CompTIA Network+ Certification (Exam N10-009)

CompTIA Network+ certification exam covers the latest trends in networking and validates the core skills necessary to establish, maintain, troubleshoot and secure networks in any environment, preparing learners for a rewarding career in networking and cybersecurity. Students gain a wide range of technical and hands-on skills required of today’s early-career network administrators. Network+ is Approved for DoD 8140.03.

Description

Overview

CompTIA Network+ is a global IT certification validating candidates have the core skills necessary to establish, maintain, troubleshoot and secure networks regardless of technology or platform. It is a crucial stepping-stone for early career professionals seeking a high-growth career in networking and cybersecurity, validating a wide range of practical skills needed to harden networks, deploy wired and wireless solutions, and ensure critical network availability.

Network+ is the industry standard for establishing hands-on networking expertise across any environment by aligning with global IT standards and best practices and proves early-career networking professionals have the hands-on and technical skills required to manage network connectivity in any environment, preparing them for the diverse challenges they can expect to face in their IT careers.

CompTIA Network+ represents the latest advancements in networking, covering the most in-demand skills related to network deployment, performance, security, troubleshooting and more. The CompTIA Network+ certification will certify that the successful candidate has the knowledge and skills required to:

  • Establish network connectivity by deploying wired and wireless devices
  • Understand and maintain network documentation
  • Understand the purpose of network services
  • Understand basic datacenter, cloud, and virtual networking concepts
  • Monitor network activity, identifying performance and availability issues
  • Implement network hardening techniques
  • Manage, configure, and troubleshoot network infrastructure

Course Objectives

  • Networking Concepts (23% of exam)
  • Network Implementations (20% of exam)
  • Network Operations (19% of exam)
  • Network Security (14% of exam)
  • Network Troubleshooting (24% of exam)

Who Should Attend

This course is intended for entry-level computer support professionals with a basic knowledge of computer hardware, software, and operating systems who wish to increase their knowledge and understanding of networking concepts and acquire the required skills to prepare for a career in network support or administration, or who wish to prepare for the CompTIA Network+ certification. CompTIA Network+ is the first certification IT professionals specializing in network administration and support should earn and is aimed at IT professionals with job roles such as network administrator, network technician, network installer, help desk technician, and IT cable installer. This course is also designed for students who are seeking the CompTIA Network+ certification and who want to prepare for the CompTIA Network+ N10-009 Certification Exam.

Course Outline

Lesson 1: Explaining Network Topologies

  • Networking Overview
  • OSI Model Concepts
  • SOHO Networks
  • Troubleshooting Methodology

Lesson 2: Supporting Cabling and Physical Installations

  • Ethernet
  • Copper Cables and Connectors
  • Wiring Implementation
  • Fiber Optic Cables and Connectors
  • Physical Installation Factors
  • Cable Troubleshooting

Lesson 3: Configuring Interfaces and Switches

  • Network Interfaces
  • Ethernet Switches
  • Switch Port Configuration
  • Switch Troubleshooting

Lesson 4: Configuring Network Addressing

  • Internet Protocol Basics
  • IP Version 4 Addressing
  • IP Version 4 Subnetting
  • IP Troubleshooting Tools
  • IP Version 6
  • IP Troubleshooting

Lesson 5: Configuring Routing and Advanced Switching

  • Routing Technologies
  • Dynamic Routing Technologies
  • Network Address Translation
  • Firewalls
  • Enterprise Network Topologies
  • Virtual LANs
  • Routing and VLAN Troubleshooting

Lesson 6: Implementing Network Services

  • Transport and Application Layer Protocols
  • Dynamic Host Configuration Protocol (DHCP)
  • APIPA and SLAAC
  • DHCP Relay and Troubleshooting
  • Domain Name System (DNS)
  • DNS Troubleshooting

Lesson 7: Explaining Application Services

  • Application Security and Time Synchronization
  • Web, File, Print, and Database Services
  • Email and Voice Services
  • Disaster Recovery and High Availability

Lesson 8: Supporting Network Management

  • Organizational Policies and Documentation
  • Host Discovery and Monitoring
  • Simple Network Management Protocol
  • Event Management
  • Packet Capture and Analysis
  • Traffic Monitoring

