A+ Preparatory Computer Repair Training Class

Welcome to South Florida’s finest hands-on computer repair school!
Our instructor-led classes begin weekly and are taught by patient instructors — each considered to be an industry expert. Since 1989, PC Professor has been offering computer repair classes to those seeking condensed, hands-on training in a relaxed, comfortable and professional environment. Stop by and visit us today to see why PC Professor Technical Institute has, since 1989, been considered the industry leader in computer training and academic excellence. Or, contact us to arrange a campus tour, to meet with an instructor or to audit a session.
Computer Repair Class. If you are considering a career as an entry-level information technology (IT) professional or personal computer (PC) service technician, PC Professor’s “A+ Preparatory Class” may be worthy of consideration. The course will build on your existing user-level knowledge and experience with personal computer software and hardware to present fundamental skills and concepts that you will use on the job. In this course, you will acquire the essential skills and information you will need to install, upgrade, repair, configure, troubleshoot, optimize, and perform preventative maintenance of basic personal computer hardware and operating systems. If you would like to tour our facility, meet with an instructor or arrange a complimentary audit, simply contact us to arrange a meeting with an Admissions Rep today.
Computer Repair Class. You will learn to install, upgrade, repair, configure, optimize, troubleshoot, and perform preventative maintenance on windows-based personal computer hardware and operating systems.
Computer Repair Class. Over a dozen intense chapters covering possible material on the national exams. Many useful illustrations, drawings, and helpful photographs are included as well. Also included are practice test questions, exercises, labs and more. Notes and highlighting can be done directly in the electronic book (class dependent), or instead, PC Professor may provided a physical book for each enrolled student.
Computer Repair Class. The target student for PC Professor’s “A+ Preparatory Computer Repair Class” are those with basic computer user skills who are interested in pursuing a career as an IT (information technology) professional or as a PC (personal computer) technician. Possible job environments include mobile and/or corporate settings with a high level of face-to face client interaction, remote-based work environments where client interaction, client training, operating systems, and connectivity issues are emphasized, or settings with limited customer interaction where hardware activities are emphasized.
In addition, this challenging, difficult and fast-paced course will help prepare students prepare for, and achieve, a nationally-recognized CompTIA A+ certification so it may be suitable for those seeking career enhancement and/or career advancement.
