Skip Navigation or Skip to Content
Sign In  |  View Cart  |    |  Help  |  
Return to Course Catalog

Course Catalog > Information Technology

Information Technology   

  • Certified AWS Cloud Practitioner (Voucher Included)
  • Fee: $1,995.00
    Item Number: SP2CCTP48091
    Dates: 1/1/2025 - 6/30/2025
    Times: 12:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    This course is intended for IT professionals who would like to better understand AWS Cloud concepts and core AWS services.



    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC, Mac, or Chromebook.

    Software Requirements:

    • PC: Windows 10 or later.
    • Mac: macOS 10.6 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
    • Virtual Labs included with the course
    • Microsoft Word Online
    • Adobe Acrobat Reader
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment and available online.

    • Study guide
    • Virtual labs
    • Practice exams

    This course is the first step in training for the industry-leading Amazon AWS product. It serves as a thorough introduction to the services and solutions possible with AWS. It is also the first certification in paths available for IT professionals looking to codify their knowledge and skills in AWS.

    Anyone looking for exposure to AWS or the AWS Certified Cloud Practitioner should take this course. This course can be used to prepare for the AWS Certified Cloud Practitioner exam. This course offers enrollment with a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.


    1. Course Overview and AWS Introduction
      1. Introduction to AWS Certified Cloud Practitioner Course and Exam Objectives
      2. Introducing AWS and the Cloud
      3. AWS Well-Architected Framework
      4. The AWS Global Architecture (Regions, Availability Zones, and Edge Locations)
      5. AWS Pricing, Billing, Support Plans and Dashboards
      6. Accessing AWS Resources
    2. AWS Compute
      1. Amazon EC2
      2. EC2 Scaling and Load Balancing
      3. Amazon ECS, EKS, and Fargate
      4. AWS Lambda
      5. Elastic BeanStalk
    3. AWS Databases
      1. Database Overview and RDS
      2. Amazon Elasticache
      3. DynamoDB
      4. DocumentDB
      5. Amazon Redshift
      6. Amazon Neptune
    4. AWS Storage
      1. Instance and EBS Storage
      2. EFS, FSx for Windows and FSx for Lustre
      3. Simple Storage Service (S3)
      4. AWS Storage Gateway
    5. AWS Networking
      1. VPC Overview and Subnets
      2. VPC Internet Connectivity, Routing, and NAT
      3. VPC Security Groups and ACLs
      4. VPNs and Direct Connect
      5. CloudFront, Global Accelerator and Route53
      6. API Gateway
    6. AWS Messaging, Migration, and Translation
      1. SQS
      2. SNS and SES
      3. Snowcone, Snowball, Snowmobile
      4. AWS DataSync, AWS Transfer, AWS Database Migration Service
      5. AWS Translate and Transcribe
    7. Security
      1. Security Overview, IAM Users and Groups
      2. Permissions and Policies
      3. IAM Roles, Identity Federation and Cognito
      4. KMS, Secrets Manager, AWS Organizations and Compliance
      5. AWS WAF, Shield, Inspector, Macie, and GuardDuty
    8. Monitoring and Maintenance
      1. CloudWatch, CloudWatch Logs, and CloudWatch Events
      2. CloudTrail and Trusted Advisor

    What you will learn

    • Define what the AWS Cloud is and the basic global infrastructure
    • Describe basic AWS Cloud architectural principles
    • Describe the AWS Cloud value proposition
    • Describe key services on the AWS platform and their common use cases (for example, compute and analytics)
    • Describe basic security and compliance aspects of the AWS platform and the shared security model
    • Define the billing, account management, and pricing models
    • Identify sources of documentation or technical assistance (for example, whitepapers or support tickets)
    • Describe basic/core characteristics of deploying and operating in the AWS Cloud

    How you will benefit

    • You will be prepared to sit for the AWS Certified Cloud Practitioner exam
    • Complete the course in 3 months or less
    • Improve your job opportunities and earning potential by increasing your AWS Cloud skills and knowledge

    Raymond Lacoste

    Raymond Lacoste is a highly recognized instructor and IT professional who holds the Cisco Sirius Instructor Award. He has authored Cisco Press publications on the Cisco ENARSI and Cisco TSHOOT exams.

    Raymond's areas of expertise include Cisco Enterprise networking, Cisco Routing and Switching, Cisco Datacenter Networking, ITIL, and Amazon AWS. He also holds certifications in Cisco CCSI, Cisco CCNP Routing and Switching, Cisco CCNP Enterprise, ITIL Foundations, ITIL Practitioner, ITIL Intermediate, Amazon AWS System Operations, Amazon AWS Architect, Amazon AWS Developer, and CISSP.

    In addition to his certifications and experience, Raymond's engaging instruction style makes even the most obscenely complicated or obtuse concepts relatable and understandable. Outside of class, he enjoys dominating both on the golf course and the basketball court.


    This course is the first step in training for the industry-leading Amazon AWS product. It serves as a thorough introduction to the services and solutions possible with AWS. It is also the first certification in paths available for IT professionals looking to codify their knowledge and skills in AWS.

    Anyone looking for exposure to AWS or the AWS Certified Cloud Practitioner should take this course. This course can be used to prepare for the AWS Certified Cloud Practitioner exam. This course offers enrollment with a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.

 

  • Certified AWS Cloud Practitioner Developer Associate (Vouchers Included)
  • Fee: $3,995.00
    Item Number: SP2CCTP48141
    Dates: 1/1/2025 - 6/30/2025
    Times: 12:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    This course is intended for IT professionals who would like to better understand AWS Cloud concepts, core AWS services, and those looking to gain more knowledge into AWS's developing capabilities.



    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC, Mac, or Chromebook.

    Software Requirements:

    • PC: Windows 8 or later.
    • Mac: macOS 10.6 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
    • Virtual Labs included with the course
    • Microsoft Word Online
    • Adobe Acrobat Reader
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment and available online.

    • Study guide
    • Virtual labs
    • Practice exams

    This comprehensive course is the first step in training for the industry-leading Amazon AWS product. It serves as a thorough introduction to the services and solutions possible with AWS. It is also the first certification in paths available for IT professionals looking to codify their knowledge and skills in AWS.

    You will learn how to use the AWS SDK to develop secure and scalable cloud applications. You will also explore how to interact with AWS using code and discuss key concepts, best practices, and troubleshooting tips.

    This course can be used to prepare for the AWS Certified Cloud Practitioner - Foundational and AWS Certified Developer – Associate exams. This course offers enrollment with vouchers. The voucher is prepaid access to sit for the certifying exam upon eligibility.


    1. Course Overview and AWS Introduction
      1. Introduction to AWS Certified Cloud Practitioner Course and Exam Objectives
      2. Introducing AWS and the Cloud
      3. AWS Well-Architected Framework
      4. The AWS Global Architecture (Regions, Availability Zones, and Edge Locations)
      5. AWS Pricing, Billing, Support Plans, and Dashboards
      6. Accessing AWS Resources
    2. AWS Compute
      1. Amazon EC2
      2. EC2 Scaling and Load Balancing
      3. Amazon ECS, EKS, and Fargate
      4. AWS Lambda
      5. Elastic BeanStalk
    3. AWS Databases
      1. Database Overview and RDS
      2. Amazon Elasticache
      3. DynamoDB
      4. DocumentDB
      5. Amazon Redshift
      6. Amazon Neptune
    4. AWS Storage
      1. Instance and EBS Storage
      2. EFS, FSx for Windows and FSx for Lustre
      3. Simple Storage Service (S3)
      4. AWS Storage Gateway
    5. AWS Networking
      1. VPC Overview and Subnets
      2. VPC Internet Connectivity, Routing, and NAT
      3. VPC Security Groups and ACLs
      4. VPNs and Direct Connect
      5. CloudFront, Global Accelerator and Route53
      6. API Gateway
    6. AWS Messaging, Migration, and Translation
      1. SQS
      2. SNS and SES
      3. Snowcone, Snowball, Snowmobile
      4. AWS DataSync, AWS Transfer, AWS Database Migration Service
      5. AWS Translate and Transcribe
    7. Security
      1. Security Overview, IAM Users and Groups
      2. Permissions and Policies
      3. IAM Roles, Identity Federation, and Cognito
      4. KMS, Secrets Manager, AWS Organizations and Compliance
      5. AWS WAF, Shield, Inspector, Macie, and GuardDuty
    8. Monitoring and Maintenance
      1. CloudWatch, CloudWatch Logs, and CloudWatch Events
      2. CloudTrail and Trusted Advisor
    9. Course Overview and the AWS Global Infrastructure
      1. Introduction to AWS Developer Associate Course and Exam Objectives
      2. Regions, Availability Zones, and Edge Locations
    10. AWS Security
      1. IAM Users, Groups, Permissions
      2. Access Keys and IAM Roles
      3. Identity Federation and Cognito
      4. KMS, HSM, and Secrets Manager
    11. Networking and Compute
      1. VPC Overview and VPC Subnets
      2. VPC Internet Connectivity, Routing, and NAT
      3. VPC Security Groups and ACLs
      4. CloudFront and Global Accelerator
      5. EC2 Overview and Launching a Server
      6. EC2 Storage
      7. EC2 Auto Scaling
      8. EC2 Elastic Loadbalancing
      9. Elastic Container Service Overview
    12. Databases
      1. Database Overview and RDS
      2. RDS Multi-AZ and Read Replicas
      3. Amazon Aurora
      4. Elasticache
      5. DynamoDB Overview, Table Creation, Modes, and Encryption
      6. DynamoDB Access Controls, Scans, Queries, Indexes
      7. DynamoDB DAX, Global Tables, Streams, and Additional Considerations
      8. DocumentDB
    13. Simple Storage Service (S3)
      1. S3 Overview, Bucket Creation, Object Upload, Storage Classes, and Lifecycle Policies
      2. S3 Object Paths, Data Consistency, and Limits
      3. S3 Encryption, Permissions, and Pre-signed URLs
      4. S3 Versioning, MFA Delete, and Object Lock
      5. S3 CORs, Server Access Logging, Event Notifications, Replication
      6. S3 Static Website Hosting
    14. Lambda, API Gateway, Step Functions
      1. Lambda Overview and Examples
      2. Lambda Features, Limits, and Permissions
      3. Step Functions
      4. API Gateway
    15. Messaging
      1. SQS
      2. SNS
      3. SES
    16. Elastic Beanstalk and Kinesis
      1. Elastic Beanstalk Overview
      2. Elastic Beanstalk Versions and Deployment Options
      3. Kinesis
    17. Developer Tools
      1. Continuous Integration and Continuous Deployment Overview
      2. Code Commit, Artifact, Build, Deploy, and Pipeline
      3. CloudFormation and Sam
      4. SDKs, CLIs, and Simple Workflow Service
    18. Monitoring
      1. CloudWatch, CloudWatch Logs, and CloudWatch Events
      2. CloudTrail and X-Ray

    What you will learn

    • Define what the AWS Cloud is and the basic global infrastructure and basic AWS Cloud architectural principles
    • Describe the AWS Cloud value proposition
    • Describe key services on the AWS platform and their common use cases Describe basic security and compliance aspects of the AWS platform and the shared security model
    • Define the billing, account management, and pricing models
    • Identify sources of documentation or technical assistance (for example, whitepapers or support tickets)
    • Describe basic/core characteristics of deploying and operating in the AWS Cloud
    • Set up the AWS SDK and developer credentials for Java, C#/.NET, Python, and JavaScript
    • Interact with AWS services and develop solutions by using the AWS SDK
    • Use AWS Identity and Access Management (IAM) for service authentication
    • Use Amazon Simple Storage Service (Amazon S3) and Amazon DynamoDB as datastores
    • Integrate applications and data by using AWS Lambda, Amazon API Gateway, Amazon Simple Queue Service (Amazon SQS), Amazon Simple Notification Service (Amazon SNS), and AWS Step Functions
    • Use Web Identity Framework and Amazon Cognito for user authentication
    • Use Amazon ElastiCache to improve application scalability
    • Use containers in the development process
    • Leverage the CI/CD pipeline to deploy applications on AWS

    How you will benefit

    • You will be prepared to sit for the AWS Certified Cloud Practitioner exam
    • You will be prepared to sit for the AWS Certified AWS Developer Associate: Associate Exam
    • Gain valuable career skills that you can apply immediately
    • Increase your earning potential
    • Complete your program in 6 months or less
    • Certificate of completion from the school or organization that you registered through (upon successfully passing the final exam)

    Raymond Lacoste

    Raymond Lacoste is a highly recognized instructor and IT professional who holds the Cisco Sirius Instructor Award. He has authored Cisco Press publications on the Cisco ENARSI and Cisco TSHOOT exams.

    Raymond's areas of expertise include Cisco Enterprise networking, Cisco Routing, and Switching, Cisco Datacenter Networking, ITIL, and Amazon AWS. He also holds certifications in Cisco CCSI, Cisco CCNP Routing and Switching, Cisco CCNP Enterprise, ITIL Foundations, ITIL Practitioner, ITIL Intermediate, Amazon AWS System Operations, Amazon AWS Architect, Amazon AWS Developer, and CISSP.

    In addition to his certifications and experience, Raymond's engaging instruction style makes even the most obscenely complicated or obtuse concepts relatable and understandable. Outside of class, he enjoys dominating both on the golf course and the basketball court.


    This comprehensive course is the first step in training for the industry-leading Amazon AWS product. It serves as a thorough introduction to the services and solutions possible with AWS. It is also the first certification in paths available for IT professionals looking to codify their knowledge and skills in AWS.

    You will learn how to use the AWS SDK to develop secure and scalable cloud applications. You will also explore how to interact with AWS using code and discuss key concepts, best practices, and troubleshooting tips.

    This course can be used to prepare for the AWS Certified Cloud Practitioner - Foundational and AWS Certified Developer – Associate exams. This course offers enrollment with vouchers. The voucher is prepaid access to sit for the certifying exam upon eligibility.

 

  • Certified AWS Cloud Practitioner Solutions Architect (Vouchers Included)
  • Fee: $3,995.00
    Item Number: SP2CCTP48151
    Dates: 1/1/2025 - 6/30/2025
    Times: 12:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    This course is intended for IT professionals who would like to better understand AWS Cloud concepts, core AWS services, Solutions Architects and Solution Design Engineers.



    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC, Mac, or Chromebook.

    Software Requirements:

    • PC: Windows 8 or later.
    • Mac: macOS 10.6 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
    • Virtual Labs included with the course
    • Microsoft Word Online
    • Adobe Acrobat Reader
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment and available online.

    • Study guide
    • Virtual labs
    • Practice exams

    This course is the first step in training for the industry-leading Amazon AWS product. It serves as a thorough introduction to the services and solutions possible with AWS. It is also the first certification in paths available for IT professionals looking to codify their knowledge and skills in AWS.

    You will be taught the fundamental skills to architect your IT solutions on AWS. AWS Architect Associate is a course for system engineers and system developers. It will cover optimizing the AWS Cloud by understanding AWS services and how they fit into cloud-based solutions.

    This course can be used to prepare for the AWS Certified Cloud Practitioner - Foundational and the AWS Certified Solutions Architect – Associate exams. This course offers enrollment with vouchers. The voucher is prepaid access to sit for the certifying exam upon eligibility.


    1. Course Overview and AWS Introduction
      1. Introduction to AWS Certified Cloud Practitioner Course and Exam Objectives
      2. Introducing AWS and the Cloud
      3. AWS Well-Architected Framework
      4. The AWS Global Architecture (Regions, Availability Zones, and Edge Locations)
      5. AWS Pricing, Billing, Support Plans and Dashboards
      6. Accessing AWS Resources
    2. AWS Compute
      1. Amazon EC2
      2. EC2 Scaling and Load Balancing
      3. Amazon ECS, EKS, and Fargate
      4. AWS Lambda
      5. Elastic BeanStalk
    3. AWS Databases
      1. Database Overview and RDS
      2. Amazon Elasticache
      3. DynamoDB
      4. DocumentDB
      5. Amazon Redshift
      6. Amazon Neptune
    4. AWS Storage
      1. Instance and EBS Storage
      2. EFS, FSx for Windows and FSx for Lustre
      3. Simple Storage Service (S3)
      4. AWS Storage Gateway
    5. AWS Networking
      1. VPC Overview and Subnets
      2. VPC Internet Connectivity, Routing, and NAT
      3. VPC Security Groups and ACLs
      4. VPNs and Direct Connect
      5. CloudFront, Global Accelerator and Route53
      6. API Gateway
    6. AWS Messaging, Migration, and Translation
      1. SQS
      2. SNS and SES
      3. Snowcone, Snowball, Snowmobile
      4. AWS DataSync, AWS Transfer, AWS Database Migration Service
      5. AWS Translate and Transcribe
    7. Security
      1. Security Overview, IAM Users and Groups
      2. Permissions and Policies
      3. IAM Roles, Identity Federation and Cognito
      4. KMS, Secrets Manager, AWS Organizations and Compliance
      5. AWS WAF, Shield, Inspector, Macie, and GuardDuty
    8. Monitoring and Maintenance
      1. CloudWatch, CloudWatch Logs, and CloudWatch Events
      2. CloudTrail and Trusted Advisor
    9. Course Overview and the AWS Global Infrastructure
      1. Introduction to AWS Architect Associate Course and Exam Objectives
      2. Regions, Availability Zones, and Edge Locations
    10. Compute
      1. EC2: Overview, Architecture, and Pricing
      2. EC2: Launching and Accessing a Linux and Windows Server
      3. EC2: AMIs and Instance Types
      4. EC2: Instance Store, EBS, EFS, FSx
      5. EC2: IP addressing, Network Interfaces, Security Groups and Placement Groups
      6. EC2: Auto Scaling
      7. EC2: Load Balancers
      8. ECS: Overview
      9. Serverless: Lambda
      10. Serverless: API Gateway
    11. Databases
      1. Databases: Overview
      2. RDS: Overview, Instances, Storage, Encryption and Backups
      3. RDS: Multi-AZ, and Read Replicas
      4. RDS: Amazon Aurora
      5. Elasticache: Overview
      6. DynamoDB: Overview
      7. Redshift: Overview
    12. Networking
      1. VPC: Overview, and VPC Subnets
      2. VPC: Internet Connectivity, Routing, and NAT
      3. VPC: Security Groups and ACLs
      4. VPC: VPNs, Direct Connect, Peering, Transit Gateways, and Endpoints
      5. CloudFront and Global Accelerator
      6. Route53
    13. Storage and Migration
      1. Storage: Overview and Review
      2. Storage: S3 Introduction, Storage Classes, Lifecyle Policies, and Static Websites
      3. Storage: S3 Security, Integrity, and Replication
      4. Storage: Storage Gateway and AWS Backup
      5. Migration: Snowcone, Snowball and Snowmobile
      6. Migration: AWS DataSync, AWS Transfer, AWS Database Migration Service
    14. Application Integration and Customer Engagement
      1. SQS, SNS, SES, Amazon MQ
    15. Security
      1. IAM: Users, Groups, Policies
      2. IAM: Temporary Credentials, Roles, Password Policies
      3. KMS and HSM
      4. Amazon Inspector, Macie, GuardDuty
      5. AWS Certificate Manager. Secrets Manager, WAF, Shield
    16. Monitoring and Management
      1. Amazon CloudWatch
      2. AWS CloudTrail, AWS Config
      3. AWS Organizations and AWS Resource Groups
      4. AWS Billing and Cost Management

    What you will learn

    • Define what the AWS Cloud is and the basic global infrastructure
    • Describe basic AWS Cloud architectural principles
    • Describe the AWS Cloud value proposition
    • Describe key services on the AWS platform and their common use cases (for example, compute and analytics)
    • Describe basic security and compliance aspects of the AWS platform and the shared security model
    • Define the billing, account management, and pricing models
    • Identify sources of documentation or technical assistance (for example, whitepapers or support tickets)
    • Describe basic/core characteristics of deploying and operating in the AWS CloudMake architectural decisions based on AWS architectural principles and best practices
    • Leverage AWS services to make your infrastructure scalable, reliable, and highly available
    • Leverage AWS Managed Services to enable greater flexibility and resiliency in an infrastructure
    • Make an AWS-based infrastructure more efficient to increase performance and reduce costs
    • Use the Well-Architected Framework to improve architectures with AWS solutions

    How you will benefit

    • You will be prepared to sit for the AWS Certified Cloud Practitioner exam
    • You will be prepared to sit for the AWS Solutions Architect: Associate Exam
    • Gain valuable career skills that you can apply immediately
    • Increase your earning potential
    • Complete your program in 6 months or less

    Raymond Lacoste

    Raymond Lacoste is a highly recognized instructor and IT professional who holds the Cisco Sirius Instructor Award. He has authored Cisco Press publications on the Cisco ENARSI and Cisco TSHOOT exams.

    Raymond's areas of expertise include Cisco Enterprise networking, Cisco Routing, and Switching, Cisco Datacenter Networking, ITIL, and Amazon AWS. He also holds certifications in Cisco CCSI, Cisco CCNP Routing and Switching, Cisco CCNP Enterprise, ITIL Foundations, ITIL Practitioner, ITIL Intermediate, Amazon AWS System Operations, Amazon AWS Architect, Amazon AWS Developer, and CISSP.

    In addition to his certifications and experience, Raymond's engaging instruction style makes even the most obscenely complicated or obtuse concepts relatable and understandable. Outside of class, he enjoys dominating both on the golf course and the basketball court.


    This course is the first step in training for the industry-leading Amazon AWS product. It serves as a thorough introduction to the services and solutions possible with AWS. It is also the first certification in paths available for IT professionals looking to codify their knowledge and skills in AWS.

    You will be taught the fundamental skills to architect your IT solutions on AWS. AWS Architect Associate is a course for system engineers and system developers. It will cover optimizing the AWS Cloud by understanding AWS services and how they fit into cloud-based solutions.

    This course can be used to prepare for the AWS Certified Cloud Practitioner - Foundational and the AWS Certified Solutions Architect – Associate exams. This course offers enrollment with vouchers. The voucher is prepaid access to sit for the certifying exam upon eligibility.

 

  • Certified AWS Cloud Practitioner SysOps Administrator (Vouchers Included)
  • Fee: $3,995.00
    Item Number: SP2CCTP48131
    Dates: 1/1/2025 - 6/30/2025
    Times: 12:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    This course is intended for system administrators and software developers and other IT professionals who would like to better understand AWS Cloud concepts and core AWS services.



    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC, Mac, or Chromebook.

    Software Requirements:

    • PC: Windows 8 or later.
    • Mac: macOS 10.6 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
    • Virtual Labs included with the course
    • Microsoft Word Online
    • Adobe Acrobat Reader
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment and available online.

    • Study guide
    • Virtual labs
    • Practice exams

    This course is the first step in training for the industry-leading Amazon AWS product. It serves as a thorough introduction to the services and solutions possible with AWS. It is also the first certification in paths available for IT professionals looking to codify their knowledge and skills in AWS.

    Students will then be taught how to create automatable and repeatable deployments of networks and systems on the AWS platform. AWS System Operations is a course for system administrators and developer operations personnel and will cover the specific AWS features and tools related to configuration and deployment, as well as common techniques used throughout the industry for configuring and deploying systems.

    This course can be used to prepare for the AWS Certified Cloud Practitioner – Foundational and AWS Certified SysOps Administrator – Associate exams. This course offers enrollment with vouchers. The voucher is prepaid access to sit for the certifying exam upon eligibility.