Lesson 9: Explaining Network Security Concepts

  • Security Concepts
  • Network Threats and Attacks
  • Spoofing Attacks
  • Rogue System Attacks
  • Social Engineering

Lesson 10: Applying Network Security Features

  • Authentication
  • Authorization and Account Management
  • Network Hardening
  • Switch Security
  • Network Security Rules

Lesson 11: Supporting Network Security Design

  • Zone-based Security
  • Internet of Things
  • Physical Security

Lesson 12: Configuring Wireless Networks

  • Wireless Concepts and Standards
  • Enterprise Wireless Network Design
  • Wireless Security
  • Wireless Troubleshooting

Lesson 13: Comparing Remote Access Methods

  • WAN and Internet Connectivity
  • Virtual Private Networks
  • Remote Management

Lesson 14: Summarizing Cloud Concepts

  • Datacenter and Storage Networks
  • Cloud Concepts
  • Cloud Networking
  • Modern Network Environments

Prerequisites

Recommended experience: CompTIA A+ certification and a minimum of 9-12 months of hands-on experience working in a junior network administrator/network support technician job role.

Prior Course Recommendation:

Similar courses

Using Data Analysis Expressions to solve common business problems in Power BI

More Information

This course was built to incorporate a unique, in-depth, and interactive hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to achieve the CEH credential.

More Information

The Microsoft Power Platform helps organizations optimize their operations by simplifying, automating and transforming business tasks and processes.

More Information

In this course, you will implement and administer networks by using Cisco solutions.

More Information

CompTIA A+ is the industry standard for launching IT careers into today’s digital world. CompTIA A+ Core 1 (Exam 220-1101) covers mobile devices, networking technology, hardware, virtualization, cloud computing and network troubleshooting.

More Information

This course is designed to create PL/SQL blocks both anonymous and named. This course will cover PL/SQL objects and data types. It will also cover packages and how to debug and improve performance within PL/SQL. It will address deploying PL/SQL objects and using Oracle pre-define packages, procedures, and functions.

More Information

The CCISO program is a first-of-its-kind training and certification course that aims to produce cybersecurity executives of the highest caliber and ethics.

More Information

In this course, you will understand and use Agile core terms, explain key Agile concepts and their importance in achieving agility, identify, engage, and leverage key stakeholders in an Agile environment, apply common Agile tools and techniques, embrace and advocate for an Agile mindset to benefit from an Agile approach, select the best practices for a project and apply them appropriately to benefit the project and organization.

More Information

The principles of Scrum and be able to identify Scrum-appropriate projects The various Scrum roles, ceremonies, and artifacts The responsibilities and the core competencies of an effective Scrum Master Best-practices on how to build and guide an effective Scrum team An understanding of user stories and techniques to prioritize and manage a product backlog Ways to communicate Scrum team progress throughout all levels of the organization Everything you need to know to pass the 50 question CSM test.

More Information

This course introduces tools and tactics to manage cybersecurity risks, identify various types of common threats, evaluate the organization's security, collect and analyze cybersecurity intelligence, and handle incidents as they occur.

More Information

Students who attend this course will leave armed with new skills to leverage modules, scale applications into multi-core environments, and improve the performance of Java 9 applications. This course will teach students everything they need to successfully master and implement the latest features and benefits of Java 9 and become a more effective Java 9 developer.

More Information

In this course you will, explain core programming fundamentals such as computer storage and processing, create and use variables and constants in programs, discuss how to create and use functions in a program, use decisions structures in a computer program, create and use repetition (loops) in a computer program, explain pseudocode and its role in programming, implement object-oriented programming concepts, and identify application errors and explain how to debug an application and handle errors.

More Information

In this course, you will create single page web applications using the MVC pattern of AngularJS, understand the programming model provided by the AngularJS framework, define Angular controllers and directives, and control Angular data bindings.

More Information

In this course, you will develop single page Angular applications using Typescript, set up a complete Angular development environment, create components, directives, services, pipes, forms and custom validators, handle advanced network data retrieval tasks using observables, consume data from REST web services using the Angular HTTP Client, handle push-data connections using the WebSockets protocol, work with Angular Pipes to format data, and use advanced Angular Component Router features.