Computer Repair Class. Students taking this course should have the following skills: End-user skills with Windows-based personal computers, including the ability to browse and search for information on the Internet. Start up and shut down the computer. Log on to a computer and/or computer network. Run programs. Move, copy, delete, and rename files in Windows Explorer. Basic knowledge of computing concepts, including the difference between hardware and software. The functions of software components, such as the operating system, applications, and file systems. The function of a computer network, an operating system and the internet.
PC Professor’s computer repair classes begin regularly and fill quickly. Contact an Admissions Rep today to discuss the enrollment process.
The following is CompTIA’s Pre-Approved Continuing Education Units (CEU) list for certification renewal (Note: not all certification-preparatory classes and/or certification exams are offered at PC Professor nor is this list intended to imply authorization, affiliation, partnership or endorsement of any type):
The following is CompTIA’s Pre-Approved Continuing Education Units (CEU) list for certification renewal (Note: not all certification-preparatory classes and/or certification exams are offered at PC Professor nor is this list intended to imply authorization, affiliation, partnership or endorsement of any type):
CERTIFICATION PROVIDER | VENDOR COURSE TITLE |
---|---|
AMAZON WEB SERVICES | SECURITY OPERATIONS ON AWS AWS SECURITY FUNDAMENTALS EL CAPITAN 101 OS X SUPPORT ESSENTIALS 10.11 YOSEMITE 101 OS X SUPPORT ESSENTIALS 10.10 YOSEMITE 201 OS X SERVER ESSENTIALS 10.10 |
APPLE | APPLE CERTIFIED MACINTOSH TECHNICIAN (ACMT) MANAGING APPLE DEVICES 2.0 DEPLOYING, MAINTAINING IOS 9 & EL CAPITAN MANAGING APPLE DEVICES 3.0 DEPLOYING, MAINTAINING IOS 9 AND EL CAPITAN ADVANCED TROUBLESHOOTING AIRWAVE WIRELESS MANAGEMENT SUITE INSTALLATION, CONFIGURATION & USE |
ARUBA | ARUBA INSTANT ACCESS POINTS (IAP) CLEARPASS ESSENTIALS HP ONLY – ARUBA MOBILITY BOOT CAMP IMC ESSENTIALS FOR NETWORK ADMINISTRATORS IMPLEMENTING ARUBA WLAN MIGRATING FROM CISCO TO HP FLEXNETWORKS MOBILITY ACCESS SWITCH SCALABLE WLAN DESIGN & IMPLEMENTATION (SWDI) SOLUTIONS PART 1 IP OFFICE BASIC INTEGRATION AND CONFIGURATION (7720C) INTRODUCTION TO SESSION INITIATION PROTOCOL (SIP) V2.0 MERIDIAN 1 OPTION 11C INSTALLATION, MAINTENANCE, AND DATABASE – COMMUNICATION SERVER 1000 RELEASE 5.5 |
AVAYA | STACKABLE ERS AND VSP INSTALLATION, CONFIGURATION, AND MAINTENANCE AVAYA COMMUNICATION SERVER 1000 DIALING PLAN DESIGN AND IP PEER NETWORKING ERS 8800/8600 INSTALLATION AND CONFIGURATION SAN 130-WBT BROCADE 8 GBPS FIBRE CHANNEL PRODUCT SAN 140-WBT BROCADE 16 GBPS FIBRE CHANNEL PRODUCT CFA 200 CORE GEN 5 SAN ADMINISTRATION DCX 200 DCX BACKBONE PRODUCT ADMINISTRATION CFP 300 ADVANCED GEN 5 SAN ADMINISTRATION CFD 200 BROCADE GEN 5 SAN DESIGN SAN-TS 300-ILT SAN TROUBLESHOOTING EXT 110-WBT INTRODUCTION TO THE BROCADE 7840 EXTENSION SWITCH NIP 200-ILT BROCADE NETWORK INDUSTRY PROTOCOL CEF 260-WBT IP STORAGE NETWORKING CEF 250-WBT BRIDGE TO BROCADE ETHERNET FABRICS FOR NETWORK PROFESSIONALS VDX-TS 300-WBT ADVANCED ETHERNET FABRIC TROUBLESHOOTING NOS 110-WBT NETWORK OS UPDATE BPIPA 200-ILT BROCADE PROFESSIONAL IP ADMINISTRATOR IPTS-300-ILT TROUBLESHOOTING IP NETWORKS BGP 400 BORDER GATEWAY PROTOCOL (BGP) FOR SP AND ENTERPRISE NETWORKS MPLS 400 BROCADE MPLS IMPLEMENTATION MPLS-TE 450 MPLS TRAFFIC ENGINEERING ICX 101-WBT IMPLEMENTING EFFORTLESS NETWORKS WITH THE BROCADE ICX FAMILY ICX 150-WBT INTRODUCTION TO HYPEREDGE AND THE ICX 6430-C12 SWITCH |
