Monday, November 16, 2020

Cisco CCNA Security 210-260 Certification (exam prep)

Network Security pros, this program delivers over 13 hours of video training covering all of the objectives in the Cisco CCNA Security 210-260 exam. This video course emphasizes core security technologies by describing the installation, troubleshooting, and monitoring of network devices to maintain integrity, confidentiality, and availability of data and devices. The six training modules mapped to the 210-260 exam include: 1) Fundamentals of Network Security, 2) Virtual Private Networks (VPNs), 3) Content and Endpoint Security, 4) Cisco Firewall Technologies and Intrusion Prevention System Technologies, 5) Secure Routing and Switching, and 6) Secure Access. Includes over 100 practice questions, interactive exercises and CLI simulations so you can practice and assess your skills. DescriptionCCNA Security 210-260  Complete Video Course is a unique video product that provides users with more than 13 hours of personal visual instruction from security experts- Omar Santos, Aaron Woland, and Mason Harris. 

Register today at: https://fxo.co/A88t  


Much career success, Lawrence E. Wilson - Cybersecurity Certification Center (CCC)

Wednesday, September 30, 2020

Digital Forensics and Cyber Crime with Kali Linux Fundamentals

Cyber and OSS colleagues, this program includes over 13 hours of instruction. Forensics can be used to determine if and how a breach occurred and also how to properly respond. Digital Forensics and Cyber Crime with Kali Linux Fundamentals introduces you to the world of digital forensics and acts as a primer for your future forensic work. You will be equipped to understand the full IoT protocol stack - from 802.15.4 and LPWA to IPv6 adaptations and management. Skill-based training modules cover: 1) Introduction to Digital Forensics, 2) Digital Forensic Investigations, 3) Forensic Linux Workstations, 4) Data Duplication and Data Protection, 5) Collecting and Preserving Evidence, 6) Cracking Passwords, 7) Endpoint Forensics, 8) Security and Network Concepts, 9) Network Forensics, 10) Email Forensics, 11) Reverse Malware Engineering, and 12) Forensic Case Studies.

Enroll today at: https://tinyurl.com/y2x7hzaz 


Much career success, Lawrence E. Wilson - Cybersecurity Certification Center (CCC) 


Tuesday, September 22, 2020

CompTIA PenTest+ Certification (PT1-001 Exam Preparation)

PenTesting colleagues, the CompTIA PenTest+ certification iis for cybersecurity professionals tasked with penetration testing and vulnerability management. This training program will equip you to pass the PT1-001 exam … creating new career and income opportunities performing reconnaissance on a target, gain access through vulnerable systems by knowing the various exploits* Restore environments after a pentest has successfully found vulnerabilities within the system, and record and log activities in a manner that is professional, clear, and advantageous to the client for system improvement Skill-based training modules cover: 1) Introduction to Ethical Hacking and How to Plan a Security Penetration Test, 2) Reconnaissance (collecting information, port scanning, and vulnerability scanning, 3) Attacks and Exploits" (social engineering attacks, application-based  and physical security along post-exploitation techniques) and 4) Tools and Reporting (available for evasion, decompilation, forensics, and software assurance).

Enroll today at: https://tinyurl.com/y6z7nlys 


Much career success, Lawrence E. Wilson - Cybersecurity Certification Center (CCC)


Sunday, September 13, 2020

Linux Security Fundamentals - Linux Foundation (LFS216)

Open Source Security colleagues, this Linux Security Fundamentals program provides an overview of computer security and touches on how security affects everyone in the chain of development, implementation, administration and the end user. Outcome: You will be able to assess your current security needs, evaluate your current security readiness and implement security options. Gain core skills in all aspects of OSS security, including: Security Basics, Threats and Risk Assessment, Physical Access, Logging, Auditing and Detection, Application Security, Kernel Vulnerabilities, Authentication, Local System Security, Network Security, Network Services Security, Denial of Service, Remote Access, Firewalling and Packet Filtering, Response and Mitigation, and Compliance Testing with OSCAP. 

Get started today at: https://fxo.co/9bDS 


Much career success, Lawrence E. Wilson - Cybersecurity Certification Center (CCC) 


Wednesday, September 9, 2020

GIAC Security Fundamentals - GSEC (Certification Training)

Cybersecurity colleagues, this GIAC Security Essentials (GSEC) program equips you to pass the GIAC certification exam and advance your career in IT security.. Your instructor, Michael J. Shannon, is an expert in IT security, with more than 30 years of experience.  Gain technical and practical skills needed to perform Network Security, defense strategies, vulnerability scanning and penetration testing, cryptography and risk management strategies, Microsoft and Linux security tools, implement, monitor, and maintain enterprise security in the real-world and GSEC exam preparation through repeatable hands-on demonstrations. Training modules are mapped to the cert exam objectives, including: 1) Network Security Essentials, 2) Defense in Depth and Attacks, 3) Threat Management, 4)  Cryptography, Risk Management, and Response, 5) Windows Security Essentials, and 6) Linux Security Essentials. 

