Wednesday, June 23, 2021

Certified Kubernetes Security Specialist (CKS)

OSS colleagues, the Certified Kubernetes Security Specialist (CKS) program provides assurance that a CKS has the skills, knowledge, and competence on a broad range of best practices for securing container-based applications and Kubernetes platforms during build, deployment and runtime. CKA certification is required to sit for this exam.CKS is a performance-based certification exam that tests candidates' knowledge of Kubernetes and cloud security in a simulated, real world environment. Candidates must have taken and passed the Certified Kubernetes Administrator (CKA) exam prior to attempting the CKS exam. CKS may be purchased but not scheduled until CKA certification has been achieved. CKA Certification must be active (non-expired) on the date the CKS exam (including Retakes) is scheduled. Training modules mapped to the certification exam include: 1) Cluster Hardening (15%), 2) System Hardening (15%), 3) Minimize Microservice Vulnerabilities (20%), 4) Supply Chain Security (20%), , and 5) Monitoring, Logging and Runtime Security (20%). This exam is an online, proctored, performance-based test that requires solving multiple tasks from a command line running Kubernetes. Candidates have 2 hours to complete the tasks.Candidates who register for the Certified Kubernetes Security Specialist (CKS) exam will have 2 attempts (per exam registration) to use an exam simulator, provided by Killer.sh.  

Enroll today (individuals & teams welcome): https://tinyurl.com/365z7thc 


Much career success, Lawrence E. Wilson -  Cybersecurity Certification Center


Wednesday, June 9, 2021

SSCP Systems Security Certified Practitioner (ISC2)

Colleagues, the Systems Security Certified Practitioner (SSCP) from ISC2 is a premier credential that is ideal for those wanting to begin or advance a career in computer networking or security. The SSCP is among the best cybersecurity certifications you can earn, especially as an entry-level professional. An SSCP exam prep course is a great way to ensure you have the knowledge to succeed—and that you can prove it to your employer. This course will also prepare you for a career as a network administrator or security administrator, and help you stay up-to-date on your skills if you already work in the IT sector.In the 80 hours of instruction you will  learn to Understand the dynamics of data communication, identify and mitigate malicious codes such as viruses, Trojans, logic bombs, social engineering, insider threats, data theft, DDoS, spoofing, Phishing, Pharming, and spam, explore authentication and access control methods become knowledgeable with identity management and cloud computing concepts. Skill-based training modules address: 1) Access Controls and Security Operations - Access Control and Security Operations, 2) Monitoring and Incident Recovery - Risk Identification, 3) Cryptography and Network Security- Cryptography and Communication Security, 4) Systems and Application Security - Security in Systems and Applications, and 5) Course Completion - pass the SSCP certification exam.

Enroll today (individuals & teams welcome): https://tinyurl.com/3k2wtd8p 


Much career success, Lawrence E. Wilson - Cybersecurity Certification Center


Monday, June 7, 2021

Certified Network Defender (CND) [Exam voucher included]

Cyber colleagues, the Certified Network Defender (CND) program trains to protect, detect and mitigate threats This online course prepares you for the Certified Network Defender (CND) exam, a credential that validates your ability to provide continuity of operations during attacks. The program is ideal for network admins looking to attain Defense-in-Depth network security preparedness. You will work through skills-based, lab-intensive modules based on a job-task analysis and cybersecurity education framework presented by the National Initiative of Cybersecurity Education (NICE). You will also gain skills mapped to global CND responsibilities as well as the Department of Defense (DoD) job roles for system/network administrators.The course with 100 hours of training also includes a voucher with enrollment, which covers the fee of the certifying exam upon eligibility. Skill-based training modules that will enable you to pass the certification exam include: 1) Computer Network and Defense, 2) Network Security Threats, Vulnerabilities, and Attack Section, 3) Network Security Controls, Protocols, and Device, 4) Network Security Policy Design and Implementation, 5) Physical Security, 6) Host Security, 7) Secure Firewall Configuration and Management, 8) Secure IDS Configuration and Management, 9) Secure VPN Configuration and Management, 10) Wireless Network Defense, 11) Network Traffic Monitoring and Analysis, 12) Network Risk and Vulnerability Management, 13) Data Backup and Recovery, and 14) Network Incident Response and Management.