CHECK POINT | THREAT PREVENTION SECURE WEB GATEWAY MDSM WITH VSX (MULTI-DOMAIN SECURITY MANAGEMENT WITH VIRTUAL SYSTEM EXTENSION) CHECK POINT CERTIFIED SECURITY MASTER (CCSM) R77.30 SECURING CISCO NETWORKS WITH THREAT DETECTION AND ANALYSIS (SCYBER) 1 |
CISCO | INTERCONNECTING CISCO NETWORKING DEVICES, PART 1 (ICND1) 3.0 DESIGNING WITH CISCO NETWORK PROGRAMMABILITY V2.0 INTERCONNECTING CISCO NETWORKING DEVICES, PART 1 (ICND1)2.0 DESIGNING WITH CISCO NETWORK PROGRAMMABILITY FOR ACI V1.10 IMPLEMENTING CISCO NETWORK PROGRAMMABILITY V2.0 IMPLEMENTING CISCO NETWORK PROGRAMMABILITY FOR ACI V1.1 IMPLEMENTING CISCO SECURE MOBILITY SOLUTIONS (SIMOS) 1.0 IMPLEMENTING CISCO SECURE ACCESS CONTROL SYSTEM V5.2 DESIGNING FOR CISCO INTERNETWORK SOLUTIONS (DESGN) V3.0 DESIGNING THE CISCO CLOUD (CLDDES) 1.0 AUTOMATING THE CISCO ENTERPRISE CLOUD (CLDAUT) 1.0 IMPLEMENTING CISCO THREAT CONTROL SOLUTIONS (SITCS) 1.5 |
CITRIX | IMPLEMENTING CITRIX NETSCALER 11 FOR APP AND DESKTOP SOLUTIONS (CNS-207) CITRIX XENAPP AND XENDESKTOP HELPDESK SUPPORT CITRIX NETSCALER 11 ADVANCED IMPLEMENTATION (CNS-301) CITRIX NETSCALER 10 ESSENTIALS FOR ACE MIGRATION DEPLOYING ENTERPRISE MOBILITY SOLUTIONS WITH CITRIX XENMOBILE (CXM-303) |
COMPTIA | COMPTIA MOBILITY+ (MB0-001) COMPTIA ADVANCED SECURITY PRACTITIONER (CASP) (CAS-002) COMPTIA NETWORK+ (N10-006) COMPTIA SECURITY+ (SY0-401) COMPTIA A+ 901/902 – APPROVED ONLY FOR THOSE CERTIFIED IN A+ 801/802 AND EARLIER COMPTIA SERVER+ (SK0-004) COMPTIA LINUX+ (LX0-103/LX0-104) |
CSA | CCSK GRC STACK |
CWNP | CWTS – ENTERPRISE WI-FI FUNDAMENTALS CWNA – ENTERPRISE WI-FI ADMINISTRATION CWSP – ENTERPRISE WI-FI SECURITY CWDP – ENTERPRISE WI-FI DESIGN CWAP – ENTERPRISE WI-FI ANALYSIS & TROUBLESHOOTING |
DELL | Dell SC Series Installation and Configuration Introduction to Dell PS Series Storage Arrays Dell PS Series Storage Admin and Data Protection Tools Integrating vSphere with Dell PS Series Storage Dell SC Storage Center Administration and Management Dell PS Series vSphere Integration Dell Storage Networking Configuration Dell Networking Planning Dell Networking Installation and Configuration Dell Networking Interoperability Dell Networking Fundamentals-Routing Dell Networking Fundamentals – Switching Dell Networking Data Center Advanced Features & Administration Dell Networking Campus Design, Advanced Features and Configuration Dell Networking Fast Track from Cisco to Dell OS 9 Dell Campus Networking N-Series Features & Basic Administration Dell Networking Data Center Overview & Basic Administration Dell OpenManage Essentials Administration Optimizing and Managing Dell PowerEdge Blade Server Solutions Optimizing and Managing Dell PowerEdge Server Solutions |
EC-COUNCIL | CERTIFIED ETHICAL HACKER (CEH) V9 CERTIFIED SECURITY ANALYST (ECSA) V9 NETWORK SECURITY ADMINISTRATOR (ENSA) DISASTER RECOVERY PROFESSIONAL (EDRP) SECURE PROGRAMMER .NET (ECSP) LICENSED PENETRATION TESTER (LPT) COMPUTER HACKING FORENSICS INVESTIGATOR (CHFI) CERTIFIED CHIEF INFORMATION SECURITY OFFICER (CCISO) CERTIFIED ETHICAL HACKER (CEH) V9 CERTIFIED SECURITY SPECIALIST (ECSS) CERTIFIED INCIDENT HANDLER (ECIH) CERTIFIED ENCRYPTION SPECIALIST (ECES) CERTIFIED VOIP PROFESSIONAL (ECVP) AVAMAR INTEGRATION AND