More Information

This course is designed for people who want to learn the Python programming language in preparation for using Python to develop software for a wide range of applications, such as data science, machine learning, artificial intelligence, and web development.

More Information

This course teaches concepts by deep-dive on-hand exercises. Throughout the course, you will learn data wrangling with hands-on exercises and activities. You’ll find checklists, best practices, and critical points mentioned throughout the lessons, making things more interesting.

More Information

In this course, you will apply recommended practices for effective and efficient automation with Ansible, perform automation operations as rolling updates, use advanced features of Red Hat Ansible Automation Platform to work with data, including filters and plugins, create automation execution environments to contain and scale Red Hat Ansible Automation, and leverage capabilities of the automation content navigator to develop Ansible Playbooks.

More Information

In this course, you will build a data analytics solution using Amazon Redshift, a cloud data warehouse service.

More Information

In this course, you will learn new concepts, strategies, and best practices for designing a cloud-based data warehousing solution using Amazon Redshift, the petabyte-scale data warehouse in AWS.

More Information

In this course, you will learn how to build an operational data lake that supports analysis of both structured and unstructured data. You will learn the components and functionality of the services involved in creating a data lake. You will use AWS Lake Formation to build a data lake, AWS Glue to build a data catalog, and Amazon Athena to analyze data. The course lectures and labs further your learning with the exploration of several common data lake architectures.

More Information

In this course, you will learn to build batch data analytics solutions using Amazon EMR, an enterprise-grade Apache Spark and Apache Hadoop managed service.

More Information

This course is designed to teach those in a systems administrator or Development Operations (DevOps) role how to create automatable and repeatable deployments of networks and systems on the AWS platform. The course covers the specific AWS features and tools related to configuration and deployment, in addition to best practices for configuring and deploying systems.

More Information

In this course, you will learn the most common DevOps patterns to develop, deploy, and maintain applications on the AWS platform. We will explore the core principles of the DevOps methodology and examine a number of use cases applicable to startup, small- to medium-sized business, and enterprise development scenarios.

More Information

In this course you will describe key database concepts in the context of SQL Server, characterize database languages used in SQL Server, describe data modeling techniques, discuss normalization and denormalization techniques, distinguish relationship types and effects in database design, describe the effects of database design on performance, and define commonly used database objects.

More Information

In this course, you will create single table SELECT queries, create multiple table SELECT queries, insert, update, and delete data, query data using built-in functions, create queries that aggregate data, create subqueries, create queries that use table expressions, use UNION, INTERSECT, and EXCEPT on multiple sets of data, implement window functions in queries, use PIVOT and GROUPING SETS in queries, use stored procedures in queries, add error handling to queries, and use transactions in queries.

More Information

In this course you will, create sophisticated SSIS packages for extracting, transforming, and loading data, use containers to efficiently control repetitive tasks and transactions, configure packages to dynamically adapt to environment changes, use Data Quality Services to cleanse data, successfully troubleshoot packages, create and manage the SSIS Catalog, deploy, configure, and schedule packages, secure the SSIS Catalog.

More Information

In this course, you will expand your Python proficiencies, select an object-oriented programming approach for Python applications, create object-oriented Python applications, create a desktop application, create data-driven applications, create and secure web service-connected applications, program Python for data science, implement unit testing and exception handling, and package an application for distribution.

More Information

In this course, you will develop web content in HTML, enhance its formatting and layout using CSS, and add interactivity using JavaScript.

More Information

In this course, you will learn how to leverage AWS data Services to store, process, analyze, stream, and query data to make decisions with speed and agility at scale, how to modernize data solutions end to end, and obtain skills to put your data to work to make better, more informed decisions, respond faster to the unexpected, and uncover new opportunities.

More Information

In this course, you will practice and deploy serverless solutions on AWS.

More Information

In this course, you will learn to accelerate the process to prepare, build, train, deploy, and monitor ML solutions using Amazon SageMaker Studio.

More Information

This course will build on existing knowledge from the CompTIA A+ 1101 course. This course will provide fundamental level skills and theoretical concepts to prepare you for real-world experiences on the job as a technician. CompTIA A+ is the industry standard for launching IT careers into today’s digital world. CompTIA A+ Core 2 (Exam 220-1102) covers installing and configuring operating systems, expanded security, software troubleshooting and operational procedures.

