covering the certifying exam's cost. This allows you to schedule and take the exam remotely using a proctor function, providing flexibility and convenience in the certification process.
By enrolling in this course and earning the CND certification, you will become proficient in network security, gain the necessary skills to protect networks from cyber breaches, and enhance your professional credibility in this high-demand field.
|
|
|
- Certified Penetration Testing Professional (CPENT) (Voucher Included)
-
Fee: $2,995.00
Item Number: SP2CCTP47921
Dates: 1/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Building:
Room:
Instructor:
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.Learn how to perform an effective penetration test in an enterprise network environment that must be attacked, exploited, evaded, and defended using the EC-Council's Certified Penetration Tester (CPENT) program. Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
Software Requirements:
- PC: Windows 7 or later.
- Mac: macOS 10.12 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
- Adobe Acrobat Reader
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment and will be available online. The EC-Council's Certified Penetration Tester (CPENT) program is an engaging, informative, and expertly designed course that aims to help you master your Penetration Testing (pen-testing) skills. Recognized by the American Council on Education (ACE), this penetrating testing course offers a comprehensive curriculum that encompasses innovative techniques and methodologies for tackling real-world threat scenarios.
In this penetration testing certification course, you will gain an understanding of a wide range of topics, such as how to write your own exploits, build custom tools, conduct advanced binaries exploitation, double pivot to access hidden networks and customize scripts/exploits to penetrate the most secure segments of a network. Pen testing is a practice that goes beyond ethical hacking by incorporating elements of exploitation, risk measurement, reporting, and executive communication.
Securing advanced domains such as the Internet of Things (IoT), Operational Technology (OT), and Cloud has become increasingly more difficult for cybersecurity professionals as there is a shortage of expertise in this area, and CPENT ranges are dynamic and constantly evolving to reflect live networks' changing targets and technology. Expert penetration testers must continually develop their skills in advanced tools, techniques, and methodologies to conduct effective penetration tests in enterprise network environments and protect against current and future cybersecurity threats.
Enrollment in this Pen Testing course includes a voucher that covers the cost of your certification exam upon course completion.
Note: We continually add new targets and defenses throughout the lifetime of this CPENT penetration testing course to ensure its relevance.
- Introduction to Penetration Testing
- Penetration Testing Scoping and Engagement
- Open-Source Intelligence (OSINT)
- Social Engineering Penetration Testing
- Network Penetration Testing – External
- Network Penetration Testing– Internal
- Network Penetration Testing – Perimeter Devices
- Web Application Penetration Testing
- Wireless Penetration Testing
- IoT Penetration Testing
- OT/SCADA Penetration Testing
- Cloud Penetration Testing
- Binary Analysis and Exploitation
- Active Directory Penetration Testing
- Report Writing and Post Testing Actions
What you will learn
- Advanced Windows Attacks
- Attacking IOT Systems
- Writing Exploits: Advanced Binary Exploitation
- Bypassing a Filtered Network
- Pen testing Operational Technology (OT)
- Access Hidden Networks with Pivoting
- Double Pivoting
- Privilege Escalation
- Evading Defense Mechanisms
- Attack Automation with Scripts
- Weaponize Your Exploits
- Write Professional Reports
How you will benefit
- Mapped with the NICE framework.
- 100% methodology-based penetration testing program
- Blends both manual and automated penetration testing approaches
- Designed with the best service providers' most common penetration testing practices
- Maps to all major Job Portals. Role Title: Penetration Tester and Security Analyst
- Provides strong reporting writing guidance
- Gives a real-world experience through an Advanced Penetration Testing Range
- Provides candidates with standard Pen test for use in the field
Kevin Cardwell
Kevin Cardwell is an experienced instructor, technical editor, and author for computer forensics and hacking courses. He has conducted over 500 security assessments across the globe with expertise in finding weaknesses and determining ways clients can mitigate or limit the impact of these weaknesses.
Kevin currently works as a freelance consultant and provides consulting services for companies throughout the world, and as an advisor to numerous government entities within the U.S., Middle East, Africa, Asia, and the U.K. He previously spent 22 years in the U.S. Navy and worked as both a software and systems engineer on a variety of Department of Defense projects.
Kevin is the author of the Center for Advanced Security and Training (CAST) Advanced Network Defense and Advanced Penetration Testing courses and Building Virtual Pentesting Labs for Advanced Penetration Testing, Advanced Penetration Testing for Highly Secured Environments 2nd Edition and Backtrack: Testing Wireless Network Security. He is technical editor of the Learning Tree Course Penetration Testing Techniques and Computer Forensics. He has also presented at the Blackhat USA, Hacker Halted, ISSA, and TakeDownCon conferences, and more.
Kevin received his Bachelor of Science in computer science from the National University in California and a Master of Science in software engineering from Southern Methodist University (SMU) in Texas. He holds the CEH, ECSA, LPT, and several other certifications.
The EC-Council's Certified Penetration Tester (CPENT) program is an engaging, informative, and expertly designed course that aims to help you master your Penetration Testing (pen-testing) skills. Recognized by the American Council on Education (ACE), this penetrating testing course offers a comprehensive curriculum that encompasses innovative techniques and methodologies for tackling real-world threat scenarios.
In this penetration testing certification course, you will gain an understanding of a wide range of topics, such as how to write your own exploits, build custom tools, conduct advanced binaries exploitation, double pivot to access hidden networks and customize scripts/exploits to penetrate the most secure segments of a network. Pen testing is a practice that goes beyond ethical hacking by incorporating elements of exploitation, risk measurement, reporting, and executive communication.
Securing advanced domains such as the Internet of Things (IoT), Operational Technology (OT), and Cloud has become increasingly more difficult for cybersecurity professionals as there is a shortage of expertise in this area, and CPENT ranges are dynamic and constantly evolving to reflect live networks' changing targets and technology. Expert penetration testers must continually develop their skills in advanced tools, techniques, and methodologies to conduct effective penetration tests in enterprise network environments and protect against current and future cybersecurity threats.
Enrollment in this Pen Testing course includes a voucher that covers the cost of your certification exam upon course completion.
Note: We continually add new targets and defenses throughout the lifetime of this CPENT penetration testing course to ensure its relevance.
|
|
|
- Cisco CCNP Collaboration: CLCOR & CLICA
-
Fee: $3,295.00
Item Number: SP2CCTP48261
Dates: 1/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Building:
Room:
Instructor:
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.This course is intended for network security engineers and those looking to attain their CCNP Security certification. Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
Software Requirements:
- PC: Windows 8 or later.
- Mac: macOS 10.6 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
- Microsoft Word Online
- Adobe Acrobat Reader
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment and will be available online. The Implementing Cisco Collaboration Core Technologies (CLCOR) course provides you with skills needed to implement and deploy core collaboration and networking technologies, including infrastructure and design, protocols, codecs, and endpoints, Cisco Internetwork Operating System (IOS®) XE gateway and media resources, call control, Quality of Service (QoS), and additional Cisco collaboration applications.
In the Implementing Cisco Collaboration Applications (CLICA) course, you will learn collaboration applications, including single sign-on, Cisco Unified IM and Presence, Cisco Unity Connection, Cisco Unity Express, and application clients.
The course will also prepare you to sit for the Cisco CCNP Collaboration Core exam CLCOR and the Cisco CCNP Collaboration Concentration exam CLICA. These exams in tandem will earn you the CCNP Collaboration certification. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.
- Overview of Infrastructure and Design
- Traditional Voice Versus Unified Voice
- Overview of Cisco Collaborations
- Overview of Cisco Collaborations Architecture
- Understanding Cisco IP Phones
- Voice Port Codec and DSP
- Introduction to Cisco Unified CM Deployment Model
- Overview of Installation & Hardware Platform
- Getting Started with GUI and Initial Configuration
- Overview and Configuration of SSL Certificate for Collaboration
- Deployment of SIP and SCCP Endpoint
- Deployment of Cisco Collaboration Features
- Voice Gateways & Trunks
- Deployment & Configurations of H323 Gateways and Trunks
- Deployment & Configurations of MGCP Gateway
- Deployment & Configurations of Call Routing
- Understanding & Configuring Call Routing
- Understanding Call Routing Digit Analysis and Calling Privileges
- Configure Globalized Call Routing in Cisco Unified CM
- Describe Mobile and Remote Access
- Cisco Unity Connection
- Overview and Configure these in Cisco Unity Connection
- Understanding Features in Cisco Unity Connection
- Describe Cisco Unified IM & P Protocols and Deployment
- Deploy Cisco Jabber on Premises
- Describe Problems That Can Lead to Poor Voice and Video Quality
- Troubleshooting Cisco Collaboration
- Troubleshooting Cisco Unity Connection Integration
- Single Sign-On (SSO) for Collaboration Applications
- Introduction to Single Sign-On
- Types of SSO
- Configuring SSO
- Introduction to SAML SSO
- Configuring Cisco Unified IM and Presence
- Introduction to Cisco Unity Connection
- Introduction to CUC multicluster operation
- Configuring on-prem Cisco Unified Instant Message and Presence
- Troubleshooting on prem Cisco Unified Instant Message and Presence
- Configuring Cisco Unity Connection and Cisco Unity Express
- Configuring call operation and rules in Cisco Unity Connection
- Troubleshoot Cisco Unity Connection
- Implementing toll fraud prevention
- Configuring Cisco Unity Express integration to Cisco Unified Communications Manager Express
- Application Clients
- Introduction to Cisco Unified Attendant Console
- Configuring service discovery
- Configuring Jabber client installation switches
- Troubleshooting Cisco Jabber
What you will learn
CLCOR
- Describe the Cisco Collaboration solutions architecture
- Compare the IP Phone signaling protocols of Session Initiation Protocol (SIP), H323, Media Gateway Control Protocol (MGCP), and Skinny Client Control Protocol (SCCP)
- Integrate and troubleshoot Cisco Unified Communications Manager with LDAP for user synchronization and user authentication
- Implement Cisco Unified Communications Manager provisioning features
- Describe the different codecs and how they are used to transform analog voice into digital streams
- Describe a dial plan, and explain call routing in Cisco Unified Communications Manager
- Implement Public Switched Telephone Network (PSTN) access using MGCP gateways
- Implement a Cisco gateway for PSTN access
- Configure calling privileges in Cisco Unified Communications Manager
- Implement toll fraud prevention
- Implement globalized call routing within a Cisco Unified Communications Manager cluster
- Implement and troubleshoot media resources in Cisco Unified Communications Manager
- Describe Cisco Instant Messaging and Presence, including call flows and protocols
- Describe and configure endpoints and commonly required features
- Configure and troubleshoot Cisco Unity Connection integration
- Configure and troubleshoot Cisco Unity Connection call handlers
- Describe how Mobile Remote Access (MRA) is used to allow endpoints to work from outside the company
- Analyze traffic patterns and quality issues in converged IP networks supporting voice, video, and data traffic
- Define QoS and its models
- Implement classification and marking
- Configure classification and marking options on Cisco Catalyst® switches
CLICA
- Configure and utilize the Single Sign-On application
- Describe Cisco Unity Connection
- Describe the CUC multicluster operation
- Configure on-prem Cisco Unified Instant Message and Presence
- Configure call operation and rules in Unity Connection
- Implement toll fraud prevention
- Describe Cisco Unified Attendant Console
- Configure and troubleshoot Cisco Jabber
How you will benefit
- You will be prepared to sit for the Cisco CCNP Collaboration core exam: 350-801 CLCOR: Implementing and Operating Cisco Collaboration Core Technologies
- You will be prepared to sit for the Cisco CCNP Security concentration exam: 300-810 CLICA: Implementing Cisco Collaboration Applications
Faisal Khan
Faisal Khan is an expert in Cisco telephony and collaboration and the world of AWS, holding many certifications with their cloud technologies. These credentials include Cisco CCIE Collaboration, Cisco CCNP, Cisco CCNA, and AWS Solutions Architect.
In addition to his certifications, Faisal has expert knowledge in the following areas: Cisco Collaboration, Amazon AWS, Cisco UCCE/UCCX, and Cisco networking.
Faisal is deeply interested in understanding technologies at the most granular level.
The Implementing Cisco Collaboration Core Technologies (CLCOR) course provides you with skills needed to implement and deploy core collaboration and networking technologies, including infrastructure and design, protocols, codecs, and endpoints, Cisco Internetwork Operating System (IOS®) XE gateway and media resources, call control, Quality of Service (QoS), and additional Cisco collaboration applications.
In the Implementing Cisco Collaboration Applications (CLICA) course, you will learn collaboration applications, including single sign-on, Cisco Unified IM and Presence, Cisco Unity Connection, Cisco Unity Express, and application clients.
The course will also prepare you to sit for the Cisco CCNP Collaboration Core exam CLCOR and the Cisco CCNP Collaboration Concentration exam CLICA. These exams in tandem will earn you the CCNP Collaboration certification. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.
|
|
|
- Cisco CCNP Collaboration: CLCOR & CLICA (Vouchers Included)
-
Fee: $3,995.00
Item Number: SP2CCTP48271
Dates: 1/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Building:
Room:
Instructor:
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.This course is intended for network security engineers and those looking to attain their CCNP Security certification. Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
Software Requirements:
- PC: Windows 8 or later.
- Mac: macOS 10.6 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
- Microsoft Word Online
- Adobe Acrobat Reader
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment and will be available online. The Implementing Cisco Collaboration Core Technologies (CLCOR) course provides you with skills needed to implement and deploy core collaboration and networking technologies, including infrastructure and design, protocols, codecs, and endpoints, Cisco Internetwork Operating System (IOS®) XE gateway and media resources, call control, Quality of Service (QoS), and additional Cisco collaboration applications.
In the Implementing Cisco Collaboration Applications (CLICA) course, you will learn collaboration applications, including single sign-on, Cisco Unified IM and Presence, Cisco Unity Connection, Cisco Unity Express, and application clients.
The course will also prepare you to sit for the Cisco CCNP Collaboration Core exam CLCOR and the Cisco CCNP Collaboration Concentration exam CLICA. These exams in tandem will earn you the CCNP Collaboration certification. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.