PERFORMANCE MANAGEMENT AVAMAR MANAGEMENT BACKUP RECOVERY SOLUTIONS – AVAMAR TO DATA DOMAIN INTEGRATION BACKUP RECOVERY SOLUTIONS – MICROSOFT EXCHANGE INTEGRATION BACKUP RECOVERY SOLUTIONS – MICROSOFT SHAREPOINT INTEGRATION BACKUP RECOVERY SOLUTIONS – NDMP INTEGRATION BACKUP RECOVERY SOLUTIONS – NETWORKER TO AVAMAR INTEGRATION BACKUP RECOVERY SOLUTIONS – NETWORKER TO DATA DOMAIN INTEGRATION BACKUP RECOVERY SOLUTIONS – ORACLE INTEGRATION BACKUP RECOVERY SOLUTIONS – VMWARE INTEGRATION BUSINESS CONTINUITY SOLUTIONS DESIGNER (BCSD) FOR RECOVERPOINT BUSINESS CONTINUITY SOLUTIONS DESIGNER (BCSD) FOR VPLEX |
EMC | CELERRA NS SERIES INSTALLATION AND MAINTENANCE CELERRA UNIFIED QUICKSTART: BASIC MANAGEMENT OVERVIEW CELERRA UNIFIED QUICKSTART: INSTALLATION AND CONFIGURATION USING CSA CELERRA UNIFIED QUICKSTART: NS-120 HARDWARE OVERVIEW & INSTALLATION CELERRA UNIFIED QUICKSTART: NS-480 HARDWARE OVERVIEW & INSTALLATION CELERRA UNIFIED QUICKSTART: NX4 HARDWARE OVERVIEW & INSTALLATION CELERRA UNIFIED QUICKSTART: PRODUCT INSTALLATION AND CONFIGURATION OVERVIEW CELERRA UNIFIED QUICKSTART: PROVISIONING FOR FCCONNECTED HOSTS CENTERA FUNDAMENTALS CENTERA HARDWARE CONFIGURATIONS CENTERA INSTALLATION AND MAINTENANCE CENTERA TOOLS AND INSTALLATION CENTERA UNIVERSAL ACCESS CENTERA UPGRADES AND MAINTENANCE CLARIION BASIC MANAGEMENT CLARIION CX3 INSTALLATION DIFFERENCES CLARIION FOUNDATIONS CLARIION HARDWARE CLARIION INSTALLATION AND MAINTENANCE CLOUD INFRASTRUCTURE PLANNING AND DESIGN CLOUD SERVICES PLANNING AND DESIGN CONNECTIVITY PROTOCOLS EMC AVAILABILITY INFRASTRUCTURE SOLUTIONS AND DESIGN EMC BACKUP RECOVERY INFRASTRUCTURE SOLUTIONS EMC BACKUP RECOVERY SOLUTIONS DESIGN ISILON FUNDAMENTALS ISILON HARDWARE BASICS AND GUIDELINES ISILON HARDWARE INSTALLATION ISILON HARDWARE MAINTENANCE ISILON INFRASTRUCTURE SOLUTIONS ISILON INITIAL CONFIGURATION ISILON SOLUTION DESIGN NETWORKER INSTALLATION, CONFIGURATION AND ADMINISTRATION RECOVERPOINT FUNDAMENTALS SAN MANAGEMENT VMAX FAMILY INSTALLATION AND MAINTENANCE VMAX1 AND VMAX2 HARDWARE FUNDAMENTALS VMAX3 – UNISPHERE FOR VMAX IMPLEMENTATION AND MANAGEMENT VMAX3 CONFIGURATION MANAGEMENT VMAX3 FUNDAMENTALS VMAX3 HARDWARE FUNDAMENTALS VMAX3 SECURITY CONCEPTS VNX APPLICATION PROTECTION SUITE FUNDAMENTALS VNX BASIC HARDWARE MAINTENANCE VNX HARDWARE FUNDAMENTALS VNX INSTALLATION AND INITIAL CONFIGURATION XTREMIO HARDWARE FUNDAMENTALS DIGITAL MEDIA – ACQUISITION AND TRIAGE |
ENCASE | ENCASE V7 FORENSICS AND ENTERPRISE FUNDAMENTALS ENCASE® V7 COMPUTER FORENSICS I INCIDENT INVESTIGATION ENCASE® ENTERPRISE EXAMINATIONS ENCASE® EXAMINATIONS OF THE MACINTOSH OPERATING SYSTEMS HOST INTRUSION METHODOLOGY AND INVESTIGATION ENCASE® CYBERSECURITY AND ANALYTICS V5 ENCASE® EXAMINATION OF NTFS ENCASE® ADVANCED INTERNET EXAMINATIONS ENCASE® ADVANCED COMPUTER FORENSICS |
HP | DESIGNING HP DATA CENTER AND CLOUD SOLUTIONS, REV. 15.11 DESIGNING HPE DATA CENTER AND CLOUD SOLUTIONS, REV. 16.11 DELTA – DESIGNING HPE DATA CENTER AND CLOUD SOLUTIONS, REV. 16.11 CREATING HPE SOFTWARE-DEFINED NETWORKS, REV. 15.41 BUILDING HP FLEXFABRIC DATA CENTERS, REV. 14.41 ARCHITECTING HP FLEXNETWORK SOLUTIONS, REV 14.21 DEPLOYING HP FLEXNETWORK CORE TECHNOLOGIES, REV 14.31 HP-UX SECURITY I HP INTEGRITY VIRTUAL MACHINES V4.3 ADMINISTRATION HP-UX LOGICAL VOLUME MANAGER HP INTEGRITY VM V6 AND HP-UX VPARS V6 ADMINISTRATION HP-UX PERFORMANCE AND TUNING HP SERVICEGUARD I HP SYSTEMS INSIGHT MANAGER HPE ARCSIGHT MASTER ASE PREPARATION COURSE ARCSIGHT ESM 6.5 ADVANCED ADMINISTRATOR ARCSIGHT ESM 6.5 ADVANCED ANALYST ARCSIGHT LOGGER – 6.0 ADMINISTRATION AND OPERATIONS DYNAMIC APPLICATION TESTING WITH HP WEBINSPECT 10.3 HP FORTIFY STATIC CODE ANALYZER / SOFTWARE SECURITY CENTER 4.2 SOFTLAYER FUNDAMENTALS |
