CompTIA Security+
CompTIA Security+ SY0-501
The CompTIA Security+ course is designed to teach students security basics and prepare them for testing to become Security+ certified. The Security+ covers many vendor neutral topics including different types of threats and attacks, networking technologies and tools, secure design and architecture, identity and access management, risk assessment and management, and finishes up with Cryptography and Public Key Infrastructure. This covered everything from the ever-expanding virtualization of various computing systems to industry management of smart devices. These topics will be covered from a ground up perspective so that even inexperienced students will be able to follow along.
IT security is an ever-growing field and its importance is recognized universally throughout the industry. This security+ course will cover security concerns from both a professional setting and on a personal level. This gives students who do not plan to apply their certificate in the immediate future the benefit of keeping up to date on the latest security practices and techniques that they can follow to keep themselves secure in a digital world.
Each of the modules of this course is designed to align with the official objectives of this certification and expand past the scope of the certification to allow for real life application. They give the student some real life examples of various attacks or security practices that they can both apply in real life or use to further their understanding of a course objective.
Instructor - Jeffrey Porch
Included Courses
Total Video Lessons

14

16

15

9

16

11
Ethical Hacking Certification Training
Fundamentals of Ethical Hacking
The Fundamentals of Ethical Hacking training course enables students to identify, counter and defend hackers from penetrating networks and gaining access to vital information. This will allow students to deploy proactive countermeasures and in turn, stay ahead of information security developments and exploited vulnerabilities. With this certification, professionals will gain a valuable credential commanding an average salary of over $100,000 per year. This course is also the prerequisite for the CHFI certification which will expand on the hacking techniques and lead into the area of cyber forensics and investigation. Topics included in this course are: DDOS Attacks, Detection, Policy Creation, Social Engineering, Virus Creation and Buffer Overflows to name a few.
Included Courses
Total Video Lessons

22

9

4

5

6

3

6

4

4

6

7

5

4

3

5

3

5

7

14
Certified Ethical Hacker (CEH) v.10
This highly hands-on course gives participants experience in network and system penetration testing. It covers all of the exam objectives for the ECC 312-50 version 10 exam while taking the learner step-by-step through hacking and exploiting each network and system type. Tools used in the activities are a combination of Windows- and Kali Linux-based, covering a broad range of examples used by ethical hackers.
In this course, you will learn hands-on penetration testing and hacking skills including:
- Footprinting, scanning, and enumeration
- Vulnerability analysis
- Sniffing and Spoofing
- Social engineering
- Denial of Service
- Web server, web application, and database hacking
- System hacking using various forms of malware and tools
- Wireless network and mobile device hacking
- Evading IDS, Firewalls, and Honeypots
- Cryptography
- Cloud computing and Internet of Things hacking
The Certified Ethical Hacker certification is a much-sought-after security certification offered by EC-Council. It demonstrates proficiency in ethical hacking concepts and techniques.
The topics in this course cover a broad range of ethical hacking concepts and techniques and will provide you with a solid foundation to pursue advanced cybersecurity studies.
In this course, you will learn hands-on penetration testing and hacking skills including:
- Footprinting, scanning, and enumeration
- Vulnerability analysis
- Sniffing and Spoofing
- Social engineering
- Denial of Service
- Web server, web application, and database hacking
- System hacking using various forms of malware and tools
- Wireless network and mobile device hacking
- Evading IDS, Firewalls, and Honeypots
- Cryptography
- Cloud computing and Internet of Things hacking
The Certified Ethical Hacker certification is a much-sought-after security certification offered by EC-Council. It demonstrates proficiency in ethical hacking concepts and techniques.
The topics in this course cover a broad range of ethical hacking concepts and techniques and will provide you with a solid foundation to pursue advanced cybersecurity studies.
Included Courses
Total Video Lessons

8

25

16

13

5

12

9

8

10

8

12

14

7

12

27

17

10

11

8

7
Computer Forensics
Computer Hacking Forensic Investigator (CHFI)
CHFI certifies individuals in the specific security discipline of computer forensics from a vendor-neutral perspective. The CHFI certification will fortify the application knowledge of law enforcement personnel, system administrators, security officers, defense and military personal, legal professionals, bankers, security professionals, and anyone who is concerned about the integrity of the network infrastructure.
Included Courses
Total Video Lessons

13

10

5

7

8

5

10

10

7

2

8

3

4

4

6

4

3

8

4

5

4

3
Certified Information Systems Auditor (CISA)
Included Courses
Total Video Lessons

12

7

11

4

11

26

3
Certified Information Security Manager (CISM)
Included Courses
Total Video Lessons

57

52

74

38

9

68
Certified Information Systems Security Pro (CISSP)
Certified Information Systems Security Pro (CISSP) 2015
The vendor-neutral CISSP certification is the ideal credential for those with proven deep technical and managerial competence, skills, experience, and credibility to design, engineer, implement, and manage their overall information security program to protect organizations from growing sophisticated attacks. Backed by (ISC)², the globally recognized, not-for-profit organization dedicated to advancing the information security field, the CISSP was the first credential in the field of information security to meet the stringent requirements of ISO/IEC Standard 17024. Not only is the CISSP an objective measure of excellence, but also a globally recognized standard of achievement. **NOTE: Effective April 15, 2015, the CISSP exam is based on a new exam blueprint.
Included Courses
Total Video Lessons

