A+ Preparatory Computer Repair Training Class
Welcome to South Florida’s finest hands-on computer repair school!
Our instructor-led classes begin weekly and are taught by patient instructors — each considered to be an industry expert. Since 1989, PC Professor has been offering computer repair classes to those seeking condensed, hands-on training in a relaxed, comfortable and professional environment. Stop by and visit us today to see why PC Professor Technical Institute has, since 1989, been considered the industry leader in computer training and academic excellence. Or, contact us to arrange a campus tour, to meet with an instructor or to audit a session.
Computer Repair Class. If you are considering a career as an entry-level information technology (IT) professional or personal computer (PC) service technician, PC Professor’s “A+ Preparatory Class” may be worthy of consideration. The course will build on your existing user-level knowledge and experience with personal computer software and hardware to present fundamental skills and concepts that you will use on the job. In this course, you will acquire the essential skills and information you will need to install, upgrade, repair, configure, troubleshoot, optimize, and perform preventative maintenance of basic personal computer hardware and operating systems. If you would like to tour our facility, meet with an instructor or arrange a complimentary audit, simply contact us to arrange a meeting with an Admissions Rep today.
Computer Repair Class. You will learn to install, upgrade, repair, configure, optimize, troubleshoot, and perform preventative maintenance on windows-based personal computer hardware and operating systems.
Computer Repair Class. Over a dozen intense chapters covering possible material on the national exams. Many useful illustrations, drawings, and helpful photographs are included as well. Also included are practice test questions, exercises, labs and more. Notes and highlighting can be done directly in the electronic book (class dependent), or instead, PC Professor may provided a physical book for each enrolled student.
Computer Repair Class. The target student for PC Professor’s “A+ Preparatory Computer Repair Class” are those with basic computer user skills who are interested in pursuing a career as an IT (information technology) professional or as a PC (personal computer) technician. Possible job environments include mobile and/or corporate settings with a high level of face-to face client interaction, remote-based work environments where client interaction, client training, operating systems, and connectivity issues are emphasized, or settings with limited customer interaction where hardware activities are emphasized.
In addition, this challenging, difficult and fast-paced course will help prepare students prepare for, and achieve, a nationally-recognized CompTIA A+ certification so it may be suitable for those seeking career enhancement and/or career advancement.