IBM | IBM SECURITY QRADAR SIEM 7.2 ADMINISTRATION AND CONFIGURATION IBM SECURITY QRADAR SIEM FOUNDATIONS IBM SECURITY DIRECTORY SERVER 6.3.1 SYSTEM ADMINISTRATION IBM SECURITY IDENTITY MANAGER 6.0 BASIC ADMINISTRATION IBM SECURITY QRADAR INCIDENT FORENSICS CONFIGURATION AND USAGE WEB APPLICATION SECURITY FUNDAMENTALS IBM SECURITY ACCESS MANAGER FOR ENTERPRISE SINGLE SIGN-ON 8.2.1 ADMINISTRATION IBM SECURITY ACCESS MANAGER FOR MOBILE 8.0 IBM SECURITY ACCESS MANAGER FOR WEB IBM SECURITY PRIVILEGED IDENTITY MANAGER FUNDAMENTALS IBM ENDPOINT MANAGER 9.2 SECURITY AND COMPLIANCE FUNDAMENTALS IBM SECURITY QRADAR ADVANCED TOPICS IBM SECURITY APPSCAN STANDARD FUNDAMENTALS |
ISACA | LINUX BASIC AND INSTALLATION INTRODUCTION TO IBM I FOR NEW USERS LINUX SYSTEM ADMINISTRATION I: IMPLEMENTATION LINUX ON POWER PERFORMANCE WEB APPLICATION SECURITY FOR AUDITORS COBIT 5 ASSESSOR FOR SECURITY INFORMATION SECURITY MANAGEMENT INFORMATION SECURITY MANAGEMENT (ADVANCED) AUDIT & SECURITY OF FIREWALLS SECURING & AUDITING MOBILE TECHNOLOGIES SECURING & AUDITING WIRELESS & MOBILE TECHNOLOGIES VIRTUALIZATION SECURITY & AUDIT WINDOWS 8 SECURITY & AUDIT CLOUD COMPUTING SECURITY & AUDIT DATABASE SECURITY AND AUDIT RISK-BASED APPROACH TO IT INFRASTRUCTURE SECURITY & CONTROL ASSESSMENTS IT RISK MANAGEMENT CISM EXAM REVIEW CRISC EXAM REVIEW CYBERSECURITY FUNDAMENTALS CSX PRACTITIONER: IDENTIFICATION AND PROTECTION CSX PRACTITIONER: RESPOND AND RECOVER CSX PRACTITIONER BOOT CAMP CSX PRACTITIONER: DETECTION CSX SPECIALIST: IDENTIFY CSX SPECIALIST: PROTECT CSX SPECIALIST: DETECT CSX SPECIALIST: RECOVER CSX SPECIALIST: RESPOND Real World Application of RMF for DoD IT |
ISC(2) | (ISC)2TRAINING FOR CAP (ISC)2TRAINING FOR CCFP (ISC)2TRAINING FOR CCSP (ISC)2TRAINING FOR CISSP (ISC)2TRAINING FOR CSSLP (ISC)2TRAINING FOR HCISPP (ISC)2TRAINING FOR CISSP-ISSAP (ISC)2TRAINING FOR CISSP-ISSEP (ISC)2TRAINING FOR CISSP-ISSMP (ISC)2TRAINING FOR SSCP JUNIPER ADVANCED DATA CENTER SWITCHING (ADCX) |
JUNIPER | JUNIPER NETWORKS DESIGN FUNDAMENTALS (JNDF) ADVANCED JUNIPER NETWORKS VPN IMPLEMENTATIONS (AJVI) ADVANCED JUNOS ENTERPRISE ROUTING (AJER) ADVANCED JUNOS ENTERPRISE ROUTING TROUBLESHOOTING (AJERT) ADVANCED JUNOS ENTERPRISE SECURITY TROUBLESHOOTING (AJEST) ADVANCED JUNOS ENTERPRISE SWITCHING (AJEX) ADVANCED JUNOS ENTERPRISE SWITCHING TROUBLESHOOTING (AJEXT) ADVANCED JUNOS SECURITY (AJSEC) ADVANCED JUNOS SERVICE PROVIDER ROUTING (AJSPR) ADVANCED JUNOS ENTERPRISE SWITCHING USING ENHANCED LAYER 2 SOFTWARE (AJEX-ELS) ADVANCED JUNOS SERVICE PROVIDER TROUBLESHOOTING (AJSPT) ATTACK PREVENTION WITH JUNIPER NETWORKS FIREWALLS (APJF) AX411 ACCESS POINT INSTALLATION AND CONFIGURATION INTEGRATING JUNIPER NETWORKS FIREWALL/IPSEC VPN PRODUCTS INTO HIGH-PERFORMANCE NETWORKS (IFVH) JUNOS ENTERPRISE SWITCHING (JEX) JUNOS ENTERPRISE SWITCHING