Enroll today (individuals & teams welcome): https://tinyurl.com/2fxu2rm9 


Much career success, Lawrence E. Wilson - Cybersecurity Certification Center


Wednesday, June 2, 2021

EC-Council Certified Security Analyst (ECSA)

Colleagues, the EC-Council Certified Security Analyst (ECSA) with exan voucher included prepares you to use methodologies, tools, and techniques needed to perform information security tests and pass the EC Council Certified Security Analyst (ECSA) exam. By learning the LPT methodology, you will be able to effectively identify and mitigate risks to the security of your infrastructure.The course also includes a voucher with enrollment, which covers the fee of the certifying exam upon eligibility. Scheduling and testing will be available through a remote proctor function. Gain expertise in the Monitor, capture and analyze network traffic and identify the possible security breaches, Identify the various computer security issues and select a suitable framework to evaluate security policies, procedures, and controls, Compare and contrast various network security assessment tools, and Assess various network security techniques and design appropriate protection levels for the network. Skill-based training covers: 1) Penetration Testing Essential Concepts (Self-Study), 2) Introduction to Penetration Testing and Methodologies, 3) Penetration Testing Scoping and Engagement Methodology, 4) Open-Source Intelligence (OSINT) Methodology, 5) Social Engineering Penetration Testing Methodology, 6) Network Penetration Testing Methodology – External, 7) Network Penetration Testing Methodology – Internal, 8) Network Penetration Testing Methodology – Perimeter Devices, 9) Web Application Penetration Testing Methodology, 10) Database Penetration Testing Methodology, 11) Wireless Penetration Testing Methodology, 12) Cloud Penetration Testing Methodology, and 12) Report Writing and Post Testing Actions.

Enroll today (individuals & teams welcome): https://tinyurl.com/jdkpkctf 


Much career success, Lawrence E. Wilson - Cybersecurity Certification Center


Monday, May 31, 2021

Cisco CCNA Security - Certification Exam Bundle

Cyber colleagues, Cisco CCNP Security - Certification Exam Bundle will equip you to pass the Implementing and Operating Cisco Security Core Technologies (350-701 SCOR) exam, which leads to the new CCNP Security, CCIE Security, and the Cisco Certified Specialist - Security Core certifications. You will master the skills and technologies you need to implement core Cisco security solutions to provide advanced threat protection against cybersecurity attacks. You will get extensive hands-on experience deploying Cisco Firepower® Next-Generation Firewall and Cisco Adaptive Security Appliance (Cisco ASA) Firewall; configuring access control policies, mail policies, and 802.1X Authentication; and more. You will get introductory practice on Cisco Stealthwatch® Enterprise and Cisco Stealthwatch Cloud threat detection features. Training modules - mapped to the cert exams - include: 1) Information Security Concepts, 2) Common TCP/IP Attacks, 3) Common Network Application Attacks, 4) Common Endpoint Attacks, 5) Network Security Technologies, 6) Cisco ASA Firewall, 7) Cisco Firepower Next-Generation Firewall, 8) Email Content Security, 9) Web Content Security, 10) Cisco Umbrella Architecture, 11) VPN Technologies and Cryptography, 12) Cisco Secure Site-to-Site VPN Solutions, 13) Cisco IOS VTI-Based Point-to-Point, 14) Point-to-Point IPsec VPNs on the Cisco ASA and Cisco Firepower NGFW, 15) Cisco Secure Remote Access VPN Solutions, 16) Cisco Secure Network Access Solutions, 17) 802.1X Authentication, 18) Endpoint Security Technologies, 19)  Cisco AMP for Endpoints, 20) Network Infrastructure Protection, and 21) Layers 2 and 3 Data Plane Security Controls.

Enroll today (individuals & teams welcome): https://tinyurl.com/ywaxmpkb 


Much career success, Lawrence E. Wilson - Cybersecurity Certification Center


Wednesday, May 5, 2021

Certified Information Systems Security Professional (CISSP)

Colleagues, the Certified Information Systems Security Professional (CISSP) is one of the highest demand credentials in the cybersecurity and Fnfosec arenas. This program will equip you to pass the CISSP exam from ISC2. Earning your CISSP is a must for cyber security professionals who want to get ahead in this important field.vThis Certified Information Systems Security Professional (CISSP) course is an engaging, fully online course that provides in-depth instruction in key areas related to information/cyber security. The skill-based training modules are mapped to the certification exam, including: 1) Security and Risk Management, 2) Asset Security, 3) Security Engineering, 4) Communication and Network Security, 5) Identity and Access Management, 6) Security Assessment and Testing, 7) Security Operations, and 8) Software Development Security. This is a 6 month program including 150 hours of training.