Computer Repair Class. Students taking this course should have the following skills: End-user skills with Windows-based personal computers, including the ability to browse and search for information on the Internet. Start up and shut down the computer. Log on to a computer and/or computer network. Run programs. Move, copy, delete, and rename files in Windows Explorer. Basic knowledge of computing concepts, including the difference between hardware and software. The functions of software components, such as the operating system, applications, and file systems. The function of a computer network, an operating system and the internet.
PC Professor’s computer repair classes begin regularly and fill quickly. Contact an Admissions Rep today to discuss the enrollment process.
The following is CompTIA’s Pre-Approved Continuing Education Units (CEU) list for certification renewal (Note: not all certification-preparatory classes and/or certification exams are offered at PC Professor nor is this list intended to imply class offerings, authorization, trademark claim, affiliation, partnership or endorsement of any type):
The following is CompTIA’s Pre-Approved Continuing Education Units (CEU) list for certification renewal (Note: not all certification-preparatory classes and/or certification exams are offered at PC Professor nor is this list intended to imply class offerings, authorization, trademark claim, affiliation, partnership or endorsement of any type):
CERTIFICATION PROVIDER | VENDOR COURSE TITLE |
---|---|
AMAZON WEB SERVICES | SECURITY OPERATIONS ON AWS AWS SECURITY FUNDAMENTALS EL CAPITAN OS X SUPPORT ESSENTIALS YOSEMITE OS X SUPPORT ESSENTIALS YOSEMITE OS X SERVER ESSENTIALS |
APPLE | APPLE CERTIFIED MACINTOSH TECHNICIAN (ACMT) MANAGING APPLE DEVICES DEPLOYING, MAINTAINING IOS & EL CAPITAN MANAGING APPLE DEVICES DEPLOYING, MAINTAINING IOS AND EL CAPITAN ADVANCED TROUBLESHOOTING AIRWAVE WIRELESS MANAGEMENT SUITE INSTALLATION, CONFIGURATION & USE |
ARUBA | ARUBA INSTANT ACCESS POINTS (IAP) CLEARPASS ESSENTIALS HP ONLY – ARUBA MOBILITY BOOT CAMP IMC ESSENTIALS FOR NETWORK ADMINISTRATORS IMPLEMENTING ARUBA WLAN MIGRATING FROM CISCO TO HP FLEXNETWORKS MOBILITY ACCESS SWITCH SCALABLE WLAN DESIGN & IMPLEMENTATION (SWDI) SOLUTIONS PART 1 IP OFFICE BASIC INTEGRATION AND CONFIGURATION INTRODUCTION TO SESSION INITIATION PROTOCOL (SIP) MERIDIAN 1 OPTION 11C INSTALLATION, MAINTENANCE, & DATABASE – COMMUNICATION SERVER |
AVAYA | STACKABLE ERS AND VSP INSTALLATION, CONFIGURATION, AND MAINTENANCE AVAYA COMMUNICATION SERVER DIALING PLAN DESIGN AND IP PEER NETWORKING ERS INSTALLATION AND CONFIGURATION SAN WBT BROCADE 8 GBPS FIBRE CHANNEL PRODUCT SAN WBT BROCADE 16 GBPS FIBRE CHANNEL PRODUCT CFA 200 CORE SAN ADMINISTRATION DCX 200 DCX BACKBONE PRODUCT ADMINISTRATION CFP 300 ADVANCED SAN ADMINISTRATION CFD 200 BROCADE SAN DESIGN SAN-TS SAN TROUBLESHOOTING INTRODUCTION TO THE BROCADE EXTENSION SWITCH BROCADE NETWORK INDUSTRY PROTOCOL IP STORAGE NETWORKING BRIDGE TO BROCADE ETHERNET FABRICS FOR NETWORK PROFESSIONALS ADVANCED ETHERNET FABRIC TROUBLESHOOTING NETWORK OS UPDATE BROCADE PROFESSIONAL IP ADMINISTRATOR TROUBLESHOOTING IP NETWORKS BORDER GATEWAY PROTOCOL (BGP) FOR SP AND ENTERPRISE NETWORKS BROCADE MPLS IMPLEMENTATION MPLS TRAFFIC ENGINEERING IMPLEMENTING EFFORTLESS NETWORKS WITH THE BROCADE ICX FAMILY INTRODUCTION TO HYPEREDGE AND THE ICX 6430-C12 SWITCH |