USING ELS (JEX-ELS) JUNOS INTERMEDIATE ROUTING (JIR) JUNOS INTRUSION PREVENTION SYSTEMS (JIPS) JUNOS MULTICAST ROUTING (JMR) JUNOS ROUTING ESSENTIALS (JRE) JUNIPER NETWORKS DESIGN-WAN (JND-WAN) JUNIPER NETWORKS SDN FUNDAMENTALS (JSDNF) CONFIGURING JUNIPER NETWORKS FIREWALL/IPSEC VPN PRODUCTS (CJFV) DATA CENTER SWITCHING (DCX) JUNOS EDGE SECURITY SERVICES (JESS) JNCIE SECURITY BOOTCAMP (JNCIE-SEC) JNCIE SERVICE PROVIDER BOOTCAMP (JNCIE-SP) JUNIPER NETWORKS DESIGN – DATA CENTER (JND-DC) POLICY SECURE CONFIGURATION AND ADMINISTRATION CONNECT SECURE ADMINISTRATION AND MAINTENANCE JUNOS SECURITY (JSEC) NETWORK AUTOMATION USING CONTRAIL CLOUD (NACC) JUNOS SERVICE PROVIDER SWITCHING (JSPX) NETWORKING FUNDAMENTALS JUNOS UNIFIED THREAT MANAGEMENT (JUTM) TROUBLESHOOTING DATA CENTER SWITCHING (TDCX) WLAN FUNDAMENTALS |
LINUX | LINUX SECURITY LINUX SYSTEM ADMINISTRATION MASTERING THE LINUX COMMAND LINE INTRODUCTION TO VMWARE ESXI SOFTWARE DEFINED NETWORKING WITH OPENDAYLIGHT ADVANCED LINUX SYSTEM ADMINISTRATION AND NETWORKING ESSENTIALS OF SYSTEM ADMINISTRATION PENETRATION TESTING WITH LINUX TOOLS LINUX IN THE REAL WORLD CENTOS SYSTEM ADMINISTRATOR PREP LINUX ESSENTIALS PUPPET FUNDAMENTALS COMPLIANCE BASICS FOR DEVELOPERS SOFTWARE DEFINED NETWORKING WITH OPENDAYLIGHT OPEN SOURCE VIRTUALIZATION LINUX ENTERPRISE AUTOMATION ESSENTIALS OF OPENSTACK ADMINISTRATION LINUX SECURITY HIGH AVAILABILITY LINUX ARCHITECTURE LINUX PERFORMANCE TUNING LINUX SYSTEM ADMINISTRATION ADVANCED LINUX SYSTEM ADMINISTRATION AND NETWORKING INTRODUCTION TO LINUX, OPEN SOURCE DEVELOPMENT, AND GIT INSIDE ANDROID: AN INTRO TO ANDROID INTERNALS OPTIMIZING LINUX DEVICE DRIVERS FOR POWER EFFICIENCY LINUX KERNEL DEBUGGING AND SECURITY INTRODUCTION TO LINUX INTRODUCTION TO CLOUD INFRASTRUCTURE TECHNOLOGIES LINUX NETWORKING AND ADMINISTRATION LINUX SECURITY FUNDAMENTALS OPENSTACK ADMINISTRATION FUNDAMENTALS SOFTWARE DEFINED NETWORKING FUNDAMENTALS FUNDAMENTALS OF LINUX |
MCAFEE | McAfee® Drive Encryption McAfee Endpoint Encryption Essentials MCAFEE NETWORK DATA LOSS PREVENTION McAfee® VirusScan and ePolicy Orchestrator McAfee® Advanced Threat Defense McAfee Host Intrusion Prevention McAfee Database Security MCAFEE® NETWORK SECURITY PLATFORM MCAFEE WEB GATEWAY ADMINISTRATION MCAFEE THREAT INTELLIGENCE EXCHANGE ADMINISTRATION MCAFEE POLICY AUDITOR ADMINISTRATION MCAFEE® SECURITY INFORMATION EVENT MANAGEMENT (SIEM) ADMINISTRATION COURSE 101 MCAFEE ADVANCED THREAT DEFENSE 3.0 MCAFEE DATABASE SECURITY 5.0 McAfee Email Gateway 7.6 MCAFEE ENTERPRISE MOBILITY MANAGEMENT ESSENTIALS 11.0 McAfee Endpoint Encryption(PC&MAC) 7.0 MCAFEE SIEM 9.4 MCAFEE WEB GATEWAY 7.5 |
MICROSOFT | NETWORK SECURITY PLATFORM 8.2 ESSENTIALS VIRUSSCAN ENTERPRISE MICROSOFT INSTALLING AND CONFIGURING WINDOWS 10 DEPLOYING AND MANAGING WINDOWS 10 USING ENTERPRISE SERVICES INSTALLING AND CONFIGURING WINDOWS® 7 CLIENT TROUBLESHOOTING AND SUPPORTING WINDOWS® 7 IN THE ENTERPRISE PLANNING AND MANAGING WINDOWS® 7 DESKTOP DEPLOYMENTS AND ENVIRONMENTS DEPLOYING WINDOWS DESKTOPS AND ENTERPRISE APPLICATIONS SUPPORTING AND TROUBLESHOOTING WINDOWS 10 NETWORKING FUNDAMENTALS SECURITY FUNDAMENTALS OVERVIEW OF ACTIVE DIRECTORY RIGHTS MANAGEMENT SERVICES WITH WINDOWS SERVER 2008 R2 CONFIGURING AND TROUBLESHOOTING WINDOWS SERVER® 2008 ACTIVE DIRECTORY® DOMAIN SERVICES CONFIGURING AND TROUBLESHOOTING IDENTITY AND ACCESS SOLUTIONS WITH WINDOWS SERVER® 2008 ACTIVE DIRECTORY® CONFIGURING AND TROUBLESHOOTING A WINDOWS SERVER® 2008 NETWORK INFRASTRUCTURE CONFIGURING WINDOWS® 8.1 SUPPORTING WINDOWS® 8.1 |
