A+ Preparatory Computer Repair Training Class

Technician Holding a Screwdriver Fixing a Computer

Welcome to South Florida’s finest hands-on computer repair school!

Our instructor-led classes begin weekly and are taught by patient instructors — each considered to be an industry expert.  Since 1989, PC Professor has been offering computer repair classes to those seeking condensed, hands-on training in a relaxed, comfortable and  professional environment.  Stop by and visit us today to see why PC Professor Technical Institute has, since 1989, been considered the industry leader in computer training and academic excellence.  Or, contact us to arrange a campus tour, to meet with an instructor or to audit a session.

Computer Repair Class. If you are considering a career as an entry-level information technology (IT) professional or personal computer (PC) service technician, PC Professor’s “A+ Preparatory Class” may be worthy of consideration. The course will build on your existing user-level knowledge and experience with personal computer software and hardware to present fundamental skills and concepts that you will use on the job. In this course, you will acquire the essential skills and information you will need to install, upgrade, repair, configure, troubleshoot, optimize, and perform preventative maintenance of basic personal computer hardware and operating systems.  If you would like to tour our facility, meet with an instructor or arrange a complimentary audit, simply contact us to arrange a meeting with an Admissions Rep today.

Computer Repair Class. You will learn to install, upgrade, repair, configure, optimize, troubleshoot, and perform preventative maintenance on windows-based personal computer hardware and operating systems.

Computer Repair Class. Over a dozen intense chapters covering possible material on the national exams.  Many useful illustrations, drawings, and helpful photographs are included as well. Also included are practice test questions, exercises, labs and more.  Notes and highlighting can be done directly in the electronic book (class dependent), or instead, PC Professor may provided a physical book for each enrolled student.

Computer Repair Class. The target student for PC Professor’s “A+ Preparatory Computer Repair Class” are those with basic computer user skills who are interested in pursuing a career as an IT (information technology) professional or as a PC (personal computer) technician.  Possible job environments include mobile and/or corporate settings with a high level of face-to face client interaction, remote-based work environments where client interaction, client training, operating systems, and connectivity issues are emphasized, or settings with limited customer interaction where hardware activities are emphasized.

In addition, this challenging, difficult and fast-paced course will help prepare students prepare for, and achieve, a nationally-recognized CompTIA A+ certification so it may be suitable for those seeking career enhancement and/or career advancement.

Computer Repair Class. Students taking this course should have the following skills: End-user skills with Windows-based personal computers, including the ability to browse and search for information on the Internet.  Start up and shut down the computer.  Log on to a computer and/or computer network.  Run programs.  Move, copy, delete, and rename files in Windows Explorer.  Basic knowledge of computing concepts, including the difference between hardware and software.  The functions of software components, such as the operating system, applications, and file systems.  The function of a computer network, an operating system and the internet.

PC Professor’s computer repair classes begin regularly and fill quickly.  Contact an Admissions Rep today to discuss the enrollment process.

The following is CompTIA’s Pre-Approved Continuing Education Units (CEU) list for certification renewal (Note: not all certification-preparatory classes and/or certification exams are offered at PC Professor nor is this list intended to imply class offerings, authorization, trademark claim, affiliation, partnership or endorsement of any type):