CHECK POINT | THREAT PREVENTION SECURE WEB GATEWAY MDSM WITH VSX (MULTI-DOMAIN SECURITY MANAGEMENT WITH VIRTUAL SYSTEM EXTENSION) CHECK POINT CERTIFIED SECURITY MASTER (CCSM) SECURING CISCO NETWORKS WITH THREAT DETECTION AND ANALYSIS (SCYBER) |
CISCO | INTERCONNECTING CISCO NETWORKING DEVICES DESIGNING WITH CISCO NETWORK PROGRAMMABILITY INTERCONNECTING CISCO NETWORKING DEVICES DESIGNING WITH CISCO NETWORK PROGRAMMABILITY FOR ACI IMPLEMENTING CISCO NETWORK PROGRAMMABILITY IMPLEMENTING CISCO NETWORK PROGRAMMABILITY FOR ACI IMPLEMENTING CISCO SECURE MOBILITY SOLUTIONS (SIMOS) IMPLEMENTING CISCO SECURE ACCESS CONTROL SYSTEM DESIGNING FOR CISCO INTERNETWORK SOLUTIONS (DESGN) DESIGNING THE CISCO CLOUD (CLDDES) AUTOMATING THE CISCO ENTERPRISE CLOUD (CLDAUT) IMPLEMENTING CISCO THREAT CONTROL SOLUTIONS (SITCS) |
CITRIX | IMPLEMENTING CITRIX NETSCALER 11 FOR APP AND DESKTOP SOLUTIONS CITRIX XENAPP AND XENDESKTOP HELPDESK SUPPORT CITRIX NETSCALER ADVANCED IMPLEMENTATION CITRIX NETSCALER ESSENTIALS FOR ACE MIGRATION DEPLOYING ENTERPRISE MOBILITY SOLUTIONS WITH CITRIX XENMOBILE |
COMPTIA | COMPTIA MOBILITY+ COMPTIA ADVANCED SECURITY PRACTITIONER (CASP) COMPTIA NETWORK+ COMPTIA SECURITY+ COMPTIA A+ 1001/1002 COMPTIA A+ 1101/1102 COMPTIA SERVER+ COMPTIA LINUX+ |
CSA | CCSK GRC STACK |
CWNP | CWTS – ENTERPRISE WI-FI FUNDAMENTALS CWNA – ENTERPRISE WI-FI ADMINISTRATION CWSP – ENTERPRISE WI-FI SECURITY CWDP – ENTERPRISE WI-FI DESIGN CWAP – ENTERPRISE WI-FI ANALYSIS & TROUBLESHOOTING |
DELL | Dell SC Series Installation and Configuration Introduction to Dell PS Series Storage Arrays Dell PS Series Storage Admin and Data Protection Tools Integrating vSphere with Dell PS Series Storage Dell SC Storage Center Administration and Management Dell PS Series vSphere Integration Dell Storage Networking Configuration Dell Networking Planning Dell Networking Installation and Configuration Dell Networking Interoperability Dell Networking Fundamentals-Routing Dell Networking Fundamentals – Switching Dell Networking Data Center Advanced Features & Administration Dell Networking Campus Design, Advanced Features and Configuration Dell Networking Fast Track from Cisco to Dell OS Dell Campus Networking N-Series Features & Basic Administration Dell Networking Data Center Overview & Basic Administration Dell OpenManage Essentials Administration Optimizing and Managing Dell PowerEdge Blade Server Solutions Optimizing and Managing Dell PowerEdge Server Solutions |
EC-COUNCIL | CERTIFIED ETHICAL HACKER (CEH) CERTIFIED SECURITY ANALYST (ECSA) NETWORK SECURITY ADMINISTRATOR (ENSA) DISASTER RECOVERY PROFESSIONAL (EDRP) SECURE PROGRAMMER .NET (ECSP) LICENSED PENETRATION TESTER (LPT) COMPUTER HACKING FORENSICS INVESTIGATOR (CHFI) CERTIFIED CHIEF INFORMATION SECURITY OFFICER (CCISO) CERTIFIED ETHICAL HACKER (CEH) CERTIFIED SECURITY SPECIALIST (ECSS) CERTIFIED INCIDENT HANDLER (ECIH) CERTIFIED ENCRYPTION SPECIALIST (ECES) CERTIFIED VOIP PROFESSIONAL (ECVP) AVAMAR INTEGRATION AND PERFORMANCE MANAGEMENT AVAMAR MANAGEMENT BACKUP RECOVERY SOLUTIONS – AVAMAR TO DATA DOMAIN INTEGRATION BACKUP RECOVERY SOLUTIONS – MICROSOFT EXCHANGE INTEGRATION BACKUP RECOVERY SOLUTIONS – MICROSOFT SHAREPOINT INTEGRATION BACKUP RECOVERY SOLUTIONS – NDMP INTEGRATION BACKUP RECOVERY SOLUTIONS – NETWORKER TO AVAMAR INTEGRATION BACKUP RECOVERY SOLUTIONS – NETWORKER TO DATA DOMAIN INTEGRATION BACKUP RECOVERY SOLUTIONS – ORACLE INTEGRATION BACKUP RECOVERY SOLUTIONS – VMWARE INTEGRATION BUSINESS CONTINUITY SOLUTIONS DESIGNER (BCSD) FOR RECOVERPOINT BUSINESS CONTINUITY SOLUTIONS DESIGNER (BCSD) FOR VPLEX |