19

13

27

15

14

9

19

10
Cloud Computing Security Knowledge (CCSK)
Included Courses
Total Video Lessons

4

7

3

4

7

4

4

1

4

4

3

5

5

7
CompTIA Advanced Security Practitioner (CASP)
CompTIA Advanced Security Practitioner (CASP) CAS-003
This course provides advanced-level training in risk management, enterprise security operations and
architecture, research and collaboration, and integration of enterprise security. It covers all of the new
exam objectives for the CAS-003 exam. The CASP certification is the highest-level security certification
offered by CompTIA and is the final step in achieving the new CompTIA Security Analytics Expert (CSAE)
or Security Infrastructure Expert (CSIE) stackable certification.
In this course you will advance your skills in the following areas:
- Risk Management
- Enterprise Security Architecture
- Enterprise Security Operations
- Technical Integration of Enterprise Security
- Research, Development and Collaboration
This course is intended for advanced students and cybersecurity practitioners who will implement cybersecurity. Successful completion of pre-requisite courses in Security+ and CySA+/PenTest+ is highly recommended.
In this course you will advance your skills in the following areas:
- Risk Management
- Enterprise Security Architecture
- Enterprise Security Operations
- Technical Integration of Enterprise Security
- Research, Development and Collaboration
This course is intended for advanced students and cybersecurity practitioners who will implement cybersecurity. Successful completion of pre-requisite courses in Security+ and CySA+/PenTest+ is highly recommended.
Included Courses
Total Video Lessons

24

56

48

38

12
CompTIA Cybersecurity Analyst (CySA+)
Included Courses
Total Video Lessons

23

12

17

15
Data Security
Data Security Compliance
This course outlines important data security measures to be taken by individuals to protect sensitive data and PI. Some of the topics include how to prevent data breaches, safeguard, protecting your personal information, different types of breaches, and how to prevent data breaches. The security measures outlined in this course not only protect the individual (mobile devices, etc) but also protect data up to the corporate level. These safe practices can prevent hacking into personal social media accounts up to hacking of sensitive corporate data and data breaches. Learn how to better protect yourself and your company by implementing these security measures into your usage. Instructor - Josh Schofer
Included Courses
Total Video Lessons

2

2

2

3
Cyber Security & Awareness
Cyber Security Awareness and Prevention
This Cyber Security Awareness and Prevention course will teach you how to keep your network safe, how to stay safe on the internet, how to keep your email safe, how to use anti-virus software and much more. You will walk away from this training with a level of understanding that will let you apply the proper amount of digital protection to your home or office computer systems. Instructor - Josh Schofer
Included Courses
Total Video Lessons

19

20
CompTIA PenTest+
CompTIA PenTest+ (PT0-001)
This highly hands-on course gives participants experience in network and system penetration testing. It
covers all of the exam objectives for the PT0-001 exam while taking the learner step-by-step through
hacking and exploiting each network and system type. Tools used in the activities are mostly Kali Linux-based,
covering a broad range of real-world examples used by penetration testers and red teams.
The PenTest+ certification is a much-sought-after security certification offered by CompTIA. It is the final step in achieving the new CompTIA Network Vulnerability Assessment Professional (CNVP) or Network Security Professional (CNSP) stackable certification. It is also an intermediary step in achieving the CompTIA Security Infrastructure Expert (CSIE) top level certification.
In this course you will learn hands-on penetration testing and hacking skills including:
- Client engagement and documentation
- Passive and active reconnaissance
- Windows, Linux, and mobile device system hacking
- Physical security testing and social engineering
- Wired and wireless network hacking and exploitation
- Network service hacking and exploitation
- Application and web app hacking and exploitation
- Lateral movement and persistence in a compromised network
- Covering your tracks
- Report writing and post-test cleanup
This course is intended for advanced students and cybersecurity practitioners who will actively test networks and computer systems for vulnerabilities. Successful completion of two pre-requisite courses, Network+ and Security+, is highly recommended.
The PenTest+ certification is a much-sought-after security certification offered by CompTIA. It is the final step in achieving the new CompTIA Network Vulnerability Assessment Professional (CNVP) or Network Security Professional (CNSP) stackable certification. It is also an intermediary step in achieving the CompTIA Security Infrastructure Expert (CSIE) top level certification.
In this course you will learn hands-on penetration testing and hacking skills including:
- Client engagement and documentation
- Passive and active reconnaissance
- Windows, Linux, and mobile device system hacking
- Physical security testing and social engineering
- Wired and wireless network hacking and exploitation
- Network service hacking and exploitation
- Application and web app hacking and exploitation
- Lateral movement and persistence in a compromised network
- Covering your tracks
- Report writing and post-test cleanup
This course is intended for advanced students and cybersecurity practitioners who will actively test networks and computer systems for vulnerabilities. Successful completion of two pre-requisite courses, Network+ and Security+, is highly recommended.
Included Courses
Total Video Lessons

16

44

106

6

10

6

14

42

24

32

16

8

4

22

4

20

14

24

10

4

8