    1. Course Overview and AWS Introduction
      1. Introduction to AWS Certified Cloud Practitioner Course and Exam Objectives
      2. Introducing AWS and the Cloud
      3. AWS Well-Architected Framework
      4. The AWS Global Architecture (Regions, Availability Zones, and Edge Locations)
      5. AWS Pricing, Billing, Support Plans, and Dashboards
      6. Accessing AWS Resources
    2. AWS Compute
      1. Amazon EC2
      2. EC2 Scaling and Load Balancing
      3. Amazon ECS, EKS, and Fargate
      4. AWS Lambda
      5. Elastic BeanStalk
    3. AWS Databases
      1. Database Overview and RDS
      2. Amazon Elasticache
      3. DynamoDB
      4. DocumentDB
      5. Amazon Redshift
      6. Amazon Neptune
    4. AWS Storage
      1. Instance and EBS Storage
      2. EFS, FSx for Windows and FSx for Lustre
      3. Simple Storage Service (S3)
      4. AWS Storage Gateway
    5. AWS Networking
      1. VPC Overview and Subnets
      2. VPC Internet Connectivity, Routing, and NAT
      3. VPC Security Groups and ACLs
      4. VPNs and Direct Connect
      5. CloudFront, Global Accelerator and Route53
      6. API Gateway
    6. AWS Messaging, Migration, and Translation
      1. SQS
      2. SNS and SES
      3. Snowcone, Snowball, Snowmobile
      4. AWS DataSync, AWS Transfer, AWS Database Migration Service
      5. AWS Translate and Transcribe
    7. Security
      1. Security Overview, IAM Users and Groups
      2. Permissions and Policies
      3. IAM Roles, Identity Federation, and Cognito
      4. KMS, Secrets Manager, AWS Organizations and Compliance
      5. AWS WAF, Shield, Inspector, Macie, and GuardDuty
    8. Monitoring and Maintenance
      1. CloudWatch, CloudWatch Logs, and CloudWatch Events
      2. CloudTrail and Trusted Advisor
    9. Course Overview and AWS Introduction
      1. Introduction to AWS Certified SysOps Administrator Associate Course and Exam Objectives
      2. Introducing AWS and the Cloud
      3. The AWS Global Architecture (Regions, Availability Zones, and Edge Locations)
      4. AWS Pricing, Billing, Support Plans, and Dashboards
      5. Accessing AWS Resources
    10. AWS Networking
      1. VPC Overview and VPC Subnets
      2. VPC Internet Connectivity, Routing, and NAT
      3. VPC Security Groups, ACLs, and Flow Logs
      4. VPC VPNs, Direct Connect, Peering, Transit Gateways, and Endpoints
      5. CloudFront, Global Accelerator and Route53
    11. AWS Compute
      1. EC2 Overview, Architecture, and Pricing
      2. EC2 Launching and Accessing a Linux and Windows Server
      3. EC2 AMIs, Instance Types, Features
      4. EC2 Instance Store, EBS, EFS, FSx, and S3 Storage
      5. EC2 IP addressing, Network Interfaces, Security Groups, and Placement Groups
      6. EC2 Auto Scaling
      7. EC2 Load Balancers
      8. ECS Overview
      9. Lambda Overview and Examples
      10. API Gateway
    12. AWS Databases
      1. Database Overview
      2. RDS Overview, Instances, Storage, Encryption, and Backups
      3. RDS Multi-AZ, and Read Replicas
      4. RDS Amazon Aurora
      5. Elasticache Overview
      6. DynamoDB Overview
      7. Redshift Overview
    13. AWS Storage
      1. Storage Overview and Review
      2. S3 Introduction, Storage Classes, and Lifecycle Policies
      3. S3 Security and Integrity
      4. S3 Replication, Event Notifications, Inventory, and Limits
      5. S3 Static Website Hosting
      6. Storage Gateway and AWS Backup
    14. AWS Migration and Messaging
      1. Snowcone, Snowball, Snowmobile
      2. AWS DataSync, AWS Transfer, AWS Database Migration Service
      3. SQS, SNS, and SES
    15. AWS Security
      1. Security Overview, IAM Users and Groups
      2. Permissions and Policies
      3. IAM Roles, Identity Federation, and Cognito
      4. KMS, Secrets Manager, Certificates Manager, and Compliance
      5. AWS WAF, Shield, Inspector, Macie, and GuardDuty
    16. Monitoring, Maintenance, and Management
      1. CloudWatch, CloudWatch Logs, and CloudWatch Events
      2. AWS CloudTrail, AWS Config, and Trusted Advisor
      3. CloudFormation and Service Catalog
      4. AWS Organizations and Control Towe
      5. AWS Systems Manager, Resource Groups, and Service/Personal Health Dashboards
      6. AWS Pricing, Billing, and Cost Management

    What you will learn

    • Define what the AWS Cloud is and the basic global infrastructure
    • Describe basic AWS Cloud architectural principles, key services, and common use cases and the AWS Cloud value proposition
    • Describe basic security and compliance aspects of the AWS platform and the shared security model
    • Define the billing, account management, and pricing models
    • Identify sources of documentation or technical assistance
    • Describe basic/core characteristics of deploying and operating in the AWS Cloud
    • Use standard AWS infrastructure features such as Amazon Virtual Private Cloud (VPC), Amazon Elastic Compute Cloud (EC2), Elastic Load Balancing, and Auto Scaling from the command line
    • Use AWS CloudFormation and other automation technologies to produce stacks of AWS resources that can be deployed in an automated, repeatable fashion
    • Build functioning virtual private networks with Amazon VPC from the ground up using the AWS Management Console
    • Deploy Amazon EC2 instances using command line calls and troubleshoot the most common problems with instances
    • Monitor the health of Amazon EC2 instances and other AWS services
    • Manage user identity, AWS permissions, and security in the cloud
    • Manage resource consumption in an AWS account using tools such as Amazon CloudWatch, tagging, and Trusted Advisor
    • Select and implement the best strategy for creating reusable Amazon EC2 instances
    • Configure a set of Amazon EC2 instances that launch behind a load balancer, with the system scaling up and down in response to demand
    • Edit and troubleshoot a basic AWS CloudFormation stack definition

    How you will benefit

    • You will be prepared to sit for the AWS Certified Cloud Practitioner exam
    • You will be prepared to sit for the AWS SysOps Administrator: Associate Exam
    • Gain valuable career skills that you can apply immediately
    • Increase your earning potential
    • Complete your program in 6 months or less
    • Certificate of completion from the school or organization that you registered through (upon successfully passing the final exam)

    Raymond Lacoste

    Raymond Lacoste is a highly recognized instructor and IT professional who holds the Cisco Sirius Instructor Award. He has authored Cisco Press publications on the Cisco ENARSI and Cisco TSHOOT exams.

    Raymond's areas of expertise include Cisco Enterprise networking, Cisco Routing, and Switching, Cisco Datacenter Networking, ITIL, and Amazon AWS. He also holds certifications in Cisco CCSI, Cisco CCNP Routing and Switching, Cisco CCNP Enterprise, ITIL Foundations, ITIL Practitioner, ITIL Intermediate, Amazon AWS System Operations, Amazon AWS Architect, Amazon AWS Developer, and CISSP.

    In addition to his certifications and experience, Raymond's engaging instruction style makes even the most obscenely complicated or obtuse concepts relatable and understandable. Outside of class, he enjoys dominating both on the golf course and the basketball court.


    This course is the first step in training for the industry-leading Amazon AWS product. It serves as a thorough introduction to the services and solutions possible with AWS. It is also the first certification in paths available for IT professionals looking to codify their knowledge and skills in AWS.

    Students will then be taught how to create automatable and repeatable deployments of networks and systems on the AWS platform. AWS System Operations is a course for system administrators and developer operations personnel and will cover the specific AWS features and tools related to configuration and deployment, as well as common techniques used throughout the industry for configuring and deploying systems.

    This course can be used to prepare for the AWS Certified Cloud Practitioner – Foundational and AWS Certified SysOps Administrator – Associate exams. This course offers enrollment with vouchers. The voucher is prepaid access to sit for the certifying exam upon eligibility.

 

  • Certified AWS Developer (Voucher Included)
  • Fee: $1,995.00
    Item Number: SP2CCTP48111
    Dates: 1/1/2025 - 6/30/2025
    Times: 12:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    The AWS Developer course is designed for intermediate-level software developers and those looking to learn more about AWS's developing capabilities.



    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC, Mac, or Chromebook.

    Software Requirements:

    • PC: Windows 8 or later.
    • Mac: macOS 10.6 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
    • Virtual Labs included with the course
    • Microsoft Word Online
    • Adobe Acrobat Reader
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment and available online.

    • Study guide
    • Virtual labs
    • Practice exams

    In this online training course, you will learn how to use the AWS SDK to develop secure and scalable cloud applications. You will also explore how to interact with AWS using code and discuss key concepts, best practices, and troubleshooting tips

    This course can be used to prepare for the AWS Certified Developer – Associate exam. This course offers enrollment with a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.


    1. Introduction to Developing in Azure
      1. Getting Started with AWS
      2. Exploring IAM
    2. EC2
      1. EC2 Basics
      2. EC2 Instance Storage Section
    3. Load Balancing, Auto Scaling Groups, and EBSVolumes
      1. High Availability and Scalability
      2. Load Balancing
      3. Auto Scaling Groups
    4. RDS, Aurora, and Elasticache
      1. Relational Database Service
      2. Aurora
      3. Elasticache
    5. DNS and VPCs
      1. Route 53
      2. VPC primer
    6. Tier 3 Architecture
      1. Tier 3 Architecture
    7. Amazon Simple Storage Service
      1. Amazon S3
      2. Cross Origin Resource Sharing
    8. AWS Development
      1. Developing on AWS
      2. Development with Simple Storage Service
    9. CloudFront, Beanstalk, and Docker development
      1. CloudFront
      2. Elastic Beanstalk
      3. AWS ECS Essentials
    10. AWS CICD
      1. Introduction to AWS CICD
      2. AWS CodeBuild
      3. AWS CodeDeploy
      4. Other AWS CICD Services
    11. Managing Your Infrastructure as Code
      1. CloudFormation
      2. CloudFormation Functions
    12. AWS Monitoring, Troubleshooting & Audit
      1. CloudWatch
      2. AWS X-ray
      3. AWS CloudTrail
    13. AWS Integration and Messaging
      1. Amazon Simple Queue Service
      2. Amazon Simple Notification Service
      3. Kinesis
    14. AWS Lambda and DynamoDB
      1. Introduction to AWS Lambda
      2. Even More Lambda
      3. DynamoDB Basics
      4. Working with DynamoDB
    15. API Gateway
      1. API Gateway Basics
      2. API Tuning
    16. Working with the Serverless Application Model (SAM)
      1. Serverless Application Model
      2. AWS Cloud Development Kit
      3. Amazon Cognito
      4. Other Serverless Features
    17. Additional Security
      1. Advanced Identity Management
      2. AWS Security and Encryption
    18. Additional AWS Services
      1. Other AWS Services

    What you will learn

    • Set up the AWS SDK and developer credentials for Java, C#/.NET, Python, and JavaScript
    • Interact with AWS services and develop solutions by using the AWS SDK
    • Use AWS Identity and Access Management (IAM) for service authentication
    • Use Amazon Simple Storage Service (Amazon S3) and Amazon DynamoDB as datastores
    • Integrate applications and data by using AWS Lambda, Amazon API Gateway, Amazon Simple Queue Service (Amazon SQS), Amazon Simple Notification Service (Amazon SNS), and AWS Step Functions
    • Use Web Identity Framework and Amazon Cognito for user authentication
    • Use Amazon ElastiCache to improve application scalability
    • Use containers in the development process
    • Leverage the CI/CD pipeline to deploy applications on AWS

    How you will benefit

    • You will be prepared to sit for the AWS Certified AWS Developer Associate: Associate Exam
    • Gain valuable career skills that you can apply immediately
    • Increase your earning potential
    • Complete your program in 3 months or less
    • Certificate of completion from the school or organization that you registered through (upon successfully passing the final exam)

    Raymond Lacoste

    Raymond Lacoste is a highly recognized instructor and IT professional who holds the Cisco Sirius Instructor Award. He has authored Cisco Press publications on the Cisco ENARSI and Cisco TSHOOT exams.

    Raymond's areas of expertise include Cisco Enterprise networking, Cisco Routing, and Switching, Cisco Datacenter Networking, ITIL, and Amazon AWS. He also holds certifications in Cisco CCSI, Cisco CCNP Routing and Switching, Cisco CCNP Enterprise, ITIL Foundations, ITIL Practitioner, ITIL Intermediate, Amazon AWS System Operations, Amazon AWS Architect, Amazon AWS Developer, and CISSP.

    In addition to his certifications and experience, Raymond's engaging instruction style makes even the most obscenely complicated or obtuse concepts relatable and understandable. Outside of class, he enjoys dominating both on the golf course and the basketball court.


    In this online training course, you will learn how to use the AWS SDK to develop secure and scalable cloud applications. You will also explore how to interact with AWS using code and discuss key concepts, best practices, and troubleshooting tips

    This course can be used to prepare for the AWS Certified Developer – Associate exam. This course offers enrollment with a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.

 

  • Certified AWS Solutions Architect (Voucher Included)
  • Fee: $1,995.00
    Item Number: SP2CCTP48121
    Dates: 1/1/2025 - 6/30/2025
    Times: 12:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    The AWS Architect Associate course is designed for solutions architects and solution design engineers who want to learn fundamental skills to architect their IT solutions on AWS and more.



    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC, Mac, or Chromebook.

    Software Requirements:

    • PC: Windows 8 or later.
    • Mac: macOS 10.6 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
    • Virtual Labs included with the course
    • Microsoft Word Online
    • Adobe Acrobat Reader
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment and available online.

    • Study guide
    • Virtual labs
    • Practice exams

    In this online training course, you will be taught the fundamental skills to architect your IT solutions on AWS. AWS Architect Associate is a course for system engineers and system developers that will cover how to optimize the AWS Cloud by understanding AWS services and how they fit into cloud-based solutions.

    This course can be used to prepare for the AWS Certified Solutions Architect – Associate exam. This course offers enrollment with a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.


    1. Course Overview
      1. Introduction to AWS Architect Associate Course and Exam Objectives
    2. The Well Architected Framework and the AWS Global Architecture
      1. AWS Well Architected Framework
      2. AWS Global Architecture
    3. Building a Server-based Architecture in AWS
      1. Virtual Private Cloud (VPC): Overview and Subnets
      2. Virtual Private Cloud (VPC): Internet Connectivity, Routing, NAT, Network Firewall
      3. Virtual Private Cloud (VPC): Security Groups and ACLs
      4. Virtual Private Cloud (VPC): VPNs, Direct Connect, Peering, Transit Gateways, and Endpoints
      5. Elastic Compute Cloud (EC2): Overview, Architecture and Pricing
      6. Elastic Compute Cloud (EC2): Launching and Accessing a Linux and Windows Server
      7. Elastic Compute Cloud (EC2): AMIs and Instance Types
      8. Elastic Compute Cloud (EC2): Storage: IS, EBS, EFS, FSx, S3
      9. Elastic Compute Cloud (EC2): IP addressing, Network Interfaces, Security Groups and Placement Groups
      10. Elastic Compute Cloud (EC2): Auto Scaling
      11. Application AutoScaling
      12. Elastic Compute Cloud (EC2): Elastic Load Balancers
      13. Elastic Container Service and Elastic Kubernetes Service
      14. Relational Database Service (RDS): Overview, Pricing, Instances, Storage, Encryption, and Backups
      15. Relational Database Service (RDS): Multi-AZ, Read Replicas, RDS Proxy
      16. Relational Database Service (RDS): Amazon Aurora
      17. Amazon Elasticache
    4. Architecting with Amazon S3 Storage
      1. Simple Storage Service (S3): Storage Review, S3 Overview, and Architecture
      2. Simple Storage Service (S3): Storage Classes, Lifecyle Policies and Performance
      3. Simple Storage Service (S3): Permissions, Encryption, Versioning, MFA Delete, and Object Lock
      4. Simple Storage Service (S3): Static Website Hosting
      5. Simple Storage Service (S3): Additional Services and Tools
    5. Improving Access and Reliability to your AWS Services
      1. Amazon CloudFront & AWS Global Accelerator
      2. Amazon Route 53
    6. Building a Server-based Architecture in AWS
      1. Introducing the Serverless Architecture
      2. Lambda and API Gateway
      3. AWS Step Functions
      4. Amazon DynamoDB
      5. DocumentDB, Redshift, Lake Formation, and Neptune
      6. Amazon SQS, Amazon SNS, Amazon SES, Amazon Pinpoint, and Amazon MQ
    7. Migrating, Transferring, and Syncing Data with Amazon S3
      1. AWS Storage Gateway and AWS Backup
      2. AWS Snowcone, Snowball and Snowmobile
      3. AWS DataSync, AWS Transfer, AWS Database Migration Service, and AWS Batch
    8. Authentication and Security in AWS
      1. Identity and Access Management: Users, Groups, and Roles
      2. Identity and Access Management: Permissions and Policies
      3. Identity Providers and Cognito
      4. AWS Certificate Manager, Secrets Manager, WAF, Shield
      5. AWS Key Management Service and AWS CloudHSM
      6. Amazon Inspector, Macie, and Guard Duty
    9. Managing and Monitoring in AWS
      1. AWS Systems Manager
      2. Amazon CloudWatch: Metrics, Logs, Alarms, Dashboards
      3. AWS CloudTrail and AWS Config
      4. Amazon EventBridge
      5. AWS Organizations, Control Tower, and Resource Groups
      6. AWS Billing, Cost Management, and Trusted Advisor
    10. Additional Services You Need to Know
      1. Amazon Translate, Transcribe, Textract, Comprehend, and Rekognition
      2. Amazon Athena, QuickSight, Glue, and AppFlow
      3. Amazon Kinesis and Amazon Elastic Beanstalk
    11. How to Approach Exam Questions and Course Wrap-Up!
      1. Practice Questions
      2. Course Wrap-Up!

     


    What you will learn

    • Make architectural decisions based on AWS architectural principles and best practices
    • Leverage AWS services to make your infrastructure scalable, reliable, and highly available
    • Leverage AWS Managed Services to enable greater flexibility and resiliency in an infrastructure
    • Make an AWS-based infrastructure more efficient to increase performance and reduce costs
    • Use the Well-Architected Framework to improve architectures with AWS solutions

    How you will benefit

    • You will be prepared to sit for the AWS Solutions Architect: Associate Exam
    • Gain valuable career skills that you can apply immediately
    • Increase your earning potential
    • Complete your program in 3 months or less
    • Certificate of completion from the school or organization that you registered through (upon successfully passing the final exam)

    Raymond Lacoste

    Raymond Lacoste is a highly recognized instructor and IT professional who holds the Cisco Sirius Instructor Award. He has authored Cisco Press publications on the Cisco ENARSI and Cisco TSHOOT exams.

    Raymond's areas of expertise include Cisco Enterprise networking, Cisco Routing, and Switching, Cisco Datacenter Networking, ITIL, and Amazon AWS. He also holds certifications in Cisco CCSI, Cisco CCNP Routing and Switching, Cisco CCNP Enterprise, ITIL Foundations, ITIL Practitioner, ITIL Intermediate, Amazon AWS System Operations, Amazon AWS Architect, Amazon AWS Developer, and CISSP.

    In addition to his certifications and experience, Raymond's engaging instruction style makes even the most obscenely complicated or obtuse concepts relatable and understandable. Outside of class, he enjoys dominating both on the golf course and the basketball court.


    In this online training course, you will be taught the fundamental skills to architect your IT solutions on AWS. AWS Architect Associate is a course for system engineers and system developers that will cover how to optimize the AWS Cloud by understanding AWS services and how they fit into cloud-based solutions.

    This course can be used to prepare for the AWS Certified Solutions Architect – Associate exam. This course offers enrollment with a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.

 

  • Certified AWS SysOps Administrator (Voucher Included)
  • Fee: $1,995.00
    Item Number: SP2CCTP48101
    Dates: 1/1/2025 - 6/30/2025
    Times: 12:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    The AWS SysOps Administrator course is intended for system administrators and software developers who wish to learn related best practices and tools on the AWS platform for configuring and deploying systems.



    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC, Mac, or Chromebook.

    Software Requirements:

    • PC: Windows 8 or later.
    • Mac: macOS 10.6 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
    • Virtual Labs included with the course
    • Microsoft Word Online
    • Adobe Acrobat Reader
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment and available online.

    • Study guide
    • Virtual labs
    • Practice exams

    In this online training course, you will be taught how to create automatable and repeatable deployments of networks and systems on the AWS platform. AWS SysOps Administrator is a course for system administrators and developer operations personnel. It will cover the specific AWS features and tools related to configuration and deployment and common techniques used throughout the industry for configuring and deploying systems.

    This course can be used to prepare for the AWS Certified SysOps Administrator – Associate exam. This course offers enrollment with a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.


    1. Course Overview and AWS Introduction
      1. Introduction to AWS Certified SysOps Administrator Associate Course and Exam Objectives
      2. Introducing AWS and the Cloud
      3. The AWS Global Architecture (Regions, Availability Zones, and Edge Locations)
      4. AWS Pricing, Billing, Support Plans and Dashboards
      5. Accessing AWS Resources
    2. AWS Networking
      1. VPC Overview and VPC Subnets
      2. VPC Internet Connectivity, Routing, and NAT
      3. VPC Security Groups, ACLs, and Flow Logs
      4. VPC VPNs, Direct Connect, Peering, Transit Gateways, and Endpoints
      5. CloudFront, Global Accelerator and Route53
    3. AWS Compute
      1. EC2 Overview, Architecture, and Pricing
      2. EC2 Launching and Accessing a Linux and Windows Server
      3. EC2 AMIs, Instance Types, Features
      4. EC2 Instance Store, EBS, EFS, FSx, and S3 Storage
      5. EC2 IP addressing, Network Interfaces, Security Groups and Placement Groups
      6. EC2 Auto Scaling
      7. EC2 Load Balancers
      8. ECS Overview
      9. Lambda Overview and Examples
      10. API Gateway
    4. AWS Databases
      1. Database Overview
      2. RDS Overview, Instances, Storage, Encryption and Backups
      3. RDS Multi-AZ, and Read Replicas
      4. RDS Amazon Aurora
      5. Elasticache Overview
      6. DynamoDB Overview
      7. Redshift Overview
    5. AWS Storage
      1. Storage Overview and Review
      2. S3 Introduction, Storage Classes, and Lifecyle Policies
      3. S3 Security, and Integrity
      4. S3 Replication, Event Notifications, Inventory, and Limits
      5. S3 Static Website Hosting
      6. Storage Gateway and AWS Backup
    6. AWS Migration and Messaging
      1. Snowcone, Snowball, Snowmobile
      2. AWS DataSync, AWS Transfer, AWS Database Migration Service
      3. SQS, SNS, and SES
    7. AWS Security
      1. Security Overview, IAM Users and Groups
      2. Permissions and Policies
      3. IAM Roles, Identity Federation and Cognito
      4. KMS, Secrets Manager, Certificates Manager, and Compliance
      5. AWS WAF, Shield, Inspector, Macie, and GuardDuty
    8. Monitoring, Maintenance, and Management
      1. CloudWatch, CloudWatch Logs, and CloudWatch Events
      2. AWS CloudTrail, AWS Config, and Trusted Advisor
      3. CloudFormation and Service Catalog
      4. AWS Organizations, and Control Towe
      5. AWS Systems Manager, Resource Groups, and Service/Personal Health Dashboards
      6. AWS Pricing, Billing, and Cost Management

    What you will learn

    • Use standard AWS infrastructure features such as Amazon Virtual Private Cloud (VPC), Amazon Elastic Compute Cloud (EC2), Elastic Load Balancing, and Auto Scaling from the command line
    • Use AWS CloudFormation and other automation technologies to produce stacks of AWS resources that can be deployed in an automated, repeatable fashion
    • Build functioning virtual private networks with Amazon VPC from the ground up using the AWS Management Console
    • Deploy Amazon EC2 instances using command line calls and troubleshoot the most common problems with instances
    • Monitor the health of Amazon EC2 instances and other AWS services
    • Manage user identity, AWS permissions, and security in the cloud
    • Manage resource consumption in an AWS account using tools such as Amazon CloudWatch, tagging, and Trusted Advisor
    • Select and implement the best strategy for creating reusable Amazon EC2 instances
    • Configure a set of Amazon EC2 instances that launch behind a load balancer, with the system scaling up and down in response to demand
    • Edit and troubleshoot a basic AWS CloudFormation stack definition

    How you will benefit

    • You will be prepared to sit for the AWS SysOps Administrator: Associate Exam
    • Gain valuable career skills that you can apply immediately
    • Increase your earning potential
    • Complete your program in 3 months or less

    Raymond Lacoste

    Raymond Lacoste is a highly recognized instructor and IT professional who holds the Cisco Sirius Instructor Award. He has authored Cisco Press publications on the Cisco ENARSI and Cisco TSHOOT exams.