NOVELL | SERVICE DESK: SERVICE MANAGEMENT (COURSE 8522) SECURING WINDOWS WORKSTATIONS USING ZENWORKS ENDPOINT SECURITY MANAGEMENT 11.X (COURSE 8520) PENETRATION TESTINGWITH KALI LINUX ADVANCED WINDOWS EXPLOITATION |
OFFENSIVE SECURITY | OFFENSIVE SECURITY WIRELESS ATTACKS (WIFU) CRACKING THE PERIMETER (CTP) ADVANCED WEB ATTACKS AND EXPLOITATION METASPLOIT UNLEASHED OFFENSIVE SECURITY PENETRATIONTESTING LAB |
ORACLE | ORACLE 12C SECURITY ADMINISTRATION ORACLE DATABASE 12C: MANAGING SECURITY USER SECURITY AND AUDITING IN ORACLE DATABASE 12C ORACLE DATABASE 11G: INTRODUCTION TO DATABASE SECURITY AND SOLUTIONS ORACLE DATABASE 11G: DATABASE SECURITY ORACLE DATABASE 11G: BASIC USER AND STRONG AUTHENTICATION ORACLE DATABASE 11G: ENTERPRISE USER SECURITY AND PROXY AUTHENTICATION ORACLE DATABASE 11G: PRIVILEGES, ROLES, AND APPLICATION CONTEXTS ORACLE DATABASE 11G: ORACLE NET SERVICES AND LISTENER SECURITY ORACLE DATABASE 11G: FIREWALLS, ORACLE CONNECTION MANAGER, AND SQL*PLUS SECURITY ORACLE DATABASE 11G RELEASE 2: ORACLE PARTITIONING AND SECURITY FEATURES ORACLE DATABASE 11G RELEASE 2: STORAGE STRUCTURES AND USER SECURITY |
PALO ALTO | FIREWALL 7.1: INSTALL, CONFIGURE, AND MANAGE (EDU-201) FIREWALL 7.1: CONFIGURE EXTENDED FEATURES (EDU-205) PANORAMA 7.1: MANAGE MULTIPLE FIREWALLS (EDU-221) FIREWALL 7.1: MANAGE CYBERTHREATS (EDU-231) FIREWALL 7.1: DEBUG AND TROUBLESHOOT (EDU-311) |
PCI | TRAPS: INSTALL, CONFIGURE AND MANAGE QUALIFIED SECURITY ASSESSOR (QSA)™ QUALIFICATION |
RED HAT | RED HAT SERVER HARDENING (RH413) RED HAT ENTERPRISE LINUX DIAGNOSTICS AND TROUBLESHOOTING (RH342) |
RIVERBED | WAN310 OPTIMIZING ENTERPRISE APPLICATIONS AND PROTOCOLS WAN350 IMPLEMENTING ENTERPRISE OPTIMIZATION ARCHITECTURES APM200 APPLICATION PERFORMANCE MANAGEMENT ESSENTIALS NPM200 NETWORK PERFORMANCE MANAGEMENT ESSENTIALS NOS200 NETWORK PLANNING AND CONFIGURATION MANAGEMENT ESSENTIALS MDL200 MODELER SUITE ESSENTIALS HCB200 STORAGE DELIVERY ESSENTIALS HCB300 HYPER CONVERGED BRANCH IMPLEMENTATION SOLUTIONS |
SABSA | SABSA FOUNDATION SABSA A1 – ADVANCED SABSA RISK ASSURANCE & GOVERNANCE SABSA A3 – ADVANCED SABSA ARCHITECTURE & DESIGN |
SANS | NETWARS – TOURNAMENT NETWARS: CONTINUOUS HOSTED: CRITICAL INFRASTRUCTURE AND CONTROL SYSTEM CYBERSECURITY HOSTED: EMBEDDED DEVICE SECURITY ASSESSMENTS FOR THE REST OF US HOSTED: (ISC)² CERTIFIED SECURE SOFTWARE LIFECYCLE PROFESSIONAL (CSSLP) CBK EDUCATION PROGRAM HOSTED: OFFENSIVE COUNTERMEASURES: THE ART OF ACTIVE DEFENSES HOSTED: PHYSICAL SECURITY SPECIALIST – FACILITIES EDITION HOSTED: PHYSICAL PENETRATION TESTING – INTRODUCTION AUD507: AUDITING & MONITORING NETWORKS, PERIMETERS & SYSTEMS AUD566: IMPLEMENTING AND AUDITING THE CRITICAL SECURITY CONTROLS – IN-DEPTH AUD440: CRITICAL SECURITY CONTROLS: PLANNING, IMPLEMENTING AND AUDITING AUD480: TOP 4 MITIGATION STRATEGIES: IMPLEMENTING & AUDITING DEV522: DEFENDING WEB APPLICATIONS SECURITY ESSENTIALS DEV541: SECURE CODING IN JAVA/JEE: DEVELOPING DEFENSIBLE APPLICATIONS DEV543: SECURE CODING