- Overview of Infrastructure and Design
- Traditional Voice Versus Unified Voice
- Overview of Cisco Collaborations
- Overview of Cisco Collaborations Architecture
- Understanding Cisco IP Phones
- Voice Port Codec and DSP
- Introduction to Cisco Unified CM Deployment Model
- Overview of Installation & Hardware Platform
- Getting Started with GUI and Initial Configuration
- Overview and Configuration of SSL Certificate for Collaboration
- Deployment of SIP and SCCP Endpoint
- Deployment of Cisco Collaboration Features
- Voice Gateways & Trunks
- Deployment & Configurations of H323 Gateways and Trunks
- Deployment & Configurations of MGCP Gateway
- Deployment & Configurations of Call Routing
- Understanding & Configuring Call Routing
- Understanding Call Routing Digit Analysis and Calling Privileges
- Configure Globalized Call Routing in Cisco Unified CM
- Describe Mobile and Remote Access
- Cisco Unity Connection
- Overview and Configure these in Cisco Unity Connection
- Understanding Features in Cisco Unity Connection
- Describe Cisco Unified IM & P Protocols and Deployment
- Deploy Cisco Jabber on Premises
- Describe Problems That Can Lead to Poor Voice and Video Quality
- Troubleshooting Cisco Collaboration
- Troubleshooting Cisco Unity Connection Integration
- Single Sign-On (SSO) for Collaboration Applications
- Introduction to Single Sign-On
- Types of SSO
- Configuring SSO
- Introduction to SAML SSO
- Configuring Cisco Unified IM and Presence
- Introduction to Cisco Unity Connection
- Introduction to CUC multicluster operation
- Configuring on-prem Cisco Unified Instant Message and Presence
- Troubleshooting on prem Cisco Unified Instant Message and Presence
- Configuring Cisco Unity Connection and Cisco Unity Express
- Configuring call operation and rules in Cisco Unity Connection
- Troubleshoot Cisco Unity Connection
- Implementing toll fraud prevention
- Configuring Cisco Unity Express integration to Cisco Unified Communications Manager Express
- Application Clients
- Introduction to Cisco Unified Attendant Console
- Configuring service discovery
- Configuring Jabber client installation switches
- Troubleshooting Cisco Jabber
What you will learn
CLCOR
- Describe the Cisco Collaboration solutions architecture
- Compare the IP Phone signaling protocols of Session Initiation Protocol (SIP), H323, Media Gateway Control Protocol (MGCP), and Skinny Client Control Protocol (SCCP)
- Integrate and troubleshoot Cisco Unified Communications Manager with LDAP for user synchronization and user authentication
- Implement Cisco Unified Communications Manager provisioning features
- Describe the different codecs and how they are used to transform analog voice into digital streams
- Describe a dial plan, and explain call routing in Cisco Unified Communications Manager
- Implement Public Switched Telephone Network (PSTN) access using MGCP gateways
- Implement a Cisco gateway for PSTN access
- Configure calling privileges in Cisco Unified Communications Manager
- Implement toll fraud prevention
- Implement globalized call routing within a Cisco Unified Communications Manager cluster
- Implement and troubleshoot media resources in Cisco Unified Communications Manager
- Describe Cisco Instant Messaging and Presence, including call flows and protocols
- Describe and configure endpoints and commonly required features
- Configure and troubleshoot Cisco Unity Connection integration
- Configure and troubleshoot Cisco Unity Connection call handlers
- Describe how Mobile Remote Access (MRA) is used to allow endpoints to work from outside the company
- Analyze traffic patterns and quality issues in converged IP networks supporting voice, video, and data traffic
- Define QoS and its models
- Implement classification and marking
- Configure classification and marking options on Cisco Catalyst® switches
CLICA
- Configure and utilize the Single Sign-On application
- Describe Cisco Unity Connection
- Describe the CUC multicluster operation
- Configure on-prem Cisco Unified Instant Message and Presence
- Configure call operation and rules in Unity Connection
- Implement toll fraud prevention
- Describe Cisco Unified Attendant Console
- Configure and troubleshoot Cisco Jabber
How you will benefit
- You will be prepared to sit for the Cisco CCNP Collaboration core exam: 350-801 CLCOR: Implementing and Operating Cisco Collaboration Core Technologies
- You will be prepared to sit for the Cisco CCNP Security concentration exam: 300-810 CLICA: Implementing Cisco Collaboration Applications
Faisal Khan
Faisal Khan is an expert in Cisco telephony and collaboration and the world of AWS, holding many certifications with their cloud technologies. These credentials include Cisco CCIE Collaboration, Cisco CCNP, Cisco CCNA, and AWS Solutions Architect.
In addition to his certifications, Faisal has expert knowledge in the following areas: Cisco Collaboration, Amazon AWS, Cisco UCCE/UCCX, and Cisco networking.
Faisal is deeply interested in understanding technologies at the most granular level.
The Implementing Cisco Collaboration Core Technologies (CLCOR) course provides you with skills needed to implement and deploy core collaboration and networking technologies, including infrastructure and design, protocols, codecs, and endpoints, Cisco Internetwork Operating System (IOS®) XE gateway and media resources, call control, Quality of Service (QoS), and additional Cisco collaboration applications.
In the Implementing Cisco Collaboration Applications (CLICA) course, you will learn collaboration applications, including single sign-on, Cisco Unified IM and Presence, Cisco Unity Connection, Cisco Unity Express, and application clients.
The course will also prepare you to sit for the Cisco CCNP Collaboration Core exam CLCOR and the Cisco CCNP Collaboration Concentration exam CLICA. These exams in tandem will earn you the CCNP Collaboration certification. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.
|
|
|
- Cisco CCNP Enterprise: ENCOR & ENARSI
-
Fee: $3,295.00
Item Number: SP2CCTP48161
Dates: 1/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Building:
Room:
Instructor:
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.This course is intended for network engineers, system engineers, network administrators, and those looking to attain their CCNP Enterprise certification. Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
Software Requirements:
- PC: Windows 8 or later.
- Mac: macOS 10.6 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
- Microsoft Word Online
- Adobe Acrobat Reader
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment and will be available online. The CCNP Enterprise: ENCOR is the first step to mastering the implementation of core enterprise network technologies. The goal of this online training course is to provide you with the skills needed to install, manage, and administer dual stack architecture, virtualization, network assurance, security, and automation in an enterprise network.
The CCNP Enterprise: ENARSI provides you with the knowledge of implementation and troubleshooting for advanced routing technologies and services. In this course, you will learn about Layer 3, VPN services, infrastructure security, infrastructure services, and infrastructure automation.
The course will also prepare you to sit for the Cisco CCNP Enterprise Core exam ENOR and the Cisco CCNP Enterprise Concentration exam ENARSI. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.
- Course Overview
- Introduction to ENCOR Course and Exam Objectives
- Campus Architecture and Device Fundamentals
- Campus Architecture
- Device Architecture
- Access and Distribution Layer Features and Services
- Configuring and Verifying VLANs
- Configuring and Verifying Trunks
- VLAN Trunking Protocol (VTP)
- STP Overview and Algorithm Deep Dive
- STP Convergence, Configuration and Manipulation
- STP PortFast, and BPDU Guard
- Multiple Spanning Tree Protocol (MSTP)
- EtherChannels
- Inter-VLAN Routing
- First-Hop Redundancy Protocol (FHRP)
- Routing
- Routing Introduction
- Dynamic Routing Overview
- OSPFv2 Overview, Packets, States, and Design
- OSPFv2 Configuration and Verification
- Text BoxOSPFv2 Network Types and DR/BDR Election
- OSPFv2 LSAs and Metric
- OSPFv2 Summarization
- OSPFv2 Filtering
- EBGP Overview, Configuration and Verification
- Text BoxShapeBGP Best Path Selection Process
- Network Address Translation (NAT)
- Multicast Protocol Overview
- VPN's
- GRE Tunnel Configuration and Verification
- IPSec Introduction
- IPSec Site-to-Site VPN Tunnel Configuration and Verification
- GRE over IPSec Tunnel Configuration and Verification
- Virtual Routing and Forwarding (VRF)
- Management Protocols and Services
- NTP Configuration and Verification
- Syslog Configuration and Verification
- Debugs, Conditional Debugs, Ping, and Traceroute
- SNMP Configuration and Verification
- NetFlow / Flexible NetFlow Configuration and Verification
- SPAN, RSPAN, ERSPAN Configuration and Verification
- IPSLA Configuration and Verification
- Quality of Service (QoS) Overview
- Embedded Event Manager (EEM) Configuration
- Security
- Device Access, Authentication Configuration and Verification
- AAA Configuration and Verification
- Access Control Lists (ACLs)
- Control Plane Policing (CoPP)
- Next-Gen Firewalls, Network Access Control, MACSec, and TrustSec
- Next Generation Campus Networks
- SD-Access
- LISP and VXLAN
- SD-WAN
- DNA Center Overview
- Data Formats
- Data Modeling
- NetConf / RestConf
- Python Exam Prep
- ShapeChef, Puppet, Ansible, SaltStack
- LAN Essentials
- Course Overview
- Introduction to ENARSI Course and Exam Objectives
- EIGRPv4, EIGRPv6 and Named EIGRP
- EIGRPv4 Configuration and Verification
- EIGRPv4 Security Features
- EIGRPv4 Metric and Path Selection
- EIGRPv4 Convergence
- EIGRPv4 Summarization
- EIGRP Route Manipulation
- EIGRPv4 Troubleshooting
- EIGRPv6
- Named EIGRP
- OSPFv2, OSPFv3, OSPF Address-Families
- OSPFv2 Design, Configuration and Verification
- OSPFv2 Security Features
- OSPFv2 Packets and States
- OSPFv2 LSAs
- OSPFv2 Metric
- OSPFv2 Network Types and DR/BDR Elections
- OSPFv2 Summarization and Area Types
- OSPFv2 Filtering, Virtual-Links, and Convergence
- OSPFv2 Troubleshooting
- OSPFv3
- OSPF Address-Families
- Multi-Protocol BGPv4
- BGP Core Operations
- BGP Configuration and Verification
- BGP Summarization
- BGP Filtering
- BGP Peer Groups and Route Reflectors
- BGP Path Selection Process and Attribute Manipulation
- Troubleshooting BGP
- BGP for IPv6
- Redistribution and Advanced Routing Control
- Redistribution Configuration and Verification
- Redistribution Filtering
- Redistribution Challenges
- Redistribution for IPv6
- Policy Based Routing Configuration and Verification
- IPSLA Configuration and Verification
- VPNs
- VRF-Lite Configuration and Verification
- MPLS Overview
- MPLS L3 VPNS
- GRE Review
- DMVPN Configuration and Verification
- DMPVN IPSec Configuration and Verification
- Management Protocol and Services
- Device Access and Authentication Configuration and Verification
- IOS Management Tools
- Syslog Configuration and Verification
- SNMP Configuration and Verification
- NetFlow and Flexible NetFlow Configuration and Verification
- DHCPv4 and DHCPv6 for Cisco IOS
- Device Security
- uRPF Configuration and Verification
- CoPP Configuration and Verification
- IPv4 ACL Review
- IPv6 ACL Review
- IPv6 First Hop Security Features
What you will learn
- ENCOR
- Configuration of VRF, GRE, VLANs, RSTP, MST, NTP, IPSec VPNs, and more
- Advanced Routing
- Configure and verify device management
- Cisco DNA Center
- Examine threat defense, endpoint security, and introduction to the Next-Generation Firewall
- ENARSI
- Route Maps
- Redistribution
- Policy-Based Routing
- VRF-Lite
- eBGP and iBGP
- DMVPNs
- IOS AAA
- DCHP for IPv4 and IPv6
- IPv4 and IPv6 ACL's
How you will benefit
- You will be prepared to sit for the Cisco CCNP Enterprise core exam: 350-401 ENCOR: Implementing and Operating Cisco Enterprise Network Core Technologies
- You will be prepared to sit for the Cisco CCNP Enterprise concentration exam: 300-410 ENARSI: Implementing Cisco Enterprise Advanced Routing and Services
Raymond Lacoste
Raymond Lacoste is a highly recognized instructor and IT professional who holds the Cisco Sirius Instructor Award. He has authored Cisco Press publications on the Cisco ENARSI and Cisco TSHOOT exams.
Raymond's areas of expertise include Cisco Enterprise networking, Cisco Routing and Switching, Cisco Datacenter Networking, ITIL, and Amazon AWS. He also holds certifications in Cisco CCSI, Cisco CCNP Routing and Switching, Cisco CCNP Enterprise, ITIL Foundations, ITIL Practitioner, ITIL Intermediate, Amazon AWS System Operations, Amazon AWS Architect, Amazon AWS Developer, and CISSP.
In addition to his certifications and experience, Raymond's engaging instruction style makes even the most obscenely complicated or obtuse concepts relatable and understandable. Outside of class, he enjoys dominating both on the golf course and the basketball court.
The CCNP Enterprise: ENCOR is the first step to mastering the implementation of core enterprise network technologies. The goal of this online training course is to provide you with the skills needed to install, manage, and administer dual stack architecture, virtualization, network assurance, security, and automation in an enterprise network.
The CCNP Enterprise: ENARSI provides you with the knowledge of implementation and troubleshooting for advanced routing technologies and services. In this course, you will learn about Layer 3, VPN services, infrastructure security, infrastructure services, and infrastructure automation.
The course will also prepare you to sit for the Cisco CCNP Enterprise Core exam ENOR and the Cisco CCNP Enterprise Concentration exam ENARSI. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.
|
|
|
- Cisco CCNP Enterprise: ENCOR & ENARSI (Vouchers Included)
-
Fee: $3,995.00
Item Number: SP2CCTP48171
Dates: 1/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Building:
Room:
Instructor:
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.This course is intended for network engineers, system engineers, network administrators, and those looking to attain their CCNP Enterprise certification. Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
Software Requirements:
- PC: Windows 8 or later.
- Mac: macOS 10.6 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
- Microsoft Word Online
- Adobe Acrobat Reader
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment and will be available online. The CCNP Enterprise: ENCOR is the first step to mastering the implementation of core enterprise network technologies. The goal of this online training course is to provide you with the skills needed to install, manage, and administer dual stack architecture, virtualization, network assurance, security, and automation in an enterprise network.
The CCNP Enterprise: ENARSI provides you with the knowledge of implementation and troubleshooting for advanced routing technologies and services. In this course, you will learn about Layer 3, VPN services, infrastructure security, infrastructure services, and infrastructure automation.
The course will also prepare you to sit for the Cisco CCNP Enterprise Core exam ENOR and the Cisco CCNP Enterprise Concentration exam ENARSI. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.