    Raymond's areas of expertise include Cisco Enterprise networking, Cisco Routing and Switching, Cisco Datacenter Networking, ITIL, and Amazon AWS. He also holds certifications in Cisco CCSI, Cisco CCNP Routing and Switching, Cisco CCNP Enterprise, ITIL Foundations, ITIL Practitioner, ITIL Intermediate, Amazon AWS System Operations, Amazon AWS Architect, Amazon AWS Developer, and CISSP.

    In addition to his certifications and experience, Raymond's engaging instruction style makes even the most obscenely complicated or obtuse concepts relatable and understandable. Outside of class, he enjoys dominating both on the golf course and the basketball court.


    In this online training course, you will be taught how to create automatable and repeatable deployments of networks and systems on the AWS platform. AWS SysOps Administrator is a course for system administrators and developer operations personnel. It will cover the specific AWS features and tools related to configuration and deployment and common techniques used throughout the industry for configuring and deploying systems.

    This course can be used to prepare for the AWS Certified SysOps Administrator – Associate exam. This course offers enrollment with a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.

 

  • Certified Ethical Hacker (Voucher Included)
  • Fee: $2,895.00
    Item Number: SP2CCTP46701
    Dates: 1/1/2025 - 6/30/2025
    Times: 12:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    This online Certified Ethical Hacker (CEH) course will teach you the valuable details that every information security professional needs to know.



    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC or Mac.

    Software Requirements:

    • PC: Windows 8 or later.
    • Mac: macOS 10.10 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
    • Adobe Acrobat Reader.
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment and will be available online. The materials are non-refundable upon registration.

    • Certified Ethical Hacker, Ethical Hacking and Countermeasures (eBook)

    To be successful in beating a hacker, you need to think like one. This ethical hacking certification course immerses you in the hacker mindset and puts you in control with hands-on activities. As a certified ethical hacker (CEH), you use the same techniques as malicious hackers to assess security and identify weaknesses, but for ethical purposes. You will scan, test, hack, and secure your own systems to help prevent potentially catastrophic damage to your organization.

    By completing this CEH training, you will learn the industry standards of ethical hacking developed by the EC-Council. This process involves five phases, namely Reconnaissance, Gaining Access, Enumeration, Maintaining Access, and Covering Your Tracks. With these skills, you will be able to assess the security posture of an organization and identify and fix weaknesses before malicious hackers can exploit them.

    This unique credential sets you apart from other IT professionals and adds even more value to your organization. According to the EC-Council, one in every two professionals receive promotions after gaining their ethical hacking certification.

    Gain advanced hacking tools and techniques while preparing to sit for the Certified Ethical Hacker Exam 312-50 with this accredited CEH course offered by the EC-Council. The exam voucher is included in the cost of your enrollment.


    1. Introduction to Ethical Hacking
    2. Foot Printing and Reconnaissance
    3. Scanning Networks
    4. Enumeration
    5. Vulnerability Analysis
    6. System Hacking
    7. Malware Threats
    8. Sniffing
    9. Social Engineering
    10. Denial of Service
    11. Session Hijacking
    12. Evading IDS, Firewalls and Honeypots
    13. Hacking Web Servers
    14. Hacking Web Applications
    15. SQL Injection
    16. Hacking Wireless Networks
    17. Hacking Mobile Platforms
    18. IoT and OT Hacking
    19. Cloud Computing
    20. Cryptography

    What you will learn

    • Assess ethical and legal requirements for security assessment and penetration testing and develop a compliance strategy
    • Analyze the different phases of hacking and determine the most effective ethical hacking strategy for assessing the security of information system components
    • Identify vulnerabilities, threats, and attacks to information systems, and recommend countermeasures.
    • Evaluate cryptography algorithms and encryption techniques and develop implementation strategies for securing information
    • Evaluate network security techniques and tools, and implement appropriate information security controls based on evidence, information, and research

    How you will benefit

    • Prepare for Certified Ethical Hacker (CEH) Exam Number 312-50 with example CEH exam questions
    • Obtain the CEH credential to unlock a number of career opportunities in the information security and cybersecurity industry
    • Obtain a credential highly acknowledged and recognized by employers in the public and private sector
    • Complete the most advanced, hands on ethical hacking program in the industry

    Eric Reed

    Eric Reed has over 12 years of experience in IT consulting, specializing in security. Since 2005, he has consulted and delivered custom training to the U.S. military and numerous Fortune 100 and Fortune 500 companies. He has delivered CEH, CHFI, and ECSA/LPT training for the last seven years, with a 95 percent pass rating. Reed was awarded the EC Council Instructor of the Year in 2009 and 2012, as well as the Circle of Excellence in 2006, 2007, and 2010.


    To be successful in beating a hacker, you need to think like one. This ethical hacking certification course immerses you in the hacker mindset and puts you in control with hands-on activities. As a certified ethical hacker (CEH), you use the same techniques as malicious hackers to assess security and identify weaknesses, but for ethical purposes. You will scan, test, hack, and secure your own systems to help prevent potentially catastrophic damage to your organization.

    By completing this CEH training, you will learn the industry standards of ethical hacking developed by the EC-Council. This process involves five phases, namely Reconnaissance, Gaining Access, Enumeration, Maintaining Access, and Covering Your Tracks. With these skills, you will be able to assess the security posture of an organization and identify and fix weaknesses before malicious hackers can exploit them.

    This unique credential sets you apart from other IT professionals and adds even more value to your organization. According to the EC-Council, one in every two professionals receive promotions after gaining their ethical hacking certification.

    Gain advanced hacking tools and techniques while preparing to sit for the Certified Ethical Hacker Exam 312-50 with this accredited CEH course offered by the EC-Council. The exam voucher is included in the cost of your enrollment.

 

  • Certified Network Defender (CND) (Voucher Included)
  • Fee: $2,895.00
    Item Number: SP2CCTP47751
    Dates: 1/1/2025 - 6/30/2025
    Times: 12:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    This course prepares for the EC-Council Certified Network Defender (CND) exam. You will gain key skills that network engineers need to protect, detect and respond to the threats on their networks.



    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC or Mac.

    Software Requirements:

    • PC: Windows 8 or later.
    • Mac: macOS 10.10 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
    • Adobe Acrobat Reader.
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment and will be available online. The materials are non-refundable upon registration.


    This comprehensive online course is specifically designed to prepare network engineers for the Certified Network Defender (CND) certification exam offered by the EC-Council (ECC). The CND certification is globally recognized and validates your ability to protect networks and maintain operations during cyber-attacks effectively.

    Throughout this CND course, you will delve into various modules that cover essential topics such as network security controls, protocols, and devices. You will learn how to strengthen security infrastructures by effectively implementing intrusion detection and prevention systems and troubleshooting network problems. The course also provides in-depth training on implementing secure virtual private networks (VPNs) for organizations and identifying and mitigating threats to wireless networks.

    One of the key highlights of this CND training program is its alignment with global CND responsibilities and Department of Defense (DoD) job roles for system/network administrators. This ensures that the skills and knowledge you acquire are highly relevant and applicable in real-world scenarios. The course follows a vendor-neutral approach, allowing you to understand network security principles and practices comprehensively without being tied to any specific technology or platform.

    Upon completing this course, you will receive a voucher covering the certifying exam's cost. This allows you to schedule and take the exam remotely using a proctor function, providing flexibility and convenience in the certification process.

    By enrolling in this course and earning the CND certification, you will become proficient in network security, gain the necessary skills to protect networks from cyber breaches, and enhance your professional credibility in this high-demand field.


    1. Network Attacks and Defense Strategies
    2. Administrative Network Security
    3. Technical Network Security
    4. Network Perimeter Security
    5. Endpoint Security-Windows Systems
    6. Endpoint Security-Linux Systems
    7. Endpoint Security- Mobile Devices
    8. Endpoint Security-IoT Devices
    9. Administrative Application Security
    10. Data Security
    11. Enterprise Virtual Network Security
    12. Enterprise Cloud Network Security
    13. Enterprise Wireless Network Security
    14. Network Traffic Monitoring and Analysis
    15. Network Logs Monitoring and Analysis
    16. Incident Response and Forensic Investigation
    17. Business Continuity and Disaster Recovery
    18. Risk Anticipation with Risk Management
    19. Threat Assessment with Attack Surface Analysis
    20. Threat Prediction With Cyber Threat Intelligence

    What you will learn

    • Acquire knowledge of basic networking concepts, including network security controls, protocols, and devices, to design a robust networking infrastructure
    • Evaluate potential vulnerabilities and threats to the network infrastructure, assess the potential impact of network security breaches, and analyze available countermeasures
    • Explore various network security mechanisms, analyze available security controls, and develop plans for implementing and configuring these controls
    • Recognize the significance of network security policies and develop comprehensive policies to protect the network infrastructure
    • Gain an understanding of the functioning of different networking devices and devise secure configuration strategies for these devices
    • Troubleshooting key network problems
    • Learn how to implement a secure VPN for organizational use and engage in monitoring and signature analysis to detect attacks and policy violations

    How you will benefit

    • This course satisfies the exam eligibility requirements for the Certified Network Defender (CND)—exam number 312-38 and includes sample CND questions
    • Gain the necessary technical knowledge to design a secure network, understand network operations, and analyze related materials
    • Develop skills in designing effective network security policies and incident response plans, as well as building resiliency and ensuring continuity of operations during attacks
    • Upon successfully passing the certification exam, you will earn the title of Certified Network Defender (CND)

    Eric Reed

    Eric Reed has over 15 years' experience in IT consulting. He has consulted and delivered certification and customized training to the U.S. military, and for many Fortune 100 and Fortune 500 companies. Eric has delivered CEH, CHFI, and ECSA/LPT for the last ten years and was named "EC-Council Instructor of the Year" seven times, as well as being the recipient of the Circle of Excellence Award in 2006, 2007 and 2010. Eric holds many industry certifications, including EC-Council's CND, CNDA, CHFI, ECSA, CEH and LPT.


    This comprehensive online course is specifically designed to prepare network engineers for the Certified Network Defender (CND) certification exam offered by the EC-Council (ECC). The CND certification is globally recognized and validates your ability to protect networks and maintain operations during cyber-attacks effectively.

    Throughout this CND course, you will delve into various modules that cover essential topics such as network security controls, protocols, and devices. You will learn how to strengthen security infrastructures by effectively implementing intrusion detection and prevention systems and troubleshooting network problems. The course also provides in-depth training on implementing secure virtual private networks (VPNs) for organizations and identifying and mitigating threats to wireless networks.

    One of the key highlights of this CND training program is its alignment with global CND responsibilities and Department of Defense (DoD) job roles for system/network administrators. This ensures that the skills and knowledge you acquire are highly relevant and applicable in real-world scenarios. The course follows a vendor-neutral approach, allowing you to understand network security principles and practices comprehensively without being tied to any specific technology or platform.

    Upon completing this course, you will receive a voucher covering the certifying exam's cost. This allows you to schedule and take the exam remotely using a proctor function, providing flexibility and convenience in the certification process.

    By enrolling in this course and earning the CND certification, you will become proficient in network security, gain the necessary skills to protect networks from cyber breaches, and enhance your professional credibility in this high-demand field.

 

  • Certified Penetration Testing Professional (CPENT) (Voucher Included)
  • Fee: $2,995.00
    Item Number: SP2CCTP47921
    Dates: 1/1/2025 - 6/30/2025
    Times: 12:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    Learn how to perform an effective penetration test in an enterprise network environment that must be attacked, exploited, evaded, and defended using the EC-Council's Certified Penetration Tester (CPENT) program.



    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC, Mac, or Chromebook.

    Software Requirements:

    • PC: Windows 7 or later.
    • Mac: macOS 10.12 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
    • Adobe Acrobat Reader
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment and will be available online.


    The EC-Council's Certified Penetration Tester (CPENT) program is an engaging, informative, and expertly designed course that aims to help you master your Penetration Testing (pen-testing) skills. Recognized by the American Council on Education (ACE), this penetrating testing course offers a comprehensive curriculum that encompasses innovative techniques and methodologies for tackling real-world threat scenarios.

    In this penetration testing certification course, you will gain an understanding of a wide range of topics, such as how to write your own exploits, build custom tools, conduct advanced binaries exploitation, double pivot to access hidden networks and customize scripts/exploits to penetrate the most secure segments of a network. Pen testing is a practice that goes beyond ethical hacking by incorporating elements of exploitation, risk measurement, reporting, and executive communication.

    Securing advanced domains such as the Internet of Things (IoT), Operational Technology (OT), and Cloud has become increasingly more difficult for cybersecurity professionals as there is a shortage of expertise in this area, and CPENT ranges are dynamic and constantly evolving to reflect live networks' changing targets and technology. Expert penetration testers must continually develop their skills in advanced tools, techniques, and methodologies to conduct effective penetration tests in enterprise network environments and protect against current and future cybersecurity threats.

    Enrollment in this Pen Testing course includes a voucher that covers the cost of your certification exam upon course completion.

    Note: We continually add new targets and defenses throughout the lifetime of this CPENT penetration testing course to ensure its relevance.


    1. Introduction to Penetration Testing
    2. Penetration Testing Scoping and Engagement
    3. Open-Source Intelligence (OSINT)
    4. Social Engineering Penetration Testing
    5. Network Penetration Testing – External
    6. Network Penetration Testing– Internal
    7. Network Penetration Testing – Perimeter Devices
    8. Web Application Penetration Testing
    9. Wireless Penetration Testing
    10. IoT Penetration Testing
    11. OT/SCADA Penetration Testing
    12. Cloud Penetration Testing
    13. Binary Analysis and Exploitation
    14. Active Directory Penetration Testing
    15. Report Writing and Post Testing Actions

    What you will learn

    • Advanced Windows Attacks
    • Attacking IOT Systems
    • Writing Exploits: Advanced Binary Exploitation
    • Bypassing a Filtered Network
    • Pen testing Operational Technology (OT)
    • Access Hidden Networks with Pivoting
    • Double Pivoting
    • Privilege Escalation
    • Evading Defense Mechanisms
    • Attack Automation with Scripts
    • Weaponize Your Exploits
    • Write Professional Reports

    How you will benefit

    • Mapped with the NICE framework.
    • 100% methodology-based penetration testing program
    • Blends both manual and automated penetration testing approaches
    • Designed with the best service providers' most common penetration testing practices
    • Maps to all major Job Portals. Role Title: Penetration Tester and Security Analyst
    • Provides strong reporting writing guidance
    • Gives a real-world experience through an Advanced Penetration Testing Range
    • Provides candidates with standard Pen test for use in the field

    Kevin Cardwell

    Kevin Cardwell is an experienced instructor, technical editor, and author for computer forensics and hacking courses. He has conducted over 500 security assessments across the globe with expertise in finding weaknesses and determining ways clients can mitigate or limit the impact of these weaknesses.

    Kevin currently works as a freelance consultant and provides consulting services for companies throughout the world, and as an advisor to numerous government entities within the U.S., Middle East, Africa, Asia, and the U.K. He previously spent 22 years in the U.S. Navy and worked as both a software and systems engineer on a variety of Department of Defense projects.

    Kevin is the author of the Center for Advanced Security and Training (CAST) Advanced Network Defense and Advanced Penetration Testing courses and Building Virtual Pentesting Labs for Advanced Penetration Testing, Advanced Penetration Testing for Highly Secured Environments 2nd Edition and Backtrack: Testing Wireless Network Security. He is technical editor of the Learning Tree Course Penetration Testing Techniques and Computer Forensics. He has also presented at the Blackhat USA, Hacker Halted, ISSA, and TakeDownCon conferences, and more.

    Kevin received his Bachelor of Science in computer science from the National University in California and a Master of Science in software engineering from Southern Methodist University (SMU) in Texas. He holds the CEH, ECSA, LPT, and several other certifications.


    The EC-Council's Certified Penetration Tester (CPENT) program is an engaging, informative, and expertly designed course that aims to help you master your Penetration Testing (pen-testing) skills. Recognized by the American Council on Education (ACE), this penetrating testing course offers a comprehensive curriculum that encompasses innovative techniques and methodologies for tackling real-world threat scenarios.

    In this penetration testing certification course, you will gain an understanding of a wide range of topics, such as how to write your own exploits, build custom tools, conduct advanced binaries exploitation, double pivot to access hidden networks and customize scripts/exploits to penetrate the most secure segments of a network. Pen testing is a practice that goes beyond ethical hacking by incorporating elements of exploitation, risk measurement, reporting, and executive communication.

    Securing advanced domains such as the Internet of Things (IoT), Operational Technology (OT), and Cloud has become increasingly more difficult for cybersecurity professionals as there is a shortage of expertise in this area, and CPENT ranges are dynamic and constantly evolving to reflect live networks' changing targets and technology. Expert penetration testers must continually develop their skills in advanced tools, techniques, and methodologies to conduct effective penetration tests in enterprise network environments and protect against current and future cybersecurity threats.

    Enrollment in this Pen Testing course includes a voucher that covers the cost of your certification exam upon course completion.

    Note: We continually add new targets and defenses throughout the lifetime of this CPENT penetration testing course to ensure its relevance.

 

  • Cisco CCNP Collaboration: CLCOR & CLICA
  • Fee: $3,295.00
    Item Number: SP2CCTP48261
    Dates: 1/1/2025 - 6/30/2025
    Times: 12:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    This course is intended for network security engineers and those looking to attain their CCNP Security certification.



    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC, Mac, or Chromebook.

    Software Requirements:

    • PC: Windows 8 or later.
    • Mac: macOS 10.6 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
    • Microsoft Word Online
    • Adobe Acrobat Reader
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment and will be available online.


    The Implementing Cisco Collaboration Core Technologies (CLCOR) course provides you with skills needed to implement and deploy core collaboration and networking technologies, including infrastructure and design, protocols, codecs, and endpoints, Cisco Internetwork Operating System (IOS®) XE gateway and media resources, call control, Quality of Service (QoS), and additional Cisco collaboration applications.

    In the Implementing Cisco Collaboration Applications (CLICA) course, you will learn collaboration applications, including single sign-on, Cisco Unified IM and Presence, Cisco Unity Connection, Cisco Unity Express, and application clients.

    The course will also prepare you to sit for the Cisco CCNP Collaboration Core exam CLCOR and the Cisco CCNP Collaboration Concentration exam CLICA. These exams in tandem will earn you the CCNP Collaboration certification. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.


    1. Overview of Infrastructure and Design
      1. Traditional Voice Versus Unified Voice
    2. Overview of Cisco Collaborations
      1. Overview of Cisco Collaborations Architecture
      2. Understanding Cisco IP Phones
      3. Voice Port Codec and DSP
      4. Introduction to Cisco Unified CM Deployment Model
      5. Overview of Installation & Hardware Platform
      6. Getting Started with GUI and Initial Configuration
      7. Overview and Configuration of SSL Certificate for Collaboration
      8. Deployment of SIP and SCCP Endpoint
      9. Deployment of Cisco Collaboration Features
    3. Voice Gateways & Trunks
      1. Deployment & Configurations of H323 Gateways and Trunks
      2. Deployment & Configurations of MGCP Gateway
      3. Deployment & Configurations of Call Routing
    4. Understanding & Configuring Call Routing
      1. Understanding Call Routing Digit Analysis and Calling Privileges
      2. Configure Globalized Call Routing in Cisco Unified CM
      3. Describe Mobile and Remote Access
    5. Cisco Unity Connection
      1. Overview and Configure these in Cisco Unity Connection
      2. Understanding Features in Cisco Unity Connection
    6. Describe Cisco Unified IM & P Protocols and Deployment
      1. Deploy Cisco Jabber on Premises
    7. Describe Problems That Can Lead to Poor Voice and Video Quality
    8. Troubleshooting Cisco Collaboration
      1. Troubleshooting Cisco Unity Connection Integration
    9. Single Sign-On (SSO) for Collaboration Applications
      1. Introduction to Single Sign-On
      2. Types of SSO
      3. Configuring SSO
      4. Introduction to SAML SSO
    10. Configuring Cisco Unified IM and Presence
      1. Introduction to Cisco Unity Connection
      2. Introduction to CUC multicluster operation
      3. Configuring on-prem Cisco Unified Instant Message and Presence
      4. Troubleshooting on prem Cisco Unified Instant Message and Presence
    11. Configuring Cisco Unity Connection and Cisco Unity Express
      1. Configuring call operation and rules in Cisco Unity Connection
      2. Troubleshoot Cisco Unity Connection
      3. Implementing toll fraud prevention
      4. Configuring Cisco Unity Express integration to Cisco Unified Communications Manager Express
    12. Application Clients
      1. Introduction to Cisco Unified Attendant Console
      2. Configuring service discovery
      3. Configuring Jabber client installation switches
      4. Troubleshooting Cisco Jabber

    What you will learn

    CLCOR

    • Describe the Cisco Collaboration solutions architecture
    • Compare the IP Phone signaling protocols of Session Initiation Protocol (SIP), H323, Media Gateway Control Protocol (MGCP), and Skinny Client Control Protocol (SCCP)
    • Integrate and troubleshoot Cisco Unified Communications Manager with LDAP for user synchronization and user authentication
    • Implement Cisco Unified Communications Manager provisioning features
    • Describe the different codecs and how they are used to transform analog voice into digital streams
    • Describe a dial plan, and explain call routing in Cisco Unified Communications Manager
    • Implement Public Switched Telephone Network (PSTN) access using MGCP gateways
    • Implement a Cisco gateway for PSTN access
    • Configure calling privileges in Cisco Unified Communications Manager
    • Implement toll fraud prevention
    • Implement globalized call routing within a Cisco Unified Communications Manager cluster
    • Implement and troubleshoot media resources in Cisco Unified Communications Manager
    • Describe Cisco Instant Messaging and Presence, including call flows and protocols
    • Describe and configure endpoints and commonly required features
    • Configure and troubleshoot Cisco Unity Connection integration
    • Configure and troubleshoot Cisco Unity Connection call handlers
    • Describe how Mobile Remote Access (MRA) is used to allow endpoints to work from outside the company
    • Analyze traffic patterns and quality issues in converged IP networks supporting voice, video, and data traffic
    • Define QoS and its models
    • Implement classification and marking
    • Configure classification and marking options on Cisco Catalyst® switches

    CLICA

    • Configure and utilize the Single Sign-On application
    • Describe Cisco Unity Connection
    • Describe the CUC multicluster operation
    • Configure on-prem Cisco Unified Instant Message and Presence
    • Configure call operation and rules in Unity Connection
    • Implement toll fraud prevention
    • Describe Cisco Unified Attendant Console
    • Configure and troubleshoot Cisco Jabber

    How you will benefit

    • You will be prepared to sit for the Cisco CCNP Collaboration core exam: 350-801 CLCOR: Implementing and Operating Cisco Collaboration Core Technologies
    • You will be prepared to sit for the Cisco CCNP Security concentration exam: 300-810 CLICA: Implementing Cisco Collaboration Applications

    Faisal Khan

    Faisal Khan is an expert in Cisco telephony and collaboration and the world of AWS, holding many certifications with their cloud technologies. These credentials include Cisco CCIE Collaboration, Cisco CCNP, Cisco CCNA, and AWS Solutions Architect.