More Information

This course teaches Azure Solution Architects how to design infrastructure solutions. Course topics cover governance, compute, application architecture, storage, data integration, authentication, networks, business continuity, and migrations. The course combines lecture with case studies to demonstrate basic architect design principles.

More Information

CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. This course was built to incorporate a unique, in-depth, and interactive hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to achieve the CEH credential.

More Information

CompTIA Cloud+ is a global certification that validates the skills needed to deploy and automate secure cloud environments that support the high availability of business systems and data. It is ideal for cloud engineers who need to have expertise across multiple products and systems. CompTIA Cloud+ is the only cloud focused certification approved for DoD 8570.01-M, offering an infrastructure option for individuals who need to certify in IAM Level I, CSSP Analyst and CSSP Infrastructure Support roles.

More Information

In this 5-day course, you will learn day-to-day management tasks, including how to manage applications, client health, hardware and software inventory, operating system deployment, and software updates by using Configuration Manager. You also will learn how to optimize Endpoint Protection, manage compliance, and create management queries and reports. Although this course and the associated labs are written for Windows Server 2022, the skills taught will also be backwards compatible for Server 2016 and 2019.

More Information

CompTIA Security+ is a global certification that validates the foundational cybersecurity skills necessary to perform core security functions and pursue an IT security career. It establishes the core knowledge required of any cybersecurity role and provides a springboard to intermediate-level cybersecurity jobs. CompTIA Security+ is compliant with ISO 17024 standards and approved by the U.S. DoD to meet Directive 8140.03M requirements.

More Information

Gain fundamental knowledge and skills to use PowerShell for administering and automating administration of Windows servers.

More Information

Learn how to make SharePoint online relevant to your team by using a sites functionality to help you share information and collaborate with your colleagues.

More Information

Gain a broad view of how to respond to a cybersecurity incident while preparing for the CyberSec First Responder certification.

More Information

This course provides detailed information on the architecture of an Oracle Database instance and database, enabling you to manage your database resources effectively. You learn how to create database storage structures appropriate for the business applications supported by your database. In addition, you learn how to create users and administer database security to meet your business requirements. This course provides basic information on backup and recovery techniques.

More Information

This introductory and beyond level course is for technical users newer to Python who want to learn advanced data handling and transformation skills, using the latest tools and techniques. The course is approximately 50% hands-on to 50% lecture ratio, combining expert lecture, real-world demonstrations and group discussions with machine-based practical labs and exercises. Student machines are required.

More Information

CompTIA Data+ is an early-career data analytics certification for professionals tasked with developing and promoting data-driven business decision-making that gives learners the confidence to bring data analysis to life.

More Information

In this course, you will compose SQL queries to retrieve desired information from a database.

More Information

In this course, you will work with advanced queries to manipulate and index tables. You will also create transactions so that you can choose to save or cancel the data entry process.

More Information

This 2-day entry-level course examines the services and features of Microsoft SQL 2022. (This is NOT a SQL querying course, SQL Querying syntax will not be discussed). The content focuses on database tables, adding and changing data, creating and using stored procedures, entity relationships, and indexes.

More Information

Doing data analysis work is about more than learning a software program (Excel, Power BI, Tableau, etc.) - you need to understand the concepts and theory too. This one day course gets you up to speed (and can be useful either before or after your software classes).

More Information

In this course, you will use various Python tools to load, analyze, manipulate, and visualize business data.

More Information

ITIL 4 is the next evolution of ITIL, providing a practical and flexible transition that allows organizations to adopt the new ways of working required by the modern digital world. It provides an end-to-end IT/digital operating model for the delivery and operation of tech-enabled products and services and enables IT teams to continue to play a crucial role in wider business strategy.

More Information

This course shows you how to apply various approaches and algorithms to solve business problems through Artificial Intelligence (AI) and Machine Learning (ML), follow a methodical workflow to develop sound solutions, use open source, off-the-shelf tools to develop, test, and deploy those solutions, and ensure that they protect the privacy of users. This course includes hands on activities for each topic area.