Enroll today at: https://tinyurl.com/y25qpd45 


Much career success, Lawrence E. Wilson - Cybersecurity Certification Center (CCC)


Tuesday, August 18, 2020

Certified Professional Ethical Hacker (CPEH Training)

Cybersecurity colleagues, this program enables you to pass the CPEH - Certification Exam, includes a 30-question CPEH practice test and will help you advance your InfoSec career. An average Certified Ethical Hacker earns up to $99k per year. Training modules will equip you in: 1) Security Fundamentals, 2) Access Controls, 3) Protocols, 4) Cryptography, 5) Vulnerability Assessments, 6) Vulnerability Tools, 7) Output Analysis and Reports, 8) Reconnaissance, Enumeration and Scanning, 9) Gaining Access, 10) Maintaining Access, 11) Covering Tracks, 12) Malware, 13) Buffer Overflows and 14) Password Cracking. CPEH is a prominent certification in the global penetration testing arena.

Enroll today at: https://tinyurl.com/yyvfpylz

Much career success, Lawrence E. Wilson - Cybersecurity Certification Center (CCC)

Monday, August 10, 2020

Systems Security Certified Practitioner Course and Practice Certification Test - ISC2 (SSCP)

Cybersecurity colleagues, learn everything you need to pass the ISC2 Systems Security Certified Practitioner (SSCP) certification exam including the updates in the 2018 exam release and advance your cybersecurity career. The ISC2 SSCP exam is a vendor-neutral world-recognized certification that endorses your IT security knowledge. It is also a great way to start your path toward CISSP certification, which is the next step through ISC2. Skill-based training modules include: 1) Security Operations and Administration (SSCP and ISC2 Code of Ethics, Security Terminology and Policy, Security Administration, 2) Risk Identification, Monitoring, and Analysis (Risk Management and Assessment, Security Operations), 3) Access Controls (Parts 1 & 2), 4) Network and Communications Security, Types of Attacks, Network Protocols and Services, Infrastructure Device Protection, Security Devices, Wireless Technology and Security), 5) Cryptography (Parts 1 & 2), 6) Systems and Application Security (Malware Threats, Identifying Malware and IoCs, Endpoint Security, Systems and Application Security, and 7) Incident Response and Recovery.

Enroll today at: https://tinyurl.com/y22ngoqj

Much career success, Lawrence E. Wilson - Cybersecurity Certification Center (CCC)

Wednesday, August 5, 2020

Continuous Encryption on AWS (Training)

Cloud security colleagues, this training will equip you to define encryption and compliance as code using AWS services. These services include AWS Key Management Service, AWS CloudFormation, AWS CodePipeline, AWS CodeCommit, AWS CodeBuild, AWS Config and Config Rules, Amazon CloudWatch Event Rules, and AWS Lambda. Core skill-based training modules address: 1) Automating AWS Resources, 2) Key Management, 3) Developing with Encryption, 4) Encryption in Transit, 5) Encryption at Rest, 6) Detecting Encrypted Resources, 7) Logging and Searching KMS Keys, and 8) Continuous Encryption. This program is part of the DevSecOps on AWS series.

Enroll today at: https://tinyurl.com/y3owqbhv

Much career success, Lawrence E. Wilson - Cybersecurity Certification Center (CCC)

Monday, August 3, 2020

Red Hat Certificate in Server Hardening 413 & LPIC-3 303 Security

Cyber and OSS colleagues, accelerate your career with the Red Hat Certificate of Expertise in Server Hardening (EX413) and LPIC-3 303 Security certifications. This program 20 hours of instruction taught by best-selling author and trainer Sander van Vugt who lays out a framework for understanding Linux security, mitigating threats, and responding to incidents. The topics in this course cover all the exam objectives and prepare you for the two most significant certifications in the field of Linux security: Skill-based training modules include: 1) Linux OS Security (version control, file system security properties, server access, system logging, system auditing, mandatory access control (MAC) and kernel security, 2) Managing Linux User Security (permissions and attributes, user accounts, central authentication), 3) Securing Linux Services (services, network file systems and remote access solutions, and 4) Securing Linux Infrastructure (sniffing and port scanning, configuring analysis and intrusion detection tools, firewalls, certificates and public key infrastructures and GPG).

Enroll today at: https://tinyurl.com/yxlgmt3l

Much career success, Lawrence E. Wilson - Cybersecurity Certification Center (CCC)


Wednesday, July 15, 2020

CISSP Complete Video Course and Practice Test (ISC2)

Cyber colleagues, earning your ISC2 CISSP credential is the gold standard for beginner-to-intermediate level security professionals. This comprehensive cert training program includes almost 26 hours of training covering every objective in the latest (ISC)2 CISSP exam. Overview CISSP Complete Course is an engaging self-paced video training solution that provides learners with almost 26 hours of personal training from 2017 Cybersecurity Educator of the Year, Sari Greene. With each lesson, Sari fully explains the topics associated with each CISSP exam objective: 17 interactive exercises, with one or more aligned to each CISSP domain, Quizzes for each CISSP domain to help you learn and retain knowledge, and a 200-question practice exam that runs in the Pearson test prep software. All nine CISSP domains are addresses in-depth: 1) Security and Risk Management, 2) Asset Security, 3) Security Architecture and Engineering, 4) Communication and Network Security, 5) Identity and Access Management (IAM), 6) Security Assessment and Testing, 7) Security Operations, 8) Software Development Security, and 9) Becoming a CISSP.

Enroll today at: https://tinyurl.com/y8yqdywv

Much career success, Lawrence E. Wilson - Cybersecurity Certification Center (CCC)