    In addition to his certifications, Faisal has expert knowledge in the following areas: Cisco Collaboration, Amazon AWS, Cisco UCCE/UCCX, and Cisco networking.

    Faisal is deeply interested in understanding technologies at the most granular level.


    The Implementing Cisco Collaboration Core Technologies (CLCOR) course provides you with skills needed to implement and deploy core collaboration and networking technologies, including infrastructure and design, protocols, codecs, and endpoints, Cisco Internetwork Operating System (IOS®) XE gateway and media resources, call control, Quality of Service (QoS), and additional Cisco collaboration applications.

    In the Implementing Cisco Collaboration Applications (CLICA) course, you will learn collaboration applications, including single sign-on, Cisco Unified IM and Presence, Cisco Unity Connection, Cisco Unity Express, and application clients.

    The course will also prepare you to sit for the Cisco CCNP Collaboration Core exam CLCOR and the Cisco CCNP Collaboration Concentration exam CLICA. These exams in tandem will earn you the CCNP Collaboration certification. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.

 

  • Cisco CCNP Collaboration: CLCOR & CLICA (Vouchers Included)
  • Fee: $3,995.00
    Item Number: SP2CCTP48271
    Dates: 1/1/2025 - 6/30/2025
    Times: 12:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    This course is intended for network security engineers and those looking to attain their CCNP Security certification.



    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC, Mac, or Chromebook.

    Software Requirements:

    • PC: Windows 8 or later.
    • Mac: macOS 10.6 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
    • Microsoft Word Online
    • Adobe Acrobat Reader
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment and will be available online.


    The Implementing Cisco Collaboration Core Technologies (CLCOR) course provides you with skills needed to implement and deploy core collaboration and networking technologies, including infrastructure and design, protocols, codecs, and endpoints, Cisco Internetwork Operating System (IOS®) XE gateway and media resources, call control, Quality of Service (QoS), and additional Cisco collaboration applications.

    In the Implementing Cisco Collaboration Applications (CLICA) course, you will learn collaboration applications, including single sign-on, Cisco Unified IM and Presence, Cisco Unity Connection, Cisco Unity Express, and application clients.

    The course will also prepare you to sit for the Cisco CCNP Collaboration Core exam CLCOR and the Cisco CCNP Collaboration Concentration exam CLICA. These exams in tandem will earn you the CCNP Collaboration certification. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.


    1. Overview of Infrastructure and Design
      1. Traditional Voice Versus Unified Voice
    2. Overview of Cisco Collaborations
      1. Overview of Cisco Collaborations Architecture
      2. Understanding Cisco IP Phones
      3. Voice Port Codec and DSP
      4. Introduction to Cisco Unified CM Deployment Model
      5. Overview of Installation & Hardware Platform
      6. Getting Started with GUI and Initial Configuration
      7. Overview and Configuration of SSL Certificate for Collaboration
      8. Deployment of SIP and SCCP Endpoint
      9. Deployment of Cisco Collaboration Features
    3. Voice Gateways & Trunks
      1. Deployment & Configurations of H323 Gateways and Trunks
      2. Deployment & Configurations of MGCP Gateway
      3. Deployment & Configurations of Call Routing
    4. Understanding & Configuring Call Routing
      1. Understanding Call Routing Digit Analysis and Calling Privileges
      2. Configure Globalized Call Routing in Cisco Unified CM
      3. Describe Mobile and Remote Access
    5. Cisco Unity Connection
      1. Overview and Configure these in Cisco Unity Connection
      2. Understanding Features in Cisco Unity Connection
    6. Describe Cisco Unified IM & P Protocols and Deployment
      1. Deploy Cisco Jabber on Premises
    7. Describe Problems That Can Lead to Poor Voice and Video Quality
    8. Troubleshooting Cisco Collaboration
      1. Troubleshooting Cisco Unity Connection Integration
    9. Single Sign-On (SSO) for Collaboration Applications
      1. Introduction to Single Sign-On
      2. Types of SSO
      3. Configuring SSO
      4. Introduction to SAML SSO
    10. Configuring Cisco Unified IM and Presence
      1. Introduction to Cisco Unity Connection
      2. Introduction to CUC multicluster operation
      3. Configuring on-prem Cisco Unified Instant Message and Presence
      4. Troubleshooting on prem Cisco Unified Instant Message and Presence
    11. Configuring Cisco Unity Connection and Cisco Unity Express
      1. Configuring call operation and rules in Cisco Unity Connection
      2. Troubleshoot Cisco Unity Connection
      3. Implementing toll fraud prevention
      4. Configuring Cisco Unity Express integration to Cisco Unified Communications Manager Express
    12. Application Clients
      1. Introduction to Cisco Unified Attendant Console
      2. Configuring service discovery
      3. Configuring Jabber client installation switches
      4. Troubleshooting Cisco Jabber

    What you will learn

    CLCOR

    • Describe the Cisco Collaboration solutions architecture
    • Compare the IP Phone signaling protocols of Session Initiation Protocol (SIP), H323, Media Gateway Control Protocol (MGCP), and Skinny Client Control Protocol (SCCP)
    • Integrate and troubleshoot Cisco Unified Communications Manager with LDAP for user synchronization and user authentication
    • Implement Cisco Unified Communications Manager provisioning features
    • Describe the different codecs and how they are used to transform analog voice into digital streams
    • Describe a dial plan, and explain call routing in Cisco Unified Communications Manager
    • Implement Public Switched Telephone Network (PSTN) access using MGCP gateways
    • Implement a Cisco gateway for PSTN access
    • Configure calling privileges in Cisco Unified Communications Manager
    • Implement toll fraud prevention
    • Implement globalized call routing within a Cisco Unified Communications Manager cluster
    • Implement and troubleshoot media resources in Cisco Unified Communications Manager
    • Describe Cisco Instant Messaging and Presence, including call flows and protocols
    • Describe and configure endpoints and commonly required features
    • Configure and troubleshoot Cisco Unity Connection integration
    • Configure and troubleshoot Cisco Unity Connection call handlers
    • Describe how Mobile Remote Access (MRA) is used to allow endpoints to work from outside the company
    • Analyze traffic patterns and quality issues in converged IP networks supporting voice, video, and data traffic
    • Define QoS and its models
    • Implement classification and marking
    • Configure classification and marking options on Cisco Catalyst® switches

    CLICA

    • Configure and utilize the Single Sign-On application
    • Describe Cisco Unity Connection
    • Describe the CUC multicluster operation
    • Configure on-prem Cisco Unified Instant Message and Presence
    • Configure call operation and rules in Unity Connection
    • Implement toll fraud prevention
    • Describe Cisco Unified Attendant Console
    • Configure and troubleshoot Cisco Jabber

    How you will benefit

    • You will be prepared to sit for the Cisco CCNP Collaboration core exam: 350-801 CLCOR: Implementing and Operating Cisco Collaboration Core Technologies
    • You will be prepared to sit for the Cisco CCNP Security concentration exam: 300-810 CLICA: Implementing Cisco Collaboration Applications

    Faisal Khan

    Faisal Khan is an expert in Cisco telephony and collaboration and the world of AWS, holding many certifications with their cloud technologies. These credentials include Cisco CCIE Collaboration, Cisco CCNP, Cisco CCNA, and AWS Solutions Architect.

    In addition to his certifications, Faisal has expert knowledge in the following areas: Cisco Collaboration, Amazon AWS, Cisco UCCE/UCCX, and Cisco networking.

    Faisal is deeply interested in understanding technologies at the most granular level.


    The Implementing Cisco Collaboration Core Technologies (CLCOR) course provides you with skills needed to implement and deploy core collaboration and networking technologies, including infrastructure and design, protocols, codecs, and endpoints, Cisco Internetwork Operating System (IOS®) XE gateway and media resources, call control, Quality of Service (QoS), and additional Cisco collaboration applications.

    In the Implementing Cisco Collaboration Applications (CLICA) course, you will learn collaboration applications, including single sign-on, Cisco Unified IM and Presence, Cisco Unity Connection, Cisco Unity Express, and application clients.

    The course will also prepare you to sit for the Cisco CCNP Collaboration Core exam CLCOR and the Cisco CCNP Collaboration Concentration exam CLICA. These exams in tandem will earn you the CCNP Collaboration certification. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.

 

  • Cisco CCNP Enterprise: ENCOR & ENARSI
  • Fee: $3,295.00
    Item Number: SP2CCTP48161
    Dates: 1/1/2025 - 6/30/2025
    Times: 12:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    This course is intended for network engineers, system engineers, network administrators, and those looking to attain their CCNP Enterprise certification.



    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC, Mac, or Chromebook.

    Software Requirements:

    • PC: Windows 8 or later.
    • Mac: macOS 10.6 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
    • Microsoft Word Online
    • Adobe Acrobat Reader
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment and will be available online.


    The CCNP Enterprise: ENCOR is the first step to mastering the implementation of core enterprise network technologies. The goal of this online training course is to provide you with the skills needed to install, manage, and administer dual stack architecture, virtualization, network assurance, security, and automation in an enterprise network.

    The CCNP Enterprise: ENARSI provides you with the knowledge of implementation and troubleshooting for advanced routing technologies and services. In this course, you will learn about Layer 3, VPN services, infrastructure security, infrastructure services, and infrastructure automation.

    The course will also prepare you to sit for the Cisco CCNP Enterprise Core exam ENOR and the Cisco CCNP Enterprise Concentration exam ENARSI. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.


    1. Course Overview
      1. Introduction to ENCOR Course and Exam Objectives
    2. Campus Architecture and Device Fundamentals
      1. Campus Architecture
      2. Device Architecture
    3. Access and Distribution Layer Features and Services
      1. Configuring and Verifying VLANs
      2. Configuring and Verifying Trunks
      3. VLAN Trunking Protocol (VTP)
      4. STP Overview and Algorithm Deep Dive
      5. STP Convergence, Configuration and Manipulation
      6. STP PortFast, and BPDU Guard
      7. Multiple Spanning Tree Protocol (MSTP)
      8. EtherChannels
      9. Inter-VLAN Routing
      10. First-Hop Redundancy Protocol (FHRP)
    4. Routing
      1. Routing Introduction
      2. Dynamic Routing Overview
      3. OSPFv2 Overview, Packets, States, and Design
      4. OSPFv2 Configuration and Verification
      5. Text BoxOSPFv2 Network Types and DR/BDR Election
      6. OSPFv2 LSAs and Metric
      7. OSPFv2 Summarization
      8. OSPFv2 Filtering
      9. EBGP Overview, Configuration and Verification
      10. Text BoxShapeBGP Best Path Selection Process
      11. Network Address Translation (NAT)
      12. Multicast Protocol Overview
    5. VPN's
      1. GRE Tunnel Configuration and Verification
      2. IPSec Introduction
      3. IPSec Site-to-Site VPN Tunnel Configuration and Verification
      4. GRE over IPSec Tunnel Configuration and Verification
      5. Virtual Routing and Forwarding (VRF)
    6. Management Protocols and Services
      1. NTP Configuration and Verification
      2. Syslog Configuration and Verification
      3. Debugs, Conditional Debugs, Ping, and Traceroute
      4. SNMP Configuration and Verification
      5. NetFlow / Flexible NetFlow Configuration and Verification
      6. SPAN, RSPAN, ERSPAN Configuration and Verification
      7. IPSLA Configuration and Verification
      8. Quality of Service (QoS) Overview
      9. Embedded Event Manager (EEM) Configuration
    7. Security
      1. Device Access, Authentication Configuration and Verification
      2. AAA Configuration and Verification
      3. Access Control Lists (ACLs)
      4. Control Plane Policing (CoPP)
      5. Next-Gen Firewalls, Network Access Control, MACSec, and TrustSec
    8. Next Generation Campus Networks
      1. SD-Access
      2. LISP and VXLAN
      3. SD-WAN
      4. DNA Center Overview
      5. Data Formats
      6. Data Modeling
      7. NetConf / RestConf
      8. Python Exam Prep
      9. ShapeChef, Puppet, Ansible, SaltStack
    9. LAN Essentials
    10. Course Overview
      1. Introduction to ENARSI Course and Exam Objectives
    11. EIGRPv4, EIGRPv6 and Named EIGRP
      1. EIGRPv4 Configuration and Verification
      2. EIGRPv4 Security Features
      3. EIGRPv4 Metric and Path Selection
      4. EIGRPv4 Convergence
      5. EIGRPv4 Summarization
      6. EIGRP Route Manipulation
      7. EIGRPv4 Troubleshooting
      8. EIGRPv6
      9. Named EIGRP
    12. OSPFv2, OSPFv3, OSPF Address-Families
      1. OSPFv2 Design, Configuration and Verification
      2. OSPFv2 Security Features
      3. OSPFv2 Packets and States
      4. OSPFv2 LSAs
      5. OSPFv2 Metric
      6. OSPFv2 Network Types and DR/BDR Elections
      7. OSPFv2 Summarization and Area Types
      8. OSPFv2 Filtering, Virtual-Links, and Convergence
      9. OSPFv2 Troubleshooting
      10. OSPFv3
      11. OSPF Address-Families
    13. Multi-Protocol BGPv4
      1. BGP Core Operations
      2. BGP Configuration and Verification
      3. BGP Summarization
      4. BGP Filtering
      5. BGP Peer Groups and Route Reflectors
      6. BGP Path Selection Process and Attribute Manipulation
      7. Troubleshooting BGP
      8. BGP for IPv6
    14. Redistribution and Advanced Routing Control
      1. Redistribution Configuration and Verification
      2. Redistribution Filtering
      3. Redistribution Challenges
      4. Redistribution for IPv6
      5. Policy Based Routing Configuration and Verification
      6. IPSLA Configuration and Verification
    15. VPNs
      1. VRF-Lite Configuration and Verification
      2. MPLS Overview
      3. MPLS L3 VPNS
      4. GRE Review
      5. DMVPN Configuration and Verification
      6. DMPVN IPSec Configuration and Verification
    16. Management Protocol and Services
      1. Device Access and Authentication Configuration and Verification
      2. IOS Management Tools
      3. Syslog Configuration and Verification
      4. SNMP Configuration and Verification
      5. NetFlow and Flexible NetFlow Configuration and Verification
      6. DHCPv4 and DHCPv6 for Cisco IOS
    17. Device Security
      1. uRPF Configuration and Verification
      2. CoPP Configuration and Verification
      3. IPv4 ACL Review
      4. IPv6 ACL Review
      5. IPv6 First Hop Security Features

    What you will learn

    • ENCOR
      • Configuration of VRF, GRE, VLANs, RSTP, MST, NTP, IPSec VPNs, and more
      • Advanced Routing
      • Configure and verify device management
      • Cisco DNA Center
      • Examine threat defense, endpoint security, and introduction to the Next-Generation Firewall
    • ENARSI
      • Route Maps
      • Redistribution
      • Policy-Based Routing
      • VRF-Lite
      • eBGP and iBGP
      • DMVPNs
      • IOS AAA
      • DCHP for IPv4 and IPv6
      • IPv4 and IPv6 ACL's

    How you will benefit

    • You will be prepared to sit for the Cisco CCNP Enterprise core exam: 350-401 ENCOR: Implementing and Operating Cisco Enterprise Network Core Technologies
    • You will be prepared to sit for the Cisco CCNP Enterprise concentration exam: 300-410 ENARSI: Implementing Cisco Enterprise Advanced Routing and Services

    Raymond Lacoste

    Raymond Lacoste is a highly recognized instructor and IT professional who holds the Cisco Sirius Instructor Award. He has authored Cisco Press publications on the Cisco ENARSI and Cisco TSHOOT exams.

    Raymond's areas of expertise include Cisco Enterprise networking, Cisco Routing and Switching, Cisco Datacenter Networking, ITIL, and Amazon AWS. He also holds certifications in Cisco CCSI, Cisco CCNP Routing and Switching, Cisco CCNP Enterprise, ITIL Foundations, ITIL Practitioner, ITIL Intermediate, Amazon AWS System Operations, Amazon AWS Architect, Amazon AWS Developer, and CISSP.

    In addition to his certifications and experience, Raymond's engaging instruction style makes even the most obscenely complicated or obtuse concepts relatable and understandable. Outside of class, he enjoys dominating both on the golf course and the basketball court.


    The CCNP Enterprise: ENCOR is the first step to mastering the implementation of core enterprise network technologies. The goal of this online training course is to provide you with the skills needed to install, manage, and administer dual stack architecture, virtualization, network assurance, security, and automation in an enterprise network.

    The CCNP Enterprise: ENARSI provides you with the knowledge of implementation and troubleshooting for advanced routing technologies and services. In this course, you will learn about Layer 3, VPN services, infrastructure security, infrastructure services, and infrastructure automation.

    The course will also prepare you to sit for the Cisco CCNP Enterprise Core exam ENOR and the Cisco CCNP Enterprise Concentration exam ENARSI. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.

 

  • Cisco CCNP Enterprise: ENCOR & ENARSI (Vouchers Included)
  • Fee: $3,995.00
    Item Number: SP2CCTP48171
    Dates: 1/1/2025 - 6/30/2025
    Times: 12:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    This course is intended for network engineers, system engineers, network administrators, and those looking to attain their CCNP Enterprise certification.



    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC, Mac, or Chromebook.

    Software Requirements:

    • PC: Windows 8 or later.
    • Mac: macOS 10.6 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
    • Microsoft Word Online
    • Adobe Acrobat Reader
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment and will be available online.


    The CCNP Enterprise: ENCOR is the first step to mastering the implementation of core enterprise network technologies. The goal of this online training course is to provide you with the skills needed to install, manage, and administer dual stack architecture, virtualization, network assurance, security, and automation in an enterprise network.

    The CCNP Enterprise: ENARSI provides you with the knowledge of implementation and troubleshooting for advanced routing technologies and services. In this course, you will learn about Layer 3, VPN services, infrastructure security, infrastructure services, and infrastructure automation.

    The course will also prepare you to sit for the Cisco CCNP Enterprise Core exam ENOR and the Cisco CCNP Enterprise Concentration exam ENARSI. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.


    1. Course Overview
      1. Introduction to ENCOR Course and Exam Objectives
    2. Campus Architecture and Device Fundamentals
      1. Campus Architecture
      2. Device Architecture
    3. Access and Distribution Layer Features and Services
      1. Configuring and Verifying VLANs
      2. Configuring and Verifying Trunks
      3. VLAN Trunking Protocol (VTP)
      4. STP Overview and Algorithm Deep Dive
      5. STP Convergence, Configuration and Manipulation
      6. STP PortFast, and BPDU Guard
      7. Multiple Spanning Tree Protocol (MSTP)
      8. EtherChannels
      9. Inter-VLAN Routing
      10. First-Hop Redundancy Protocol (FHRP)
    4. Routing
      1. Routing Introduction
      2. Dynamic Routing Overview
      3. OSPFv2 Overview, Packets, States, and Design
      4. OSPFv2 Configuration and Verification
      5. Text BoxOSPFv2 Network Types and DR/BDR Election
      6. OSPFv2 LSAs and Metric
      7. OSPFv2 Summarization
      8. OSPFv2 Filtering
      9. EBGP Overview, Configuration and Verification
      10. Text BoxShapeBGP Best Path Selection Process
      11. Network Address Translation (NAT)
      12. Multicast Protocol Overview
    5. VPN's
      1. GRE Tunnel Configuration and Verification
      2. IPSec Introduction
      3. IPSec Site-to-Site VPN Tunnel Configuration and Verification
      4. GRE over IPSec Tunnel Configuration and Verification
      5. Virtual Routing and Forwarding (VRF)
    6. Management Protocols and Services
      1. NTP Configuration and Verification
      2. Syslog Configuration and Verification
      3. Debugs, Conditional Debugs, Ping, and Traceroute
      4. SNMP Configuration and Verification
      5. NetFlow / Flexible NetFlow Configuration and Verification
      6. SPAN, RSPAN, ERSPAN Configuration and Verification
      7. IPSLA Configuration and Verification
      8. Quality of Service (QoS) Overview
      9. Embedded Event Manager (EEM) Configuration
    7. Security
      1. Device Access, Authentication Configuration and Verification
      2. AAA Configuration and Verification
      3. Access Control Lists (ACLs)
      4. Control Plane Policing (CoPP)
      5. Next-Gen Firewalls, Network Access Control, MACSec, and TrustSec
    8. Next Generation Campus Networks
      1. SD-Access
      2. LISP and VXLAN
      3. SD-WAN
      4. DNA Center Overview
      5. Data Formats
      6. Data Modeling
      7. NetConf / RestConf
      8. Python Exam Prep
      9. ShapeChef, Puppet, Ansible, SaltStack
    9. LAN Essentials
    10. Course Overview
      1. Introduction to ENARSI Course and Exam Objectives
    11. EIGRPv4, EIGRPv6 and Named EIGRP
      1. EIGRPv4 Configuration and Verification
      2. EIGRPv4 Security Features
      3. EIGRPv4 Metric and Path Selection
      4. EIGRPv4 Convergence
      5. EIGRPv4 Summarization
      6. EIGRP Route Manipulation
      7. EIGRPv4 Troubleshooting
      8. EIGRPv6
      9. Named EIGRP
    12. OSPFv2, OSPFv3, OSPF Address-Families
      1. OSPFv2 Design, Configuration and Verification
      2. OSPFv2 Security Features
      3. OSPFv2 Packets and States
      4. OSPFv2 LSAs
      5. OSPFv2 Metric
      6. OSPFv2 Network Types and DR/BDR Elections
      7. OSPFv2 Summarization and Area Types
      8. OSPFv2 Filtering, Virtual-Links, and Convergence
      9. OSPFv2 Troubleshooting
      10. OSPFv3
      11. OSPF Address-Families
    13. Multi-Protocol BGPv4
      1. BGP Core Operations
      2. BGP Configuration and Verification
      3. BGP Summarization
      4. BGP Filtering
      5. BGP Peer Groups and Route Reflectors
      6. BGP Path Selection Process and Attribute Manipulation
      7. Troubleshooting BGP
      8. BGP for IPv6
    14. Redistribution and Advanced Routing Control
      1. Redistribution Configuration and Verification
      2. Redistribution Filtering
      3. Redistribution Challenges
      4. Redistribution for IPv6
      5. Policy Based Routing Configuration and Verification
      6. IPSLA Configuration and Verification
    15. VPNs
      1. VRF-Lite Configuration and Verification
      2. MPLS Overview
      3. MPLS L3 VPNS
      4. GRE Review
      5. DMVPN Configuration and Verification
      6. DMPVN IPSec Configuration and Verification
    16. Management Protocol and Services
      1. Device Access and Authentication Configuration and Verification
      2. IOS Management Tools
      3. Syslog Configuration and Verification
      4. SNMP Configuration and Verification
      5. NetFlow and Flexible NetFlow Configuration and Verification
      6. DHCPv4 and DHCPv6 for Cisco IOS
    17. Device Security
      1. uRPF Configuration and Verification
      2. CoPP Configuration and Verification
      3. IPv4 ACL Review
      4. IPv6 ACL Review
      5. IPv6 First Hop Security Features

    What you will learn

    ENCOR

    • Configuration of VRF, GRE, VLANs, RSTP, MST, NTP, IPSec VPNs, and more
    • Advanced Routing
    • Configure and verify device management
    • Cisco DNA Center
    • Examine threat defense, endpoint security, and introduction to the Next-Generation Firewall

    ENARSI

    • Route Maps
    • Redistribution
    • Policy-Based Routing
    • VRF-Lite
    • eBGP and iBGP
    • DMVPNs
    • IOS AAA
    • DCHP for IPv4 and IPv6
    • IPv4 and IPv6 ACL's

    How you will benefit

    • You will be prepared to sit for the Cisco CCNP Enterprise core exam: 350-401 ENCOR: Implementing and Operating Cisco Enterprise Network Core Technologies
    • You will be prepared to sit for the Cisco CCNP Enterprise concentration exam: 300-410 ENARSI: Implementing Cisco Enterprise Advanced Routing and Services

    Raymond Lacoste

    Raymond Lacoste is a highly recognized instructor and IT professional who holds the Cisco Sirius Instructor Award. He has authored Cisco Press publications on the Cisco ENARSI and Cisco TSHOOT exams.