More Information

This five-day instructor-led course teaches IT professionals the fundamental administration skills required to deploy and support Windows Server in most organizations. It is designed primarily for IT professionals who have some experience with Windows Server and will be responsible for managing identity, networking, storage and compute by using Windows Server, and who need to understand the scenarios, requirements, and options that are available and applicable to Windows Server.

More Information

This four-day course is intended for Windows Server Hybrid Administrators who have experience working with Windows Server and want to extend the capabilities of their on-premises environments by combining on-premises and hybrid technologies. Windows Server Hybrid Administrators implement and manage on-premises and hybrid solutions such as identity, management, compute, networking, and storage in a Windows Server hybrid environment.

More Information

Our Exam Cram sessions are intensive, focused review sessions designed to help your team master key concepts and pass their CompTIA certification exams with confidence. Led by expert instructors, these sessions provide in-depth, targeted hands-on practice to ensure your team is fully prepared for exam day. CompTIA A+ Core 1 covers mobile devices, networking technology, hardware, virtualization and cloud computing and network troubleshooting. This exam cram session is included with the A+ Core 1 course.

More Information

Our Exam Cram sessions are intensive, focused review sessions designed to help your team master key concepts and pass their CompTIA certification exams with confidence. Led by expert instructors, these sessions provide in-depth, targeted hands-on practice to ensure your team is fully prepared for exam day. CompTIA A+ Core 2 covers installing and configuring operating systems, expanded security, software troubleshooting and operational procedures. This exam cram session is included with the A+ Core 2 course.

More Information

Our Exam Cram sessions are intensive, focused review sessions designed to help your team master key concepts and pass their CompTIA certification exams with confidence. Led by expert instructors, these sessions provide in-depth, targeted hands-on practice to ensure your team is fully prepared for exam day. Network+ exam covers the core skills necessary to establish, maintain, troubleshoot and secure networks regardless of technology or platform. This exam cram session is included with the Network+ course.

More Information

Our Exam Cram sessions are intensive, focused review sessions designed to help your team master key concepts and pass their CompTIA certification exams with confidence. Led by expert instructors, these sessions provide in-depth, targeted hands-on practice to ensure your team is fully prepared for exam day. Security+ covers the most in-demand skills related to current threats, automation, zero trust, IoT, risk – and more. This exam cram session is included with the Security+ course.

More Information

Our Exam Cram sessions are intensive, focused review sessions designed to help your team master key concepts and pass their CompTIA certification exams with confidence. Led by expert instructors, these sessions provide in-depth, targeted hands-on practice to ensure your team is fully prepared for exam day. Cloud+ covers the expertise needed to deploy and automate secure cloud environments and protect mission-critical applications and data. This exam cram session is included with the Cloud+ course.

More Information

Our Exam Cram sessions are intensive, focused review sessions designed to help your team master key concepts and pass their CompTIA certification exams with confidence. Led by expert instructors, these sessions provide in-depth, targeted hands-on practice to ensure your team is fully prepared for exam day. Cloud+ covers mining and manipulating data, applying basic statistical methods, and analyzing complex datasets. This exam cram session is included with the Data+ course.

More Information

This five-day course teaches you advanced skills for configuring and maintaining a highly available and scalable virtual infrastructure. Through a mix of lecture and hands-on labs, you configure and optimize the VMware vSphere 8 features that build a foundation for a truly scalable infrastructure. You also discuss when and where these features have the greatest effect. Attend this course to deepen your understanding of vSphere and learn how its advanced features and controls can benefit your organization.

More Information

Administering Cisco Unified Communications Manager (ACUCM with AUC) is a 5-day training program that provides system administrators and networking professionals with an understanding of the Cisco Unified Communications Manager System. This course teaches the concepts of IP telephony based in system administration, including its function, features, and configuration. This UC training course focuses on Cisco Unified Communications Manager (CUCM) v12x. All labs are using CUCM v12x.

More Information

In this course, you will develop your understanding about agile business analysis and the role of the business analyst on an agile team. You will learn how business analysis on an agile project is ‘the same’ and ‘different’ than business analysis performed on waterfall projects. You will understand how the business analysis role changes on an agile team.