- Course Overview
- Introduction to ENCOR Course and Exam Objectives
- Campus Architecture and Device Fundamentals
- Campus Architecture
- Device Architecture
- Access and Distribution Layer Features and Services
- Configuring and Verifying VLANs
- Configuring and Verifying Trunks
- VLAN Trunking Protocol (VTP)
- STP Overview and Algorithm Deep Dive
- STP Convergence, Configuration and Manipulation
- STP PortFast, and BPDU Guard
- Multiple Spanning Tree Protocol (MSTP)
- EtherChannels
- Inter-VLAN Routing
- First-Hop Redundancy Protocol (FHRP)
- Routing
- Routing Introduction
- Dynamic Routing Overview
- OSPFv2 Overview, Packets, States, and Design
- OSPFv2 Configuration and Verification
- Text BoxOSPFv2 Network Types and DR/BDR Election
- OSPFv2 LSAs and Metric
- OSPFv2 Summarization
- OSPFv2 Filtering
- EBGP Overview, Configuration and Verification
- Text BoxShapeBGP Best Path Selection Process
- Network Address Translation (NAT)
- Multicast Protocol Overview
- VPN's
- GRE Tunnel Configuration and Verification
- IPSec Introduction
- IPSec Site-to-Site VPN Tunnel Configuration and Verification
- GRE over IPSec Tunnel Configuration and Verification
- Virtual Routing and Forwarding (VRF)
- Management Protocols and Services
- NTP Configuration and Verification
- Syslog Configuration and Verification
- Debugs, Conditional Debugs, Ping, and Traceroute
- SNMP Configuration and Verification
- NetFlow / Flexible NetFlow Configuration and Verification
- SPAN, RSPAN, ERSPAN Configuration and Verification
- IPSLA Configuration and Verification
- Quality of Service (QoS) Overview
- Embedded Event Manager (EEM) Configuration
- Security
- Device Access, Authentication Configuration and Verification
- AAA Configuration and Verification
- Access Control Lists (ACLs)
- Control Plane Policing (CoPP)
- Next-Gen Firewalls, Network Access Control, MACSec, and TrustSec
- Next Generation Campus Networks
- SD-Access
- LISP and VXLAN
- SD-WAN
- DNA Center Overview
- Data Formats
- Data Modeling
- NetConf / RestConf
- Python Exam Prep
- ShapeChef, Puppet, Ansible, SaltStack
- LAN Essentials
- Course Overview
- Introduction to ENARSI Course and Exam Objectives
- EIGRPv4, EIGRPv6 and Named EIGRP
- EIGRPv4 Configuration and Verification
- EIGRPv4 Security Features
- EIGRPv4 Metric and Path Selection
- EIGRPv4 Convergence
- EIGRPv4 Summarization
- EIGRP Route Manipulation
- EIGRPv4 Troubleshooting
- EIGRPv6
- Named EIGRP
- OSPFv2, OSPFv3, OSPF Address-Families
- OSPFv2 Design, Configuration and Verification
- OSPFv2 Security Features
- OSPFv2 Packets and States
- OSPFv2 LSAs
- OSPFv2 Metric
- OSPFv2 Network Types and DR/BDR Elections
- OSPFv2 Summarization and Area Types
- OSPFv2 Filtering, Virtual-Links, and Convergence
- OSPFv2 Troubleshooting
- OSPFv3
- OSPF Address-Families
- Multi-Protocol BGPv4
- BGP Core Operations
- BGP Configuration and Verification
- BGP Summarization
- BGP Filtering
- BGP Peer Groups and Route Reflectors
- BGP Path Selection Process and Attribute Manipulation
- Troubleshooting BGP
- BGP for IPv6
- Redistribution and Advanced Routing Control
- Redistribution Configuration and Verification
- Redistribution Filtering
- Redistribution Challenges
- Redistribution for IPv6
- Policy Based Routing Configuration and Verification
- IPSLA Configuration and Verification
- VPNs
- VRF-Lite Configuration and Verification
- MPLS Overview
- MPLS L3 VPNS
- GRE Review
- DMVPN Configuration and Verification
- DMPVN IPSec Configuration and Verification
- Management Protocol and Services
- Device Access and Authentication Configuration and Verification
- IOS Management Tools
- Syslog Configuration and Verification
- SNMP Configuration and Verification
- NetFlow and Flexible NetFlow Configuration and Verification
- DHCPv4 and DHCPv6 for Cisco IOS
- Device Security
- uRPF Configuration and Verification
- CoPP Configuration and Verification
- IPv4 ACL Review
- IPv6 ACL Review
- IPv6 First Hop Security Features
What you will learn
ENCOR
- Configuration of VRF, GRE, VLANs, RSTP, MST, NTP, IPSec VPNs, and more
- Advanced Routing
- Configure and verify device management
- Cisco DNA Center
- Examine threat defense, endpoint security, and introduction to the Next-Generation Firewall
ENARSI
- Route Maps
- Redistribution
- Policy-Based Routing
- VRF-Lite
- eBGP and iBGP
- DMVPNs
- IOS AAA
- DCHP for IPv4 and IPv6
- IPv4 and IPv6 ACL's
How you will benefit
- You will be prepared to sit for the Cisco CCNP Enterprise core exam: 350-401 ENCOR: Implementing and Operating Cisco Enterprise Network Core Technologies
- You will be prepared to sit for the Cisco CCNP Enterprise concentration exam: 300-410 ENARSI: Implementing Cisco Enterprise Advanced Routing and Services
Raymond Lacoste
Raymond Lacoste is a highly recognized instructor and IT professional who holds the Cisco Sirius Instructor Award. He has authored Cisco Press publications on the Cisco ENARSI and Cisco TSHOOT exams.
Raymond's areas of expertise include Cisco Enterprise networking, Cisco Routing and Switching, Cisco Datacenter Networking, ITIL, and Amazon AWS. He also holds certifications in Cisco CCSI, Cisco CCNP Routing and Switching, Cisco CCNP Enterprise, ITIL Foundations, ITIL Practitioner, ITIL Intermediate, Amazon AWS System Operations, Amazon AWS Architect, Amazon AWS Developer, and CISSP.
In addition to his certifications and experience, Raymond's engaging instruction style makes even the most obscenely complicated or obtuse concepts relatable and understandable. Outside of class, he enjoys dominating both on the golf course and the basketball court.
The CCNP Enterprise: ENCOR is the first step to mastering the implementation of core enterprise network technologies. The goal of this online training course is to provide you with the skills needed to install, manage, and administer dual stack architecture, virtualization, network assurance, security, and automation in an enterprise network.
The CCNP Enterprise: ENARSI provides you with the knowledge of implementation and troubleshooting for advanced routing technologies and services. In this course, you will learn about Layer 3, VPN services, infrastructure security, infrastructure services, and infrastructure automation.
The course will also prepare you to sit for the Cisco CCNP Enterprise Core exam ENOR and the Cisco CCNP Enterprise Concentration exam ENARSI. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.
|
|
|
- Cisco CCNP Enterprise: ENCOR & ENSLD
-
Fee: $3,295.00
Item Number: SP2CCTP48181
Dates: 1/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Building:
Room:
Instructor:
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.This course is intended for network engineers, system engineers, network administrators, and those looking to attain their CCNP Enterprise certification. Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
Software Requirements:
- PC: Windows 8 or later.
- Mac: macOS 10.6 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
- Microsoft Word Online
- Adobe Acrobat Reader
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment and will be available online. The CCNP Enterprise: ENCOR is the first step to mastering the implementation of core enterprise network technologies. The goal of this online training course is to provide you with the skills needed to install, manage, and administer dual stack architecture, virtualization, network assurance, security, and automation in an enterprise network.
CCNP Enterprise: ENARSI provides you with knowledge of Cisco solutions in advanced addressing and routing solutions, advanced enterprise campus networks, WAN, security and network services, and Software-Defined Access.
The course will also prepare you to sit for the Cisco CCNP Enterprise Core exam ENOR and the Cisco CCNP Enterprise Concentration exam ENSLD. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.
- Course Overview
- Introduction to ENCOR Course and Exam Objectives
- Campus Architecture and Device Fundamentals
- Campus Architecture
- Device Architecture
- Access and Distribution Layer Features and Services
- Configuring and Verifying VLANs
- Configuring and Verifying Trunks
- VLAN Trunking Protocol (VTP)
- STP Overview and Algorithm Deep Dive
- STP Convergence, Configuration and Manipulation
- STP PortFast, and BPDU Guard
- Multiple Spanning Tree Protocol (MSTP)
- EtherChannels
- Inter-VLAN Routing
- First-Hop Redundancy Protocol (FHRP)
- Routing
- Routing Introduction
- Dynamic Routing Overview
- OSPFv2 Overview, Packets, States, and Design
- OSPFv2 Configuration and Verification
- Text BoxOSPFv2 Network Types and DR/BDR Election
- OSPFv2 LSAs and Metric
- OSPFv2 Summarization
- OSPFv2 Filtering
- EBGP Overview, Configuration and Verification
- Text BoxShapeBGP Best Path Selection Process
- Network Address Translation (NAT)
- Multicast Protocol Overview
- VPN's
- GRE Tunnel Configuration and Verification
- IPSec Introduction
- IPSec Site-to-Site VPN Tunnel Configuration and Verification
- GRE over IPSec Tunnel Configuration and Verification
- Virtual Routing and Forwarding (VRF)
- Management Protocols and Services
- NTP Configuration and Verification
- Syslog Configuration and Verification
- Debugs, Conditional Debugs, Ping, and Traceroute
- SNMP Configuration and Verification
- NetFlow / Flexible NetFlow Configuration and Verification
- SPAN, RSPAN, ERSPAN Configuration and Verification
- IPSLA Configuration and Verification
- Quality of Service (QoS) Overview
- Embedded Event Manager (EEM) Configuration
- Security
- Device Access, Authentication Configuration and Verification
- AAA Configuration and Verification
- Access Control Lists (ACLs)
- Control Plane Policing (CoPP)
- Next-Gen Firewalls, Network Access Control, MACSec, and TrustSec
- Next Generation Campus Networks
- SD-Access
- LISP and VXLAN
- SD-WAN
- DNA Center Overview
- Data Formats
- Data Modeling
- NetConf / RestConf
- Python Exam Prep
- ShapeChef, Puppet, Ansible, SaltStack
- LAN Essentials
- Routed Protocols - Addressing
- IPv4 addressing (create plan)
- IPv6 addressing (create plan)
- IPv6 migration methods (determine)
- Routing Protocols – Secure and scale (create design)
- IS-IS
- EIGRP
- OSPF
- BGP – address families, attributes, filtering, RR's, load sharing, balancing, symmetry
- Enterprise Campus Networks (design)
- HA – GR, FHRP's
- L2 – xSTP, loop prevention, convergence
- L3 – convergence, vrf, redistribution, filtering, summarization
- SD-Access architecture and design (describe) – underlay, overlay, control and data planes
- Wide Area Networks (WAN)
- Options (compare) – L2/3 VPN's, metro ethernet, DWDM, SD-Wan ce
- Site to site VPN (design) – L2/L3, GRE, DMVPN, GET VPN
- HA (design) – single, multi, backup, failover
- SD-WAN architecture and design (describe) – various planes, QoS, multicast
- End-to-End Quality of Service (QoS)
- QoS strategies – IntServ/Diffserv (design)
- End-to-End QoS – Classify, mark, shape, police, queue (design)
- Network management techniques, out-of-band, in-band (design)
- Multicast
- Concepts – source/shared trees, RPF, RP (describe)
- Services – PIM bi-dir, SSM, MSDP (design)
- Automation
- YANG data models (IETF, Openconfig, Cisco native) – recognize differences
- Netconf and Restconf – recognize differences
- Telemetry model-driven (periodic/on-change publication and dial-in/dial-out) – recognize differences and impact
What you will learn
ENCOR
- Configuration of VRF, GRE, VLANs, RSTP, MST, NTP, IPSec VPNs, and more!
- Advanced Routing
- Configure and verify device management
- Cisco DNA Center
- Examine threat defense, endpoint security, and introduction to the Next-Generation Firewall
ENSLD
- Describe and apply advanced addressing and routing solutions
- Describe and apply advanced enterprise campus networks
- Describe and apply WAN
- Describe and apply security and network services
- Describe and apply Software-Defined Access
How you will benefit
- You will be prepared to sit for the Cisco CCNP Enterprise core exam: 350-401 ENCOR: Implementing and Operating Cisco Enterprise Network Core Technologies
- You will be prepared to sit for the Cisco CCNP Enterprise concentration exam: 300-420 ENSLD: Designing Cisco Enterprise Networks
Raymond Lacoste
Raymond Lacoste is a highly recognized instructor and IT professional who holds the Cisco Sirius Instructor Award. He has authored Cisco Press publications on the Cisco ENARSI and Cisco TSHOOT exams. Raymond's areas of expertise include Cisco Enterprise networking, Cisco Routing and Switching, Cisco Datacenter Networking, ITIL, and Amazon AWS. He also holds certifications in Cisco CCSI, Cisco CCNP Routing and Switching, Cisco CCNP Enterprise, ITIL Foundations, ITIL Practitioner, ITIL Intermediate, Amazon AWS System Operations, Amazon AWS Architect, Amazon AWS Developer, and CISSP. In addition to his certifications and experience, Raymond's engaging instruction style makes even the most obscenely complicated or obtuse concepts relatable and understandable. Outside of class, he enjoys dominating both on the golf course and the basketball court.
Aaron Gould
Aaron Gould is a highly knowledgeable network engineer with heavy experience in the Internet Service Provider space. Aaron holds multiple professional-level certifications with Juniper and Cisco equipment as well as Juniper - JNCIP-SP, Juniper - JNCIS-SP, Juniper - JNCDS-DC, Juniper - AAA (JNCIA X 3), Juniper – JNCDA, Juniper - JNCIA-Cloud, Juniper - JNCIA-Junos, Cisco - CCNP SP, Cisco – CCIP, Cisco – CCDP, Cisco - CCNP R/S, MEF CECP, and IPv6 Forum - Silver certifications. Aaron's extensive expertise includes Cisco IOS Routing and Switching, Cisco Network Design, Cisco Service Provider Routing, and Juniper Service Provider Routing.
The CCNP Enterprise: ENCOR is the first step to mastering the implementation of core enterprise network technologies. The goal of this online training course is to provide you with the skills needed to install, manage, and administer dual stack architecture, virtualization, network assurance, security, and automation in an enterprise network.
CCNP Enterprise: ENARSI provides you with knowledge of Cisco solutions in advanced addressing and routing solutions, advanced enterprise campus networks, WAN, security and network services, and Software-Defined Access.
The course will also prepare you to sit for the Cisco CCNP Enterprise Core exam ENOR and the Cisco CCNP Enterprise Concentration exam ENSLD. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.
|
|
|
- Cisco CCNP Enterprise: ENCOR & ENSLD (Vouchers Included)
-
Fee: $3,995.00
Item Number: SP2CCTP48191
Dates: 1/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Building:
Room:
Instructor:
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.This course is intended for network engineers, system engineers, network administrators, and those looking to attain their CCNP Enterprise certification. Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
Software Requirements:
- PC: Windows 8 or later.
- Mac: macOS 10.6 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
- Microsoft Word Online
- Adobe Acrobat Reader
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment and will be available online. The CCNP Enterprise: ENCOR is the first step to mastering the implementation of core enterprise network technologies. The goal of this online training course is to provide you with the skills needed to install, manage, and administer dual stack architecture, virtualization, network assurance, security, and automation in an enterprise network.
CCNP Enterprise: ENARSI provides you with knowledge of Cisco solutions in advanced addressing and routing solutions, advanced enterprise campus networks, WAN, security and network services, and Software-Defined Access.
The course will also prepare you to sit for the Cisco CCNP Enterprise Core exam ENOR and the Cisco CCNP Enterprise Concentration exam ENSLD. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.