    Raymond's areas of expertise include Cisco Enterprise networking, Cisco Routing and Switching, Cisco Datacenter Networking, ITIL, and Amazon AWS. He also holds certifications in Cisco CCSI, Cisco CCNP Routing and Switching, Cisco CCNP Enterprise, ITIL Foundations, ITIL Practitioner, ITIL Intermediate, Amazon AWS System Operations, Amazon AWS Architect, Amazon AWS Developer, and CISSP.

    In addition to his certifications and experience, Raymond's engaging instruction style makes even the most obscenely complicated or obtuse concepts relatable and understandable. Outside of class, he enjoys dominating both on the golf course and the basketball court.


    The CCNP Enterprise: ENCOR is the first step to mastering the implementation of core enterprise network technologies. The goal of this online training course is to provide you with the skills needed to install, manage, and administer dual stack architecture, virtualization, network assurance, security, and automation in an enterprise network.

    The CCNP Enterprise: ENARSI provides you with the knowledge of implementation and troubleshooting for advanced routing technologies and services. In this course, you will learn about Layer 3, VPN services, infrastructure security, infrastructure services, and infrastructure automation.

    The course will also prepare you to sit for the Cisco CCNP Enterprise Core exam ENOR and the Cisco CCNP Enterprise Concentration exam ENARSI. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.

 

  • Cisco CCNP Enterprise: ENCOR & ENSLD
  • Fee: $3,295.00
    Item Number: SP2CCTP48181
    Dates: 1/1/2025 - 6/30/2025
    Times: 12:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    This course is intended for network engineers, system engineers, network administrators, and those looking to attain their CCNP Enterprise certification.



    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC, Mac, or Chromebook.

    Software Requirements:

    • PC: Windows 8 or later.
    • Mac: macOS 10.6 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
    • Microsoft Word Online
    • Adobe Acrobat Reader
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment and will be available online.


    The CCNP Enterprise: ENCOR is the first step to mastering the implementation of core enterprise network technologies. The goal of this online training course is to provide you with the skills needed to install, manage, and administer dual stack architecture, virtualization, network assurance, security, and automation in an enterprise network.

    CCNP Enterprise: ENARSI provides you with knowledge of Cisco solutions in advanced addressing and routing solutions, advanced enterprise campus networks, WAN, security and network services, and Software-Defined Access.

    The course will also prepare you to sit for the Cisco CCNP Enterprise Core exam ENOR and the Cisco CCNP Enterprise Concentration exam ENSLD. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.


    1. Course Overview
      1. Introduction to ENCOR Course and Exam Objectives
    2. Campus Architecture and Device Fundamentals
      1. Campus Architecture
      2. Device Architecture
    3. Access and Distribution Layer Features and Services
      1. Configuring and Verifying VLANs
      2. Configuring and Verifying Trunks
      3. VLAN Trunking Protocol (VTP)
      4. STP Overview and Algorithm Deep Dive
      5. STP Convergence, Configuration and Manipulation
      6. STP PortFast, and BPDU Guard
      7. Multiple Spanning Tree Protocol (MSTP)
      8. EtherChannels
      9. Inter-VLAN Routing
      10. First-Hop Redundancy Protocol (FHRP)
    4. Routing
      1. Routing Introduction
      2. Dynamic Routing Overview
      3. OSPFv2 Overview, Packets, States, and Design
      4. OSPFv2 Configuration and Verification
      5. Text BoxOSPFv2 Network Types and DR/BDR Election
      6. OSPFv2 LSAs and Metric
      7. OSPFv2 Summarization
      8. OSPFv2 Filtering
      9. EBGP Overview, Configuration and Verification
      10. Text BoxShapeBGP Best Path Selection Process
      11. Network Address Translation (NAT)
      12. Multicast Protocol Overview
    5. VPN's
      1. GRE Tunnel Configuration and Verification
      2. IPSec Introduction
      3. IPSec Site-to-Site VPN Tunnel Configuration and Verification
      4. GRE over IPSec Tunnel Configuration and Verification
      5. Virtual Routing and Forwarding (VRF)
    6. Management Protocols and Services
      1. NTP Configuration and Verification
      2. Syslog Configuration and Verification
      3. Debugs, Conditional Debugs, Ping, and Traceroute
      4. SNMP Configuration and Verification
      5. NetFlow / Flexible NetFlow Configuration and Verification
      6. SPAN, RSPAN, ERSPAN Configuration and Verification
      7. IPSLA Configuration and Verification
      8. Quality of Service (QoS) Overview
      9. Embedded Event Manager (EEM) Configuration
    7. Security
      1. Device Access, Authentication Configuration and Verification
      2. AAA Configuration and Verification
      3. Access Control Lists (ACLs)
      4. Control Plane Policing (CoPP)
      5. Next-Gen Firewalls, Network Access Control, MACSec, and TrustSec
    8. Next Generation Campus Networks
      1. SD-Access
      2. LISP and VXLAN
      3. SD-WAN
      4. DNA Center Overview
      5. Data Formats
      6. Data Modeling
      7. NetConf / RestConf
      8. Python Exam Prep
      9. ShapeChef, Puppet, Ansible, SaltStack
    9. LAN Essentials
    10. Routed Protocols - Addressing
      1. IPv4 addressing (create plan)
      2. IPv6 addressing (create plan)
      3. IPv6 migration methods (determine)
    11. Routing Protocols – Secure and scale (create design)
      1. IS-IS
      2. EIGRP
      3. OSPF
      4. BGP – address families, attributes, filtering, RR's, load sharing, balancing, symmetry
    12. Enterprise Campus Networks (design)
      1. HA – GR, FHRP's
      2. L2 – xSTP, loop prevention, convergence
      3. L3 – convergence, vrf, redistribution, filtering, summarization
      4. SD-Access architecture and design (describe) – underlay, overlay, control and data planes
    13. Wide Area Networks (WAN)
      1. Options (compare) – L2/3 VPN's, metro ethernet, DWDM, SD-Wan ce
      2. Site to site VPN (design) – L2/L3, GRE, DMVPN, GET VPN
      3. HA (design) – single, multi, backup, failover
      4. SD-WAN architecture and design (describe) – various planes, QoS, multicast
    14. End-to-End Quality of Service (QoS)
      1. QoS strategies – IntServ/Diffserv (design)
      2. End-to-End QoS – Classify, mark, shape, police, queue (design)
      3. Network management techniques, out-of-band, in-band (design)
    15. Multicast
      1. Concepts – source/shared trees, RPF, RP (describe)
      2. Services – PIM bi-dir, SSM, MSDP (design)
    16. Automation
      1. YANG data models (IETF, Openconfig, Cisco native) – recognize differences
      2. Netconf and Restconf – recognize differences
      3. Telemetry model-driven (periodic/on-change publication and dial-in/dial-out) – recognize differences and impact

    What you will learn

    ENCOR

    • Configuration of VRF, GRE, VLANs, RSTP, MST, NTP, IPSec VPNs, and more!
    • Advanced Routing
    • Configure and verify device management
    • Cisco DNA Center
    • Examine threat defense, endpoint security, and introduction to the Next-Generation Firewall

    ENSLD

    • Describe and apply advanced addressing and routing solutions
    • Describe and apply advanced enterprise campus networks
    • Describe and apply WAN
    • Describe and apply security and network services
    • Describe and apply Software-Defined Access

    How you will benefit

    • You will be prepared to sit for the Cisco CCNP Enterprise core exam: 350-401 ENCOR: Implementing and Operating Cisco Enterprise Network Core Technologies
    • You will be prepared to sit for the Cisco CCNP Enterprise concentration exam: 300-420 ENSLD: Designing Cisco Enterprise Networks

    Raymond Lacoste

    Raymond Lacoste is a highly recognized instructor and IT professional who holds the Cisco Sirius Instructor Award. He has authored Cisco Press publications on the Cisco ENARSI and Cisco TSHOOT exams. Raymond's areas of expertise include Cisco Enterprise networking, Cisco Routing and Switching, Cisco Datacenter Networking, ITIL, and Amazon AWS. He also holds certifications in Cisco CCSI, Cisco CCNP Routing and Switching, Cisco CCNP Enterprise, ITIL Foundations, ITIL Practitioner, ITIL Intermediate, Amazon AWS System Operations, Amazon AWS Architect, Amazon AWS Developer, and CISSP. In addition to his certifications and experience, Raymond's engaging instruction style makes even the most obscenely complicated or obtuse concepts relatable and understandable. Outside of class, he enjoys dominating both on the golf course and the basketball court.

    Aaron Gould

    Aaron Gould is a highly knowledgeable network engineer with heavy experience in the Internet Service Provider space. Aaron holds multiple professional-level certifications with Juniper and Cisco equipment as well as Juniper - JNCIP-SP, Juniper - JNCIS-SP, Juniper - JNCDS-DC, Juniper - AAA (JNCIA X 3), Juniper – JNCDA, Juniper - JNCIA-Cloud, Juniper - JNCIA-Junos, Cisco - CCNP SP, Cisco – CCIP, Cisco – CCDP, Cisco - CCNP R/S, MEF CECP, and IPv6 Forum - Silver certifications. Aaron's extensive expertise includes Cisco IOS Routing and Switching, Cisco Network Design, Cisco Service Provider Routing, and Juniper Service Provider Routing.


    The CCNP Enterprise: ENCOR is the first step to mastering the implementation of core enterprise network technologies. The goal of this online training course is to provide you with the skills needed to install, manage, and administer dual stack architecture, virtualization, network assurance, security, and automation in an enterprise network.

    CCNP Enterprise: ENARSI provides you with knowledge of Cisco solutions in advanced addressing and routing solutions, advanced enterprise campus networks, WAN, security and network services, and Software-Defined Access.

    The course will also prepare you to sit for the Cisco CCNP Enterprise Core exam ENOR and the Cisco CCNP Enterprise Concentration exam ENSLD. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.

 

  • Cisco CCNP Enterprise: ENCOR & ENSLD (Vouchers Included)
  • Fee: $3,995.00
    Item Number: SP2CCTP48191
    Dates: 1/1/2025 - 6/30/2025
    Times: 12:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    This course is intended for network engineers, system engineers, network administrators, and those looking to attain their CCNP Enterprise certification.



    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC, Mac, or Chromebook.

    Software Requirements:

    • PC: Windows 8 or later.
    • Mac: macOS 10.6 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
    • Microsoft Word Online
    • Adobe Acrobat Reader
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment and will be available online.


    The CCNP Enterprise: ENCOR is the first step to mastering the implementation of core enterprise network technologies. The goal of this online training course is to provide you with the skills needed to install, manage, and administer dual stack architecture, virtualization, network assurance, security, and automation in an enterprise network.

    CCNP Enterprise: ENARSI provides you with knowledge of Cisco solutions in advanced addressing and routing solutions, advanced enterprise campus networks, WAN, security and network services, and Software-Defined Access.

    The course will also prepare you to sit for the Cisco CCNP Enterprise Core exam ENOR and the Cisco CCNP Enterprise Concentration exam ENSLD. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.


    1. Course Overview
      1. Introduction to ENCOR Course and Exam Objectives
    2. Campus Architecture and Device Fundamentals
      1. Campus Architecture
      2. Device Architecture
    3. Access and Distribution Layer Features and Services
      1. Configuring and Verifying VLANs
      2. Configuring and Verifying Trunks
      3. VLAN Trunking Protocol (VTP)
      4. STP Overview and Algorithm Deep Dive
      5. STP Convergence, Configuration and Manipulation
      6. STP PortFast, and BPDU Guard
      7. Multiple Spanning Tree Protocol (MSTP)
      8. EtherChannels
      9. Inter-VLAN Routing
      10. First-Hop Redundancy Protocol (FHRP)
    4. Routing
      1. Routing Introduction
      2. Dynamic Routing Overview
      3. OSPFv2 Overview, Packets, States, and Design
      4. OSPFv2 Configuration and Verification
      5. Text BoxOSPFv2 Network Types and DR/BDR Election
      6. OSPFv2 LSAs and Metric
      7. OSPFv2 Summarization
      8. OSPFv2 Filtering
      9. EBGP Overview, Configuration and Verification
      10. Text BoxShapeBGP Best Path Selection Process
      11. Network Address Translation (NAT)
      12. Multicast Protocol Overview
    5. VPN's
      1. GRE Tunnel Configuration and Verification
      2. IPSec Introduction
      3. IPSec Site-to-Site VPN Tunnel Configuration and Verification
      4. GRE over IPSec Tunnel Configuration and Verification
      5. Virtual Routing and Forwarding (VRF)
    6. Management Protocols and Services
      1. NTP Configuration and Verification
      2. Syslog Configuration and Verification
      3. Debugs, Conditional Debugs, Ping, and Traceroute
      4. SNMP Configuration and Verification
      5. NetFlow / Flexible NetFlow Configuration and Verification
      6. SPAN, RSPAN, ERSPAN Configuration and Verification
      7. IPSLA Configuration and Verification
      8. Quality of Service (QoS) Overview
      9. Embedded Event Manager (EEM) Configuration
    7. Security
      1. Device Access, Authentication Configuration and Verification
      2. AAA Configuration and Verification
      3. Access Control Lists (ACLs)
      4. Control Plane Policing (CoPP)
      5. Next-Gen Firewalls, Network Access Control, MACSec, and TrustSec
    8. Next Generation Campus Networks
      1. SD-Access
      2. LISP and VXLAN
      3. SD-WAN
      4. DNA Center Overview
      5. Data Formats
      6. Data Modeling
      7. NetConf / RestConf
      8. Python Exam Prep
      9. ShapeChef, Puppet, Ansible, SaltStack
    9. LAN Essentials
    10. Routed Protocols - Addressing
      1. IPv4 addressing (create plan)
      2. IPv6 addressing (create plan)
      3. IPv6 migration methods (determine)
    11. Routing Protocols – Secure and scale (create design)
      1. IS-IS
      2. EIGRP
      3. OSPF
      4. BGP – address families, attributes, filtering, RR's, load sharing, balancing, symmetry
    12. Enterprise Campus Networks (design)
      1. HA – GR, FHRP's
      2. L2 – xSTP, loop prevention, convergence
      3. L3 – convergence, vrf, redistribution, filtering, summarization
      4. SD-Access architecture and design (describe) – underlay, overlay, control and data planes
    13. Wide Area Networks (WAN)
      1. Options (compare) – L2/3 VPN's, metro ethernet, DWDM, SD-Wan ce
      2. Site to site VPN (design) – L2/L3, GRE, DMVPN, GET VPN
      3. HA (design) – single, multi, backup, failover
      4. SD-WAN architecture and design (describe) – various planes, QoS, multicast
    14. End-to-End Quality of Service (QoS)
      1. QoS strategies – IntServ/Diffserv (design)
      2. End-to-End QoS – Classify, mark, shape, police, queue (design)
      3. Network management techniques, out-of-band, in-band (design)
    15. Multicast
      1. Concepts – source/shared trees, RPF, RP (describe)
      2. Services – PIM bi-dir, SSM, MSDP (design)
    16. Automation
      1. YANG data models (IETF, Openconfig, Cisco native) – recognize differences
      2. Netconf and Restconf – recognize differences
      3. Telemetry model-driven (periodic/on-change publication and dial-in/dial-out) – recognize differences and impact

    What you will learn

    ENCOR

    • Configuration of VRF, GRE, VLANs, RSTP, MST, NTP, IPSec VPNs, and more!
    • Advanced Routing
    • Configure and verify device management
    • Cisco DNA Center
    • Examine threat defense, endpoint security, and introduction to the Next-Generation Firewall

    ENSLD

    • Describe and apply advanced addressing and routing solutions
    • Describe and apply advanced enterprise campus networks
    • Describe and apply WAN
    • Describe and apply security and network services
    • Describe and apply Software-Defined Access

    How you will benefit

    • You will be prepared to sit for the Cisco CCNP Enterprise core exam: 350-401 ENCOR: Implementing and Operating Cisco Enterprise Network Core Technologies
    • You will be prepared to sit for the Cisco CCNP Enterprise concentration exam: 300-420 ENSLD: Designing Cisco Enterprise Networks

    Raymond Lacoste

    Raymond Lacoste is a highly recognized instructor and IT professional who holds the Cisco Sirius Instructor Award. He has authored Cisco Press publications on the Cisco ENARSI and Cisco TSHOOT exams. Raymond's areas of expertise include Cisco Enterprise networking, Cisco Routing and Switching, Cisco Datacenter Networking, ITIL, and Amazon AWS. He also holds certifications in Cisco CCSI, Cisco CCNP Routing and Switching, Cisco CCNP Enterprise, ITIL Foundations, ITIL Practitioner, ITIL Intermediate, Amazon AWS System Operations, Amazon AWS Architect, Amazon AWS Developer, and CISSP. In addition to his certifications and experience, Raymond's engaging instruction style makes even the most obscenely complicated or obtuse concepts relatable and understandable. Outside of class, he enjoys dominating both on the golf course and the basketball court.

    Aaron Gould

    Aaron Gould is a highly knowledgeable network engineer with heavy experience in the Internet Service Provider space. Aaron holds multiple professional-level certifications with Juniper and Cisco equipment as well as Juniper - JNCIP-SP, Juniper - JNCIS-SP, Juniper - JNCDS-DC, Juniper - AAA (JNCIA X 3), Juniper – JNCDA, Juniper - JNCIA-Cloud, Juniper - JNCIA-Junos, Cisco - CCNP SP, Cisco – CCIP, Cisco – CCDP, Cisco - CCNP R/S, MEF CECP, and IPv6 Forum - Silver certifications. Aaron's extensive expertise includes Cisco IOS Routing and Switching, Cisco Network Design, Cisco Service Provider Routing, and Juniper Service Provider Routing.


    The CCNP Enterprise: ENCOR is the first step to mastering the implementation of core enterprise network technologies. The goal of this online training course is to provide you with the skills needed to install, manage, and administer dual stack architecture, virtualization, network assurance, security, and automation in an enterprise network.

    CCNP Enterprise: ENARSI provides you with knowledge of Cisco solutions in advanced addressing and routing solutions, advanced enterprise campus networks, WAN, security and network services, and Software-Defined Access.

    The course will also prepare you to sit for the Cisco CCNP Enterprise Core exam ENOR and the Cisco CCNP Enterprise Concentration exam ENSLD. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.

 

  • Cisco CCNP Enterprise: ENCOR & ENWLSI
  • Fee: $3,295.00
    Item Number: SP2CCTP48201
    Dates: 1/1/2025 - 6/30/2025
    Times: 12:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    This course is intended for network engineers, system engineers, network administrators, and those looking to attain their CCNP Enterprise certification.



    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC, Mac, or Chromebook.

    Software Requirements:

    • PC: Windows 8 or later.
    • Mac: macOS 10.6 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
    • Microsoft Word Online
    • Adobe Acrobat Reader
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment and will be available online.


    The CCNP Enterprise: ENCOR is the first step to mastering the implementation of core enterprise network technologies. The goal of this online training course is to provide you with the skills needed to install, manage, and administer dual stack architecture, virtualization, network assurance, security, and automation in an enterprise network.

    In CCNP Enterprise: ENWLSI, you will be given the skills and knowledge to implement wireless networks, including FlexConnect, QoS, Multicast, advanced location services, security for client connectivity, monitoring, and device hardening.

    The course will prepare you to sit for the Cisco CCNP Enterprise Core exam ENCOR and the Cisco CCNP Enterprise Concentration exam ENWLSI. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.


    1. Course Overview
      1. Introduction to ENCOR Course and Exam Objectives
    2. Campus Architecture and Device Fundamentals
      1. Campus Architecture
      2. Device Architecture
    3. Access and Distribution Layer Features and Services
      1. Configuring and Verifying VLANs
      2. Configuring and Verifying Trunks
      3. VLAN Trunking Protocol (VTP)
      4. STP Overview and Algorithm Deep Dive
      5. STP Convergence, Configuration and Manipulation
      6. STP PortFast, and BPDU Guard
      7. Multiple Spanning Tree Protocol (MSTP)
      8. EtherChannels
      9. Inter-VLAN Routing
      10. First-Hop Redundancy Protocol (FHRP)
    4. Routing
      1. Routing Introduction
      2. Dynamic Routing Overview
      3. OSPFv2 Overview, Packets, States, and Design
      4. OSPFv2 Configuration and Verification
      5. Text BoxOSPFv2 Network Types and DR/BDR Election
      6. OSPFv2 LSAs and Metric
      7. OSPFv2 Summarization
      8. OSPFv2 Filtering
      9. EBGP Overview, Configuration and Verification
      10. Text BoxShapeBGP Best Path Selection Process
      11. Network Address Translation (NAT)
      12. Multicast Protocol Overview
    5. VPN's
      1. GRE Tunnel Configuration and Verification
      2. IPSec Introduction
      3. IPSec Site-to-Site VPN Tunnel Configuration and Verification
      4. GRE over IPSec Tunnel Configuration and Verification
      5. Virtual Routing and Forwarding (VRF)
    6. Management Protocols and Services
      1. NTP Configuration and Verification
      2. Syslog Configuration and Verification
      3. Debugs, Conditional Debugs, Ping, and Traceroute
      4. SNMP Configuration and Verification
      5. NetFlow / Flexible NetFlow Configuration and Verification
      6. SPAN, RSPAN, ERSPAN Configuration and Verification
      7. IPSLA Configuration and Verification
      8. Quality of Service (QoS) Overview
      9. Embedded Event Manager (EEM) Configuration
    7. Security
      1. Device Access, Authentication Configuration and Verification
      2. AAA Configuration and Verification
      3. Access Control Lists (ACLs)
      4. Control Plane Policing (CoPP)
      5. Next-Gen Firewalls, Network Access Control, MACSec, and TrustSec
    8. Next Generation Campus Networks
      1. SD-Access
      2. LISP and VXLAN
      3. SD-WAN
      4. DNA Center Overview
      5. Data Formats
      6. Data Modeling
      7. NetConf / RestConf
      8. Python Exam Prep
      9. ShapeChef, Puppet, Ansible, SaltStack
    9. LAN Essentials
    10. Securing and Troubleshooting the Wireless Network Infrastructure including
      1. Secure access to Wireless LAN Controllers (WLCs) and Access Points (APs)
      2. Configuration management via Cisco DNA Center, Cisco Prime Infrastructure (PI)
    11. Implementing and Troubleshooting Secure Client Connectivity including
      1. 802.1X Authentication, AAA services, and Cisco Connected Mobile Experiences (CMX)
    12. Implementing and Troubleshooting QoS in Wireless Networks including
      1. Cisco Application Visibility and Control (AVC), Multicast DNS (mDNS), and Cisco Media Stream
    13. Implementing and Troubleshooting Advanced Wireless Network Services including
      1. Location Services, Analytics, and wireless spectrum management

    What you will learn

    ENCOR

    • Configuration of VRF, GRE, VLANs, RSTP, MST, NTP, IPSec VPNs, and more
    • Advanced Routing
    • Configure and verify device management
    • Cisco DNA Center
    • Examine threat defense, endpoint security, and introduction to the Next-Generation Firewall

    ENWLSI

    • Implement network settings to provide a secure wireless network infrastructure and troubleshoot security issues as it relates to the wireless network infrastructure
    • Implement a secure wireless client and troubleshoot wireless client connectivity issues
    • Implement and troubleshoot QoS in wireless networks
    • Implement and troubleshoot advanced capabilities in wireless network services

    How you will benefit

    • You will be prepared to sit for the Cisco CCNP Enterprise core exam: 350-401 ENCOR: Implementing and Operating Cisco Enterprise Network Core Technologies
    • You will be prepared to sit for the Cisco CCNP Enterprise concentration exam: 300-430 ENWLSI: Implementing Cisco Enterprise Wireless Networks

    Raymond Lacoste

    Raymond Lacoste is a highly recognized instructor and IT professional who holds the Cisco Sirius Instructor Award. He has authored Cisco Press publications on the Cisco ENARSI and Cisco TSHOOT exams. Raymond's areas of expertise include Cisco Enterprise networking, Cisco Routing and Switching, Cisco Datacenter Networking, ITIL, and Amazon AWS. He also holds certifications in Cisco CCSI, Cisco CCNP Routing and Switching, Cisco CCNP Enterprise, ITIL Foundations, ITIL Practitioner, ITIL Intermediate, Amazon AWS System Operations, Amazon AWS Architect, Amazon AWS Developer, and CISSP. In addition to his certifications and experience, Raymond's engaging instruction style makes even the most obscenely complicated or obtuse concepts relatable and understandable. Outside of class, he enjoys dominating both on the golf course and the basketball court.