More Information

This 2-day virtual workshop puts the distributed agile team members through their paces, by showing them how to conduct the five (5) scrum ceremonies, while simulating key activities within a sprint, all while working remotely and using their own project (for private classes) as a case study for the exercises.

More Information

The Certified Information Systems Security Manager (C-ISSM) course covers the skills and knowledge to assess threat analysis & risks, risk & incident management, security programs & CISO roles, IS security strategy & frameworks, audit & risk management creation of policies, compliance & awareness, as well as DR & BCP development, deployment & maintenance. This course not only covers ISACA®'s CISM exam, but will provide a measurable certification that demonstrates proficiency in the IS Management field.

More Information

This scenario-based course focuses on computer security as an applied process across job roles and industries. The course also helps to prepare students for achieving the widely regarded Certified Information Systems Security Professional (CISSP) certification.

More Information

This course shows you the fundamentals of building IT infrastructure on the AWS platform. You learn how to optimize the AWS Cloud by understanding AWS services and how they fit into cloud-based solutions. You explore best practices and design patterns to help you architect optimal IT solutions on AWS, then build and explore a variety of infrastructures through guided, hands-on activity. You learn how to create fledgling architectures and build them into robust and adaptive solutions.

More Information

This fundamental-level, full-day course is intended for individuals who seek an overall understanding of the AWS Cloud, independent of specific technical roles. It provides a detailed overview of cloud concepts, AWS services, security, architecture, pricing, and support. It includes lab exercises reinforcing some of the core concepts of the lecture. This course also helps you prepare for the AWS Certified Cloud Practitioner exam.

More Information

In this course, you will learn how to use the AWS SDK for developing secure and scalable cloud applications. The course provides in-depth knowledge about how to interact with AWS using code and covers key concepts, best practices, and troubleshooting tips.

More Information

During this 5-day course, students will learn Transact-SQL as implemented in SQL Server 2008, 2012 and 2014. The course starts by establishing a foundation understanding of database concepts and terminology. Students are then prepared to use various Microsoft tools to submit queries and view the result.

More Information

The Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR) v1.3 training gives you the knowledge and skills needed to install, configure, operate, and troubleshoot an enterprise network and introduces you to overlay network design by using SD-Access and SD-WAN solutions. This course also prepares you for the 350-401 Implementing Cisco Enterprise Network Core Technologies (ENCOR) exam.

More Information

Explore Oracle 19c DB Architecture, DBCS Deployments, Managing Database Security, Backup and Recovery, Monitoring and more.

More Information

Explore Next-Level DBA Skills: Backup & Recovery, Working with Grid Infrastructure, Upgrading Oracle and more.

More Information

This class uses the standard VMware vSphere class outline as a base but adds additional focus on vSphere troubleshooting - giving students a more practical learning experience compared with the standard course introductory vSphere class.

More Information

This course is a continuation of AZ-040T00: Automating Administration with PowerShell, taking a deep dive into the development of PowerShell cmdlets and modules and features both hands on labs and challenging exercises to help you practice the skills presented in class. Time will be spent on the theory of how to design cmdlets as well as the proper structure of the programming code to facility cmdlets that work with the PowerShell piping in keeping with community standards.

More Information

This is a 4-day course is designed to provide you with the knowledge and skills required to support and troubleshoot Windows 11 PCs and devices in an on-premises Windows Server Active Directory domain environment.

More Information

In this course, students will continue their learning on the foundations of report writing with Microsoft® SQL Server® Report Builder and SSRS.

More Information

AWS Technical Essentials introduces you to AWS products, services, and common solutions. It provides you with fundamentals to become more proficient in identifying AWS services so that you can make informed decisions about IT solutions based on your business requirements and get started working on AWS.

More Information

This course teaches Network Engineers how to design, implement, and maintain Azure networking solutions. This course covers the process of designing, implementing, and managing core Azure networking infrastructure, Hybrid Networking connections, load balancing traffic, network routing, private access to Azure services, network security and monitoring.

More Information

The Cloud is being widely adopted today for a diverse set of reasons. However, many are finding that security in the cloud is a huge challenge. The C)CSO looks to fill the gap in cloud security education and give you the skills you need to develop strong cloud security.