EMC | CELERRA NS SERIES INSTALLATION AND MAINTENANCE CELERRA UNIFIED QUICKSTART: BASIC MANAGEMENT OVERVIEW CELERRA UNIFIED QUICKSTART: INSTALLATION AND CONFIGURATION USING CSA CELERRA UNIFIED QUICKSTART: NS-120 HARDWARE OVERVIEW & INSTALLATION CELERRA UNIFIED QUICKSTART: NS-480 HARDWARE OVERVIEW & INSTALLATION CELERRA UNIFIED QUICKSTART: NX4 HARDWARE OVERVIEW & INSTALLATION CELERRA UNIFIED QUICKSTART: PRODUCT INSTALLATION AND CONFIGURATION OVERVIEW CELERRA UNIFIED QUICKSTART: PROVISIONING FOR FCCONNECTED HOSTS CENTERA FUNDAMENTALS CENTERA HARDWARE CONFIGURATIONS CENTERA INSTALLATION AND MAINTENANCE CENTERA TOOLS AND INSTALLATION CENTERA UNIVERSAL ACCESS CENTERA UPGRADES AND MAINTENANCE CLARIION BASIC MANAGEMENT CLARIION CX3 INSTALLATION DIFFERENCES CLARIION FOUNDATIONS CLARIION HARDWARE CLARIION INSTALLATION AND MAINTENANCE CLOUD INFRASTRUCTURE PLANNING AND DESIGN CLOUD SERVICES PLANNING AND DESIGN CONNECTIVITY PROTOCOLS EMC AVAILABILITY INFRASTRUCTURE SOLUTIONS AND DESIGN EMC BACKUP RECOVERY INFRASTRUCTURE SOLUTIONS EMC BACKUP RECOVERY SOLUTIONS DESIGN ISILON FUNDAMENTALS ISILON HARDWARE BASICS AND GUIDELINES ISILON HARDWARE INSTALLATION ISILON HARDWARE MAINTENANCE ISILON INFRASTRUCTURE SOLUTIONS ISILON INITIAL CONFIGURATION ISILON SOLUTION DESIGN NETWORKER INSTALLATION, CONFIGURATION AND ADMINISTRATION RECOVERPOINT FUNDAMENTALS SAN MANAGEMENT VMAX FAMILY INSTALLATION AND MAINTENANCE VMAX1 AND VMAX2 HARDWARE FUNDAMENTALS VMAX3 – UNISPHERE FOR VMAX IMPLEMENTATION AND MANAGEMENT VMAX3 CONFIGURATION MANAGEMENT VMAX3 FUNDAMENTALS VMAX3 HARDWARE FUNDAMENTALS VMAX3 SECURITY CONCEPTS VNX APPLICATION PROTECTION SUITE FUNDAMENTALS VNX BASIC HARDWARE MAINTENANCE VNX HARDWARE FUNDAMENTALS VNX INSTALLATION AND INITIAL CONFIGURATION XTREMIO HARDWARE FUNDAMENTALS DIGITAL MEDIA – ACQUISITION AND TRIAGE |
ENCASE | ENCASE® FORENSICS AND ENTERPRISE FUNDAMENTALS ENCASE® COMPUTER FORENSICS I INCIDENT INVESTIGATION ENCASE® ENTERPRISE EXAMINATIONS ENCASE® EXAMINATIONS OF THE MACINTOSH OPERATING SYSTEMS HOST INTRUSION METHODOLOGY AND INVESTIGATION ENCASE® CYBERSECURITY AND ANALYTICS ENCASE® EXAMINATION OF NTFS ENCASE® ADVANCED INTERNET EXAMINATIONS ENCASE® ADVANCED COMPUTER FORENSICS |
HP | DESIGNING HP DATA CENTER AND CLOUD SOLUTIONS DESIGNING HPE DATA CENTER AND CLOUD SOLUTIONS DELTA – DESIGNING HPE DATA CENTER AND CLOUD SOLUTIONS CREATING HPE SOFTWARE-DEFINED NETWORKS BUILDING HP FLEXFABRIC DATA CENTERS ARCHITECTING HP FLEXNETWORK SOLUTIONS DEPLOYING HP FLEXNETWORK CORE TECHNOLOGIES HP-UX SECURITY I HP INTEGRITY VIRTUAL MACHINES ADMINISTRATION HP-UX LOGICAL VOLUME MANAGER HP INTEGRITY VM AND HP-UX VPARS ADMINISTRATION HP-UX PERFORMANCE AND TUNING HP SERVICEGUARD I HP SYSTEMS INSIGHT MANAGER HPE ARCSIGHT MASTER ASE PREPARATION COURSE ARCSIGHT ESM ADVANCED ADMINISTRATOR ARCSIGHT ESM ADVANCED ANALYST ARCSIGHT LOGGER – ADMINISTRATION AND OPERATIONS DYNAMIC APPLICATION TESTING WITH HP WEBINSPECT HP FORTIFY STATIC CODE ANALYZER / SOFTWARE SECURITY CENTER SOFTLAYER FUNDAMENTALS |