CERTIFICATION PROVIDER VENDOR COURSE TITLE
AMAZON WEB SERVICES SECURITY OPERATIONS ON AWS
AWS SECURITY FUNDAMENTALS
EL CAPITAN OS X SUPPORT ESSENTIALS
YOSEMITE OS X SUPPORT ESSENTIALS
YOSEMITE OS X SERVER ESSENTIALS
 APPLE  APPLE CERTIFIED MACINTOSH TECHNICIAN (ACMT)
MANAGING APPLE DEVICES DEPLOYING, MAINTAINING IOS & EL CAPITAN
MANAGING APPLE DEVICES DEPLOYING, MAINTAINING IOS AND EL CAPITAN
ADVANCED TROUBLESHOOTING
AIRWAVE WIRELESS MANAGEMENT SUITE INSTALLATION, CONFIGURATION & USE
 ARUBA ARUBA INSTANT ACCESS POINTS (IAP)
CLEARPASS ESSENTIALS
HP ONLY – ARUBA MOBILITY BOOT CAMP
IMC ESSENTIALS FOR NETWORK ADMINISTRATORS
IMPLEMENTING ARUBA WLAN
MIGRATING FROM CISCO TO HP FLEXNETWORKS
MOBILITY ACCESS SWITCH
SCALABLE WLAN DESIGN & IMPLEMENTATION (SWDI)
SOLUTIONS PART 1
IP OFFICE BASIC INTEGRATION AND CONFIGURATION
INTRODUCTION TO SESSION INITIATION PROTOCOL (SIP)
MERIDIAN 1 OPTION 11C INSTALLATION, MAINTENANCE, & DATABASE – COMMUNICATION SERVER
 AVAYA STACKABLE ERS AND VSP INSTALLATION, CONFIGURATION, AND MAINTENANCE
AVAYA COMMUNICATION SERVER DIALING PLAN DESIGN AND IP PEER NETWORKING
ERS INSTALLATION AND CONFIGURATION
SAN WBT BROCADE 8 GBPS FIBRE CHANNEL PRODUCT
SAN WBT BROCADE 16 GBPS FIBRE CHANNEL PRODUCT
CFA 200 CORE  SAN ADMINISTRATION
DCX 200 DCX BACKBONE PRODUCT ADMINISTRATION
CFP 300 ADVANCED SAN ADMINISTRATION
CFD 200 BROCADE SAN DESIGN
SAN-TS SAN TROUBLESHOOTING
INTRODUCTION TO THE BROCADE EXTENSION SWITCH
BROCADE NETWORK INDUSTRY PROTOCOL
IP STORAGE NETWORKING
BRIDGE TO BROCADE ETHERNET FABRICS FOR NETWORK PROFESSIONALS
ADVANCED ETHERNET FABRIC TROUBLESHOOTING
NETWORK OS UPDATE
BROCADE PROFESSIONAL IP ADMINISTRATOR
TROUBLESHOOTING IP NETWORKS
BORDER GATEWAY PROTOCOL (BGP) FOR SP AND ENTERPRISE NETWORKS
BROCADE MPLS IMPLEMENTATION
MPLS TRAFFIC ENGINEERING
IMPLEMENTING EFFORTLESS NETWORKS WITH THE BROCADE ICX FAMILY
INTRODUCTION TO HYPEREDGE AND THE ICX 6430-C12 SWITCH
 CHECK POINT THREAT PREVENTION
SECURE WEB GATEWAY
MDSM WITH VSX (MULTI-DOMAIN SECURITY MANAGEMENT WITH VIRTUAL SYSTEM EXTENSION)
CHECK POINT CERTIFIED SECURITY MASTER (CCSM)
SECURING CISCO NETWORKS WITH THREAT DETECTION AND ANALYSIS (SCYBER)
 CISCO INTERCONNECTING CISCO NETWORKING DEVICES
DESIGNING WITH CISCO NETWORK PROGRAMMABILITY
INTERCONNECTING CISCO NETWORKING DEVICES
DESIGNING WITH CISCO NETWORK PROGRAMMABILITY FOR ACI
IMPLEMENTING CISCO NETWORK PROGRAMMABILITY
IMPLEMENTING CISCO NETWORK PROGRAMMABILITY FOR ACI
IMPLEMENTING CISCO SECURE MOBILITY SOLUTIONS (SIMOS)
IMPLEMENTING CISCO SECURE ACCESS CONTROL SYSTEM
DESIGNING FOR CISCO INTERNETWORK SOLUTIONS (DESGN)