- Course Overview
- Introduction to ENCOR Course and Exam Objectives
- Campus Architecture and Device Fundamentals
- Campus Architecture
- Device Architecture
- Access and Distribution Layer Features and Services
- Configuring and Verifying VLANs
- Configuring and Verifying Trunks
- VLAN Trunking Protocol (VTP)
- STP Overview and Algorithm Deep Dive
- STP Convergence, Configuration and Manipulation
- STP PortFast, and BPDU Guard
- Multiple Spanning Tree Protocol (MSTP)
- EtherChannels
- Inter-VLAN Routing
- First-Hop Redundancy Protocol (FHRP)
- Routing
- Routing Introduction
- Dynamic Routing Overview
- OSPFv2 Overview, Packets, States, and Design
- OSPFv2 Configuration and Verification
- Text BoxOSPFv2 Network Types and DR/BDR Election
- OSPFv2 LSAs and Metric
- OSPFv2 Summarization
- OSPFv2 Filtering
- EBGP Overview, Configuration and Verification
- Text BoxShapeBGP Best Path Selection Process
- Network Address Translation (NAT)
- Multicast Protocol Overview
- VPN's
- GRE Tunnel Configuration and Verification
- IPSec Introduction
- IPSec Site-to-Site VPN Tunnel Configuration and Verification
- GRE over IPSec Tunnel Configuration and Verification
- Virtual Routing and Forwarding (VRF)
- Management Protocols and Services
- NTP Configuration and Verification
- Syslog Configuration and Verification
- Debugs, Conditional Debugs, Ping, and Traceroute
- SNMP Configuration and Verification
- NetFlow / Flexible NetFlow Configuration and Verification
- SPAN, RSPAN, ERSPAN Configuration and Verification
- IPSLA Configuration and Verification
- Quality of Service (QoS) Overview
- Embedded Event Manager (EEM) Configuration
- Security
- Device Access, Authentication Configuration and Verification
- AAA Configuration and Verification
- Access Control Lists (ACLs)
- Control Plane Policing (CoPP)
- Next-Gen Firewalls, Network Access Control, MACSec, and TrustSec
- Next Generation Campus Networks
- SD-Access
- LISP and VXLAN
- SD-WAN
- DNA Center Overview
- Data Formats
- Data Modeling
- NetConf / RestConf
- Python Exam Prep
- ShapeChef, Puppet, Ansible, SaltStack
- LAN Essentials
- Routed Protocols - Addressing
- IPv4 addressing (create plan)
- IPv6 addressing (create plan)
- IPv6 migration methods (determine)
- Routing Protocols – Secure and scale (create design)
- IS-IS
- EIGRP
- OSPF
- BGP – address families, attributes, filtering, RR's, load sharing, balancing, symmetry
- Enterprise Campus Networks (design)
- HA – GR, FHRP's
- L2 – xSTP, loop prevention, convergence
- L3 – convergence, vrf, redistribution, filtering, summarization
- SD-Access architecture and design (describe) – underlay, overlay, control and data planes
- Wide Area Networks (WAN)
- Options (compare) – L2/3 VPN's, metro ethernet, DWDM, SD-Wan ce
- Site to site VPN (design) – L2/L3, GRE, DMVPN, GET VPN
- HA (design) – single, multi, backup, failover
- SD-WAN architecture and design (describe) – various planes, QoS, multicast
- End-to-End Quality of Service (QoS)
- QoS strategies – IntServ/Diffserv (design)
- End-to-End QoS – Classify, mark, shape, police, queue (design)
- Network management techniques, out-of-band, in-band (design)
- Multicast
- Concepts – source/shared trees, RPF, RP (describe)
- Services – PIM bi-dir, SSM, MSDP (design)
- Automation
- YANG data models (IETF, Openconfig, Cisco native) – recognize differences
- Netconf and Restconf – recognize differences
- Telemetry model-driven (periodic/on-change publication and dial-in/dial-out) – recognize differences and impact
What you will learn
ENCOR
- Configuration of VRF, GRE, VLANs, RSTP, MST, NTP, IPSec VPNs, and more!
- Advanced Routing
- Configure and verify device management
- Cisco DNA Center
- Examine threat defense, endpoint security, and introduction to the Next-Generation Firewall
ENSLD
- Describe and apply advanced addressing and routing solutions
- Describe and apply advanced enterprise campus networks
- Describe and apply WAN
- Describe and apply security and network services
- Describe and apply Software-Defined Access
How you will benefit
- You will be prepared to sit for the Cisco CCNP Enterprise core exam: 350-401 ENCOR: Implementing and Operating Cisco Enterprise Network Core Technologies
- You will be prepared to sit for the Cisco CCNP Enterprise concentration exam: 300-420 ENSLD: Designing Cisco Enterprise Networks
Raymond Lacoste
Raymond Lacoste is a highly recognized instructor and IT professional who holds the Cisco Sirius Instructor Award. He has authored Cisco Press publications on the Cisco ENARSI and Cisco TSHOOT exams. Raymond's areas of expertise include Cisco Enterprise networking, Cisco Routing and Switching, Cisco Datacenter Networking, ITIL, and Amazon AWS. He also holds certifications in Cisco CCSI, Cisco CCNP Routing and Switching, Cisco CCNP Enterprise, ITIL Foundations, ITIL Practitioner, ITIL Intermediate, Amazon AWS System Operations, Amazon AWS Architect, Amazon AWS Developer, and CISSP. In addition to his certifications and experience, Raymond's engaging instruction style makes even the most obscenely complicated or obtuse concepts relatable and understandable. Outside of class, he enjoys dominating both on the golf course and the basketball court.
Aaron Gould
Aaron Gould is a highly knowledgeable network engineer with heavy experience in the Internet Service Provider space. Aaron holds multiple professional-level certifications with Juniper and Cisco equipment as well as Juniper - JNCIP-SP, Juniper - JNCIS-SP, Juniper - JNCDS-DC, Juniper - AAA (JNCIA X 3), Juniper – JNCDA, Juniper - JNCIA-Cloud, Juniper - JNCIA-Junos, Cisco - CCNP SP, Cisco – CCIP, Cisco – CCDP, Cisco - CCNP R/S, MEF CECP, and IPv6 Forum - Silver certifications. Aaron's extensive expertise includes Cisco IOS Routing and Switching, Cisco Network Design, Cisco Service Provider Routing, and Juniper Service Provider Routing.
The CCNP Enterprise: ENCOR is the first step to mastering the implementation of core enterprise network technologies. The goal of this online training course is to provide you with the skills needed to install, manage, and administer dual stack architecture, virtualization, network assurance, security, and automation in an enterprise network.
CCNP Enterprise: ENARSI provides you with knowledge of Cisco solutions in advanced addressing and routing solutions, advanced enterprise campus networks, WAN, security and network services, and Software-Defined Access.
The course will also prepare you to sit for the Cisco CCNP Enterprise Core exam ENOR and the Cisco CCNP Enterprise Concentration exam ENSLD. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.
|
|
|
- Cisco CCNP Enterprise: ENCOR & ENWLSI
-
Fee: $3,295.00
Item Number: SP2CCTP48201
Dates: 1/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Building:
Room:
Instructor:
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.This course is intended for network engineers, system engineers, network administrators, and those looking to attain their CCNP Enterprise certification. Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
Software Requirements:
- PC: Windows 8 or later.
- Mac: macOS 10.6 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
- Microsoft Word Online
- Adobe Acrobat Reader
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment and will be available online. The CCNP Enterprise: ENCOR is the first step to mastering the implementation of core enterprise network technologies. The goal of this online training course is to provide you with the skills needed to install, manage, and administer dual stack architecture, virtualization, network assurance, security, and automation in an enterprise network.
In CCNP Enterprise: ENWLSI, you will be given the skills and knowledge to implement wireless networks, including FlexConnect, QoS, Multicast, advanced location services, security for client connectivity, monitoring, and device hardening.
The course will prepare you to sit for the Cisco CCNP Enterprise Core exam ENCOR and the Cisco CCNP Enterprise Concentration exam ENWLSI. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.
- Course Overview
- Introduction to ENCOR Course and Exam Objectives
- Campus Architecture and Device Fundamentals
- Campus Architecture
- Device Architecture
- Access and Distribution Layer Features and Services
- Configuring and Verifying VLANs
- Configuring and Verifying Trunks
- VLAN Trunking Protocol (VTP)
- STP Overview and Algorithm Deep Dive
- STP Convergence, Configuration and Manipulation
- STP PortFast, and BPDU Guard
- Multiple Spanning Tree Protocol (MSTP)
- EtherChannels
- Inter-VLAN Routing
- First-Hop Redundancy Protocol (FHRP)
- Routing
- Routing Introduction
- Dynamic Routing Overview
- OSPFv2 Overview, Packets, States, and Design
- OSPFv2 Configuration and Verification
- Text BoxOSPFv2 Network Types and DR/BDR Election
- OSPFv2 LSAs and Metric
- OSPFv2 Summarization
- OSPFv2 Filtering
- EBGP Overview, Configuration and Verification
- Text BoxShapeBGP Best Path Selection Process
- Network Address Translation (NAT)
- Multicast Protocol Overview
- VPN's
- GRE Tunnel Configuration and Verification
- IPSec Introduction
- IPSec Site-to-Site VPN Tunnel Configuration and Verification
- GRE over IPSec Tunnel Configuration and Verification
- Virtual Routing and Forwarding (VRF)
- Management Protocols and Services
- NTP Configuration and Verification
- Syslog Configuration and Verification
- Debugs, Conditional Debugs, Ping, and Traceroute
- SNMP Configuration and Verification
- NetFlow / Flexible NetFlow Configuration and Verification
- SPAN, RSPAN, ERSPAN Configuration and Verification
- IPSLA Configuration and Verification
- Quality of Service (QoS) Overview
- Embedded Event Manager (EEM) Configuration
- Security
- Device Access, Authentication Configuration and Verification
- AAA Configuration and Verification
- Access Control Lists (ACLs)
- Control Plane Policing (CoPP)
- Next-Gen Firewalls, Network Access Control, MACSec, and TrustSec
- Next Generation Campus Networks
- SD-Access
- LISP and VXLAN
- SD-WAN
- DNA Center Overview
- Data Formats
- Data Modeling
- NetConf / RestConf
- Python Exam Prep
- ShapeChef, Puppet, Ansible, SaltStack
- LAN Essentials
- Securing and Troubleshooting the Wireless Network Infrastructure including
- Secure access to Wireless LAN Controllers (WLCs) and Access Points (APs)
- Configuration management via Cisco DNA Center, Cisco Prime Infrastructure (PI)
- Implementing and Troubleshooting Secure Client Connectivity including
- 802.1X Authentication, AAA services, and Cisco Connected Mobile Experiences (CMX)
- Implementing and Troubleshooting QoS in Wireless Networks including
- Cisco Application Visibility and Control (AVC), Multicast DNS (mDNS), and Cisco Media Stream
- Implementing and Troubleshooting Advanced Wireless Network Services including
- Location Services, Analytics, and wireless spectrum management
What you will learn
ENCOR
- Configuration of VRF, GRE, VLANs, RSTP, MST, NTP, IPSec VPNs, and more
- Advanced Routing
- Configure and verify device management
- Cisco DNA Center
- Examine threat defense, endpoint security, and introduction to the Next-Generation Firewall
ENWLSI
- Implement network settings to provide a secure wireless network infrastructure and troubleshoot security issues as it relates to the wireless network infrastructure
- Implement a secure wireless client and troubleshoot wireless client connectivity issues
- Implement and troubleshoot QoS in wireless networks
- Implement and troubleshoot advanced capabilities in wireless network services
How you will benefit
- You will be prepared to sit for the Cisco CCNP Enterprise core exam: 350-401 ENCOR: Implementing and Operating Cisco Enterprise Network Core Technologies
- You will be prepared to sit for the Cisco CCNP Enterprise concentration exam: 300-430 ENWLSI: Implementing Cisco Enterprise Wireless Networks
Raymond Lacoste
Raymond Lacoste is a highly recognized instructor and IT professional who holds the Cisco Sirius Instructor Award. He has authored Cisco Press publications on the Cisco ENARSI and Cisco TSHOOT exams. Raymond's areas of expertise include Cisco Enterprise networking, Cisco Routing and Switching, Cisco Datacenter Networking, ITIL, and Amazon AWS. He also holds certifications in Cisco CCSI, Cisco CCNP Routing and Switching, Cisco CCNP Enterprise, ITIL Foundations, ITIL Practitioner, ITIL Intermediate, Amazon AWS System Operations, Amazon AWS Architect, Amazon AWS Developer, and CISSP. In addition to his certifications and experience, Raymond's engaging instruction style makes even the most obscenely complicated or obtuse concepts relatable and understandable. Outside of class, he enjoys dominating both on the golf course and the basketball court.
Dan Goodman
Dan Goodman is an IT professional specializing in Linux administration, Palo Alto firewalls, and wireless networking. He holds certifications in CompTIA Linux+, CWNP: CWNA, and Palo Alto PCNSA. In addition to his highly recognizable certifications, Dan is an expert in Linux administration, Palo Alto firewall administration, and wireless networking. Dan enjoys teaching the technologies focusing on real-world application of the theory. Outside of class-related efforts, he runs an animal shelter teaming with rescue animals.
The CCNP Enterprise: ENCOR is the first step to mastering the implementation of core enterprise network technologies. The goal of this online training course is to provide you with the skills needed to install, manage, and administer dual stack architecture, virtualization, network assurance, security, and automation in an enterprise network.
In CCNP Enterprise: ENWLSI, you will be given the skills and knowledge to implement wireless networks, including FlexConnect, QoS, Multicast, advanced location services, security for client connectivity, monitoring, and device hardening.
The course will prepare you to sit for the Cisco CCNP Enterprise Core exam ENCOR and the Cisco CCNP Enterprise Concentration exam ENWLSI. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.
|
|
|
- Cisco CCNP Enterprise: ENCOR & ENWLSI (Vouchers Included)
-
Fee: $3,995.00
Item Number: SP2CCTP48211
Dates: 1/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Building:
Room:
Instructor:
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.This course is intended for network engineers, system engineers, network administrators, and those looking to attain their CCNP Enterprise certification. Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
Software Requirements:
- PC: Windows 8 or later.
- Mac: macOS 10.6 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
- Microsoft Word Online
- Adobe Acrobat Reader
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment and will be available online. The CCNP Enterprise: ENCOR is the first step to mastering the implementation of core enterprise network technologies. The goal of this online training course is to provide you with the skills needed to install, manage, and administer dual stack architecture, virtualization, network assurance, security, and automation in an enterprise network.
In CCNP Enterprise: ENWLSI, you will be given the skills and knowledge to implement wireless networks, including FlexConnect, QoS, Multicast, advanced location services, security for client connectivity, monitoring, and device hardening.
The course will prepare you to sit for the Cisco CCNP Enterprise Core exam ENCOR and the Cisco CCNP Enterprise Concentration exam ENWLSI. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.