IBM | IBM SECURITY QRADAR SIEM ADMINISTRATION AND CONFIGURATION IBM SECURITY QRADAR SIEM FOUNDATIONS IBM SECURITY DIRECTORY SERVER SYSTEM ADMINISTRATION IBM SECURITY IDENTITY MANAGER BASIC ADMINISTRATION IBM SECURITY QRADAR INCIDENT FORENSICS CONFIGURATION AND USAGE WEB APPLICATION SECURITY FUNDAMENTALS IBM SECURITY ACCESS MANAGER FOR ENTERPRISE SINGLE SIGN-ON ADMINISTRATION IBM SECURITY ACCESS MANAGER FOR MOBILE IBM SECURITY ACCESS MANAGER FOR WEB IBM SECURITY PRIVILEGED IDENTITY MANAGER FUNDAMENTALS IBM ENDPOINT MANAGER SECURITY AND COMPLIANCE FUNDAMENTALS IBM SECURITY QRADAR ADVANCED TOPICS IBM SECURITY APPSCAN STANDARD FUNDAMENTALS |
ISACA | LINUX BASIC AND INSTALLATION INTRODUCTION TO IBM I FOR NEW USERS LINUX SYSTEM ADMINISTRATION I: IMPLEMENTATION LINUX ON POWER PERFORMANCE WEB APPLICATION SECURITY FOR AUDITORS COBIT ASSESSOR FOR SECURITY INFORMATION SECURITY MANAGEMENT INFORMATION SECURITY MANAGEMENT (ADVANCED) AUDIT & SECURITY OF FIREWALLS SECURING & AUDITING MOBILE TECHNOLOGIES SECURING & AUDITING WIRELESS & MOBILE TECHNOLOGIES VIRTUALIZATION SECURITY & AUDIT WINDOWS SECURITY & AUDIT CLOUD COMPUTING SECURITY & AUDIT DATABASE SECURITY AND AUDIT RISK-BASED APPROACH TO IT INFRASTRUCTURE SECURITY & CONTROL ASSESSMENTS IT RISK MANAGEMENT CISM EXAM REVIEW CRISC EXAM REVIEW CYBERSECURITY FUNDAMENTALS CSX PRACTITIONER: IDENTIFICATION AND PROTECTION CSX PRACTITIONER: RESPOND AND RECOVER CSX PRACTITIONER BOOT CAMP CSX PRACTITIONER: DETECTION CSX SPECIALIST: IDENTIFY CSX SPECIALIST: PROTECT CSX SPECIALIST: DETECT CSX SPECIALIST: RECOVER CSX SPECIALIST: RESPOND Real World Application of RMF for DoD IT |
ISC(2) | (ISC) TRAINING FOR CAP (ISC) TRAINING FOR CCFP (ISC) TRAINING FOR CCSP (ISC) TRAINING FOR CISSP (ISC) TRAINING FOR CSSLP (ISC) TRAINING FOR HCISPP (ISC) TRAINING FOR CISSP-ISSAP (ISC) TRAINING FOR CISSP-ISSEP (ISC) TRAINING FOR CISSP-ISSMP (ISC) TRAINING FOR SSCP JUNIPER ADVANCED DATA CENTER SWITCHING (ADCX) |
JUNIPER | JUNIPER NETWORKS DESIGN FUNDAMENTALS (JNDF) ADVANCED JUNIPER NETWORKS VPN IMPLEMENTATIONS (AJVI) ADVANCED JUNOS ENTERPRISE ROUTING (AJER) ADVANCED JUNOS ENTERPRISE ROUTING TROUBLESHOOTING (AJERT) ADVANCED JUNOS ENTERPRISE SECURITY TROUBLESHOOTING (AJEST) ADVANCED JUNOS ENTERPRISE SWITCHING (AJEX) ADVANCED JUNOS ENTERPRISE SWITCHING TROUBLESHOOTING (AJEXT) ADVANCED JUNOS SECURITY (AJSEC) ADVANCED JUNOS SERVICE PROVIDER ROUTING (AJSPR) ADVANCED JUNOS ENTERPRISE SWITCHING USING ENHANCED LAYER 2 SOFTWARE (AJEX-ELS) ADVANCED JUNOS SERVICE PROVIDER TROUBLESHOOTING (AJSPT) ATTACK PREVENTION WITH JUNIPER NETWORKS FIREWALLS (APJF) AX411 ACCESS POINT INSTALLATION AND CONFIGURATION INTEGRATING JUNIPER NETWORKS FIREWALL/IPSEC VPN PRODUCTS INTO HIGH-PERFORMANCE NETWORKS (IFVH) JUNOS ENTERPRISE SWITCHING (JEX) JUNOS ENTERPRISE SWITCHING USING ELS (JEX-ELS) JUNOS INTERMEDIATE ROUTING (JIR) JUNOS INTRUSION PREVENTION SYSTEMS (JIPS) JUNOS