DESIGNING THE CISCO CLOUD (CLDDES)
AUTOMATING THE CISCO ENTERPRISE CLOUD (CLDAUT)
IMPLEMENTING CISCO THREAT CONTROL SOLUTIONS (SITCS)
 CITRIX IMPLEMENTING CITRIX NETSCALER 11 FOR APP AND DESKTOP SOLUTIONS
CITRIX XENAPP AND XENDESKTOP HELPDESK SUPPORT
CITRIX NETSCALER ADVANCED IMPLEMENTATION
CITRIX NETSCALER ESSENTIALS FOR ACE MIGRATION
DEPLOYING ENTERPRISE MOBILITY SOLUTIONS WITH CITRIX XENMOBILE
 COMPTIA COMPTIA MOBILITY+
COMPTIA ADVANCED SECURITY PRACTITIONER (CASP)
COMPTIA NETWORK+
COMPTIA SECURITY+
COMPTIA A+ 1001/1002
COMPTIA A+ 1101/1102
COMPTIA SERVER+
COMPTIA LINUX+
 CSA CCSK
GRC STACK
 CWNP CWTS – ENTERPRISE WI-FI FUNDAMENTALS
CWNA – ENTERPRISE WI-FI ADMINISTRATION
CWSP – ENTERPRISE WI-FI SECURITY
CWDP – ENTERPRISE WI-FI DESIGN
CWAP – ENTERPRISE WI-FI ANALYSIS & TROUBLESHOOTING
 DELL Dell SC Series Installation and Configuration
Introduction to Dell PS Series Storage Arrays
Dell PS Series Storage Admin and Data Protection Tools
Integrating vSphere with Dell PS Series Storage
Dell SC Storage Center Administration and Management
Dell PS Series vSphere Integration
Dell Storage Networking Configuration
Dell Networking Planning
Dell Networking Installation and Configuration
Dell Networking Interoperability
Dell Networking Fundamentals-Routing
Dell Networking Fundamentals – Switching
Dell Networking Data Center Advanced Features & Administration
Dell Networking Campus Design, Advanced Features and Configuration
Dell Networking Fast Track from Cisco to Dell OS
Dell Campus Networking N-Series Features & Basic Administration
Dell Networking Data Center Overview & Basic Administration
Dell OpenManage Essentials Administration
Optimizing and Managing Dell PowerEdge Blade Server Solutions
Optimizing and Managing Dell PowerEdge Server Solutions
 EC-COUNCIL CERTIFIED ETHICAL HACKER (CEH)
CERTIFIED SECURITY ANALYST (ECSA)
NETWORK SECURITY ADMINISTRATOR (ENSA)
DISASTER RECOVERY PROFESSIONAL (EDRP)
SECURE PROGRAMMER .NET (ECSP)
LICENSED PENETRATION TESTER (LPT)
COMPUTER HACKING FORENSICS INVESTIGATOR (CHFI)
CERTIFIED CHIEF INFORMATION SECURITY OFFICER (CCISO)
CERTIFIED ETHICAL HACKER (CEH)
CERTIFIED SECURITY SPECIALIST (ECSS)
CERTIFIED INCIDENT HANDLER (ECIH)
CERTIFIED ENCRYPTION SPECIALIST (ECES)
CERTIFIED VOIP PROFESSIONAL (ECVP)
AVAMAR INTEGRATION AND PERFORMANCE MANAGEMENT
AVAMAR MANAGEMENT
BACKUP RECOVERY SOLUTIONS – AVAMAR TO DATA DOMAIN INTEGRATION
BACKUP RECOVERY SOLUTIONS – MICROSOFT EXCHANGE INTEGRATION
BACKUP RECOVERY SOLUTIONS – MICROSOFT SHAREPOINT INTEGRATION
BACKUP RECOVERY SOLUTIONS – NDMP INTEGRATION
BACKUP RECOVERY SOLUTIONS – NETWORKER TO AVAMAR INTEGRATION