- Course Overview
- Introduction to ENCOR Course and Exam Objectives
- Campus Architecture and Device Fundamentals
- Campus Architecture
- Device Architecture
- Access and Distribution Layer Features and Services
- Configuring and Verifying VLANs
- Configuring and Verifying Trunks
- VLAN Trunking Protocol (VTP)
- STP Overview and Algorithm Deep Dive
- STP Convergence, Configuration and Manipulation
- STP PortFast, and BPDU Guard
- Multiple Spanning Tree Protocol (MSTP)
- EtherChannels
- Inter-VLAN Routing
- First-Hop Redundancy Protocol (FHRP)
- Routing
- Routing Introduction
- Dynamic Routing Overview
- OSPFv2 Overview, Packets, States, and Design
- OSPFv2 Configuration and Verification
- Text BoxOSPFv2 Network Types and DR/BDR Election
- OSPFv2 LSAs and Metric
- OSPFv2 Summarization
- OSPFv2 Filtering
- EBGP Overview, Configuration and Verification
- Text BoxShapeBGP Best Path Selection Process
- Network Address Translation (NAT)
- Multicast Protocol Overview
- VPN's
- GRE Tunnel Configuration and Verification
- IPSec Introduction
- IPSec Site-to-Site VPN Tunnel Configuration and Verification
- GRE over IPSec Tunnel Configuration and Verification
- Virtual Routing and Forwarding (VRF)
- Management Protocols and Services
- NTP Configuration and Verification
- Syslog Configuration and Verification
- Debugs, Conditional Debugs, Ping, and Traceroute
- SNMP Configuration and Verification
- NetFlow / Flexible NetFlow Configuration and Verification
- SPAN, RSPAN, ERSPAN Configuration and Verification
- IPSLA Configuration and Verification
- Quality of Service (QoS) Overview
- Embedded Event Manager (EEM) Configuration
- Security
- Device Access, Authentication Configuration and Verification
- AAA Configuration and Verification
- Access Control Lists (ACLs)
- Control Plane Policing (CoPP)
- Next-Gen Firewalls, Network Access Control, MACSec, and TrustSec
- Next Generation Campus Networks
- SD-Access
- LISP and VXLAN
- SD-WAN
- DNA Center Overview
- Data Formats
- Data Modeling
- NetConf / RestConf
- Python Exam Prep
- ShapeChef, Puppet, Ansible, SaltStack
- LAN Essentials
- Securing and Troubleshooting the Wireless Network Infrastructure including
- Secure access to Wireless LAN Controllers (WLCs) and Access Points (APs)
- Configuration management via Cisco DNA Center, Cisco Prime Infrastructure (PI)
- Implementing and Troubleshooting Secure Client Connectivity including
- 802.1X Authentication, AAA services, and Cisco Connected Mobile Experiences (CMX)
- Implementing and Troubleshooting QoS in Wireless Networks including
- Cisco Application Visibility and Control (AVC), Multicast DNS (mDNS), and Cisco Media Stream
- Implementing and Troubleshooting Advanced Wireless Network Services including
- Location Services, Analytics, and wireless spectrum management
What you will learn
ENCOR
- Configuration of VRF, GRE, VLANs, RSTP, MST, NTP, IPSec VPNs, and more
- Advanced Routing
- Configure and verify device management
- Cisco DNA Center
- Examine threat defense, endpoint security, and introduction to the Next-Generation Firewall
ENWLSI
- Implement network settings to provide a secure wireless network infrastructure and troubleshoot security issues as it relates to the wireless network infrastructure
- Implement a secure wireless client and troubleshoot wireless client connectivity issues
- Implement and troubleshoot QoS in wireless networks
- Implement and troubleshoot advanced capabilities in wireless network services
How you will benefit
- You will be prepared to sit for the Cisco CCNP Enterprise core exam: 350-401 ENCOR: Implementing and Operating Cisco Enterprise Network Core Technologies
- You will be prepared to sit for the Cisco CCNP Enterprise concentration exam: 300-430 ENWLSI: Implementing Cisco Enterprise Wireless Networks
Raymond Lacoste
Raymond Lacoste is a highly recognized instructor and IT professional who holds the Cisco Sirius Instructor Award. He has authored Cisco Press publications on the Cisco ENARSI and Cisco TSHOOT exams. Raymond's areas of expertise include Cisco Enterprise networking, Cisco Routing and Switching, Cisco Datacenter Networking, ITIL, and Amazon AWS. He also holds certifications in Cisco CCSI, Cisco CCNP Routing and Switching, Cisco CCNP Enterprise, ITIL Foundations, ITIL Practitioner, ITIL Intermediate, Amazon AWS System Operations, Amazon AWS Architect, Amazon AWS Developer, and CISSP. In addition to his certifications and experience, Raymond's engaging instruction style makes even the most obscenely complicated or obtuse concepts relatable and understandable. Outside of class, he enjoys dominating both on the golf course and the basketball court.
Dan Goodman
Dan Goodman is an IT professional specializing in Linux administration, Palo Alto firewalls, and wireless networking. He holds certifications in CompTIA Linux+, CWNP: CWNA, and Palo Alto PCNSA. In addition to his highly recognizable certifications, Dan is an expert in Linux administration, Palo Alto firewall administration, and wireless networking. Dan enjoys teaching the technologies focusing on real-world application of the theory. Outside of class-related efforts, he runs an animal shelter teaming with rescue animals.
The CCNP Enterprise: ENCOR is the first step to mastering the implementation of core enterprise network technologies. The goal of this online training course is to provide you with the skills needed to install, manage, and administer dual stack architecture, virtualization, network assurance, security, and automation in an enterprise network.
In CCNP Enterprise: ENWLSI, you will be given the skills and knowledge to implement wireless networks, including FlexConnect, QoS, Multicast, advanced location services, security for client connectivity, monitoring, and device hardening.
The course will prepare you to sit for the Cisco CCNP Enterprise Core exam ENCOR and the Cisco CCNP Enterprise Concentration exam ENWLSI. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.
|
|
|
- Cisco CCNP Security: SCOR & SISE
-
Fee: $3,295.00
Item Number: SP2CCTP48221
Dates: 1/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Building:
Room:
Instructor:
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.This course is intended for network security engineers and those looking to attain their CCNP Security certification. Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
Software Requirements:
- PC: Windows 8 or later.
- Mac: macOS 10.6 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
- Microsoft Word Online
- Adobe Acrobat Reader
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment and will be available online. The CCNP Security: SCOR course provides you with the knowledge to implement and operate core Cisco security technologies. You will learn about common security vulnerabilities, Email Security Appliance (ESA), Web Security Appliance (WSA), Cloud Email Security (CES), mobile device management (MDM), VPN configuration, and more.
The Configuring Cisco Identity Services Engine (SISE) course provides you with the skills and knowledge to deploy and use the Cisco Identity Services Engine (ISE), policy enforcement, profiling services, web authentication and guest access services, BYOD, endpoint compliance services, and TACACS+ device administration. Crucial elements of this course include the ability to use Cisco ISE to gain visibility into what is happening in your network, streamline security policy management, and contribute to operational efficiency.
The course will prepare you to sit for the Cisco CCNP Security Core exam SCOR and the Cisco CCNP Security Concentration exam SISE. These exams in tandem will earn you the CCNP Security certification. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.
- Security Foundations
- Attacks against on-premises and cloud resources
- Common security vulnerabilities
- Cryptography concepts and applications
- Managing Cisco security devices via application programming interfaces (APIs)
- Implementing Security
- Security in common cloud environments
- Division of responsibility (shared responsibility model)
- DevSecOps, continuous integration, and orchestration
- Cloud Concepts and Security
- Configuring and Verifying VLANs
- Configuring and Verifying Trunks
- VLAN Trunking Protocol (VTP)
- STP Overview and Algorithm Deep Dive
- STP Convergence, Configuration and Manipulation
- STP PortFast, and BPDU Guard
- Multiple Spanning Tree Protocol (MSTP)
- EtherChannels
- Inter-VLAN Routing
- First-Hop Redundancy Protocol (FHRP)
- Application-Specific Security Tools
- Email Security Appliance (ESA)
- Web Security Appliance (WSA)
- Cloud Email Security (CES)
- Securing DNS with Cisco Umbrella
- Securing Endpoints
- Antimalware concepts
- Mobile device management (MDM)
- Multifactor authentication (MFA)
- Network access control
- Patch management
- Network Access Control and Visibility
- 802.1x, WebAuth, and MAB
- Network visibility and evasion techniques
- Cisco network analytics technologies
- Introducing Cisco ISE Architecture and Deployment
- Using Cisco ISE as a Network Access Policy Engine
- Cisco ISE Use Cases
- Describing Cisco ISE Functions
- Cisco ISE Deployment Models
- Context Visibility
- Cisco ISE Policy Enforcement
- Using 802.1X for Wired and Wireless Access
- Using MAC Authentication Bypass for Wired and Wireless Access
- Introducing Identity Management
- Configuring Certificate Services
- Introducing Cisco ISE Policy
- Implementing Third-Party Network Access Device Support
- Introducing Cisco TrustSec
- Cisco TrustSec Configuration
- Easy Connect
- Web Authentication and Guest Services
- Introducing Web Access with Cisco ISE
- Introducing Guest Access Components
- Configuring Guest Access Settings
- Configuring Sponsor and Guest Portals
- Cisco ISE Profiler
- Introducing Cisco ISE Profiler
- Profiling Deployment and Best Practices
- Cisco ISE BYOD
- Introducing the Cisco ISE BYOD Process
- Describing BYOD Flow
- Configuring the My Devices Portal
- Configuring Certificates in BYOD Scenarios
- Cisco ISE Endpoint Compliance Services
- Introducing Endpoint Compliance Services
- Configuring Client Posture Services and Provisioning in Cisco ISE
- Working with Network Access Devices
- Review TACACS+
- Cisco ISE TACACS+ Device Administration
- Configure TACACS+ Device Administration
- TACACS+ Device Administration Guidelines and Best Practices
- Migrating from Cisco ACS to Cisco ISE
What you will learn
SCOR
- Cisco security devices via an API
- Layer 2 and Layer 3+ security
- VPNs
- Cloud security concepts
- Email Security Appliance (ESA)
- Web Security Appliance (WSA)
- Cloud Email Security (CES)
- DNS with Cisco Umbrella
- Mobile device management (MDM)
- Multifactor authentication (MFA)
SISE
- Describe Cisco ISE deployments, including core deployment components and how they interact to create a cohesive security architecture
- Describe the advantages of such a deployment and how each Cisco ISE capability contributes to these advantages
- Describe concepts and configure components related to 802.1X and MAC Authentication Bypass (MAB) authentication, identity management, and certificate services
- Describe how Cisco ISE policy sets are used to implement authentication and authorization and how to leverage this capability to meet the needs of your organization
- Describe third-party Network Access Devices (NADs), Cisco TrustSec®, and Easy Connect
- Describe and configure web authentication, processes, operation, and guest services, including guest access components and various guest access scenarios
- Describe and configure Cisco ISE profiling services and understand how to monitor these services to enhance your situational awareness about network-connected endpoints
- Describe best practices for deploying this profiler service in your specific environment
- Describe BYOD challenges, solutions, processes, and portalsConfigure a BYOD solution and describe the relationship between BYOD processes and their related configuration components
- Describe and configure various certificates related to a BYOD solution
- Describe the value of the My Devices portal and how to configure this portal
- Describe endpoint compliance, compliance components, posture agents, posture deployment and licensing, and the posture service in Cisco ISE
- Describe and configure TACACS+ device administration using Cisco ISE, including command sets, profiles, and policy sets
- Understand the role of TACACS+ within the Authentication, Authentication, and Accounting (AAA) framework and the differences between the RADIUS and TACACS+ protocols
- Migrate TACACS+ functionality from Cisco Secure Access Control System (ACS) to Cisco ISE, using a migration tool
How you will benefit
- You will be prepared to sit for the Cisco CCNP Security core exam: 350-701 SCOR: Implementing and Operating Cisco Security Core Technologies
- You will be prepared to sit for the Cisco CCNP Security concentration exam: 300-715 SISE: Implementing and Configuring Cisco Identity Services Engine
Shane Sexton
Shane Sexton is a cybersecurity-focused instructor with a hunger for using technology to combat real-world challenges. He holds many professional IT certifications such as Citrix CCA, CompTIA A+, CompTIA Security+, CompTIA Linux+, CompTIA CySA+, ITIL Foundations, Cisco CCNA, AWS SysOps, and Cisco CCNP Security. Shane's extensive professional expertise includes Citrix Virtualization, Citrix Virtualization, Computer Hardware support, Cisco networking, Cybersecurity Blue Team, Cybersecurity Red Team, Cisco security, Amazon AWS, and ITIL. Inside the classroom, Shane makes the complicated seem approachable. Outside the classroom, Shane is a mad scientist with automation, coding, and scripting, tying them back to technologies he teaches in class. If he isn't watching the latest SpaceX launch, he can usually be found tinkering with something.
Doug Bassett
Doug Bassett is an IT instructor specializing in Microsoft Azure, Server 2016/19, and Exchange messaging. He holds many highly sought-after IT certifications, including Microsoft MCSE, Microsoft MCSA, CompTIA Network+, Cisco CCNA, and Microsoft MCT. In addition to his certifications, Doug has expert knowledge of Microsoft Server 2000, 2003, 2008/2012/2016/2019, Exchange Server and Exchange Online, and Networking structure and applications. As an instructor, Doug is deeply involved in helping his students understand complex concepts and loves to approach teaching a subject from multiple angles.
The CCNP Security: SCOR course provides you with the knowledge to implement and operate core Cisco security technologies. You will learn about common security vulnerabilities, Email Security Appliance (ESA), Web Security Appliance (WSA), Cloud Email Security (CES), mobile device management (MDM), VPN configuration, and more.
The Configuring Cisco Identity Services Engine (SISE) course provides you with the skills and knowledge to deploy and use the Cisco Identity Services Engine (ISE), policy enforcement, profiling services, web authentication and guest access services, BYOD, endpoint compliance services, and TACACS+ device administration. Crucial elements of this course include the ability to use Cisco ISE to gain visibility into what is happening in your network, streamline security policy management, and contribute to operational efficiency.
The course will prepare you to sit for the Cisco CCNP Security Core exam SCOR and the Cisco CCNP Security Concentration exam SISE. These exams in tandem will earn you the CCNP Security certification. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.
|
|
|
- Cisco CCNP Security: SCOR & SISE (Vouchers Included)
-
Fee: $3,995.00
Item Number: SP2CCTP48231
Dates: 1/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Building:
Room:
Instructor:
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.This course is intended for network security engineers and those looking to attain their CCNP Security certification. Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
Software Requirements:
- PC: Windows 8 or later.
- Mac: macOS 10.6 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
- Microsoft Word Online
- Adobe Acrobat Reader
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment and will be available online. The CCNP Security: SCOR course provides you with the knowledge to implement and operate core Cisco security technologies. You will learn about common security vulnerabilities, Email Security Appliance (ESA), Web Security Appliance (WSA), Cloud Email Security (CES), mobile device management (MDM), VPN configuration, and more.
The Configuring Cisco Identity Services Engine (SISE) course provides you with the skills and knowledge to deploy and use the Cisco Identity Services Engine (ISE), policy enforcement, profiling services, web authentication and guest access services, BYOD, endpoint compliance services, and TACACS+ device administration. Crucial elements of this course include the ability to use Cisco ISE to gain visibility into what is happening in your network, streamline security policy management, and contribute to operational efficiency.
The course will prepare you to sit for the Cisco CCNP Security Core exam SCOR and the Cisco CCNP Security Concentration exam SISE. These exams in tandem will earn you the CCNP Security certification. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.