MULTICAST ROUTING (JMR) JUNOS ROUTING ESSENTIALS (JRE) JUNIPER NETWORKS DESIGN-WAN (JND-WAN) JUNIPER NETWORKS SDN FUNDAMENTALS (JSDNF) CONFIGURING JUNIPER NETWORKS FIREWALL/IPSEC VPN PRODUCTS (CJFV) DATA CENTER SWITCHING (DCX) JUNOS EDGE SECURITY SERVICES (JESS) JNCIE SECURITY BOOTCAMP (JNCIE-SEC) JNCIE SERVICE PROVIDER BOOTCAMP (JNCIE-SP) JUNIPER NETWORKS DESIGN – DATA CENTER (JND-DC) POLICY SECURE CONFIGURATION AND ADMINISTRATION CONNECT SECURE ADMINISTRATION AND MAINTENANCE JUNOS SECURITY (JSEC) NETWORK AUTOMATION USING CONTRAIL CLOUD (NACC) JUNOS SERVICE PROVIDER SWITCHING (JSPX) NETWORKING FUNDAMENTALS JUNOS UNIFIED THREAT MANAGEMENT (JUTM) TROUBLESHOOTING DATA CENTER SWITCHING (TDCX) WLAN FUNDAMENTALS |
LINUX | LINUX SECURITY LINUX SYSTEM ADMINISTRATION MASTERING THE LINUX COMMAND LINE INTRODUCTION TO VMWARE ESXI SOFTWARE DEFINED NETWORKING WITH OPENDAYLIGHT ADVANCED LINUX SYSTEM ADMINISTRATION AND NETWORKING ESSENTIALS OF SYSTEM ADMINISTRATION PENETRATION TESTING WITH LINUX TOOLS LINUX IN THE REAL WORLD CENTOS SYSTEM ADMINISTRATOR PREP LINUX ESSENTIALS PUPPET FUNDAMENTALS COMPLIANCE BASICS FOR DEVELOPERS SOFTWARE DEFINED NETWORKING WITH OPENDAYLIGHT OPEN SOURCE VIRTUALIZATION LINUX ENTERPRISE AUTOMATION ESSENTIALS OF OPENSTACK ADMINISTRATION LINUX SECURITY HIGH AVAILABILITY LINUX ARCHITECTURE LINUX PERFORMANCE TUNING LINUX SYSTEM ADMINISTRATION ADVANCED LINUX SYSTEM ADMINISTRATION AND NETWORKING INTRODUCTION TO LINUX, OPEN SOURCE DEVELOPMENT, AND GIT INSIDE ANDROID: AN INTRO TO ANDROID INTERNALS OPTIMIZING LINUX DEVICE DRIVERS FOR POWER EFFICIENCY LINUX KERNEL DEBUGGING AND SECURITY INTRODUCTION TO LINUX INTRODUCTION TO CLOUD INFRASTRUCTURE TECHNOLOGIES LINUX NETWORKING AND ADMINISTRATION LINUX SECURITY FUNDAMENTALS OPENSTACK ADMINISTRATION FUNDAMENTALS SOFTWARE DEFINED NETWORKING FUNDAMENTALS FUNDAMENTALS OF LINUX |
MCAFEE | McAfee® Drive Encryption McAfee® Endpoint Encryption Essentials MCAFEE® NETWORK DATA LOSS PREVENTION McAfee® VirusScan and ePolicy Orchestrator McAfee® Advanced Threat Defense McAfee® Host Intrusion Prevention McAfee® Database Security MCAFEE® NETWORK SECURITY PLATFORM MCAFEE WEB GATEWAY ADMINISTRATION MCAFEE THREAT INTELLIGENCE EXCHANGE ADMINISTRATION MCAFEE POLICY AUDITOR ADMINISTRATION MCAFEE® SECURITY INFORMATION EVENT MANAGEMENT (SIEM) ADMINISTRATION COURSE 101 MCAFEE ADVANCED THREAT DEFENSE MCAFEE DATABASE SECURITY McAfee Email Gateway MCAFEE ENTERPRISE MOBILITY MANAGEMENT ESSENTIALS McAfee Endpoint Encryption(PC&MAC) MCAFEE SIEM MCAFEE WEB GATEWAY |
MICROSOFT | NETWORK SECURITY PLATFORM ESSENTIALS VIRUSSCAN ENTERPRISE MICROSOFT INSTALLING AND CONFIGURING WINDOWS DEPLOYING AND MANAGING WINDOWS USING ENTERPRISE SERVICES INSTALLING AND CONFIGURING WINDOWS® CLIENT TROUBLESHOOTING AND SUPPORTING WINDOWS® IN THE ENTERPRISE PLANNING AND MANAGING WINDOWS® DESKTOP DEPLOYMENTS AND ENVIRONMENTS DEPLOYING WINDOWS DESKTOPS AND ENTERPRISE APPLICATIONS SUPPORTING AND TROUBLESHOOTING WINDOWS NETWORKING FUNDAMENTALS SECURITY FUNDAMENTALS OVERVIEW OF ACTIVE DIRECTORY RIGHTS MANAGEMENT SERVICES WITH WINDOWS SERVER CONFIGURING AND TROUBLESHOOTING WINDOWS SERVER® ACTIVE DIRECTORY® DOMAIN SERVICES CONFIGURING AND TROUBLESHOOTING IDENTITY AND ACCESS SOLUTIONS WITH WINDOWS SERVER® ACTIVE DIRECTORY® CONFIGURING AND TROUBLESHOOTING A WINDOWS SERVER® NETWORK INFRASTRUCTURE CONFIGURING WINDOWS® SUPPORTING WINDOWS® |