BACKUP RECOVERY SOLUTIONS – NETWORKER TO DATA DOMAIN INTEGRATION
BACKUP RECOVERY SOLUTIONS – ORACLE INTEGRATION
BACKUP RECOVERY SOLUTIONS – VMWARE INTEGRATION
BUSINESS CONTINUITY SOLUTIONS DESIGNER (BCSD) FOR RECOVERPOINT
BUSINESS CONTINUITY SOLUTIONS DESIGNER (BCSD) FOR VPLEX
 EMC CELERRA NS SERIES INSTALLATION AND MAINTENANCE
CELERRA UNIFIED QUICKSTART: BASIC MANAGEMENT OVERVIEW
CELERRA UNIFIED QUICKSTART: INSTALLATION AND CONFIGURATION USING CSA
CELERRA UNIFIED QUICKSTART: NS-120 HARDWARE OVERVIEW & INSTALLATION
CELERRA UNIFIED QUICKSTART: NS-480 HARDWARE OVERVIEW & INSTALLATION
CELERRA UNIFIED QUICKSTART: NX4 HARDWARE OVERVIEW & INSTALLATION
CELERRA UNIFIED QUICKSTART: PRODUCT INSTALLATION AND CONFIGURATION OVERVIEW
CELERRA UNIFIED QUICKSTART: PROVISIONING FOR FCCONNECTED HOSTS
CENTERA FUNDAMENTALS
CENTERA HARDWARE CONFIGURATIONS
CENTERA INSTALLATION AND MAINTENANCE
CENTERA TOOLS AND INSTALLATION
CENTERA UNIVERSAL ACCESS
CENTERA UPGRADES AND MAINTENANCE
CLARIION BASIC MANAGEMENT
CLARIION CX3 INSTALLATION DIFFERENCES
CLARIION FOUNDATIONS
CLARIION HARDWARE
CLARIION INSTALLATION AND MAINTENANCE
CLOUD INFRASTRUCTURE PLANNING AND DESIGN
CLOUD SERVICES PLANNING AND DESIGN
CONNECTIVITY PROTOCOLS
EMC AVAILABILITY INFRASTRUCTURE SOLUTIONS AND DESIGN
EMC BACKUP RECOVERY INFRASTRUCTURE SOLUTIONS
EMC BACKUP RECOVERY SOLUTIONS DESIGN
ISILON FUNDAMENTALS
ISILON HARDWARE BASICS AND GUIDELINES
ISILON HARDWARE INSTALLATION
ISILON HARDWARE MAINTENANCE
ISILON INFRASTRUCTURE SOLUTIONS
ISILON INITIAL CONFIGURATION
ISILON SOLUTION DESIGN
NETWORKER INSTALLATION, CONFIGURATION AND ADMINISTRATION
RECOVERPOINT FUNDAMENTALS
SAN MANAGEMENT
VMAX FAMILY INSTALLATION AND MAINTENANCE
VMAX1 AND VMAX2 HARDWARE FUNDAMENTALS
VMAX3 – UNISPHERE FOR VMAX IMPLEMENTATION AND MANAGEMENT
VMAX3 CONFIGURATION MANAGEMENT
VMAX3 FUNDAMENTALS
VMAX3 HARDWARE FUNDAMENTALS
VMAX3 SECURITY CONCEPTS
VNX APPLICATION PROTECTION SUITE FUNDAMENTALS
VNX BASIC HARDWARE MAINTENANCE
VNX HARDWARE FUNDAMENTALS
VNX INSTALLATION AND INITIAL CONFIGURATION
XTREMIO HARDWARE FUNDAMENTALS
DIGITAL MEDIA – ACQUISITION AND TRIAGE
 ENCASE ENCASE® FORENSICS AND ENTERPRISE FUNDAMENTALS
ENCASE® COMPUTER FORENSICS I
INCIDENT INVESTIGATION
ENCASE® ENTERPRISE EXAMINATIONS
ENCASE® EXAMINATIONS OF THE MACINTOSH OPERATING SYSTEMS
HOST INTRUSION METHODOLOGY AND INVESTIGATION
ENCASE® CYBERSECURITY AND ANALYTICS
ENCASE® EXAMINATION OF NTFS
ENCASE® ADVANCED INTERNET EXAMINATIONS
ENCASE® ADVANCED COMPUTER FORENSICS
 HP DESIGNING HP DATA CENTER AND CLOUD SOLUTIONS
DESIGNING HPE DATA CENTER AND CLOUD SOLUTIONS