    Dan Goodman

    Dan Goodman is an IT professional specializing in Linux administration, Palo Alto firewalls, and wireless networking. He holds certifications in CompTIA Linux+, CWNP: CWNA, and Palo Alto PCNSA. In addition to his highly recognizable certifications, Dan is an expert in Linux administration, Palo Alto firewall administration, and wireless networking. Dan enjoys teaching the technologies focusing on real-world application of the theory. Outside of class-related efforts, he runs an animal shelter teaming with rescue animals.


    The CCNP Enterprise: ENCOR is the first step to mastering the implementation of core enterprise network technologies. The goal of this online training course is to provide you with the skills needed to install, manage, and administer dual stack architecture, virtualization, network assurance, security, and automation in an enterprise network.

    In CCNP Enterprise: ENWLSI, you will be given the skills and knowledge to implement wireless networks, including FlexConnect, QoS, Multicast, advanced location services, security for client connectivity, monitoring, and device hardening.

    The course will prepare you to sit for the Cisco CCNP Enterprise Core exam ENCOR and the Cisco CCNP Enterprise Concentration exam ENWLSI. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.

 

  • Cisco CCNP Enterprise: ENCOR & ENWLSI (Vouchers Included)
  • Fee: $3,995.00
    Item Number: SP2CCTP48211
    Dates: 1/1/2025 - 6/30/2025
    Times: 12:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    This course is intended for network engineers, system engineers, network administrators, and those looking to attain their CCNP Enterprise certification.



    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC, Mac, or Chromebook.

    Software Requirements:

    • PC: Windows 8 or later.
    • Mac: macOS 10.6 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
    • Microsoft Word Online
    • Adobe Acrobat Reader
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment and will be available online.


    The CCNP Enterprise: ENCOR is the first step to mastering the implementation of core enterprise network technologies. The goal of this online training course is to provide you with the skills needed to install, manage, and administer dual stack architecture, virtualization, network assurance, security, and automation in an enterprise network.

    In CCNP Enterprise: ENWLSI, you will be given the skills and knowledge to implement wireless networks, including FlexConnect, QoS, Multicast, advanced location services, security for client connectivity, monitoring, and device hardening.

    The course will prepare you to sit for the Cisco CCNP Enterprise Core exam ENCOR and the Cisco CCNP Enterprise Concentration exam ENWLSI. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.


    1. Course Overview
      1. Introduction to ENCOR Course and Exam Objectives
    2. Campus Architecture and Device Fundamentals
      1. Campus Architecture
      2. Device Architecture
    3. Access and Distribution Layer Features and Services
      1. Configuring and Verifying VLANs
      2. Configuring and Verifying Trunks
      3. VLAN Trunking Protocol (VTP)
      4. STP Overview and Algorithm Deep Dive
      5. STP Convergence, Configuration and Manipulation
      6. STP PortFast, and BPDU Guard
      7. Multiple Spanning Tree Protocol (MSTP)
      8. EtherChannels
      9. Inter-VLAN Routing
      10. First-Hop Redundancy Protocol (FHRP)
    4. Routing
      1. Routing Introduction
      2. Dynamic Routing Overview
      3. OSPFv2 Overview, Packets, States, and Design
      4. OSPFv2 Configuration and Verification
      5. Text BoxOSPFv2 Network Types and DR/BDR Election
      6. OSPFv2 LSAs and Metric
      7. OSPFv2 Summarization
      8. OSPFv2 Filtering
      9. EBGP Overview, Configuration and Verification
      10. Text BoxShapeBGP Best Path Selection Process
      11. Network Address Translation (NAT)
      12. Multicast Protocol Overview
    5. VPN's
      1. GRE Tunnel Configuration and Verification
      2. IPSec Introduction
      3. IPSec Site-to-Site VPN Tunnel Configuration and Verification
      4. GRE over IPSec Tunnel Configuration and Verification
      5. Virtual Routing and Forwarding (VRF)
    6. Management Protocols and Services
      1. NTP Configuration and Verification
      2. Syslog Configuration and Verification
      3. Debugs, Conditional Debugs, Ping, and Traceroute
      4. SNMP Configuration and Verification
      5. NetFlow / Flexible NetFlow Configuration and Verification
      6. SPAN, RSPAN, ERSPAN Configuration and Verification
      7. IPSLA Configuration and Verification
      8. Quality of Service (QoS) Overview
      9. Embedded Event Manager (EEM) Configuration
    7. Security
      1. Device Access, Authentication Configuration and Verification
      2. AAA Configuration and Verification
      3. Access Control Lists (ACLs)
      4. Control Plane Policing (CoPP)
      5. Next-Gen Firewalls, Network Access Control, MACSec, and TrustSec
    8. Next Generation Campus Networks
      1. SD-Access
      2. LISP and VXLAN
      3. SD-WAN
      4. DNA Center Overview
      5. Data Formats
      6. Data Modeling
      7. NetConf / RestConf
      8. Python Exam Prep
      9. ShapeChef, Puppet, Ansible, SaltStack
    9. LAN Essentials
    10. Securing and Troubleshooting the Wireless Network Infrastructure including
      1. Secure access to Wireless LAN Controllers (WLCs) and Access Points (APs)
      2. Configuration management via Cisco DNA Center, Cisco Prime Infrastructure (PI)
    11. Implementing and Troubleshooting Secure Client Connectivity including
      1. 802.1X Authentication, AAA services, and Cisco Connected Mobile Experiences (CMX)
    12. Implementing and Troubleshooting QoS in Wireless Networks including
      1. Cisco Application Visibility and Control (AVC), Multicast DNS (mDNS), and Cisco Media Stream
    13. Implementing and Troubleshooting Advanced Wireless Network Services including
      1. Location Services, Analytics, and wireless spectrum management

    What you will learn

    ENCOR

    • Configuration of VRF, GRE, VLANs, RSTP, MST, NTP, IPSec VPNs, and more
    • Advanced Routing
    • Configure and verify device management
    • Cisco DNA Center
    • Examine threat defense, endpoint security, and introduction to the Next-Generation Firewall

    ENWLSI

    • Implement network settings to provide a secure wireless network infrastructure and troubleshoot security issues as it relates to the wireless network infrastructure
    • Implement a secure wireless client and troubleshoot wireless client connectivity issues
    • Implement and troubleshoot QoS in wireless networks
    • Implement and troubleshoot advanced capabilities in wireless network services

    How you will benefit

    • You will be prepared to sit for the Cisco CCNP Enterprise core exam: 350-401 ENCOR: Implementing and Operating Cisco Enterprise Network Core Technologies
    • You will be prepared to sit for the Cisco CCNP Enterprise concentration exam: 300-430 ENWLSI: Implementing Cisco Enterprise Wireless Networks

    Raymond Lacoste

    Raymond Lacoste is a highly recognized instructor and IT professional who holds the Cisco Sirius Instructor Award. He has authored Cisco Press publications on the Cisco ENARSI and Cisco TSHOOT exams. Raymond's areas of expertise include Cisco Enterprise networking, Cisco Routing and Switching, Cisco Datacenter Networking, ITIL, and Amazon AWS. He also holds certifications in Cisco CCSI, Cisco CCNP Routing and Switching, Cisco CCNP Enterprise, ITIL Foundations, ITIL Practitioner, ITIL Intermediate, Amazon AWS System Operations, Amazon AWS Architect, Amazon AWS Developer, and CISSP. In addition to his certifications and experience, Raymond's engaging instruction style makes even the most obscenely complicated or obtuse concepts relatable and understandable. Outside of class, he enjoys dominating both on the golf course and the basketball court.

    Dan Goodman

    Dan Goodman is an IT professional specializing in Linux administration, Palo Alto firewalls, and wireless networking. He holds certifications in CompTIA Linux+, CWNP: CWNA, and Palo Alto PCNSA. In addition to his highly recognizable certifications, Dan is an expert in Linux administration, Palo Alto firewall administration, and wireless networking. Dan enjoys teaching the technologies focusing on real-world application of the theory. Outside of class-related efforts, he runs an animal shelter teaming with rescue animals.


    The CCNP Enterprise: ENCOR is the first step to mastering the implementation of core enterprise network technologies. The goal of this online training course is to provide you with the skills needed to install, manage, and administer dual stack architecture, virtualization, network assurance, security, and automation in an enterprise network.

    In CCNP Enterprise: ENWLSI, you will be given the skills and knowledge to implement wireless networks, including FlexConnect, QoS, Multicast, advanced location services, security for client connectivity, monitoring, and device hardening.

    The course will prepare you to sit for the Cisco CCNP Enterprise Core exam ENCOR and the Cisco CCNP Enterprise Concentration exam ENWLSI. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.

 

  • Cisco CCNP Security: SCOR & SISE
  • Fee: $3,295.00
    Item Number: SP2CCTP48221
    Dates: 1/1/2025 - 6/30/2025
    Times: 12:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    This course is intended for network security engineers and those looking to attain their CCNP Security certification.



    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC, Mac, or Chromebook.

    Software Requirements:

    • PC: Windows 8 or later.
    • Mac: macOS 10.6 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
    • Microsoft Word Online
    • Adobe Acrobat Reader
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment and will be available online.


    The CCNP Security: SCOR course provides you with the knowledge to implement and operate core Cisco security technologies. You will learn about common security vulnerabilities, Email Security Appliance (ESA), Web Security Appliance (WSA), Cloud Email Security (CES), mobile device management (MDM), VPN configuration, and more.

    The Configuring Cisco Identity Services Engine (SISE) course provides you with the skills and knowledge to deploy and use the Cisco Identity Services Engine (ISE), policy enforcement, profiling services, web authentication and guest access services, BYOD, endpoint compliance services, and TACACS+ device administration. Crucial elements of this course include the ability to use Cisco ISE to gain visibility into what is happening in your network, streamline security policy management, and contribute to operational efficiency.

    The course will prepare you to sit for the Cisco CCNP Security Core exam SCOR and the Cisco CCNP Security Concentration exam SISE. These exams in tandem will earn you the CCNP Security certification. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.


    1. Security Foundations
      1. Attacks against on-premises and cloud resources
      2. Common security vulnerabilities
      3. Cryptography concepts and applications
      4. Managing Cisco security devices via application programming interfaces (APIs)
    2. Implementing Security
      1. Security in common cloud environments
      2. Division of responsibility (shared responsibility model)
      3. DevSecOps, continuous integration, and orchestration
    3. Cloud Concepts and Security
      1. Configuring and Verifying VLANs
      2. Configuring and Verifying Trunks
      3. VLAN Trunking Protocol (VTP)
      4. STP Overview and Algorithm Deep Dive
      5. STP Convergence, Configuration and Manipulation
      6. STP PortFast, and BPDU Guard
      7. Multiple Spanning Tree Protocol (MSTP)
      8. EtherChannels
      9. Inter-VLAN Routing
      10. First-Hop Redundancy Protocol (FHRP)
    4. Application-Specific Security Tools
      1. Email Security Appliance (ESA)
      2. Web Security Appliance (WSA)
      3. Cloud Email Security (CES)
      4. Securing DNS with Cisco Umbrella
    5. Securing Endpoints
      1. Antimalware concepts
      2. Mobile device management (MDM)
      3. Multifactor authentication (MFA)
      4. Network access control
      5. Patch management
    6. Network Access Control and Visibility
      1. 802.1x, WebAuth, and MAB
      2. Network visibility and evasion techniques
      3. Cisco network analytics technologies
    7. Introducing Cisco ISE Architecture and Deployment
      1. Using Cisco ISE as a Network Access Policy Engine
      2. Cisco ISE Use Cases
      3. Describing Cisco ISE Functions
      4. Cisco ISE Deployment Models
      5. Context Visibility
    8. Cisco ISE Policy Enforcement
      1. Using 802.1X for Wired and Wireless Access
      2. Using MAC Authentication Bypass for Wired and Wireless Access
      3. Introducing Identity Management
      4. Configuring Certificate Services
      5. Introducing Cisco ISE Policy
      6. Implementing Third-Party Network Access Device Support
      7. Introducing Cisco TrustSec
      8. Cisco TrustSec Configuration
      9. Easy Connect
    9. Web Authentication and Guest Services
      1. Introducing Web Access with Cisco ISE
      2. Introducing Guest Access Components
      3. Configuring Guest Access Settings
      4. Configuring Sponsor and Guest Portals
    10. Cisco ISE Profiler
      1. Introducing Cisco ISE Profiler
      2. Profiling Deployment and Best Practices
    11. Cisco ISE BYOD
      1. Introducing the Cisco ISE BYOD Process
      2. Describing BYOD Flow
      3. Configuring the My Devices Portal
      4. Configuring Certificates in BYOD Scenarios
    12. Cisco ISE Endpoint Compliance Services
      1. Introducing Endpoint Compliance Services
      2. Configuring Client Posture Services and Provisioning in Cisco ISE
    13. Working with Network Access Devices
      1. Review TACACS+
      2. Cisco ISE TACACS+ Device Administration
      3. Configure TACACS+ Device Administration
      4. TACACS+ Device Administration Guidelines and Best Practices
      5. Migrating from Cisco ACS to Cisco ISE

    What you will learn

    SCOR

    • Cisco security devices via an API
    • Layer 2 and Layer 3+ security
    • VPNs
    • Cloud security concepts
    • Email Security Appliance (ESA)
    • Web Security Appliance (WSA)
    • Cloud Email Security (CES)
    • DNS with Cisco Umbrella
    • Mobile device management (MDM)
    • Multifactor authentication (MFA)

    SISE

    • Describe Cisco ISE deployments, including core deployment components and how they interact to create a cohesive security architecture
    • Describe the advantages of such a deployment and how each Cisco ISE capability contributes to these advantages
    • Describe concepts and configure components related to 802.1X and MAC Authentication Bypass (MAB) authentication, identity management, and certificate services
    • Describe how Cisco ISE policy sets are used to implement authentication and authorization and how to leverage this capability to meet the needs of your organization
    • Describe third-party Network Access Devices (NADs), Cisco TrustSec®, and Easy Connect
    • Describe and configure web authentication, processes, operation, and guest services, including guest access components and various guest access scenarios
    • Describe and configure Cisco ISE profiling services and understand how to monitor these services to enhance your situational awareness about network-connected endpoints
    • Describe best practices for deploying this profiler service in your specific environment
    • Describe BYOD challenges, solutions, processes, and portalsConfigure a BYOD solution and describe the relationship between BYOD processes and their related configuration components
    • Describe and configure various certificates related to a BYOD solution
    • Describe the value of the My Devices portal and how to configure this portal
    • Describe endpoint compliance, compliance components, posture agents, posture deployment and licensing, and the posture service in Cisco ISE
    • Describe and configure TACACS+ device administration using Cisco ISE, including command sets, profiles, and policy sets
    • Understand the role of TACACS+ within the Authentication, Authentication, and Accounting (AAA) framework and the differences between the RADIUS and TACACS+ protocols
    • Migrate TACACS+ functionality from Cisco Secure Access Control System (ACS) to Cisco ISE, using a migration tool

    How you will benefit

    • You will be prepared to sit for the Cisco CCNP Security core exam: 350-701 SCOR: Implementing and Operating Cisco Security Core Technologies
    • You will be prepared to sit for the Cisco CCNP Security concentration exam: 300-715 SISE: Implementing and Configuring Cisco Identity Services Engine

    Shane Sexton

    Shane Sexton is a cybersecurity-focused instructor with a hunger for using technology to combat real-world challenges. He holds many professional IT certifications such as Citrix CCA, CompTIA A+, CompTIA Security+, CompTIA Linux+, CompTIA CySA+, ITIL Foundations, Cisco CCNA, AWS SysOps, and Cisco CCNP Security. Shane's extensive professional expertise includes Citrix Virtualization, Citrix Virtualization, Computer Hardware support, Cisco networking, Cybersecurity Blue Team, Cybersecurity Red Team, Cisco security, Amazon AWS, and ITIL. Inside the classroom, Shane makes the complicated seem approachable. Outside the classroom, Shane is a mad scientist with automation, coding, and scripting, tying them back to technologies he teaches in class. If he isn't watching the latest SpaceX launch, he can usually be found tinkering with something.

    Doug Bassett

    Doug Bassett is an IT instructor specializing in Microsoft Azure, Server 2016/19, and Exchange messaging. He holds many highly sought-after IT certifications, including Microsoft MCSE, Microsoft MCSA, CompTIA Network+, Cisco CCNA, and Microsoft MCT. In addition to his certifications, Doug has expert knowledge of Microsoft Server 2000, 2003, 2008/2012/2016/2019, Exchange Server and Exchange Online, and Networking structure and applications. As an instructor, Doug is deeply involved in helping his students understand complex concepts and loves to approach teaching a subject from multiple angles.


    The CCNP Security: SCOR course provides you with the knowledge to implement and operate core Cisco security technologies. You will learn about common security vulnerabilities, Email Security Appliance (ESA), Web Security Appliance (WSA), Cloud Email Security (CES), mobile device management (MDM), VPN configuration, and more.

    The Configuring Cisco Identity Services Engine (SISE) course provides you with the skills and knowledge to deploy and use the Cisco Identity Services Engine (ISE), policy enforcement, profiling services, web authentication and guest access services, BYOD, endpoint compliance services, and TACACS+ device administration. Crucial elements of this course include the ability to use Cisco ISE to gain visibility into what is happening in your network, streamline security policy management, and contribute to operational efficiency.

    The course will prepare you to sit for the Cisco CCNP Security Core exam SCOR and the Cisco CCNP Security Concentration exam SISE. These exams in tandem will earn you the CCNP Security certification. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.

 

  • Cisco CCNP Security: SCOR & SISE (Vouchers Included)
  • Fee: $3,995.00
    Item Number: SP2CCTP48231
    Dates: 1/1/2025 - 6/30/2025
    Times: 12:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    This course is intended for network security engineers and those looking to attain their CCNP Security certification.



    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC, Mac, or Chromebook.

    Software Requirements:

    • PC: Windows 8 or later.
    • Mac: macOS 10.6 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
    • Microsoft Word Online
    • Adobe Acrobat Reader
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment and will be available online.


    The CCNP Security: SCOR course provides you with the knowledge to implement and operate core Cisco security technologies. You will learn about common security vulnerabilities, Email Security Appliance (ESA), Web Security Appliance (WSA), Cloud Email Security (CES), mobile device management (MDM), VPN configuration, and more.

    The Configuring Cisco Identity Services Engine (SISE) course provides you with the skills and knowledge to deploy and use the Cisco Identity Services Engine (ISE), policy enforcement, profiling services, web authentication and guest access services, BYOD, endpoint compliance services, and TACACS+ device administration. Crucial elements of this course include the ability to use Cisco ISE to gain visibility into what is happening in your network, streamline security policy management, and contribute to operational efficiency.

    The course will prepare you to sit for the Cisco CCNP Security Core exam SCOR and the Cisco CCNP Security Concentration exam SISE. These exams in tandem will earn you the CCNP Security certification. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.


    1. Security Foundations
      1. Attacks against on-premises and cloud resources
      2. Common security vulnerabilities
      3. Cryptography concepts and applications
      4. Managing Cisco security devices via application programming interfaces (APIs)
    2. Implementing Security
      1. Security in common cloud environments
      2. Division of responsibility (shared responsibility model)
      3. DevSecOps, continuous integration, and orchestration
    3. Cloud Concepts and Security
      1. Configuring and Verifying VLANs
      2. Configuring and Verifying Trunks
      3. VLAN Trunking Protocol (VTP)
      4. STP Overview and Algorithm Deep Dive
      5. STP Convergence, Configuration and Manipulation
      6. STP PortFast, and BPDU Guard
      7. Multiple Spanning Tree Protocol (MSTP)
      8. EtherChannels
      9. Inter-VLAN Routing
      10. First-Hop Redundancy Protocol (FHRP)
    4. Application-Specific Security Tools
      1. Email Security Appliance (ESA)
      2. Web Security Appliance (WSA)
      3. Cloud Email Security (CES)
      4. Securing DNS with Cisco Umbrella
    5. Securing Endpoints
      1. Antimalware concepts
      2. Mobile device management (MDM)
      3. Multifactor authentication (MFA)
      4. Network access control
      5. Patch management
    6. Network Access Control and Visibility
      1. 802.1x, WebAuth, and MAB
      2. Network visibility and evasion techniques
      3. Cisco network analytics technologies
    7. Introducing Cisco ISE Architecture and Deployment
      1. Using Cisco ISE as a Network Access Policy Engine
      2. Cisco ISE Use Cases
      3. Describing Cisco ISE Functions
      4. Cisco ISE Deployment Models
      5. Context Visibility
    8. Cisco ISE Policy Enforcement
      1. Using 802.1X for Wired and Wireless Access
      2. Using MAC Authentication Bypass for Wired and Wireless Access
      3. Introducing Identity Management
      4. Configuring Certificate Services
      5. Introducing Cisco ISE Policy
      6. Implementing Third-Party Network Access Device Support
      7. Introducing Cisco TrustSec
      8. Cisco TrustSec Configuration
      9. Easy Connect
    9. Web Authentication and Guest Services
      1. Introducing Web Access with Cisco ISE
      2. Introducing Guest Access Components
      3. Configuring Guest Access Settings
      4. Configuring Sponsor and Guest Portals
    10. Cisco ISE Profiler
      1. Introducing Cisco ISE Profiler
      2. Profiling Deployment and Best Practices
    11. Cisco ISE BYOD
      1. Introducing the Cisco ISE BYOD Process
      2. Describing BYOD Flow
      3. Configuring the My Devices Portal
      4. Configuring Certificates in BYOD Scenarios
    12. Cisco ISE Endpoint Compliance Services
      1. Introducing Endpoint Compliance Services
      2. Configuring Client Posture Services and Provisioning in Cisco ISE
    13. Working with Network Access Devices
      1. Review TACACS+
      2. Cisco ISE TACACS+ Device Administration
      3. Configure TACACS+ Device Administration
      4. TACACS+ Device Administration Guidelines and Best Practices
      5. Migrating from Cisco ACS to Cisco ISE

    What you will learn

    SCOR

    • Cisco security devices via an API
    • Layer 2 and Layer 3+ security
    • VPNs
    • Cloud security concepts
    • Email Security Appliance (ESA)
    • Web Security Appliance (WSA)
    • Cloud Email Security (CES)
    • DNS with Cisco Umbrella
    • Mobile device management (MDM)
    • Multifactor authentication (MFA)

    SISE

    • Describe Cisco ISE deployments, including core deployment components and how they interact to create a cohesive security architecture
    • Describe the advantages of such a deployment and how each Cisco ISE capability contributes to these advantages
    • Describe concepts and configure components related to 802.1X and MAC Authentication Bypass (MAB) authentication, identity management, and certificate services
    • Describe how Cisco ISE policy sets are used to implement authentication and authorization and how to leverage this capability to meet the needs of your organization
    • Describe third-party Network Access Devices (NADs), Cisco TrustSec®, and Easy Connect
    • Describe and configure web authentication, processes, operation, and guest services, including guest access components and various guest access scenarios
    • Describe and configure Cisco ISE profiling services and understand how to monitor these services to enhance your situational awareness about network-connected endpoints
    • Describe best practices for deploying this profiler service in your specific environment
    • Describe BYOD challenges, solutions, processes, and portalsConfigure a BYOD solution and describe the relationship between BYOD processes and their related configuration components
    • Describe and configure various certificates related to a BYOD solution
    • Describe the value of the My Devices portal and how to configure this portal
    • Describe endpoint compliance, compliance components, posture agents, posture deployment and licensing, and the posture service in Cisco ISE
    • Describe and configure TACACS+ device administration using Cisco ISE, including command sets, profiles, and policy sets
    • Understand the role of TACACS+ within the Authentication, Authentication, and Accounting (AAA) framework and the differences between the RADIUS and TACACS+ protocols
    • Migrate TACACS+ functionality from Cisco Secure Access Control System (ACS) to Cisco ISE, using a migration tool

    How you will benefit

    • You will be prepared to sit for the Cisco CCNP Security core exam: 350-701 SCOR: Implementing and Operating Cisco Security Core Technologies
    • You will be prepared to sit for the Cisco CCNP Security concentration exam: 300-715 SISE: Implementing and Configuring Cisco Identity Services Engine

    Shane Sexton

    Shane Sexton is a cybersecurity-focused instructor with a hunger for using technology to combat real-world challenges. He holds many professional IT certifications such as Citrix CCA, CompTIA A+, CompTIA Security+, CompTIA Linux+, CompTIA CySA+, ITIL Foundations, Cisco CCNA, AWS SysOps, and Cisco CCNP Security. Shane's extensive professional expertise includes Citrix Virtualization, Citrix Virtualization, Computer Hardware support, Cisco networking, Cybersecurity Blue Team, Cybersecurity Red Team, Cisco security, Amazon AWS, and ITIL. Inside the classroom, Shane makes the complicated seem approachable. Outside the classroom, Shane is a mad scientist with automation, coding, and scripting, tying them back to technologies he teaches in class. If he isn't watching the latest SpaceX launch, he can usually be found tinkering with something.