- Security Foundations
- Attacks against on-premises and cloud resources
- Common security vulnerabilities
- Cryptography concepts and applications
- Managing Cisco security devices via application programming interfaces (APIs)
- Implementing Security
- Security in common cloud environments
- Division of responsibility (shared responsibility model)
- DevSecOps, continuous integration, and orchestration
- Cloud Concepts and Security
- Configuring and Verifying VLANs
- Configuring and Verifying Trunks
- VLAN Trunking Protocol (VTP)
- STP Overview and Algorithm Deep Dive
- STP Convergence, Configuration and Manipulation
- STP PortFast, and BPDU Guard
- Multiple Spanning Tree Protocol (MSTP)
- EtherChannels
- Inter-VLAN Routing
- First-Hop Redundancy Protocol (FHRP)
- Application-Specific Security Tools
- Email Security Appliance (ESA)
- Web Security Appliance (WSA)
- Cloud Email Security (CES)
- Securing DNS with Cisco Umbrella
- Securing Endpoints
- Antimalware concepts
- Mobile device management (MDM)
- Multifactor authentication (MFA)
- Network access control
- Patch management
- Network Access Control and Visibility
- 802.1x, WebAuth, and MAB
- Network visibility and evasion techniques
- Cisco network analytics technologies
- Introducing Cisco ISE Architecture and Deployment
- Using Cisco ISE as a Network Access Policy Engine
- Cisco ISE Use Cases
- Describing Cisco ISE Functions
- Cisco ISE Deployment Models
- Context Visibility
- Cisco ISE Policy Enforcement
- Using 802.1X for Wired and Wireless Access
- Using MAC Authentication Bypass for Wired and Wireless Access
- Introducing Identity Management
- Configuring Certificate Services
- Introducing Cisco ISE Policy
- Implementing Third-Party Network Access Device Support
- Introducing Cisco TrustSec
- Cisco TrustSec Configuration
- Easy Connect
- Web Authentication and Guest Services
- Introducing Web Access with Cisco ISE
- Introducing Guest Access Components
- Configuring Guest Access Settings
- Configuring Sponsor and Guest Portals
- Cisco ISE Profiler
- Introducing Cisco ISE Profiler
- Profiling Deployment and Best Practices
- Cisco ISE BYOD
- Introducing the Cisco ISE BYOD Process
- Describing BYOD Flow
- Configuring the My Devices Portal
- Configuring Certificates in BYOD Scenarios
- Cisco ISE Endpoint Compliance Services
- Introducing Endpoint Compliance Services
- Configuring Client Posture Services and Provisioning in Cisco ISE
- Working with Network Access Devices
- Review TACACS+
- Cisco ISE TACACS+ Device Administration
- Configure TACACS+ Device Administration
- TACACS+ Device Administration Guidelines and Best Practices
- Migrating from Cisco ACS to Cisco ISE
What you will learn
SCOR
- Cisco security devices via an API
- Layer 2 and Layer 3+ security
- VPNs
- Cloud security concepts
- Email Security Appliance (ESA)
- Web Security Appliance (WSA)
- Cloud Email Security (CES)
- DNS with Cisco Umbrella
- Mobile device management (MDM)
- Multifactor authentication (MFA)
SISE
- Describe Cisco ISE deployments, including core deployment components and how they interact to create a cohesive security architecture
- Describe the advantages of such a deployment and how each Cisco ISE capability contributes to these advantages
- Describe concepts and configure components related to 802.1X and MAC Authentication Bypass (MAB) authentication, identity management, and certificate services
- Describe how Cisco ISE policy sets are used to implement authentication and authorization and how to leverage this capability to meet the needs of your organization
- Describe third-party Network Access Devices (NADs), Cisco TrustSec®, and Easy Connect
- Describe and configure web authentication, processes, operation, and guest services, including guest access components and various guest access scenarios
- Describe and configure Cisco ISE profiling services and understand how to monitor these services to enhance your situational awareness about network-connected endpoints
- Describe best practices for deploying this profiler service in your specific environment
- Describe BYOD challenges, solutions, processes, and portalsConfigure a BYOD solution and describe the relationship between BYOD processes and their related configuration components
- Describe and configure various certificates related to a BYOD solution
- Describe the value of the My Devices portal and how to configure this portal
- Describe endpoint compliance, compliance components, posture agents, posture deployment and licensing, and the posture service in Cisco ISE
- Describe and configure TACACS+ device administration using Cisco ISE, including command sets, profiles, and policy sets
- Understand the role of TACACS+ within the Authentication, Authentication, and Accounting (AAA) framework and the differences between the RADIUS and TACACS+ protocols
- Migrate TACACS+ functionality from Cisco Secure Access Control System (ACS) to Cisco ISE, using a migration tool
How you will benefit
- You will be prepared to sit for the Cisco CCNP Security core exam: 350-701 SCOR: Implementing and Operating Cisco Security Core Technologies
- You will be prepared to sit for the Cisco CCNP Security concentration exam: 300-715 SISE: Implementing and Configuring Cisco Identity Services Engine
Shane Sexton
Shane Sexton is a cybersecurity-focused instructor with a hunger for using technology to combat real-world challenges. He holds many professional IT certifications such as Citrix CCA, CompTIA A+, CompTIA Security+, CompTIA Linux+, CompTIA CySA+, ITIL Foundations, Cisco CCNA, AWS SysOps, and Cisco CCNP Security. Shane's extensive professional expertise includes Citrix Virtualization, Citrix Virtualization, Computer Hardware support, Cisco networking, Cybersecurity Blue Team, Cybersecurity Red Team, Cisco security, Amazon AWS, and ITIL. Inside the classroom, Shane makes the complicated seem approachable. Outside the classroom, Shane is a mad scientist with automation, coding, and scripting, tying them back to technologies he teaches in class. If he isn't watching the latest SpaceX launch, he can usually be found tinkering with something.
Doug Bassett
Doug Bassett is an IT instructor specializing in Microsoft Azure, Server 2016/19, and Exchange messaging. He holds many highly sought-after IT certifications, including Microsoft MCSE, Microsoft MCSA, CompTIA Network+, Cisco CCNA, and Microsoft MCT. In addition to his certifications, Doug has expert knowledge of Microsoft Server 2000, 2003, 2008/2012/2016/2019, Exchange Server and Exchange Online, and Networking structure and applications. As an instructor, Doug is deeply involved in helping his students understand complex concepts and loves to approach teaching a subject from multiple angles.
The CCNP Security: SCOR course provides you with the knowledge to implement and operate core Cisco security technologies. You will learn about common security vulnerabilities, Email Security Appliance (ESA), Web Security Appliance (WSA), Cloud Email Security (CES), mobile device management (MDM), VPN configuration, and more.
The Configuring Cisco Identity Services Engine (SISE) course provides you with the skills and knowledge to deploy and use the Cisco Identity Services Engine (ISE), policy enforcement, profiling services, web authentication and guest access services, BYOD, endpoint compliance services, and TACACS+ device administration. Crucial elements of this course include the ability to use Cisco ISE to gain visibility into what is happening in your network, streamline security policy management, and contribute to operational efficiency.
The course will prepare you to sit for the Cisco CCNP Security Core exam SCOR and the Cisco CCNP Security Concentration exam SISE. These exams in tandem will earn you the CCNP Security certification. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.
|
|
|
- CompTIA A+ Certification Training (Vouchers Included)
-
Fee: $2,095.00
Item Number: SP2CCTP46591
Dates: 1/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Building:
Room:
Instructor:
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.This course is designed to help you prepare to earn your CompTIA A+ credential by passing both required certification exams. Essential exam topics covered include various computer hardware and software aspects, including mobile devices, networking technology, virtualization, cloud computing, security, and operational procedures. Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
- Labs included in this program are not supported on mobile devices (i.e., phones and tablets).
Software Requirements:
- PC: Windows 10 or later.
- Note: Access to Windows 11 is needed for the optional textbook module "Installing Windows".
- Note: A Windows environment is required to complete some course assignments.
- Mac: macOS 10.6 or later.
- Chromebook 113 or later
- Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
- Microsoft Word. To complete your assignments, you may need Microsoft Word 2003 or higher, or an equivalent word-processing program, such as LibreOffice, which is available to download for free.
- Adobe Acrobat Reader. (Software must be installed and fully operational before the course begins.)
Other:
- Email capabilities and access to a personal email account.
- A reliable high-speed Internet connection.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment and will be available online. The textbook for the A+ course is accessed via links in the course lessons.
- CompTIA A+ Guide to IT Technical Support
Prepare to pass the CompTIA A+ certification exams to boost your resume and demonstrate your IT competence with a globally recognized credential! Obtaining your CompTIA A+ certification will open doors to entry-level IT jobs such as technical support specialists, help desk technicians, or field service technicians.
Our comprehensive CompTIA A+ course offers a thorough overview of the basic concepts around multiple operating systems, enabling you to efficiently maintain and troubleshoot various operating systems. The CompTIA A+ certification is vendor-neutral and adaptable to different technology platforms, providing a solid foundation to pursue specialized certifications.
You will become equipped with the skills to effectively diagnose and troubleshoot common software, hardware, and connectivity issues. With this employer-desired expertise, you will be an indispensable asset in any organization as you ensure smooth system operations and handle any technical challenges that arise.
This CompTIA A+ certification training also covers network fundamentals, providing you with a solid foundation in networking concepts, protocols, and troubleshooting techniques. This knowledge will enable you to effectively manage network infrastructure, enhance connectivity, and contribute to efficient communication within organizations.
Furthermore, you will gain practical experience in assembling and disassembling multiple computer parts, honing your skills in computer hardware. The in-depth CompTIA A+ training enables you to become proficient in building and maintaining computer systems, giving you a competitive edge in the job market.
Upon successful completion of the lessons and exercises in this bundled CompTIA A+ certification program, you will be well-prepared to take CompTIA's A+ certification exams. You will receive an exam voucher for each certification exam, which covers the cost to sit for the certifying exams upon eligibility.
- CompTIA A+ Certification Training
- Taking a Computer Apart and Putting It Back Together
- All About Cases and Motherboards
- Supporting Processors and Upgrading Memory
- Power Supplies and Troubleshooting Computer Problems
- Supporting Hard Drives and Other Storage Devices
- Supporting Input/Output Devices
- Networking Fundamentals
- Network Infrastructure and Cloud Computing
- Supporting Mobile Devices
- Supporting Printers
- The Complex World of IT Professionals
- Installing Windows
- Maintaining Windows
- Troubleshooting Windows After Startup
- Troubleshooting Windows Startup
- Security Strategies
- Securing and Sharing Windows Resources
- Mobile Device Security
- Network Security and Troubleshooting
- Supporting macOS
- Linux and Scripting
- Preparing for a Certification Exam
What you will learn
- Explore a comprehensive video overview of the CompTIA A+ course
- Master fundamental concepts of multiple operating systems to maintain and support them effectively
- Develop troubleshooting skills for software, hardware, and connectivity issues
- Acquire knowledge of network fundamentals, protocols, and troubleshooting techniques
- Gain in-depth experience in assembling and disassembling computer parts to expand your IT expertise
How you will benefit
- Enhance and ensure your preparation for the CompTIA A+ certification exams
- Engage with a variety of interactive learning materials, assignments, and assessments that will deepen your understanding and help with exam preparation
- Boost your employability by jump-starting your IT career with a highly respected and recognized certification that demonstrates your proficiency in essential IT skills
Linda Matthews
Linda Matthews has years of experience both in the classroom teaching technical material and in the field solving a myriad of technical issues.
Linda possesses the background to engage deeply with cybersecurity through teaching and intellectual focus. For the past eight years, she has lived with this vast and fascinating body of knowledge. Now, she regularly trains individuals in several of the most popular security courses from CompTIA and Microsoft. CompTIA's Security+ is the foundational course students need to begin an incredible journey into cybersecurity.
Linda has a strong love for teaching and igniting the spark that can set students on a most worthwhile and fulfilling path.
Sara Perrott
Sara Perrott has been working in the information technology field for 20+ years and has devoted the last 10 of those to focusing on cybersecurity. She is a published author and a former college professor, and she is passionate about teaching the next generation of cybersecurity professionals. Sara has a Master of Science in Cybersecurity and Information Assurance from Western Governors University Washington and a Bachelor of Science in Information Systems Security from the University of Phoenix.
Paula Woodall
Paula Woodall began her technical career as a network and computer consultant 30 years ago. She first taught at a local university before taking the CompTIA and Microsoft exams to teach certified courses. Paula has been fortunate to teach these classes worldwide for companies such as HP and Microsoft. Paula enjoys teaching classes regarding computers and networking and talking to students about how their companies put these technologies to work for them.
Justin Burandt
Justin Burandt has built a strong career in information technology (IT) education, holding various leadership and support roles across several universities. As an assistant director at Miami Dade College's Cybersecurity Center of the Americas, he played a key role in developing the IT training infrastructure and expanding certification programs. Additionally, Justin has mentored over 120 students in Western Governors University's IT bachelor's programs. His teaching experience spans both online and in-person, including CompTIA Tech+, A+, and Network+ courses across high school, college, and adult education settings. He has also led IT seminars for various organizations, including governments, financial institutions, and businesses.
Prepare to pass the CompTIA A+ certification exams to boost your resume and demonstrate your IT competence with a globally recognized credential! Obtaining your CompTIA A+ certification will open doors to entry-level IT jobs such as technical support specialists, help desk technicians, or field service technicians.
Our comprehensive CompTIA A+ course offers a thorough overview of the basic concepts around multiple operating systems, enabling you to efficiently maintain and troubleshoot various operating systems. The CompTIA A+ certification is vendor-neutral and adaptable to different technology platforms, providing a solid foundation to pursue specialized certifications.
You will become equipped with the skills to effectively diagnose and troubleshoot common software, hardware, and connectivity issues. With this employer-desired expertise, you will be an indispensable asset in any organization as you ensure smooth system operations and handle any technical challenges that arise.
This CompTIA A+ certification training also covers network fundamentals, providing you with a solid foundation in networking concepts, protocols, and troubleshooting techniques. This knowledge will enable you to effectively manage network infrastructure, enhance connectivity, and contribute to efficient communication within organizations.
Furthermore, you will gain practical experience in assembling and disassembling multiple computer parts, honing your skills in computer hardware. The in-depth CompTIA A+ training enables you to become proficient in building and maintaining computer systems, giving you a competitive edge in the job market.
Upon successful completion of the lessons and exercises in this bundled CompTIA A+ certification program, you will be well-prepared to take CompTIA's A+ certification exams. You will receive an exam voucher for each certification exam, which covers the cost to sit for the certifying exams upon eligibility.
|
|
|
- CompTIA Network+ Certification Training (Voucher Included)
-
Fee: $1,895.00
Item Number: SP2CCTP46571
Dates: 1/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Building:
Room:
Instructor:
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.This course will prepare you for a career as a network technician and qualify you to take the CompTIA Network+ certification exam (N10-009). You will master a variety of networking concepts and gain a fundamental knowledge of network design, security, cloud computing, and routing and switching. Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
- Labs included in this program are not supported on mobile devices (i.e., phones and tablets).
- Please note that a Windows environment is required to complete some course assignments.
- A motherboard capable of client-side virtualization:
- A 64-bit CPU
- UEFI firmware
- Hardware virtualization support in UEFI
Software Requirements:
- PC: Windows 10 or later.
- Mac: macOS 10.6 or later.
- Chromebook 113 or later
- Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
- Microsoft Word. To complete your assignments, you may need Microsoft Word 2003 or higher, or an equivalent word-processing program, such as LibreOffice, which is available to download for free.
- Adobe Acrobat Reader. (Software must be installed and fully operational before the course begins.)
Tools:
- Access to copper Ethernet cable-making tools and equipment:
- RJ-45 connectors
- A crimping tool
- Cat5, Cat5e, or Cat6 cable to practice on
Other:
- Email capabilities and access to a personal email account.
- A reliable high-speed Internet connection.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment. The following digital textbook for this course is accessed via links in the course lessons:
- CompTIA Network+ Guide to Networks, by Jill West (eBook)
Knowing how to install, configure, and troubleshoot a computer network is a highly marketable and in-demand skill—and it's an ideal time to explore online CompTIA Network+ courses to expand your career opportunities and earning potential!
This CompTIA Network+ certification course introduces the fundamental building blocks that form a modern network, such as hardware, topologies, and protocols, along with an introduction to the OSI model. The course provides in-depth coverage of the most important concepts in contemporary networking, including TCP/IP, Ethernet, wireless transmission, virtual networks, cloud computing, segmentation, security, performance optimization, and troubleshooting.
After reading the lessons and completing the exercises in this CompTIA Net+ certification course, you will gain the confidence to select the network design, hardware, and software that best fits your environment. You will have the skills to build a network from scratch and maintain, upgrade, troubleshoot, and manage an existing network. Finally, you will be well-prepared to take CompTIA's Network+ certification exam.
You will receive an exam voucher with your enrollment, which covers the fee to sit for the CompTIA Network+ (N10-009) certifying exam upon eligibility.