DELTA – DESIGNING HPE DATA CENTER AND CLOUD SOLUTIONS
CREATING HPE SOFTWARE-DEFINED NETWORKS
BUILDING HP FLEXFABRIC DATA CENTERS
ARCHITECTING HP FLEXNETWORK SOLUTIONS
DEPLOYING HP FLEXNETWORK CORE TECHNOLOGIES
HP-UX SECURITY I
HP INTEGRITY VIRTUAL MACHINES ADMINISTRATION
HP-UX LOGICAL VOLUME MANAGER
HP INTEGRITY VM AND HP-UX VPARS ADMINISTRATION
HP-UX PERFORMANCE AND TUNING
HP SERVICEGUARD I
HP SYSTEMS INSIGHT MANAGER
HPE ARCSIGHT MASTER ASE PREPARATION COURSE
ARCSIGHT ESM ADVANCED ADMINISTRATOR
ARCSIGHT ESM ADVANCED ANALYST
ARCSIGHT LOGGER – ADMINISTRATION AND OPERATIONS
DYNAMIC APPLICATION TESTING WITH HP WEBINSPECT
HP FORTIFY STATIC CODE ANALYZER / SOFTWARE SECURITY CENTER
SOFTLAYER FUNDAMENTALS
 IBM  IBM SECURITY QRADAR SIEM ADMINISTRATION AND CONFIGURATION
IBM SECURITY QRADAR SIEM FOUNDATIONS
IBM SECURITY DIRECTORY SERVER SYSTEM ADMINISTRATION
IBM SECURITY IDENTITY MANAGER BASIC ADMINISTRATION
IBM SECURITY QRADAR INCIDENT FORENSICS CONFIGURATION AND USAGE
WEB APPLICATION SECURITY FUNDAMENTALS
IBM SECURITY ACCESS MANAGER FOR ENTERPRISE SINGLE SIGN-ON ADMINISTRATION
IBM SECURITY ACCESS MANAGER FOR MOBILE
IBM SECURITY ACCESS MANAGER FOR WEB
IBM SECURITY PRIVILEGED IDENTITY MANAGER FUNDAMENTALS
IBM ENDPOINT MANAGER SECURITY AND COMPLIANCE FUNDAMENTALS
IBM SECURITY QRADAR ADVANCED TOPICS
IBM SECURITY APPSCAN STANDARD FUNDAMENTALS
 ISACA LINUX BASIC AND INSTALLATION
INTRODUCTION TO IBM I FOR NEW USERS
LINUX SYSTEM ADMINISTRATION I: IMPLEMENTATION
LINUX ON POWER PERFORMANCE
WEB APPLICATION SECURITY FOR AUDITORS
COBIT ASSESSOR FOR SECURITY
INFORMATION SECURITY MANAGEMENT
INFORMATION SECURITY MANAGEMENT (ADVANCED)
AUDIT & SECURITY OF FIREWALLS
SECURING & AUDITING MOBILE TECHNOLOGIES
SECURING & AUDITING WIRELESS & MOBILE TECHNOLOGIES
VIRTUALIZATION SECURITY & AUDIT
WINDOWS SECURITY & AUDIT
CLOUD COMPUTING SECURITY & AUDIT
DATABASE SECURITY AND AUDIT
RISK-BASED APPROACH TO IT INFRASTRUCTURE SECURITY & CONTROL ASSESSMENTS
IT RISK MANAGEMENT
CISM EXAM REVIEW
CRISC EXAM REVIEW
CYBERSECURITY FUNDAMENTALS
CSX PRACTITIONER: IDENTIFICATION AND PROTECTION
CSX PRACTITIONER: RESPOND AND RECOVER
CSX PRACTITIONER BOOT CAMP
CSX PRACTITIONER: DETECTION
CSX SPECIALIST: IDENTIFY
CSX SPECIALIST: PROTECT
CSX SPECIALIST: DETECT
CSX SPECIALIST: RECOVER
CSX SPECIALIST: RESPOND
Real World Application of RMF for DoD IT
 ISC(2) (ISC) TRAINING FOR CAP
(ISC) TRAINING FOR CCFP
(ISC) TRAINING FOR CCSP
(ISC) TRAINING FOR CISSP
(ISC) TRAINING FOR CSSLP
(ISC) TRAINING FOR HCISPP
(ISC) TRAINING FOR CISSP-ISSAP
(ISC) TRAINING FOR CISSP-ISSEP
(ISC) TRAINING FOR CISSP-ISSMP
(ISC) TRAINING FOR SSCP