Enroll today (individuals & teams welcome): https://tinyurl.com/4t5jwbfr 


Much career success, Lawrence E. Wilson -  Cybersecurity Certification Center

Wednesday, April 28, 2021

Certified Information Security Manager (CISM)

Colleagues,become a Certified Information Security Manager (CISM) and take your cyber career to the next level. In the InfoSec world, security managers are the driving force behind an organization's cybersecurity policies. These key individuals typically started their IT careers in hands-on roles before earning their CISM certification and taking on managerial duties. If you're ready to earn your next IT certification, this online training course will fully prepare you for the ISACA Certified Information Security Manager (CISM) certification exam. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility. Skill-based training modules (mapped to the ISACA exam) include: 1) Information System Auditing Process, 2) Governance and Management of IT, 3) Information Systems Acquisition, 4) Information Systems Operations and Business Resilience, and 5) Protection of Information Assets.

Enroll today (individuals & teams welcome): https://tinyurl.com/33xb2dst 


Much career success, Lawrence E. Wilson - Cybersecurity Certification Center


Tuesday, April 27, 2021

CompTIA Security+ Certification Training (SY0-601 exam)

Colleagues, the CompTIA Security+ is one of the most recognized certifications in the cybersecurity arena. This program will prepare you for the CompTIA Security+ certification SY0-601 exam through comprehensive material that covers the key objectives and fundamentals to perform core security functions while pursuing an information technology-based career. With an estimated 31% employment increase projected over the next ten years according to the U.S. Bureau of Labor Statistics, demand for security professionals is high. Learning comprehensive workplace security skills allows you to become a knowledgeable go-to source for reducing liabilities, risk, and other expenses for an organization. This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility. After completing the course, you can set up your own exam dates and times at a nearby testing center. Skill-based training modules (mapped to the SyS-601 exam) include: 1) Security Foundations - Threat Management, , 2) Security and Protection - Threats and Attacks, Endpoint Application Development, Mobile Device Security, , 3) Cryptography - Keys and Protocols, , 4) Security on Networks - Networking Threats, Network Applications, Cloud and Virtualization, Wireless Networks, , 5) Enterprise Security, - Authentication, Incidents, Risk Management, and 6) Conclusions (exam preparation).

Enroll today (individuals & teams welcome): https://tinyurl.com/nppxy3b4 


Much career success, Lawrence E. Wilson - Cybersecurity Certification Center


Monday, April 26, 2021

Certified Information Systems Auditor (CISA)

Colleagues, this Certified Information Systems Auditor (CISA) training program includes an ISACA exam voucher. With cyberattacks on the rise, more organizations are investing in data protection and building out their cybersecurity teams. This online CISA training course will teach you how to identify and evaluate the five Certified Information Systems Auditor certification domains: auditing, governance, implementation, management, and protection. The training modules (each mapped to the CISA cert exam) include: 1) Governance and Management of IT (IT governance creates an IT framework to support the business strategy and how IT management oversees information technology operations and resources), 2) Information System Auditing Process (IT auditors examine plans, assess, verify and report on information technology assets to ensure they align with organizational goals), 3) IT Life Cycle Management & Systems Acquisition (addresses IT resources and their life cycles to make better purchasing and acquisition decisions), 4)  IT Service Management and Business Resilience (designs, creates, and, supports IT services. Similarly, learn how this relates to business resilience, which is an IT organization's ability to quickly adapt to interferences), and 5) Protection of Information Assets (learn the best practices for the protection of information assets). 

Enroll today (individuals & teams welcome): https://tinyurl.com/56c96hy4 


Much career success, Lawrence E. Wilson - Cybersecurity Certification Center


Monday, March 29, 2021

Ansible 2: Advancements with Security Automation

Cyber colleagues, Ansible makes it easy for you to secure any part of your system, including setting firewalls, providing authentication to users and groups, and setting custom security policies. Ansible allows you to write automation procedures once and use them across your entire infrastructure. This program on Ansible Security Automation starts with basic Ansible concepts and later progresses to the advanced features of Ansible 2 including Ansible Tower. Next, it will look at secure user management with Ansible managing multiple users and different permissions. Complex hardening with STIG and CIS is also covered in-depth. You will be equipped to Perform SSH hardening and manage SSH users with Ansible, Deal with SELinux at a more advanced level, Harden your system by tweaking sysctl, bootloader, networks, and logging, Set up Ansible Tower and learn to use it, and Install Ansible and connect to Windows boxes and network devices. The skill-based lectures-training modules address: 1) User Management with Ansible, 2) Httpd (apache2) Web Server Hardening, 3) OS Hardening, 4) Advanced Use of Ansible, 5) Security Governance with Ansible, and 6) Ansible and Windows.                                                   

Enroll today (individuals & teams welcome): https://tinyurl.com/3jr5vajh 


Much career success, Lawrence E. Wilson - Cybersecurity Certification Center