- Introduction to CompTIA
- Introduction to Networking
- Infrastructure and Documentation
- Addressing
- Protocols
- Cabling
- Wireless Networking
- Network Architecture
- Segmentation
- Wide Area Networking
- Risk Management
- Security in Network Design
- Performance and Recovery
- Final Exam
What you will learn
- Compare common network types, topologies, and architectures
- Characteristics and uses of networking hardware and tools
- How to install and configure wired and wireless networks
- TCP/IP functionality and protocols
- IP addressing concepts, including subnetting and VLANs
- Cloud computing, virtualization, and remote access systems and methods
- Tools and practices for monitoring network performance and health
- Network safety and security threats and how to mitigate them
- Explain how to troubleshoot and recover from network problems
- Identify the purposes of network policies and documentation
How you will benefit
- Expand your career opportunities and earning potential
- Course content is aligned with the CompTIA Network+ certification
- Optional hands-on learning activities with simulations and live virtual machine labs
- Opportunity to practice on multiple-choice questions to prepare you for your Network+ certification exam (N10-009)
Linda Matthews
Linda Matthews has years of experience both in the classroom teaching technical material and, in the field, solving a myriad of technical issues.
Linda possesses the background to engage deeply with cybersecurity through teaching and intellectual focus. For the past eight years, she has lived with this vast and fascinating body of knowledge. Now, she regularly trains individuals in several of the most popular security courses from CompTIA and Microsoft.
Linda has a strong love for teaching and igniting the spark that can set students on a most worthwhile and fulfilling path.
Sara Perrott
Sara Perrott has been working in the information technology field for 20+ years and has devoted the last 10 of those to focusing on cybersecurity. She is a published author and a former college professor, and she is passionate about teaching the next generation of cybersecurity professionals. Sara has a Master of Science in Cybersecurity and Information Assurance from Western Governors University Washington and a Bachelor of Science in Information Systems Security from the University of Phoenix.
Brett Glines
Brett Glines holds a Bachelor of Science in Finance from BYU and an MBA from Emory University. Since 1995, he has excelled as a consultant and educator in the field of technical education, primarily specializing in information technology and certification. He has helped thousands transition into IT careers and holds certifications in CompTIA A+, Network+, and Security+.
Brett is a master at leveraging online environments for learning and has been training online exclusively since 2015. His focus is on engaging students and ensuring they understand and remember what they learn. He uses practical examples, everyday analogies and recall techniques to make learning easier and more effective.
Justin Burandt
Justin Burandt has built a strong career in information technology (IT) education, holding various leadership and support roles across several universities. As an assistant director at Miami Dade College's Cybersecurity Center of the Americas, he played a key role in developing the IT training infrastructure and expanding certification programs. Additionally, Justin has mentored over 120 students in Western Governors University's IT bachelor's programs. His teaching experience spans both online and in-person, including CompTIA Tech+, A+, and Network+ courses across high school, college, and adult education settings. He has also led IT seminars for various organizations, including governments, financial institutions, and businesses.
Knowing how to install, configure, and troubleshoot a computer network is a highly marketable and in-demand skill—and it's an ideal time to explore online CompTIA Network+ courses to expand your career opportunities and earning potential!
This CompTIA Network+ certification course introduces the fundamental building blocks that form a modern network, such as hardware, topologies, and protocols, along with an introduction to the OSI model. The course provides in-depth coverage of the most important concepts in contemporary networking, including TCP/IP, Ethernet, wireless transmission, virtual networks, cloud computing, segmentation, security, performance optimization, and troubleshooting.
After reading the lessons and completing the exercises in this CompTIA Net+ certification course, you will gain the confidence to select the network design, hardware, and software that best fits your environment. You will have the skills to build a network from scratch and maintain, upgrade, troubleshoot, and manage an existing network. Finally, you will be well-prepared to take CompTIA's Network+ certification exam.
You will receive an exam voucher with your enrollment, which covers the fee to sit for the CompTIA Network+ (N10-009) certifying exam upon eligibility.
|
|
|
- CompTIA Security+ Certification Training (Voucher Included)
-
Fee: $1,995.00
Item Number: SP2CCTP46581
Dates: 1/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Building:
Room:
Instructor:
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.Learn a broad range of security topics, including threat management, identity management, access control, cryptography, and network security. This course will teach you everything you need to take and successfully pass the CompTIA Security+ certification exam. Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
- Labs included in this program are not supported on mobile devices (i.e., phones and tablets).
Software Requirements:
- PC: Windows 10 or later.
- Mac: macOS 10.6 or later.
- Chromebook 113 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
- Microsoft Word. To complete your assignments, you may need Microsoft Word 2003 or higher, or an equivalent word-processing program, such as LibreOffice, which is available to download for free.
- Adobe Acrobat Reader.
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
- A reliable high-speed Internet connection
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment. The textbook for the Security+ course is accessed via links in the course lessons.
- CompTIA Security+ Guide to Network Security Fundamentals
Boost your cybersecurity career and yearly income by obtaining your CompTIA Security+ certification! According to CompTIA, five of the top six security jobs have annual salaries of $90,000 or higher, with some exceeding $127,000. The Security+ certification is widely recognized and well-respected in the IT industry and it will validate your skills and help you gain top-paying employment.
The vendor-neutral CompTIA Security+ certification covers a broad range of security topics, including threat management, identity management, access control, cryptography, and network security. By completing this CompTIA Security+ course, learning key cybersecurity concepts and mastering accompanying quizzes and tests, you will be well-prepared to take the Security+ certification exam.
This online CompTIA Security+ training covers the essential knowledge and skills required to identify, assess, and mitigate security risks in modern IT environments. This course provides a comprehensive overview of the key concepts and best practices in cybersecurity, including the latest trends and emerging threats. It also teaches the fundamental principles of cybersecurity and enables students to implement security controls that protect against a wide range of attacks and vulnerabilities.
This Security+ certification course offers an exam voucher with enrollment. The voucher covers the cost to sit for the certifying exam upon eligibility. After completing the CompTIA Security+ course, you can set up your own exam dates and times at a nearby testing center.
- Introduction to CompTIA
- Security Fundamentals
- Threat Management and Cybersecurity Resources
- Threats and Attacks on Endpoints
- Endpoint and Application Development Security
- Cryptography
- Public Key Infrastructure and Cryptographic Protocols
- Mobile, Embedded, and Specialized Device Security
- Networking Threats, Assessments, and Defenses
- Network Security Appliances and Technologies
- Cloud and Virtualization Security
- Network Threats, Assessments, and Defenses
- Authentication
- Incident Preparation, Response, and Investigation
- Cybersecurity Resilience
- Risk Management and Data Privacy
- Preparing for the Certificate Exam
- Exploring a Career in Cybersecurity
What you will learn
- Gain fundamental concepts of computer security
- Understand cybersecurity threats, vulnerabilities, and assessments
- Review incident preparations, response, and risk management
- Learn to monitor and secure hybrid environments, including cloud, mobile, Internet of Things (IoT), and operational technology
How you will benefit
- Prepare for the CompTIA Security+ certificate exam
- Utilize a variety of interactives, assignments, and assessments
- Review topics covering the most updated objectives found in the CompTIA Security+ exam
Linda Matthews
Linda Matthews has years of experience both in the classroom teaching technical material and in the field solving a myriad of technical issues.
Linda possesses the background to engage deeply with cybersecurity through teaching and intellectual focus. For the past eight years, she has lived with this vast and fascinating body of knowledge. Now, she regularly trains individuals in several of the most popular security courses from CompTIA and Microsoft. CompTIA's Security+ is the foundational course students need to begin an incredible journey into cybersecurity.
Linda has a strong love for teaching and igniting the spark that can set students on a most worthwhile and fulfilling path.
Sara Perrott
Sara Perrott has been working in the information technology field for 20+ years and has devoted the last 10 of those to focusing on cybersecurity. She is a published author and a former college professor, and she is passionate about teaching the next generation of cybersecurity professionals. Sara has a Master of Science in Cybersecurity and Information Assurance from Western Governors University Washington and a Bachelor of Science in Information Systems Security from the University of Phoenix.
Boost your cybersecurity career and yearly income by obtaining your CompTIA Security+ certification! According to CompTIA, five of the top six security jobs have annual salaries of $90,000 or higher, with some exceeding $127,000. The Security+ certification is widely recognized and well-respected in the IT industry and it will validate your skills and help you gain top-paying employment.
The vendor-neutral CompTIA Security+ certification covers a broad range of security topics, including threat management, identity management, access control, cryptography, and network security. By completing this CompTIA Security+ course, learning key cybersecurity concepts and mastering accompanying quizzes and tests, you will be well-prepared to take the Security+ certification exam.
This online CompTIA Security+ training covers the essential knowledge and skills required to identify, assess, and mitigate security risks in modern IT environments. This course provides a comprehensive overview of the key concepts and best practices in cybersecurity, including the latest trends and emerging threats. It also teaches the fundamental principles of cybersecurity and enables students to implement security controls that protect against a wide range of attacks and vulnerabilities.
This Security+ certification course offers an exam voucher with enrollment. The voucher covers the cost to sit for the certifying exam upon eligibility. After completing the CompTIA Security+ course, you can set up your own exam dates and times at a nearby testing center.
|
|
|
- Computer Hacking Forensics Investigator (CHFI) (Voucher Included)
-
Fee: $2,895.00
Item Number: SP2CCTP47761
Dates: 1/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Building:
Room:
Instructor:
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.This course prepares for Computer Hacking Forensics Investigator (CHFI) certification exam. You will master the security discipline of digital forensics from a vendor-neutral perspective. Requirements:
Hardware Requirements:
- This course can be taken on either a PC or Mac.
Software Requirements:
- PC: Windows 8 or later.
- Mac: macOS 10.10 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
- Adobe Acrobat Reader.
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment and will be available online. The materials are non-refundable upon registration. This computer forensics certification course is designed to equip you with the necessary skills to pass the EC-Council's Computer Hacking Forensic Investigator (CHFI) Certification exam. By achieving this credential, you will be able to demonstrate your proficiency in digital forensic tools and techniques that are crucial in today's cybersecurity industry.
Our digital forensics certification course takes a comprehensive and meticulous approach to computer forensics and evidence analysis. You will learn how to identify an intruder's traces, collect the appropriate evidence for prosecution, and prevent future attacks.
Taught by a skilled digital forensics professional, in this CHFI certification program, you will learn a reliable method for conducting forensic investigations, which includes templates for collecting evidence, maintaining the chain of custody, and creating final investigation reports. Additionally, you will have access to cloud-based virtual labs on advanced Cyber Ranges, allowing you to practice different investigation techniques in realistically simulated environments.
Note: This computer forensics certification is an ANSI 17024 accredited program, mapped to the NICE 2.0 framework and recognized and approved by the DoD under Directive 8570. Course enrollment includes a voucher that covers the certification exam fee upon eligibility. You can take the exam remotely through a proctor function—ensuring scheduling and testing are convenient.
- Computer Forensics in Today's World
- Computer Forensics Investigation Process
- Understanding Hard Disks and File Systems
- Data Acquisition and Duplication
- Defeating Anti-Forensics Techniques
- Windows Forensics
- Linux and Mac Forensics
- Network Forensics
- Malware Forensics
- Investigating Web Attacks
- Dark Web Forensics
- Cloud Forensics
- Email and Social Media Forensics
- Mobile Forensics
- IoT Forensics
What you will learn
- Establish threat intelligence and key learning points to support pro-active profiling and scenario modeling
- Perform anti-forensic methods detection
- Conduct post-intrusion analysis of electronic and digital media to determine who, where, what, when, and how the intrusion occurred
- Extract and analyze logs from various devices such as proxy, firewall, IPS, IDS, desktop, laptop, servers, SIM tool, router, firewall, switches AD server, DHCP logs, and access control logs as part of the investigation process
- Identify & check the possible source/incident origin
- Recover deleted files and partitions in Windows, macOS, and Linux
How you will benefit
- Become a Certified Hacking Forensics Investigator (CHFI)
- Exam eligibility for the EC-Council Certified Hacking Forensics Investigator (CHFI) Exam Number 312-49 with example CHFI questions
- The CHFI certification can fortify the applied knowledge level of law enforcement, system administrators, security, defense and military personnel, legal, banking, and computer and network security. It helps to enhance knowledge and skills in digital investigations and network integrity
Eric Reed
Eric Reed has over 12 years of experience in IT consulting, specializing in security. Since 2005, he has consulted and delivered custom training to the U.S. military and numerous Fortune 100 and Fortune 500 companies. He has delivered CEH, CHFI, and ECSA/LPT training for the last seven years, with a 95 percent pass rating. Reed was awarded the EC Council Instructor of the Year in 2009 and 2012, as well as the Circle of Excellence in 2006, 2007, and 2010.
This computer forensics certification course is designed to equip you with the necessary skills to pass the EC-Council's Computer Hacking Forensic Investigator (CHFI) Certification exam. By achieving this credential, you will be able to demonstrate your proficiency in digital forensic tools and techniques that are crucial in today's cybersecurity industry.
Our digital forensics certification course takes a comprehensive and meticulous approach to computer forensics and evidence analysis. You will learn how to identify an intruder's traces, collect the appropriate evidence for prosecution, and prevent future attacks.
Taught by a skilled digital forensics professional, in this CHFI certification program, you will learn a reliable method for conducting forensic investigations, which includes templates for collecting evidence, maintaining the chain of custody, and creating final investigation reports. Additionally, you will have access to cloud-based virtual labs on advanced Cyber Ranges, allowing you to practice different investigation techniques in realistically simulated environments.
Note: This computer forensics certification is an ANSI 17024 accredited program, mapped to the NICE 2.0 framework and recognized and approved by the DoD under Directive 8570. Course enrollment includes a voucher that covers the certification exam fee upon eligibility. You can take the exam remotely through a proctor function—ensuring scheduling and testing are convenient.
|
|
|
- Digital Game Artist Certificate
-
Fee: $2,595.00
Item Number: SP2CCTP47131
Dates: 1/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Building:
Room:
Instructor:
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.This online Digital Game Artist Certificate course will train you to become a professional video game artist by developing core skills for jobs related to Digital Art, 3D Art, Modeling, Character Design, and Environmental Art Design. Requirements:
Hardware Requirements:
- This course can be taken on either a PC or Mac.
- 3 Button Mouse (with wheel)
- These supplementary materials are recommended but not required:
- Pressure sensitive tablet (e.g., Wacom)
- Quixel Mixer
- Various thickness black markers
- Sketching pencils
- 12 color pack of pens
Software Requirements:
- PC: Windows 8 or later.
- Mac: macOS 10.6 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
- Blender 2015 or later
- Adobe Photoshop CS6+ (not included in enrollment) or GIMP/Paint.NET (free)
- Unreal Engine 4
- Unity 5+
- Adobe Acrobat Reader.
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment and will be available online. Become a professional video game artist with this online game artist training course, designed to equip you with the necessary skills and knowledge to succeed in this creative and lucrative industry. Focus on developing core competencies in areas such as digital art, 3D art, modeling, character design, and environmental art design. You will learn essential techniques for jobs related to game art, including modeling game props and characters, importing elements into game-specific software, and animating game assets.
Apply the concepts learned in the course by working with popular game development platforms such as Unreal Engine 4 and Unity 5+. These platforms are widely used in the video game industry and will provide you with hands-on experience in translating your artistic skills into practical game design.
In addition to software and game-related techniques, this game art course also covers broader topics that can help boost your career such as general design principles and concept art. You will learn the fundamental principles that distinguish good art from great art and the key social aspects necessary for ongoing growth and professional development in the field. By the end of the game artist course, you will have acquired a diverse set of employable skills and a solid understanding of the key components of 3D art and environmental art.