IN C & C++ DEV544: SECURE CODING IN .NET: DEVELOPING DEFENSIBLE APPLICATIONS FOR408: WINDOWS FORENSIC ANALYSIS FOR508: ADVANCED COMPUTER FORENSIC ANALYSIS AND INCIDENT RESPONSE FOR518: MAC FORENSIC ANALYSIS FOR578: CYBER THREAT INTELLIGENCE FOR526: MEMORY FORENSICS IN-DEPTH FOR572: ADVANCED NETWORK FORENSICS AND ANALYSIS FOR585: ADVANCED SMARTPHONE AND MOBILE DEVICE FORENSICS FOR610: REVERSE-ENGINEERING MALWARE: MALWARE ANALYSIS TOOLS AND TECHNIQUES ICS515: ICS ACTIVE DEFENSE AND INCIDENT RESPONSE ICS410: ICS/SCADA SECURITY ESSENTIALS ICS456: ESSENTIALS FOR NERC CRITICAL INFRASTRUCTURE PROTECTION MGT405: CRITICAL INFRASTRUCTURE PROTECTION MGT414: SANS +S TRAINING PROGRAM FOR THE CISSP® CERTIFICATION EXAM MGT415: A PRACTICAL INTRODUCTION TO RISK ASSESSMENT MGT433: SECURING THE HUMAN: HOW TO BUILD, MAINTAIN AND MEASURE A HIGH-IMPACT AWARENESS PROGRAM MGT512: SANS SECURITY LEADERSHIP ESSENTIALS FOR MANAGERS WITH KNOWLEDGE COMPRESSION MGT514: IT SECURITY STRATEGIC PLANNING, POLICY AND LEADERSHIP MGT535: INCIDENT RESPONSE TEAM MANAGEMENT |
SYMANTEC | LEG523: LAW OF DATA SECURITY AND INVESTIGATIONS SEC301: INTRO TO INFORMATION SECURITY SEC401: SECURITY ESSENTIALS BOOTCAMP STYLE SEC440: CRITICAL SECURITY CONTROLS: PLANNING, IMPLEMENTING AND AUDITING SEC480: TOP 4 MITIGATION STRATEGIES: IMPLEMENTING & AUDITING SEC501: ADVANCED SECURITY ESSENTIALS – ENTERPRISE DEFENDER SEC502: PERIMETER PROTECTION IN-DEPTH SEC503: INTRUSION DETECTION IN-DEPTH SEC504: HACKER TOOLS, TECHNIQUES, EXPLOITS AND INCIDENT HANDLING SEC505: SECURING WINDOWS WITH THE CRITICAL SECURITY CONTROLS SEC506: SECURING LINUX/UNIX SEC511: CONTINUOUS MONITORING AND SECURITY OPERATIONS SEC524: CLOUD SECURITY FUNDAMENTALS SEC542: WEB APP PENETRATION TESTING AND ETHICAL HACKING SEC546: IPV6 ESSENTIALS SEC550: ACTIVE DEFENSE, OFFENSIVE COUNTERMEASURES AND CYBER DECEPTION SEC560: NETWORK PENETRATION TESTING AND ETHICAL HACKING SEC561: INTENSE HANDS-ON PEN TESTING SKILL DEVELOPMENT (WITH SANS NETWARS) SEC562: CYBERCITY HANDS-ON KINETIC CYBER RANGE EXERCISE SEC566: IMPLEMENTING AND AUDITING THE CRITICAL SECURITY CONTROLS – IN-DEPTH SEC573: PYTHON FOR PENETRATION TESTERS SEC575: MOBILE DEVICE SECURITY AND ETHICAL HACKING SEC579: VIRTUALIZATION AND PRIVATE CLOUD SECURITY SEC580: METASPLOIT KUNG FU FOR ENTERPRISE PEN TESTING SEC617: WIRELESS ETHICAL HACKING, PENETRATION TESTING, AND DEFENSES SEC642: ADVANCED WEB APP PENETRATION TESTING AND ETHICAL HACKING SEC660: ADVANCED PENETRATION TESTING, EXPLOIT WRITING, AND ETHICAL HACKING SEC760: ADVANCED EXPLOIT DEVELOPMENT FOR PENETRATION TESTERS SPECIAL: HACKER GUARD: THREAT UPDATE SPECIAL: COMPLIANCE TRAINING AND SECURING THE HUMAN SPECIAL: SECURITY AWARENESS TRAINING FOR ELECTRIC ENTITIES SPECIAL: SPECIAL FOR HIMSS – IMPLEMENTING HEALTHCARE CYBER-HYGIENE WITH THE CRITICAL SECURITY CONTROLS SPECIAL: INTRODUCTION TO MALWARE ANALYSIS: HANDS-ON AND TECHNICAL SYMANTEC ADVANCED THREAT PROTECTION 2.X: INCIDENT RESPONSE ENDPOINT PROTECTION 12.1: ADMINISTRATION ENDPOINT PROTECTION 12.1: MAINTAIN AND TROUBLESHOOT ENDPOINT PROTECTION 12.X: INSTALL, CONFIGURE, AND DEPLOY ENDPOINT PROTECTION 12.X: MANAGE AND ADMINISTER MANAGED PKI PATCH MANAGEMENT 6.2 RISK AUTOMATION SUITE (SRAS) SERVICE DESK ADMINISTRATION 7.1 VALIDATION AND ID PROTECTION (VIP) |