More Information

The Certified Security Principles (C)SP) course is going to prepare you for security across the entire environment including understanding risk management, identity and access control, network and data security. This is just a short list of everything covered within this course, which will include new technologies like IoT and cloud services. This course is intended to prepare you to become a benefit to any company attempting to improve its security posture.

More Information

The Certified Cybersecurity Systems Auditor (C)CSSA) course covers the skills and knowledge to assess vulnerabilities, report on compliance and implement controls for private and public enterprises. Many organizations require a Cybersecurity System Auditor's expert knowledge when it comes to identifying critical issues and providing effective auditing solutions.

More Information

The CISSO addresses the broad range of industry best practices, knowledge and skills expected of a security manager/officer. You will learn in-depth theory pertaining to the practical implementation of core security concepts, practices, monitoring and compliance of IS management. Whether you’re responsible for the management of a Cybersecurity team, a Security Officer, an IT auditor or a Business Analyst, the C)ISSO certification course is an ideal way to increase your knowledge, expertise and skill.

More Information

A Certified Disaster Recovery Engineer (C)DRE) is the superhero of an Information System. Disaster recovery (DR) and business continuity planning (BCP) is the process of having a professional work with a business to prepare processes, policies, and procedures to follow in the event of a disruption. The C)DRE prepares students to plan and present the latest methodologies and best practices for real-world system recovery.

More Information

To protect an information system you need to be able to see that system through the eyes of the attacker. The Certified Professional Ethical Hacker certification course is the foundational training to a line of penetration testing courses because it teaches you to think like a hacker. Therefore, you can set up dynamic defenses to prevent intrusion.

More Information

A Certified Penetration Testing Engineer (C)PTE) imagines all of the ways that a hacker can penetrate a data system. In this course you will learn 5 Key Elements of Pen Testing, discover the latest vulnerabilities and the techniques malicious hackers are using to acquire and destroy data and learn more about the business skills needed to identify protection opportunities, justify testing activities and optimize security controls appropriate to the business needs in order to reduce business risk.

More Information

The Certified Secure Web Application Engineer (C)SWAE) course is delivered by high level OWASP experts and students can expect to obtain real world security knowledge that enables them to recognize vulnerabilities, exploit system weaknesses and help safeguard against application threats. You will learn how to develop web applications that aren't subject to common vulnerabilities, and how to test and validate that their applications are secure, reliable and resistant to attack.

More Information

This course is intended for power users and IT professionals who are tasked with working within the SharePoint 2016 environment and conduct site collection and site administration. This course is for an on-premise SharePoint environment.

More Information

The course focuses on common data engineering tasks such as orchestrating data transfer and transformation pipelines, working with data files in a data lake, creating and loading relational data warehouses, capturing and aggregating streams of real-time data, and tracking data assets and lineage.

More Information

This course teaches developers how to create applications using the SQL API and SDK for Azure Cosmos DB. Students will learn how to write efficient queries, create indexing policies, manage and provision resources, and perform common operations with the SDK.

More Information

In this course students will learn the various security, compliance, and identity concepts. After attending you will be able to describe the capabilities of Microsoft’s identity and access management solutions and Microsoft security and compliance solutions.

More Information

This course introduces a process for effectively planning and designing a functional, efficient database. Knowing how to plan a relational database is important to the success of the databases you create. Without planning, you cannot possibly know what the database needs to do, or even what information to include in the database. Planning a database is essential and prevents the extra work of fixing data maintenance problems later on.

More Information

This five-day course describes how to set up, configure and manage an Office 365 tenant including identities, and the core services of Microsoft 365. In this five-day course, you will learn how to plan the configuration of an Office 365 tenant including integration with existing user identities; plan, configure and manage core services; and report on key metrics.

More Information

This five-day instructor-led course provides students who administer and maintain SQL Server databases with the knowledge and skills to administer a SQL server database infrastructure. Additionally, it will be of use to individuals who develop applications that deliver content from SQL Server databases.

More Information

This 2-day instructor-led course teaches you everything you need to know about BitLocker. This course includes hands-on labs that reinforce and expand on the instructor-led portion by having you actually deploy and operate BitLocker. You’ll practice techniques for setting up a BitLocker-enabled environment, implementing BitLocker on multiple system configurations, and recovering BitLocker after the detection of a possible compromise.

More Information