- 3D Modeling I
- Getting Started
- Basic Blender Interface
- Viewport Configuration and Layout
- Display Settings and Menu Rollouts
- Select, Undo/Redo, and Space Search
- Rendering an Image
- Viewport Controls and Settings
- Transforms and User Preferences
- Select and Deselect
- Primitives
- Append
- Primitive Properties
- 3D Cursor and Object Position
- Edit and Object Mode
- Grease Pencil
- Pivots and Object Origin
- 3D Cursor
- Transform Orientation and Duplicate
- Polygon, Vertex, and Edge
- Object Mode Keys
- Edit Mode Keys
- Limit Selection to Visible
- Viewport Shading and Smoothing
- Insert, Delete, Dissolve Edge
- Edge Split and Create Edge
- Merge
- User Preferences and Key Commands
- Outliner
- Modifiers
- Piling Modifiers
- Snaps (Edit and Object Mode)
- Snap to Grid
- Splines
- Rendering Splines
- Splines in Edit Mode
- Curve Modifier
- Path Deform Process
- Bevel with Contour Controls
- Lathe
- Mirror and Symmetrize
- Insert
- Intersect Tool
- Fill, Bridge, and Grid Fill
- Bend
- Pivot Positioning
- Fill
- Grease Pencil Revisited
- Duplicate and Linked Duplicate
- Appending and Saving Selected
- Layers
- Boolean
- Smooth Shading
- Arrays
- Solidify
- Subdivide
- Proportional Editing
- Mesh Deform
- Basic Light Settings
- Basic Edge Placement for Sub D Surfaces
- Final Practical
- Elements of Visual Design
- Getting Started
- Balance
- Unity
- Gradation
- Harmony
- Dominance
- Repetition
- Contrast
- Gestalt
- Space
- Symmetry and Asymmetry
- Gathering and Filtering
- Style Guides
- Form and Structure
- Silhouette and Visual Reference
- Tonal Studies
- Light
- Ball Study
- Visual Depth
- Tactile Texture / Visual Texture / Pattern
- Volume
- Visual Narrative I
- Visual Narrative II
- Final Practical
- Texture Maps and Digital Painting
- Getting Started
- Photoshop Texture Maps
- Custom Brushes
- Style Sheets and Ortho Concepts
- Creature Design
- DDO, NDO, and 3DO in Photoshop
- Quixel
- Map Types
- What is Physically Based Rendering?
- Ambient Occlusion (AO) Maps
- ID Maps
- Using the Quixel Suite
- Using NDO I
- Using 3DO I
- NDO Practical
- Accessing Material ID Links
- Using DDO I
- Saving DDO Smart Materials
- Using DDO II
- Using DDO III
- Create Base (Albedo / Specular / Reflection / AO / Normal)
- Lowering Preview Resolution and Viewing IDs in Real-Time
- Combining Normal Information
- Layers and Blending Modes in DDO
- The Mask Editor and Mask Paint
- Brush Combining in Photoshop and Blender
- Grouping Layers
- Final Practical
- 3D Modeling II
- Getting Started
- Basic Photoshop
- Tile Texture
- Wacom Tablet Properties
- Layers
- Lights
- Sizing and Saving Texture Maps
- Texel Density
- Basic UV Unwrap
- The UV Editor
- Adding Maps to Objects
- Auto and Smart Unwrap
- To Sphere
- Unwrap Follow Active Quads
- Setting Seams for UVW Unwrap
- Smoothing and UV Elements
- Element Selection
- Positioning of Unwrap Elements
- Weld, Stitch, and Breaking UV Elements
- Relaxing UV Vertices and Elements
- Packing UV Elements
- Mesh Smooth and Edge Crease
- Cycles in Blender
- Texture Paint
- Basic Sculpt
- Baking ID Maps
- Baked Textures
- Creating Normal Maps
- Sub-D Modeling Intro
- Final Practical
- Elements of Digital Design
- Getting Started
- Stylized 3d Character
- Man Made Prop
- 3d Tree
- Underwater Vehicle
- 3D Modeling III
- Getting Started
- Anatomy (Hands)
- Anatomy (Feet)
- Anatomy (Head)
- Anatomy (Arm, Leg)
- Anatomy (Chest, Back)
- Anatomy (Creature - Cat)
- Anatomy (Creature - Horse)
- Anatomy (Bird)
- Anatomy (Creature - Dinosaur)
- Anatomy (Structural Design - Wings)
- Edge Flow, Relaxed Edge Flow
- Anatomy and Edge Flow
- Supporting Edges (Structural)
- Supporting Edges (Curved Mesh)
- Mirror and Edge Flow
- Weighted Vertices
- Armature in 3d (Skin Modifier)
- Edge Flow for Animated Meshes
- Fixing Texture Seams
- Digital Sculpting
- Solidify to Set Up Clothing
- Script UV Squares Master
- Script Mesh Align to G Pencil
- Final Practical
- 3D Sculpture
- Getting Started
- Orthographic Planes
- Alpha Settings and Transparency
- X-Ray
- Blocking Out the Leg
- Adding the Mirror Modifier
- Defining the Back of the Neck
- Creating the Feet
- Creating the Head I
- Creating the Head II
- Creating the Hands I
- Creating the Hands II
- Creating the Arms
- Creating the Toes
- Eyes and Teeth
- Final Base Mesh (Ready for Sculpt)
- The Multiresolution Modifier
- Setting Up the Sculpt Menu
- Laying Down Clay Strips
- Refining the Sculpt
- Sculpting Details
- Duplicate Mesh, Create Low and High Variation
- Spaced (Relax) Vertices and Tight Mesh Areas
- Texture Projections
- Projection Snaps and Retopo
- Final Practical
- Sub-D Modeling
- Getting Started
- Add/Delete Edge Loops to Define Volumes
- Unwrapping Separate Objects (Sub-Objects)
- Baking Normal Maps (Blender)
- Baking Normal Maps (XNormal)
- Apply Normal Maps to Mesh
- Texture Paint Mode and Brushes
- Mirror in Paint Mode
- Stencils
- UV Unwrap Guidelines
- Normal Map Errors and Extreme Stretching
- Normal Map Elements (XYZ, Color, Designation)
- Additional Projects
- Final Practical
- Digital Lighting and Game Engines
- Getting Started
- New Project and UI Overview
- Viewport Navigation
- View Modes and Show Flags
- Placing Objects in a Level
- Content Browser
- Material Creation I
- Material Creation II
- Basic Lighting
- Basic Blueprints
- Lights and Settings
- Shadows
- Light Behavior I
- Light Behavior II
- Three Point Lighting
- Time of Day Lighting
- Translucency and Projections
- Game Engine Lighting I
- Game Engine Lighting II
- Final Practical
- Character Design and Animation
- Getting Started
- Modeling the Base Mesh
- Sculpting the Character
- Retopology
- UV Mapping and Texture Baking
- Texture Painting
- Rigging the Character
- Creating Animation Cycles
- Setting Up in Unity
- Final Practical
- (CAPSTONE) Final Practical and Portfolio
- Final Practical and Essay
- Portfolio Development
- Career/Next Steps Consultation
What you will learn
- How to improve your game art abilities
- Prop, environment, and character art/animation
- Proficiency in popular 2D and 3D modeling software
- Modeling and texturing techniques to effectively bring your designs to life
- The fundamental principles of creating exceptional art
How you will benefit
- Identify the specific skills needed for your professional game art projects
- Engage in hands-on development to practice and improve your new animation skills
- Assess your artistic ability and identify areas for improvement
- Evaluate the effectiveness of your new skills in real-world projects
Christian Bradley
Christian Bradley is the Director of Curriculum Development for Digital Media at the Art Institute of California, Orange County campus. He was as an instructor and Academic Director of Game Art and Design at the Art Institute of California, San Diego from 2003 to 2015. For more than twenty years, Bradley was an environment artist and texture artist with more than 35 commercial video game titles for PC, and Sony, Microsoft, and Nintendo consoles in his portfolio. He has worked at Interplay, the Dreamers Guild Studios, and the Collective Studios. Some previous clients include Activision, Digital Extremes, and Legend Entertainment.
Become a professional video game artist with this online game artist training course, designed to equip you with the necessary skills and knowledge to succeed in this creative and lucrative industry. Focus on developing core competencies in areas such as digital art, 3D art, modeling, character design, and environmental art design. You will learn essential techniques for jobs related to game art, including modeling game props and characters, importing elements into game-specific software, and animating game assets.
Apply the concepts learned in the course by working with popular game development platforms such as Unreal Engine 4 and Unity 5+. These platforms are widely used in the video game industry and will provide you with hands-on experience in translating your artistic skills into practical game design.
In addition to software and game-related techniques, this game art course also covers broader topics that can help boost your career such as general design principles and concept art. You will learn the fundamental principles that distinguish good art from great art and the key social aspects necessary for ongoing growth and professional development in the field. By the end of the game artist course, you will have acquired a diverse set of employable skills and a solid understanding of the key components of 3D art and environmental art.
|
|
|
- Management for IT Professionals
-
Fee: $2,295.00
Item Number: SP2CCTP46311
Dates: 1/1/2025 - 6/30/2025
Times: 12:00 AM - 12:00 AM
Days:
Sessions: 0
Building:
Room:
Instructor:
REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.Learn leadership skills that will help you succeed as a manager in the IT field by exploring different decision-making techniques. This course focuses on developing a successful leadership style that facilitates team building, collaboration, and a corporate culture that promotes success. Requirements:
Hardware Requirements:
- This course can be taken on either a PC or Mac.
- A high-speed Internet connection
Software Requirements:
- PC: Windows 8 or later.
- Mac: macOS 10.6 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
- Microsoft Office or equivalent (not included in enrollment).
- Adobe Acrobat Reader.
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment. The following textbooks will be shipped to you approximately 7-10 business days after enrollment:
- Managing by the Numbers: A Commonsense Guide to Understanding and using your Company's Financials
- Strategic Planning - A Pragmatic Guide
Please note: You will receive a digital book if the physical book is on backorder. If you manage IT professionals, this course is for you! The leaders in an organization often set the tone and establish the benchmarks for success. In this course, you'll explore different decision-making techniques in the context of successful leadership styles. The focus is on developing a successful leadership style that facilitates team building, collaboration, and a corporate culture that promotes success.
The Management for IT Professionals Online Training course is particularly well suited for anyone in IT who has recently assumed management responsibilities, anyone who is managing IT professionals, or anyone who wants an introductory perspective on some of the unique issues facing the management of IT professionals. This course explores the developmental process and how to be successful in creating change. Since most business organizations are social systems, the Management for IT Professionals Online Training course will also focus on organizational culture and how it influences the way people work, so as to maximize the long-term health of the organization and its people. This course delivers essential leadership skills, business practices, budgeting strategies, communication skills, and more, all with the goal of helping you run your IT department better than ever before.
- Management Issues in the IT Environment
- Introduction and Components of a Successful Manager
- Organizational Culture and Change
- Power and Perceptions
- Leadership and Risk
- Strategies, Decision Making, Empowerment, and Accountability
- Customer Relationship Management and Quality
- Human Resource Management
- Financial Accountability
- Summary
- Collaborative Problem Solving
- Introduction
- Backgrounds, Management, and Leadership
- Communication, Motivation, and Development
- Summary
- Strategic Management in Operations
- Introduction and Overview
- Definitions and Business Models
- Categories of Strategies
- Strategic Planning Models
- Creating Strategic Alternatives
- Implementation
- Conclusion
- Business Best Practices
- Financial Accounting for IT Managers
- Introduction and Overview
- Importance of Financial Statements
- The Balance Sheet
- The Income Statement
- Statement of Cash Flows
- Financial Ratios
- Conclusion
- Legal Issues in Operations
- Introduction
- Sources of Law
- Agency and Employment Law
- Torts Law
- Sales and Products Liability
- Intellectual Property
- Ethics
- Summary
- Organizational Leadership and Decision Making
- Introduction and Overview
- What Is a Leader
- Sources of Power in Leadership
- Leadership Theories
- Transformational Leaders
- Decision Making and Empowerment
- Accountability
- Summary
- Organizational Development and Change
- Introduction and Overview
- The Culture of an Organization
- Types of Culture
- Organizational Change
- The Human Side of Change and Resistance
- Summary
- Negotiating Strategies
- Introduction
- Steps in Negotiating
- Tools in Negotiating
- Types of Negotiations
- Personality Types
- Preparing for Negotiations
- BATNA and Summary
- Seven Management Disciplines
- Introduction and Overview
- Strategy Management
- Human Resource Management
- Technology Management
- Production and Operations Management
- Sales and Marketing Management
- Customer Experience Management
- Financial Management
- Risk Management
- Summary
- Budgeting Essentials
- Introduction
- The Concept of Budgeting
- Activity Based Budgeting
- Factors to Consider in Budgeting
- Production Planning
- Inventory
- Sample Budget and Summary
- Persuasive Communication
- Introduction
- Fundamentals of Communication
- Knowing the Audience
- The Power of Listening
- Credibility of the Speaker
- Evidence in Persuasion
- Emotion in Persuasion
- Organizing the Argument
- Summary
What you will learn
- Learn to think about budgeting in a strategic, integrated manner
- Gain strategies to solve problems and challenges on a collaborative basis
- Understand the legal issues involved in operations, including agency and employment law
- Learn seven management disciplines
- Develop a foundation for negotiating with great awareness and effectiveness
- Learn about the key areas of business management
How you will benefit
- Begin your career as an IT professional or develop your existing skills to move up at your current job
- Learn to communicate and lead a team effectively
- Understand how to successfully run a department and what financial and legal regulations you'll be held to
- Discuss ways in which you can benefit your organization, from decision making to cultural shifts, that will make you an asset to any team
Katrina McBride
Katrina McBride's career reflects extensive experience in organizational leadership, marketing strategies, and market development in multi-national corporate environments. Her leadership abilities have been utilized to develop new programs and functional areas. In director-level positions for Nortel Networks, she led strategy for competitive intelligence, emerging markets, and lead generation. McBride holds an M.A. in organizational management and a B.S. in psychology.
Katherine Squires Pang
Katherine Squires Pang, J.D., LL.M., M.Ed has practiced law with since 1983. She has served as an adjunct faculty member in the Graduate School of Management at the University of Texas, Dallas, and has been an adjunct faculty member of many universities, including New York University and the University of California, Irvine. She received her B.A. in 1980 from Clark University, her J.D. from the University of Dayton Law School in 1982, her LL.M in Taxation from Georgetown University Law School in 1983, and her M.Ed from the University of Texas in 2001.
If you manage IT professionals, this course is for you! The leaders in an organization often set the tone and establish the benchmarks for success. In this course, you'll explore different decision-making techniques in the context of successful leadership styles. The focus is on developing a successful leadership style that facilitates team building, collaboration, and a corporate culture that promotes success.
The Management for IT Professionals Online Training course is particularly well suited for anyone in IT who has recently assumed management responsibilities, anyone who is managing IT professionals, or anyone who wants an introductory perspective on some of the unique issues facing the management of IT professionals. This course explores the developmental process and how to be successful in creating change. Since most business organizations are social systems, the Management for IT Professionals Online Training course will also focus on organizational culture and how it influences the way people work, so as to maximize the long-term health of the organization and its people. This course delivers essential leadership skills, business practices, budgeting strategies, communication skills, and more, all with the goal of helping you run your IT department better than ever before.
|
|
|