NOVELL | SERVICE DESK: SERVICE MANAGEMENT SECURING WINDOWS WORKSTATIONS USING ZENWORKS ENDPOINT SECURITY MANAGEMENT PENETRATION TESTINGWITH KALI LINUX ADVANCED WINDOWS EXPLOITATION |
OFFENSIVE SECURITY | OFFENSIVE SECURITY WIRELESS ATTACKS (WIFU) CRACKING THE PERIMETER (CTP) ADVANCED WEB ATTACKS AND EXPLOITATION METASPLOIT UNLEASHED OFFENSIVE SECURITY PENETRATIONTESTING LAB |
ORACLE | ORACLE SECURITY ADMINISTRATION ORACLE DATABASE: MANAGING SECURITY USER SECURITY AND AUDITING IN ORACLE DATABASE ORACLE DATABASE: INTRODUCTION TO DATABASE SECURITY AND SOLUTIONS ORACLE DATABASE: DATABASE SECURITY ORACLE DATABASE: BASIC USER AND STRONG AUTHENTICATION ORACLE DATABASE: ENTERPRISE USER SECURITY AND PROXY AUTHENTICATION ORACLE DATABASE: PRIVILEGES, ROLES, AND APPLICATION CONTEXTS ORACLE DATABASE: ORACLE NET SERVICES AND LISTENER SECURITY ORACLE DATABASE: FIREWALLS, ORACLE CONNECTION MANAGER, AND SQL*PLUS SECURITY ORACLE DATABASE: ORACLE PARTITIONING AND SECURITY FEATURES ORACLE DATABASE: STORAGE STRUCTURES AND USER SECURITY |
PALO ALTO | FIREWALL: INSTALL, CONFIGURE, AND MANAGE FIREWALL: CONFIGURE EXTENDED FEATURES PANORAMA: MANAGE MULTIPLE FIREWALLS FIREWALL: MANAGE CYBERTHREATS FIREWALL: DEBUG AND TROUBLESHOOT |
PCI | TRAPS: INSTALL, CONFIGURE AND MANAGE QUALIFIED SECURITY ASSESSOR (QSA)™ QUALIFICATION |
RED HAT | RED HAT SERVER HARDENING RED HAT ENTERPRISE LINUX DIAGNOSTICS AND TROUBLESHOOTING |
RIVERBED | OPTIMIZING ENTERPRISE APPLICATIONS AND PROTOCOLS IMPLEMENTING ENTERPRISE OPTIMIZATION ARCHITECTURES APPLICATION PERFORMANCE MANAGEMENT ESSENTIALS NETWORK PERFORMANCE MANAGEMENT ESSENTIALS NETWORK PLANNING AND CONFIGURATION MANAGEMENT ESSENTIALS MODELER SUITE ESSENTIALS STORAGE DELIVERY ESSENTIALS HYPER CONVERGED BRANCH IMPLEMENTATION SOLUTIONS |
SABSA | SABSA FOUNDATION SABSA ADVANCED SABSA RISK ASSURANCE & GOVERNANCE SABSA ADVANCED SABSA ARCHITECTURE & DESIGN |
SANS | NETWARS – TOURNAMENT NETWARS: CONTINUOUS HOSTED: CRITICAL INFRASTRUCTURE AND CONTROL SYSTEM CYBERSECURITY HOSTED: EMBEDDED DEVICE SECURITY ASSESSMENTS FOR THE REST OF US HOSTED: (ISC)² CERTIFIED SECURE SOFTWARE LIFECYCLE PROFESSIONAL (CSSLP) CBK EDUCATION PROGRAM HOSTED: OFFENSIVE COUNTERMEASURES: THE ART OF ACTIVE DEFENSES HOSTED: PHYSICAL SECURITY SPECIALIST – FACILITIES EDITION HOSTED: PHYSICAL PENETRATION TESTING – INTRODUCTION AUDITING & MONITORING NETWORKS, PERIMETERS & SYSTEMS IMPLEMENTING AND AUDITING THE CRITICAL SECURITY CONTROLS – IN-DEPTH CRITICAL SECURITY CONTROLS: PLANNING, IMPLEMENTING AND AUDITING TOP 4 MITIGATION STRATEGIES: IMPLEMENTING & AUDITING DEFENDING WEB APPLICATIONS SECURITY ESSENTIALS SECURE CODING IN JAVA/JEE: DEVELOPING DEFENSIBLE APPLICATIONS SECURE CODING IN C & C++ SECURE CODING IN .NET: DEVELOPING DEFENSIBLE APPLICATIONS WINDOWS FORENSIC ANALYSIS ADVANCED COMPUTER FORENSIC ANALYSIS AND INCIDENT RESPONSE MAC FORENSIC ANALYSIS CYBER THREAT INTELLIGENCE MEMORY FORENSICS IN-DEPTH ADVANCED NETWORK FORENSICS AND ANALYSIS ADVANCED