    Doug Bassett

    Doug Bassett is an IT instructor specializing in Microsoft Azure, Server 2016/19, and Exchange messaging. He holds many highly sought-after IT certifications, including Microsoft MCSE, Microsoft MCSA, CompTIA Network+, Cisco CCNA, and Microsoft MCT. In addition to his certifications, Doug has expert knowledge of Microsoft Server 2000, 2003, 2008/2012/2016/2019, Exchange Server and Exchange Online, and Networking structure and applications. As an instructor, Doug is deeply involved in helping his students understand complex concepts and loves to approach teaching a subject from multiple angles.


    The CCNP Security: SCOR course provides you with the knowledge to implement and operate core Cisco security technologies. You will learn about common security vulnerabilities, Email Security Appliance (ESA), Web Security Appliance (WSA), Cloud Email Security (CES), mobile device management (MDM), VPN configuration, and more.

    The Configuring Cisco Identity Services Engine (SISE) course provides you with the skills and knowledge to deploy and use the Cisco Identity Services Engine (ISE), policy enforcement, profiling services, web authentication and guest access services, BYOD, endpoint compliance services, and TACACS+ device administration. Crucial elements of this course include the ability to use Cisco ISE to gain visibility into what is happening in your network, streamline security policy management, and contribute to operational efficiency.

    The course will prepare you to sit for the Cisco CCNP Security Core exam SCOR and the Cisco CCNP Security Concentration exam SISE. These exams in tandem will earn you the CCNP Security certification. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility.

 

  • CompTIA A+ Certification Training (Vouchers Included)
  • Fee: $2,095.00
    Item Number: SP2CCTP46591
    Dates: 1/1/2025 - 6/30/2025
    Times: 12:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    This course is designed to help you prepare to earn your CompTIA A+ credential by passing both required certification exams. Essential exam topics covered include various computer hardware and software aspects, including mobile devices, networking technology, virtualization, cloud computing, security, and operational procedures.



    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC, Mac, or Chromebook.
    • Labs included in this program are not supported on mobile devices (i.e., phones and tablets).

    Software Requirements:

    • PC: Windows 10 or later.
      • Note: Access to Windows 11 is needed for the optional textbook module "Installing Windows".
      • Note: A Windows environment is required to complete some course assignments.
    • Mac: macOS 10.6 or later.
    • Chromebook 113 or later
    • Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
    • Microsoft Word. To complete your assignments, you may need Microsoft Word 2003 or higher, or an equivalent word-processing program, such as LibreOffice, which is available to download for free.
    • Adobe Acrobat Reader. (Software must be installed and fully operational before the course begins.)

    Other:

    • Email capabilities and access to a personal email account.
    • A reliable high-speed Internet connection.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment and will be available online. The textbook for the A+ course is accessed via links in the course lessons.

    • CompTIA A+ Guide to IT Technical Support

    Prepare to pass the CompTIA A+ certification exams to boost your resume and demonstrate your IT competence with a globally recognized credential! Obtaining your CompTIA A+ certification will open doors to entry-level IT jobs such as technical support specialists, help desk technicians, or field service technicians.

    Our comprehensive CompTIA A+ course offers a thorough overview of the basic concepts around multiple operating systems, enabling you to efficiently maintain and troubleshoot various operating systems. The CompTIA A+ certification is vendor-neutral and adaptable to different technology platforms, providing a solid foundation to pursue specialized certifications.

    You will become equipped with the skills to effectively diagnose and troubleshoot common software, hardware, and connectivity issues. With this employer-desired expertise, you will be an indispensable asset in any organization as you ensure smooth system operations and handle any technical challenges that arise.

    This CompTIA A+ certification training also covers network fundamentals, providing you with a solid foundation in networking concepts, protocols, and troubleshooting techniques. This knowledge will enable you to effectively manage network infrastructure, enhance connectivity, and contribute to efficient communication within organizations.

    Furthermore, you will gain practical experience in assembling and disassembling multiple computer parts, honing your skills in computer hardware. The in-depth CompTIA A+ training enables you to become proficient in building and maintaining computer systems, giving you a competitive edge in the job market.

    Upon successful completion of the lessons and exercises in this bundled CompTIA A+ certification program, you will be well-prepared to take CompTIA's A+ certification exams. You will receive an exam voucher for each certification exam, which covers the cost to sit for the certifying exams upon eligibility.


    1. CompTIA A+ Certification Training
      1. Taking a Computer Apart and Putting It Back Together
      2. All About Cases and Motherboards
      3. Supporting Processors and Upgrading Memory
      4. Power Supplies and Troubleshooting Computer Problems
      5. Supporting Hard Drives and Other Storage Devices
      6. Supporting Input/Output Devices
      7. Networking Fundamentals
      8. Network Infrastructure and Cloud Computing
      9. Supporting Mobile Devices
      10. Supporting Printers
      11. The Complex World of IT Professionals
      12. Installing Windows
      13. Maintaining Windows
      14. Troubleshooting Windows After Startup
      15. Troubleshooting Windows Startup
      16. Security Strategies
      17. Securing and Sharing Windows Resources
      18. Mobile Device Security
      19. Network Security and Troubleshooting
      20. Supporting macOS
      21. Linux and Scripting
      22. Preparing for a Certification Exam

    What you will learn

    • Explore a comprehensive video overview of the CompTIA A+ course
    • Master fundamental concepts of multiple operating systems to maintain and support them effectively
    • Develop troubleshooting skills for software, hardware, and connectivity issues
    • Acquire knowledge of network fundamentals, protocols, and troubleshooting techniques
    • Gain in-depth experience in assembling and disassembling computer parts to expand your IT expertise

    How you will benefit

    • Enhance and ensure your preparation for the CompTIA A+ certification exams
    • Engage with a variety of interactive learning materials, assignments, and assessments that will deepen your understanding and help with exam preparation
    • Boost your employability by jump-starting your IT career with a highly respected and recognized certification that demonstrates your proficiency in essential IT skills

    Linda Matthews

    Linda Matthews has years of experience both in the classroom teaching technical material and in the field solving a myriad of technical issues.

    Linda possesses the background to engage deeply with cybersecurity through teaching and intellectual focus. For the past eight years, she has lived with this vast and fascinating body of knowledge. Now, she regularly trains individuals in several of the most popular security courses from CompTIA and Microsoft. CompTIA's Security+ is the foundational course students need to begin an incredible journey into cybersecurity.

    Linda has a strong love for teaching and igniting the spark that can set students on a most worthwhile and fulfilling path.

    Sara Perrott

    Sara Perrott has been working in the information technology field for 20+ years and has devoted the last 10 of those to focusing on cybersecurity. She is a published author and a former college professor, and she is passionate about teaching the next generation of cybersecurity professionals. Sara has a Master of Science in Cybersecurity and Information Assurance from Western Governors University Washington and a Bachelor of Science in Information Systems Security from the University of Phoenix.

    Paula Woodall

    Paula Woodall began her technical career as a network and computer consultant 30 years ago. She first taught at a local university before taking the CompTIA and Microsoft exams to teach certified courses. Paula has been fortunate to teach these classes worldwide for companies such as HP and Microsoft. Paula enjoys teaching classes regarding computers and networking and talking to students about how their companies put these technologies to work for them.

    Justin Burandt

    Justin Burandt has built a strong career in information technology (IT) education, holding various leadership and support roles across several universities. As an assistant director at Miami Dade College's Cybersecurity Center of the Americas, he played a key role in developing the IT training infrastructure and expanding certification programs. Additionally, Justin has mentored over 120 students in Western Governors University's IT bachelor's programs. His teaching experience spans both online and in-person, including CompTIA Tech+, A+, and Network+ courses across high school, college, and adult education settings. He has also led IT seminars for various organizations, including governments, financial institutions, and businesses.


    Prepare to pass the CompTIA A+ certification exams to boost your resume and demonstrate your IT competence with a globally recognized credential! Obtaining your CompTIA A+ certification will open doors to entry-level IT jobs such as technical support specialists, help desk technicians, or field service technicians.

    Our comprehensive CompTIA A+ course offers a thorough overview of the basic concepts around multiple operating systems, enabling you to efficiently maintain and troubleshoot various operating systems. The CompTIA A+ certification is vendor-neutral and adaptable to different technology platforms, providing a solid foundation to pursue specialized certifications.

    You will become equipped with the skills to effectively diagnose and troubleshoot common software, hardware, and connectivity issues. With this employer-desired expertise, you will be an indispensable asset in any organization as you ensure smooth system operations and handle any technical challenges that arise.

    This CompTIA A+ certification training also covers network fundamentals, providing you with a solid foundation in networking concepts, protocols, and troubleshooting techniques. This knowledge will enable you to effectively manage network infrastructure, enhance connectivity, and contribute to efficient communication within organizations.

    Furthermore, you will gain practical experience in assembling and disassembling multiple computer parts, honing your skills in computer hardware. The in-depth CompTIA A+ training enables you to become proficient in building and maintaining computer systems, giving you a competitive edge in the job market.

    Upon successful completion of the lessons and exercises in this bundled CompTIA A+ certification program, you will be well-prepared to take CompTIA's A+ certification exams. You will receive an exam voucher for each certification exam, which covers the cost to sit for the certifying exams upon eligibility.

 

  • CompTIA Network+ Certification Training (Voucher Included)
  • Fee: $1,895.00
    Item Number: SP2CCTP46571
    Dates: 1/1/2025 - 6/30/2025
    Times: 12:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    This course will prepare you for a career as a network technician and qualify you to take the CompTIA Network+ certification exam (N10-009). You will master a variety of networking concepts and gain a fundamental knowledge of network design, security, cloud computing, and routing and switching.



    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC, Mac, or Chromebook.
    • Labs included in this program are not supported on mobile devices (i.e., phones and tablets).
    • Please note that a Windows environment is required to complete some course assignments.
    • A motherboard capable of client-side virtualization:
      • A 64-bit CPU
      • UEFI firmware
      • Hardware virtualization support in UEFI

    Software Requirements:

    • PC: Windows 10 or later.
    • Mac: macOS 10.6 or later.
    • Chromebook 113 or later
    • Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
    • Microsoft Word. To complete your assignments, you may need Microsoft Word 2003 or higher, or an equivalent word-processing program, such as LibreOffice, which is available to download for free.
    • Adobe Acrobat Reader. (Software must be installed and fully operational before the course begins.)

    Tools:

    • Access to copper Ethernet cable-making tools and equipment:
    • RJ-45 connectors
    • A crimping tool
    • Cat5, Cat5e, or Cat6 cable to practice on

    Other:

    • Email capabilities and access to a personal email account.
    • A reliable high-speed Internet connection.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment. The following digital textbook for this course is accessed via links in the course lessons:

    • CompTIA Network+ Guide to Networks, by Jill West (eBook)

    Knowing how to install, configure, and troubleshoot a computer network is a highly marketable and in-demand skill—and it's an ideal time to explore online CompTIA Network+ courses to expand your career opportunities and earning potential!

    This CompTIA Network+ certification course introduces the fundamental building blocks that form a modern network, such as hardware, topologies, and protocols, along with an introduction to the OSI model. The course provides in-depth coverage of the most important concepts in contemporary networking, including TCP/IP, Ethernet, wireless transmission, virtual networks, cloud computing, segmentation, security, performance optimization, and troubleshooting.

    After reading the lessons and completing the exercises in this CompTIA Net+ certification course, you will gain the confidence to select the network design, hardware, and software that best fits your environment. You will have the skills to build a network from scratch and maintain, upgrade, troubleshoot, and manage an existing network. Finally, you will be well-prepared to take CompTIA's Network+ certification exam.

    You will receive an exam voucher with your enrollment, which covers the fee to sit for the CompTIA Network+ (N10-009) certifying exam upon eligibility.


    1. Introduction to CompTIA
    2. Introduction to Networking
    3. Infrastructure and Documentation
    4. Addressing
    5. Protocols
    6. Cabling
    7. Wireless Networking
    8. Network Architecture
    9. Segmentation
    10. Wide Area Networking
    11. Risk Management
    12. Security in Network Design
    13. Performance and Recovery
    14. Final Exam

    What you will learn

    • Compare common network types, topologies, and architectures
    • Characteristics and uses of networking hardware and tools
    • How to install and configure wired and wireless networks
    • TCP/IP functionality and protocols
    • IP addressing concepts, including subnetting and VLANs
    • Cloud computing, virtualization, and remote access systems and methods
    • Tools and practices for monitoring network performance and health
    • Network safety and security threats and how to mitigate them
    • Explain how to troubleshoot and recover from network problems
    • Identify the purposes of network policies and documentation

    How you will benefit

    • Expand your career opportunities and earning potential
    • Course content is aligned with the CompTIA Network+ certification
    • Optional hands-on learning activities with simulations and live virtual machine labs
    • Opportunity to practice on multiple-choice questions to prepare you for your Network+ certification exam (N10-009)

    Linda Matthews

    Linda Matthews has years of experience both in the classroom teaching technical material and, in the field, solving a myriad of technical issues.

    Linda possesses the background to engage deeply with cybersecurity through teaching and intellectual focus. For the past eight years, she has lived with this vast and fascinating body of knowledge. Now, she regularly trains individuals in several of the most popular security courses from CompTIA and Microsoft.

    Linda has a strong love for teaching and igniting the spark that can set students on a most worthwhile and fulfilling path.

    Sara Perrott

    Sara Perrott has been working in the information technology field for 20+ years and has devoted the last 10 of those to focusing on cybersecurity. She is a published author and a former college professor, and she is passionate about teaching the next generation of cybersecurity professionals. Sara has a Master of Science in Cybersecurity and Information Assurance from Western Governors University Washington and a Bachelor of Science in Information Systems Security from the University of Phoenix.

    Brett Glines

    Brett Glines holds a Bachelor of Science in Finance from BYU and an MBA from Emory University. Since 1995, he has excelled as a consultant and educator in the field of technical education, primarily specializing in information technology and certification. He has helped thousands transition into IT careers and holds certifications in CompTIA A+, Network+, and Security+.

    Brett is a master at leveraging online environments for learning and has been training online exclusively since 2015. His focus is on engaging students and ensuring they understand and remember what they learn. He uses practical examples, everyday analogies and recall techniques to make learning easier and more effective.

    Justin Burandt

    Justin Burandt has built a strong career in information technology (IT) education, holding various leadership and support roles across several universities. As an assistant director at Miami Dade College's Cybersecurity Center of the Americas, he played a key role in developing the IT training infrastructure and expanding certification programs. Additionally, Justin has mentored over 120 students in Western Governors University's IT bachelor's programs. His teaching experience spans both online and in-person, including CompTIA Tech+, A+, and Network+ courses across high school, college, and adult education settings. He has also led IT seminars for various organizations, including governments, financial institutions, and businesses.


    Knowing how to install, configure, and troubleshoot a computer network is a highly marketable and in-demand skill—and it's an ideal time to explore online CompTIA Network+ courses to expand your career opportunities and earning potential!

    This CompTIA Network+ certification course introduces the fundamental building blocks that form a modern network, such as hardware, topologies, and protocols, along with an introduction to the OSI model. The course provides in-depth coverage of the most important concepts in contemporary networking, including TCP/IP, Ethernet, wireless transmission, virtual networks, cloud computing, segmentation, security, performance optimization, and troubleshooting.

    After reading the lessons and completing the exercises in this CompTIA Net+ certification course, you will gain the confidence to select the network design, hardware, and software that best fits your environment. You will have the skills to build a network from scratch and maintain, upgrade, troubleshoot, and manage an existing network. Finally, you will be well-prepared to take CompTIA's Network+ certification exam.

    You will receive an exam voucher with your enrollment, which covers the fee to sit for the CompTIA Network+ (N10-009) certifying exam upon eligibility.

 

  • CompTIA Security+ Certification Training (Voucher Included)
  • Fee: $1,995.00
    Item Number: SP2CCTP46581
    Dates: 1/1/2025 - 6/30/2025
    Times: 12:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    Learn a broad range of security topics, including threat management, identity management, access control, cryptography, and network security. This course will teach you everything you need to take and successfully pass the CompTIA Security+ certification exam.



    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC, Mac, or Chromebook.
    • Labs included in this program are not supported on mobile devices (i.e., phones and tablets).

    Software Requirements:

    • PC: Windows 10 or later.
    • Mac: macOS 10.6 or later.
    • Chromebook 113 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
    • Microsoft Word. To complete your assignments, you may need Microsoft Word 2003 or higher, or an equivalent word-processing program, such as LibreOffice, which is available to download for free.
    • Adobe Acrobat Reader.
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.
    • A reliable high-speed Internet connection

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment. The textbook for the Security+ course is accessed via links in the course lessons.

    • CompTIA Security+ Guide to Network Security Fundamentals

    Boost your cybersecurity career and yearly income by obtaining your CompTIA Security+ certification! According to CompTIA, five of the top six security jobs have annual salaries of $90,000 or higher, with some exceeding $127,000. The Security+ certification is widely recognized and well-respected in the IT industry and it will validate your skills and help you gain top-paying employment.

    The vendor-neutral CompTIA Security+ certification covers a broad range of security topics, including threat management, identity management, access control, cryptography, and network security. By completing this CompTIA Security+ course, learning key cybersecurity concepts and mastering accompanying quizzes and tests, you will be well-prepared to take the Security+ certification exam.

    This online CompTIA Security+ training covers the essential knowledge and skills required to identify, assess, and mitigate security risks in modern IT environments. This course provides a comprehensive overview of the key concepts and best practices in cybersecurity, including the latest trends and emerging threats. It also teaches the fundamental principles of cybersecurity and enables students to implement security controls that protect against a wide range of attacks and vulnerabilities.

    This Security+ certification course offers an exam voucher with enrollment. The voucher covers the cost to sit for the certifying exam upon eligibility. After completing the CompTIA Security+ course, you can set up your own exam dates and times at a nearby testing center.


    1. Introduction to CompTIA
    2. Security Fundamentals
    3. Threat Management and Cybersecurity Resources
    4. Threats and Attacks on Endpoints
    5. Endpoint and Application Development Security
    6. Cryptography
    7. Public Key Infrastructure and Cryptographic Protocols
    8. Mobile, Embedded, and Specialized Device Security
    9. Networking Threats, Assessments, and Defenses
    10. Network Security Appliances and Technologies
    11. Cloud and Virtualization Security
    12. Network Threats, Assessments, and Defenses
    13. Authentication
    14. Incident Preparation, Response, and Investigation
    15. Cybersecurity Resilience
    16. Risk Management and Data Privacy
    17. Preparing for the Certificate Exam
    18. Exploring a Career in Cybersecurity

    What you will learn

    • Gain fundamental concepts of computer security
    • Understand cybersecurity threats, vulnerabilities, and assessments
    • Review incident preparations, response, and risk management
    • Learn to monitor and secure hybrid environments, including cloud, mobile, Internet of Things (IoT), and operational technology

    How you will benefit

    • Prepare for the CompTIA Security+ certificate exam
    • Utilize a variety of interactives, assignments, and assessments
    • Review topics covering the most updated objectives found in the CompTIA Security+ exam

    Linda Matthews

    Linda Matthews has years of experience both in the classroom teaching technical material and in the field solving a myriad of technical issues.

    Linda possesses the background to engage deeply with cybersecurity through teaching and intellectual focus. For the past eight years, she has lived with this vast and fascinating body of knowledge. Now, she regularly trains individuals in several of the most popular security courses from CompTIA and Microsoft. CompTIA's Security+ is the foundational course students need to begin an incredible journey into cybersecurity.

    Linda has a strong love for teaching and igniting the spark that can set students on a most worthwhile and fulfilling path.

    Sara Perrott

    Sara Perrott has been working in the information technology field for 20+ years and has devoted the last 10 of those to focusing on cybersecurity. She is a published author and a former college professor, and she is passionate about teaching the next generation of cybersecurity professionals. Sara has a Master of Science in Cybersecurity and Information Assurance from Western Governors University Washington and a Bachelor of Science in Information Systems Security from the University of Phoenix.


    Boost your cybersecurity career and yearly income by obtaining your CompTIA Security+ certification! According to CompTIA, five of the top six security jobs have annual salaries of $90,000 or higher, with some exceeding $127,000. The Security+ certification is widely recognized and well-respected in the IT industry and it will validate your skills and help you gain top-paying employment.

    The vendor-neutral CompTIA Security+ certification covers a broad range of security topics, including threat management, identity management, access control, cryptography, and network security. By completing this CompTIA Security+ course, learning key cybersecurity concepts and mastering accompanying quizzes and tests, you will be well-prepared to take the Security+ certification exam.

    This online CompTIA Security+ training covers the essential knowledge and skills required to identify, assess, and mitigate security risks in modern IT environments. This course provides a comprehensive overview of the key concepts and best practices in cybersecurity, including the latest trends and emerging threats. It also teaches the fundamental principles of cybersecurity and enables students to implement security controls that protect against a wide range of attacks and vulnerabilities.

    This Security+ certification course offers an exam voucher with enrollment. The voucher covers the cost to sit for the certifying exam upon eligibility. After completing the CompTIA Security+ course, you can set up your own exam dates and times at a nearby testing center.

 

  • Computer Hacking Forensics Investigator (CHFI) (Voucher Included)
  • Fee: $2,895.00
    Item Number: SP2CCTP47761
    Dates: 1/1/2025 - 6/30/2025
    Times: 12:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    This course prepares for Computer Hacking Forensics Investigator (CHFI) certification exam. You will master the security discipline of digital forensics from a vendor-neutral perspective.



