Product | Content | Hours | Days |
Microsoft | Windows 10 Eğitimi | 12 | 2 |
Microsoft | MCSA: Microsoft Windows Server 2016 | 18 | 3 |
Microsoft | MCSA: Cloud Platform | 30 | 5 |
Microsoft | MCSA: Linux on Azure | 30 | 5 |
Microsoft | MCSA: Windows Server 2012 | 30 | 5 |
Product | Content | Hours | Days |
Microsoft | Server Virtualization with Windows Server Hyper-V and System Center | 30 | 5 |
Microsoft | Configuring and Administering Hyper-V in Windows Server 2012 | 30 | 5 |
Vmware | VMware vRealize Automation: Install, Configure, Manage [V6.2] | 30 | 5 |
Vmware | VMware vCenter Site Recovery Manager: Install, Configure, Manage [V5.5] | 30 | 5 |
Product | Content | Hours | Days |
Cisco | Interconnecting Cisco Networking Devices 1 - 2 | 60 | 10 |
Cisco | Cisco IP Switched Networks | 18 | 3 |
Microsoft | HP E-Series Networking Technologies | 30 | 5 |
Product | Content | Hours | Days |
EC-Council | EC-Council Certified Ethical Hacker (CEH) | 30 | 5 |
Check Point | Penetration Testing Training | 18 | 3 |
PfSense | Cyber Incident Response Team (CIRT) Training | 30 | 5 |
Product | Content | Hours | Days |
SANS | Malware Analysis | 30 | 5 |
SANS | Intro to Information Security | 30 | 5 |
SANS | Information Security Bootcamp | 30 | 5 |
SANS | Critical Security Controls: Planning, Application and Assessment | 30 | 5 |
SANS | Advanced Security Foundations | 30 | 5 |
SANS | In-Depth Penetration Assessment | 30 | 5 |
SANS | Incident Management for Hacker Technique and Technologies | 30 | 5 |
SANS | Linux UNIX Security | 30 | 5 |
SANS | Constant Surveillence and Security Solutions | 18 | 3 |
SANS | Cloud Security Bascis | 18 | 3 |
SANS | Penetration Testing for Web Applications | 18 | 3 |
SANS | Active Defense, Offensive Precautions and Cyber Deceit | 30 | 5 |
SANS | Penetration Testing and Ethical Hacking | 30 | 5 |
SANS | Believable and Applied Penetration Techniques | 30 | 5 |
SANS | SCADA Systems | 18 | 3 |
SANS | Social Engineering for Penetration Testing | 18 | 3 |
SANS | Ethical Hacking for Mobile Security | 18 | 3 |
SANS | Virtualization and Private Cloud Security | 18 | 3 |
Content | Hours | Days |
Windows Forensics | 30 | 5 |
Advanced Digital Forensics, Incident Response and Threat Hunting | 18 | 3 |
In Depth Week Memory Analysis | 18 | 3 |
Advanced Network Analysis | 18 | 3 |
Cyber Threat Intelligence | 18 | 3 |
Advanced Smart Phone Analysis | 18 | 3 |
Content | Hours | Days |
ICS/SCADA Security Basics | 18 | 3 |
NERC Critical Infrastructure Protection Basics | 18 | 3 |
ICS Active Defense and Incident Response | 18 | 3 |
Content |
Hacker Protection: Thread Update |
Consonance Training and Employee Safety |
Security Awareness for Electricity Organizations |
Critical Security Controls: Health Systems Administration for HIMSS |
Intro to Malware Analysis: Applied and Technical Training |
Active Defense and Incident Response Techniques |