SMARTPHONE AND MOBILE DEVICE FORENSICS REVERSE-ENGINEERING MALWARE: MALWARE ANALYSIS TOOLS AND TECHNIQUES ICS ACTIVE DEFENSE AND INCIDENT RESPONSE ICS/SCADA SECURITY ESSENTIALS ESSENTIALS FOR NERC CRITICAL INFRASTRUCTURE PROTECTION CRITICAL INFRASTRUCTURE PROTECTION SANS +S TRAINING PROGRAM FOR THE CISSP® CERTIFICATION EXAM A PRACTICAL INTRODUCTION TO RISK ASSESSMENT SECURING THE HUMAN: HOW TO BUILD, MAINTAIN AND MEASURE A HIGH-IMPACT AWARENESS SANS SECURITY LEADERSHIP ESSENTIALS FOR MANAGERS WITH KNOWLEDGE COMPRESSION IT SECURITY STRATEGIC PLANNING, POLICY AND LEADERSHIP INCIDENT RESPONSE TEAM MANAGEMENT |
SYMANTEC | LAW OF DATA SECURITY AND INVESTIGATIONS INTRO TO INFORMATION SECURITY SECURITY ESSENTIALS BOOTCAMP STYLE CRITICAL SECURITY CONTROLS: PLANNING, IMPLEMENTING AND AUDITING TOP 4 MITIGATION STRATEGIES: IMPLEMENTING & AUDITING ADVANCED SECURITY ESSENTIALS – ENTERPRISE DEFENDER PERIMETER PROTECTION IN-DEPTH INTRUSION DETECTION IN-DEPTH HACKER TOOLS, TECHNIQUES, EXPLOITS AND INCIDENT HANDLING SECURING WINDOWS WITH THE CRITICAL SECURITY CONTROLS SECURING LINUX/UNIX CONTINUOUS MONITORING AND SECURITY OPERATIONS CLOUD SECURITY FUNDAMENTALS WEB APP PENETRATION TESTING AND ETHICAL HACKING IPV6 ESSENTIALS ACTIVE DEFENSE, OFFENSIVE COUNTERMEASURES AND CYBER DECEPTION NETWORK PENETRATION TESTING AND ETHICAL HACKING INTENSE HANDS-ON PEN TESTING SKILL DEVELOPMENT (WITH SANS NETWARS) CYBERCITY HANDS-ON KINETIC CYBER RANGE EXERCISE IMPLEMENTING AND AUDITING THE CRITICAL SECURITY CONTROLS – IN-DEPTH PYTHON FOR PENETRATION TESTERS MOBILE DEVICE SECURITY AND ETHICAL HACKING VIRTUALIZATION AND PRIVATE CLOUD SECURITY METASPLOIT KUNG FU FOR ENTERPRISE PEN TESTING WIRELESS ETHICAL HACKING, PENETRATION TESTING, AND DEFENSES ADVANCED WEB APP PENETRATION TESTING AND ETHICAL HACKING ADVANCED PENETRATION TESTING, EXPLOIT WRITING, AND ETHICAL HACKING ADVANCED EXPLOIT DEVELOPMENT FOR PENETRATION TESTERS SPECIAL: HACKER GUARD: THREAT UPDATE SPECIAL: COMPLIANCE TRAINING AND SECURING THE HUMAN SPECIAL: SECURITY AWARENESS TRAINING FOR ELECTRIC ENTITIES SPECIAL: SPECIAL FOR HIMSS – IMPLEMENTING HEALTHCARE CYBER-HYGIENE WITH THE CRITICAL SECURITY CONTROLS SPECIAL: INTRODUCTION TO MALWARE ANALYSIS: HANDS-ON AND TECHNICAL SYMANTEC ADVANCED THREAT PROTECTION 2.X: INCIDENT RESPONSE ENDPOINT PROTECTION: ADMINISTRATION ENDPOINT PROTECTION: MAINTAIN AND TROUBLESHOOT ENDPOINT PROTECTION: INSTALL, CONFIGURE, AND DEPLOY ENDPOINT PROTECTION: MANAGE AND ADMINISTER MANAGED PKI PATCH MANAGEMENT RISK AUTOMATION SUITE SERVICE DESK ADMINISTRATION VALIDATION AND ID PROTECTION (VIP) |
Important Note: PC Professor makes no claim to any of the registered trademarks used above. Nor, unless otherwise specified in writing, does PC Professor claim to be an authorized vendor, trainer, partner or service provider for any of the companies, services, testing services, hardware, software or products mentioned herein. Not all certification-preparatory classes and/or certification exams are offered at PC Professor nor is this list intended to imply State licensure, scheduled classes, vendor authorization, affiliation, trademark claim, partnership or endorsement of any type.