    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC or Mac.

    Software Requirements:

    • PC: Windows 8 or later.
    • Mac: macOS 10.10 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
    • Adobe Acrobat Reader.
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment and will be available online. The materials are non-refundable upon registration.


    This computer forensics certification course is designed to equip you with the necessary skills to pass the EC-Council's Computer Hacking Forensic Investigator (CHFI) Certification exam. By achieving this credential, you will be able to demonstrate your proficiency in digital forensic tools and techniques that are crucial in today's cybersecurity industry.

    Our digital forensics certification course takes a comprehensive and meticulous approach to computer forensics and evidence analysis. You will learn how to identify an intruder's traces, collect the appropriate evidence for prosecution, and prevent future attacks.

    Taught by a skilled digital forensics professional, in this CHFI certification program, you will learn a reliable method for conducting forensic investigations, which includes templates for collecting evidence, maintaining the chain of custody, and creating final investigation reports. Additionally, you will have access to cloud-based virtual labs on advanced Cyber Ranges, allowing you to practice different investigation techniques in realistically simulated environments.

    Note: This computer forensics certification is an ANSI 17024 accredited program, mapped to the NICE 2.0 framework and recognized and approved by the DoD under Directive 8570. Course enrollment includes a voucher that covers the certification exam fee upon eligibility. You can take the exam remotely through a proctor function—ensuring scheduling and testing are convenient.


    1. Computer Forensics in Today's World
    2. Computer Forensics Investigation Process
    3. Understanding Hard Disks and File Systems
    4. Data Acquisition and Duplication
    5. Defeating Anti-Forensics Techniques
    6. Windows Forensics
    7. Linux and Mac Forensics
    8. Network Forensics
    9. Malware Forensics
    10. Investigating Web Attacks
    11. Dark Web Forensics
    12. Cloud Forensics
    13. Email and Social Media Forensics
    14. Mobile Forensics
    15. IoT Forensics

    What you will learn

    • Establish threat intelligence and key learning points to support pro-active profiling and scenario modeling
    • Perform anti-forensic methods detection
    • Conduct post-intrusion analysis of electronic and digital media to determine who, where, what, when, and how the intrusion occurred
    • Extract and analyze logs from various devices such as proxy, firewall, IPS, IDS, desktop, laptop, servers, SIM tool, router, firewall, switches AD server, DHCP logs, and access control logs as part of the investigation process
    • Identify & check the possible source/incident origin
    • Recover deleted files and partitions in Windows, macOS, and Linux

    How you will benefit

    • Become a Certified Hacking Forensics Investigator (CHFI)
    • Exam eligibility for the EC-Council Certified Hacking Forensics Investigator (CHFI) Exam Number 312-49 with example CHFI questions
    • The CHFI certification can fortify the applied knowledge level of law enforcement, system administrators, security, defense and military personnel, legal, banking, and computer and network security. It helps to enhance knowledge and skills in digital investigations and network integrity

    Eric Reed

    Eric Reed has over 12 years of experience in IT consulting, specializing in security. Since 2005, he has consulted and delivered custom training to the U.S. military and numerous Fortune 100 and Fortune 500 companies. He has delivered CEH, CHFI, and ECSA/LPT training for the last seven years, with a 95 percent pass rating. Reed was awarded the EC Council Instructor of the Year in 2009 and 2012, as well as the Circle of Excellence in 2006, 2007, and 2010.


    This computer forensics certification course is designed to equip you with the necessary skills to pass the EC-Council's Computer Hacking Forensic Investigator (CHFI) Certification exam. By achieving this credential, you will be able to demonstrate your proficiency in digital forensic tools and techniques that are crucial in today's cybersecurity industry.

    Our digital forensics certification course takes a comprehensive and meticulous approach to computer forensics and evidence analysis. You will learn how to identify an intruder's traces, collect the appropriate evidence for prosecution, and prevent future attacks.

    Taught by a skilled digital forensics professional, in this CHFI certification program, you will learn a reliable method for conducting forensic investigations, which includes templates for collecting evidence, maintaining the chain of custody, and creating final investigation reports. Additionally, you will have access to cloud-based virtual labs on advanced Cyber Ranges, allowing you to practice different investigation techniques in realistically simulated environments.

    Note: This computer forensics certification is an ANSI 17024 accredited program, mapped to the NICE 2.0 framework and recognized and approved by the DoD under Directive 8570. Course enrollment includes a voucher that covers the certification exam fee upon eligibility. You can take the exam remotely through a proctor function—ensuring scheduling and testing are convenient.

 

  • Digital Game Artist Certificate
  • Fee: $2,595.00
    Item Number: SP2CCTP47131
    Dates: 1/1/2025 - 6/30/2025
    Times: 12:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    This online Digital Game Artist Certificate course will train you to become a professional video game artist by developing core skills for jobs related to Digital Art, 3D Art, Modeling, Character Design, and Environmental Art Design.



    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC or Mac.
    • 3 Button Mouse (with wheel)
    • These supplementary materials are recommended but not required:
      • Pressure sensitive tablet (e.g., Wacom)
      • Quixel Mixer
      • Various thickness black markers
      • Sketching pencils
      • 12 color pack of pens

    Software Requirements:

    • PC: Windows 8 or later.
    • Mac: macOS 10.6 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
    • Blender 2015 or later
    • Adobe Photoshop CS6+ (not included in enrollment) or GIMP/Paint.NET (free)
    • Unreal Engine 4
    • Unity 5+
    • Adobe Acrobat Reader.
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment and will be available online.


    Become a professional video game artist with this online game artist training course, designed to equip you with the necessary skills and knowledge to succeed in this creative and lucrative industry. Focus on developing core competencies in areas such as digital art, 3D art, modeling, character design, and environmental art design. You will learn essential techniques for jobs related to game art, including modeling game props and characters, importing elements into game-specific software, and animating game assets.

    Apply the concepts learned in the course by working with popular game development platforms such as Unreal Engine 4 and Unity 5+. These platforms are widely used in the video game industry and will provide you with hands-on experience in translating your artistic skills into practical game design.

    In addition to software and game-related techniques, this game art course also covers broader topics that can help boost your career such as general design principles and concept art. You will learn the fundamental principles that distinguish good art from great art and the key social aspects necessary for ongoing growth and professional development in the field. By the end of the game artist course, you will have acquired a diverse set of employable skills and a solid understanding of the key components of 3D art and environmental art.


    1. 3D Modeling I
      1. Getting Started
      2. Basic Blender Interface
      3. Viewport Configuration and Layout
      4. Display Settings and Menu Rollouts
      5. Select, Undo/Redo, and Space Search
      6. Rendering an Image
      7. Viewport Controls and Settings
      8. Transforms and User Preferences
      9. Select and Deselect
      10. Primitives
      11. Append
      12. Primitive Properties
      13. 3D Cursor and Object Position
      14. Edit and Object Mode
      15. Grease Pencil
      16. Pivots and Object Origin
      17. 3D Cursor
      18. Transform Orientation and Duplicate
      19. Polygon, Vertex, and Edge
      20. Object Mode Keys
      21. Edit Mode Keys
      22. Limit Selection to Visible
      23. Viewport Shading and Smoothing
      24. Insert, Delete, Dissolve Edge
      25. Edge Split and Create Edge
      26. Merge
      27. User Preferences and Key Commands
      28. Outliner
      29. Modifiers
      30. Piling Modifiers
      31. Snaps (Edit and Object Mode)
      32. Snap to Grid
      33. Splines
      34. Rendering Splines
      35. Splines in Edit Mode
      36. Curve Modifier
      37. Path Deform Process
      38. Bevel with Contour Controls
      39. Lathe
      40. Mirror and Symmetrize
      41. Insert
      42. Intersect Tool
      43. Fill, Bridge, and Grid Fill
      44. Bend
      45. Pivot Positioning
      46. Fill
      47. Grease Pencil Revisited
      48. Duplicate and Linked Duplicate
      49. Appending and Saving Selected
      50. Layers
      51. Boolean
      52. Smooth Shading
      53. Arrays
      54. Solidify
      55. Subdivide
      56. Proportional Editing
      57. Mesh Deform
      58. Basic Light Settings
      59. Basic Edge Placement for Sub D Surfaces
      60. Final Practical
    2. Elements of Visual Design
      1. Getting Started
      2. Balance
      3. Unity
      4. Gradation
      5. Harmony
      6. Dominance
      7. Repetition
      8. Contrast
      9. Gestalt
      10. Space
      11. Symmetry and Asymmetry
      12. Gathering and Filtering
      13. Style Guides
      14. Form and Structure
      15. Silhouette and Visual Reference
      16. Tonal Studies
      17. Light
      18. Ball Study
      19. Visual Depth
      20. Tactile Texture / Visual Texture / Pattern
      21. Volume
      22. Visual Narrative I
      23. Visual Narrative II
      24. Final Practical
    3. Texture Maps and Digital Painting
      1. Getting Started
      2. Photoshop Texture Maps
      3. Custom Brushes
      4. Style Sheets and Ortho Concepts
      5. Creature Design
      6. DDO, NDO, and 3DO in Photoshop
      7. Quixel
      8. Map Types
      9. What is Physically Based Rendering?
      10. Ambient Occlusion (AO) Maps
      11. ID Maps
      12. Using the Quixel Suite
      13. Using NDO I
      14. Using 3DO I
      15. NDO Practical
      16. Accessing Material ID Links
      17. Using DDO I
      18. Saving DDO Smart Materials
      19. Using DDO II
      20. Using DDO III
      21. Create Base (Albedo / Specular / Reflection / AO / Normal)
      22. Lowering Preview Resolution and Viewing IDs in Real-Time
      23. Combining Normal Information
      24. Layers and Blending Modes in DDO
      25. The Mask Editor and Mask Paint
      26. Brush Combining in Photoshop and Blender
      27. Grouping Layers
      28. Final Practical
    4. 3D Modeling II
      1. Getting Started
      2. Basic Photoshop
      3. Tile Texture
      4. Wacom Tablet Properties
      5. Layers
      6. Lights
      7. Sizing and Saving Texture Maps
      8. Texel Density
      9. Basic UV Unwrap
      10. The UV Editor
      11. Adding Maps to Objects
      12. Auto and Smart Unwrap
      13. To Sphere
      14. Unwrap Follow Active Quads
      15. Setting Seams for UVW Unwrap
      16. Smoothing and UV Elements
      17. Element Selection
      18. Positioning of Unwrap Elements
      19. Weld, Stitch, and Breaking UV Elements
      20. Relaxing UV Vertices and Elements
      21. Packing UV Elements
      22. Mesh Smooth and Edge Crease
      23. Cycles in Blender
      24. Texture Paint
      25. Basic Sculpt
      26. Baking ID Maps
      27. Baked Textures
      28. Creating Normal Maps
      29. Sub-D Modeling Intro
      30. Final Practical
    5. Elements of Digital Design
      1. Getting Started
      2. Stylized 3d Character
      3. Man Made Prop
      4. 3d Tree
      5. Underwater Vehicle
    6. 3D Modeling III
      1. Getting Started
      2. Anatomy (Hands)
      3. Anatomy (Feet)
      4. Anatomy (Head)
      5. Anatomy (Arm, Leg)
      6. Anatomy (Chest, Back)
      7. Anatomy (Creature - Cat)
      8. Anatomy (Creature - Horse)
      9. Anatomy (Bird)
      10. Anatomy (Creature - Dinosaur)
      11. Anatomy (Structural Design - Wings)
      12. Edge Flow, Relaxed Edge Flow
      13. Anatomy and Edge Flow
      14. Supporting Edges (Structural)
      15. Supporting Edges (Curved Mesh)
      16. Mirror and Edge Flow
      17. Weighted Vertices
      18. Armature in 3d (Skin Modifier)
      19. Edge Flow for Animated Meshes
      20. Fixing Texture Seams
      21. Digital Sculpting
      22. Solidify to Set Up Clothing
      23. Script UV Squares Master
      24. Script Mesh Align to G Pencil
      25. Final Practical
    7. 3D Sculpture
      1. Getting Started
      2. Orthographic Planes
      3. Alpha Settings and Transparency
      4. X-Ray
      5. Blocking Out the Leg
      6. Adding the Mirror Modifier
      7. Defining the Back of the Neck
      8. Creating the Feet
      9. Creating the Head I
      10. Creating the Head II
      11. Creating the Hands I
      12. Creating the Hands II
      13. Creating the Arms
      14. Creating the Toes
      15. Eyes and Teeth
      16. Final Base Mesh (Ready for Sculpt)
      17. The Multiresolution Modifier
      18. Setting Up the Sculpt Menu
      19. Laying Down Clay Strips
      20. Refining the Sculpt
      21. Sculpting Details
      22. Duplicate Mesh, Create Low and High Variation
      23. Spaced (Relax) Vertices and Tight Mesh Areas
      24. Texture Projections
      25. Projection Snaps and Retopo
      26. Final Practical
    8. Sub-D Modeling
      1. Getting Started
      2. Add/Delete Edge Loops to Define Volumes
      3. Unwrapping Separate Objects (Sub-Objects)
      4. Baking Normal Maps (Blender)
      5. Baking Normal Maps (XNormal)
      6. Apply Normal Maps to Mesh
      7. Texture Paint Mode and Brushes
      8. Mirror in Paint Mode
      9. Stencils
      10. UV Unwrap Guidelines
      11. Normal Map Errors and Extreme Stretching
      12. Normal Map Elements (XYZ, Color, Designation)
      13. Additional Projects
      14. Final Practical
    9. Digital Lighting and Game Engines
      1. Getting Started
      2. New Project and UI Overview
      3. Viewport Navigation
      4. View Modes and Show Flags
      5. Placing Objects in a Level
      6. Content Browser
      7. Material Creation I
      8. Material Creation II
      9. Basic Lighting
      10. Basic Blueprints
      11. Lights and Settings
      12. Shadows
      13. Light Behavior I
      14. Light Behavior II
      15. Three Point Lighting
      16. Time of Day Lighting
      17. Translucency and Projections
      18. Game Engine Lighting I
      19. Game Engine Lighting II
      20. Final Practical
    10. Character Design and Animation
      1. Getting Started
      2. Modeling the Base Mesh
      3. Sculpting the Character
      4. Retopology
      5. UV Mapping and Texture Baking
      6. Texture Painting
      7. Rigging the Character
      8. Creating Animation Cycles
      9. Setting Up in Unity
      10. Final Practical
    11. (CAPSTONE) Final Practical and Portfolio
      1. Final Practical and Essay
      2. Portfolio Development
      3. Career/Next Steps Consultation

    What you will learn

    • How to improve your game art abilities
    • Prop, environment, and character art/animation
    • Proficiency in popular 2D and 3D modeling software
    • Modeling and texturing techniques to effectively bring your designs to life
    • The fundamental principles of creating exceptional art

    How you will benefit

    • Identify the specific skills needed for your professional game art projects
    • Engage in hands-on development to practice and improve your new animation skills
    • Assess your artistic ability and identify areas for improvement
    • Evaluate the effectiveness of your new skills in real-world projects

    Christian Bradley

    Christian Bradley is the Director of Curriculum Development for Digital Media at the Art Institute of California, Orange County campus. He was as an instructor and Academic Director of Game Art and Design at the Art Institute of California, San Diego from 2003 to 2015. For more than twenty years, Bradley was an environment artist and texture artist with more than 35 commercial video game titles for PC, and Sony, Microsoft, and Nintendo consoles in his portfolio. He has worked at Interplay, the Dreamers Guild Studios, and the Collective Studios. Some previous clients include Activision, Digital Extremes, and Legend Entertainment.


    Become a professional video game artist with this online game artist training course, designed to equip you with the necessary skills and knowledge to succeed in this creative and lucrative industry. Focus on developing core competencies in areas such as digital art, 3D art, modeling, character design, and environmental art design. You will learn essential techniques for jobs related to game art, including modeling game props and characters, importing elements into game-specific software, and animating game assets.

    Apply the concepts learned in the course by working with popular game development platforms such as Unreal Engine 4 and Unity 5+. These platforms are widely used in the video game industry and will provide you with hands-on experience in translating your artistic skills into practical game design.

    In addition to software and game-related techniques, this game art course also covers broader topics that can help boost your career such as general design principles and concept art. You will learn the fundamental principles that distinguish good art from great art and the key social aspects necessary for ongoing growth and professional development in the field. By the end of the game artist course, you will have acquired a diverse set of employable skills and a solid understanding of the key components of 3D art and environmental art.

 

  • Management for IT Professionals
  • Fee: $2,295.00
    Item Number: SP2CCTP46311
    Dates: 1/1/2025 - 6/30/2025
    Times: 12:00 AM - 12:00 AM
    Days:
    Sessions: 0
    Building:
    Room:
    Instructor:
    REGISTRATION FOR THIS CLASS IS CLOSED. This class is already in session.

    Learn leadership skills that will help you succeed as a manager in the IT field by exploring different decision-making techniques. This course focuses on developing a successful leadership style that facilitates team building, collaboration, and a corporate culture that promotes success.



    Requirements:

    Hardware Requirements:

    • This course can be taken on either a PC or Mac.
    • A high-speed Internet connection

    Software Requirements:

    • PC: Windows 8 or later.
    • Mac: macOS 10.6 or later.
    • Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
    • Microsoft Office or equivalent (not included in enrollment).
    • Adobe Acrobat Reader.
    • Software must be installed and fully operational before the course begins.

    Other:

    • Email capabilities and access to a personal email account.

    Instructional Material Requirements:

    The instructional materials required for this course are included in enrollment. The following textbooks will be shipped to you approximately 7-10 business days after enrollment:

    • Managing by the Numbers: A Commonsense Guide to Understanding and using your Company's Financials
    • Strategic Planning - A Pragmatic Guide

    Please note: You will receive a digital book if the physical book is on backorder.


    If you manage IT professionals, this course is for you! The leaders in an organization often set the tone and establish the benchmarks for success. In this course, you'll explore different decision-making techniques in the context of successful leadership styles. The focus is on developing a successful leadership style that facilitates team building, collaboration, and a corporate culture that promotes success.

    The Management for IT Professionals Online Training course is particularly well suited for anyone in IT who has recently assumed management responsibilities, anyone who is managing IT professionals, or anyone who wants an introductory perspective on some of the unique issues facing the management of IT professionals. This course explores the developmental process and how to be successful in creating change. Since most business organizations are social systems, the Management for IT Professionals Online Training course will also focus on organizational culture and how it influences the way people work, so as to maximize the long-term health of the organization and its people. This course delivers essential leadership skills, business practices, budgeting strategies, communication skills, and more, all with the goal of helping you run your IT department better than ever before.


    1. Management Issues in the IT Environment
      1. Introduction and Components of a Successful Manager
      2. Organizational Culture and Change
      3. Power and Perceptions
      4. Leadership and Risk
      5. Strategies, Decision Making, Empowerment, and Accountability
      6. Customer Relationship Management and Quality
      7. Human Resource Management
      8. Financial Accountability
      9. Summary
    2. Collaborative Problem Solving
      1. Introduction
      2. Backgrounds, Management, and Leadership
      3. Communication, Motivation, and Development
      4. Summary
    3. Strategic Management in Operations
      1. Introduction and Overview
      2. Definitions and Business Models
      3. Categories of Strategies
      4. Strategic Planning Models
      5. Creating Strategic Alternatives
      6. Implementation
      7. Conclusion
    4. Business Best Practices
    5. Financial Accounting for IT Managers
      1. Introduction and Overview
      2. Importance of Financial Statements
      3. The Balance Sheet
      4. The Income Statement
      5. Statement of Cash Flows
      6. Financial Ratios
      7. Conclusion
    6. Legal Issues in Operations
      1. Introduction
      2. Sources of Law
      3. Agency and Employment Law
      4. Torts Law
      5. Sales and Products Liability
      6. Intellectual Property
      7. Ethics
      8. Summary
    7. Organizational Leadership and Decision Making
      1. Introduction and Overview
      2. What Is a Leader
      3. Sources of Power in Leadership
      4. Leadership Theories
      5. Transformational Leaders
      6. Decision Making and Empowerment
      7. Accountability
      8. Summary
    8. Organizational Development and Change
      1. Introduction and Overview
      2. The Culture of an Organization
      3. Types of Culture
      4. Organizational Change
      5. The Human Side of Change and Resistance
      6. Summary
    9. Negotiating Strategies
      1. Introduction
      2. Steps in Negotiating
      3. Tools in Negotiating
      4. Types of Negotiations
      5. Personality Types
      6. Preparing for Negotiations
      7. BATNA and Summary
    10. Seven Management Disciplines
      1. Introduction and Overview
      2. Strategy Management
      3. Human Resource Management
      4. Technology Management
      5. Production and Operations Management
      6. Sales and Marketing Management
      7. Customer Experience Management
      8. Financial Management
      9. Risk Management
      10. Summary
    11. Budgeting Essentials
      1. Introduction
      2. The Concept of Budgeting
      3. Activity Based Budgeting
      4. Factors to Consider in Budgeting
      5. Production Planning
      6. Inventory
      7. Sample Budget and Summary
    12. Persuasive Communication
      1. Introduction
      2. Fundamentals of Communication
      3. Knowing the Audience
      4. The Power of Listening
      5. Credibility of the Speaker
      6. Evidence in Persuasion
      7. Emotion in Persuasion
      8. Organizing the Argument
      9. Summary

    What you will learn

    • Learn to think about budgeting in a strategic, integrated manner
    • Gain strategies to solve problems and challenges on a collaborative basis
    • Understand the legal issues involved in operations, including agency and employment law
    • Learn seven management disciplines
    • Develop a foundation for negotiating with great awareness and effectiveness
    • Learn about the key areas of business management

    How you will benefit

    • Begin your career as an IT professional or develop your existing skills to move up at your current job
    • Learn to communicate and lead a team effectively
    • Understand how to successfully run a department and what financial and legal regulations you'll be held to
    • Discuss ways in which you can benefit your organization, from decision making to cultural shifts, that will make you an asset to any team

    Katrina McBride

    Katrina McBride's career reflects extensive experience in organizational leadership, marketing strategies, and market development in multi-national corporate environments. Her leadership abilities have been utilized to develop new programs and functional areas. In director-level positions for Nortel Networks, she led strategy for competitive intelligence, emerging markets, and lead generation. McBride holds an M.A. in organizational management and a B.S. in psychology.

    Katherine Squires Pang

    Katherine Squires Pang, J.D., LL.M., M.Ed has practiced law with since 1983. She has served as an adjunct faculty member in the Graduate School of Management at the University of Texas, Dallas, and has been an adjunct faculty member of many universities, including New York University and the University of California, Irvine. She received her B.A. in 1980 from Clark University, her J.D. from the University of Dayton Law School in 1982, her LL.M in Taxation from Georgetown University Law School in 1983, and her M.Ed from the University of Texas in 2001.


    If you manage IT professionals, this course is for you! The leaders in an organization often set the tone and establish the benchmarks for success. In this course, you'll explore different decision-making techniques in the context of successful leadership styles. The focus is on developing a successful leadership style that facilitates team building, collaboration, and a corporate culture that promotes success.

    The Management for IT Professionals Online Training course is particularly well suited for anyone in IT who has recently assumed management responsibilities, anyone who is managing IT professionals, or anyone who wants an introductory perspective on some of the unique issues facing the management of IT professionals. This course explores the developmental process and how to be successful in creating change. Since most business organizations are social systems, the Management for IT Professionals Online Training course will also focus on organizational culture and how it influences the way people work, so as to maximize the long-term health of the organization and its people. This course delivers essential leadership skills, business practices, budgeting strategies, communication skills, and more, all with the goal of helping you run your IT department better than ever before.

 

Some Title



Your Cart

×