JUNIPER ADVANCED DATA CENTER SWITCHING (ADCX)
 JUNIPER  JUNIPER NETWORKS DESIGN FUNDAMENTALS (JNDF)
ADVANCED JUNIPER NETWORKS VPN IMPLEMENTATIONS (AJVI)
ADVANCED JUNOS ENTERPRISE ROUTING (AJER)
ADVANCED JUNOS ENTERPRISE ROUTING TROUBLESHOOTING (AJERT)
ADVANCED JUNOS ENTERPRISE SECURITY TROUBLESHOOTING (AJEST)
ADVANCED JUNOS ENTERPRISE SWITCHING (AJEX)
ADVANCED JUNOS ENTERPRISE SWITCHING TROUBLESHOOTING (AJEXT)
ADVANCED JUNOS SECURITY (AJSEC)
ADVANCED JUNOS SERVICE PROVIDER ROUTING (AJSPR)
ADVANCED JUNOS ENTERPRISE SWITCHING USING ENHANCED LAYER 2 SOFTWARE (AJEX-ELS)
ADVANCED JUNOS SERVICE PROVIDER TROUBLESHOOTING (AJSPT)
ATTACK PREVENTION WITH JUNIPER NETWORKS FIREWALLS (APJF)
AX411 ACCESS POINT INSTALLATION AND CONFIGURATION
INTEGRATING JUNIPER NETWORKS FIREWALL/IPSEC VPN PRODUCTS INTO HIGH-PERFORMANCE NETWORKS (IFVH)
JUNOS ENTERPRISE SWITCHING (JEX)
JUNOS ENTERPRISE SWITCHING USING ELS (JEX-ELS)
JUNOS INTERMEDIATE ROUTING (JIR)
JUNOS INTRUSION PREVENTION SYSTEMS (JIPS)
JUNOS MULTICAST ROUTING (JMR)
JUNOS ROUTING ESSENTIALS (JRE)
JUNIPER NETWORKS DESIGN-WAN (JND-WAN)
JUNIPER NETWORKS SDN FUNDAMENTALS (JSDNF)
CONFIGURING JUNIPER NETWORKS FIREWALL/IPSEC VPN PRODUCTS (CJFV)
DATA CENTER SWITCHING (DCX)
JUNOS EDGE SECURITY SERVICES (JESS)
JNCIE SECURITY BOOTCAMP (JNCIE-SEC)
JNCIE SERVICE PROVIDER BOOTCAMP (JNCIE-SP)
JUNIPER NETWORKS DESIGN – DATA CENTER (JND-DC)
POLICY SECURE CONFIGURATION AND ADMINISTRATION
CONNECT SECURE ADMINISTRATION AND MAINTENANCE
JUNOS SECURITY (JSEC)
NETWORK AUTOMATION USING CONTRAIL CLOUD (NACC)
JUNOS SERVICE PROVIDER SWITCHING (JSPX)
NETWORKING FUNDAMENTALS
JUNOS UNIFIED THREAT MANAGEMENT (JUTM)
TROUBLESHOOTING DATA CENTER SWITCHING (TDCX)
WLAN FUNDAMENTALS
 LINUX LINUX SECURITY
LINUX SYSTEM ADMINISTRATION
MASTERING THE LINUX COMMAND LINE
INTRODUCTION TO VMWARE ESXI
SOFTWARE DEFINED NETWORKING WITH OPENDAYLIGHT
ADVANCED LINUX SYSTEM ADMINISTRATION AND NETWORKING
ESSENTIALS OF SYSTEM ADMINISTRATION
PENETRATION TESTING WITH LINUX TOOLS
LINUX IN THE REAL WORLD
CENTOS SYSTEM ADMINISTRATOR PREP
LINUX ESSENTIALS
PUPPET FUNDAMENTALS
COMPLIANCE BASICS FOR DEVELOPERS
SOFTWARE DEFINED NETWORKING WITH OPENDAYLIGHT
OPEN SOURCE VIRTUALIZATION
LINUX ENTERPRISE AUTOMATION
ESSENTIALS OF OPENSTACK ADMINISTRATION
LINUX SECURITY
HIGH AVAILABILITY LINUX ARCHITECTURE
LINUX PERFORMANCE TUNING
LINUX SYSTEM ADMINISTRATION
ADVANCED LINUX SYSTEM ADMINISTRATION AND NETWORKING
INTRODUCTION TO LINUX, OPEN SOURCE DEVELOPMENT, AND GIT
INSIDE ANDROID: AN INTRO TO ANDROID INTERNALS
OPTIMIZING LINUX DEVICE DRIVERS FOR POWER EFFICIENCY
LINUX KERNEL DEBUGGING AND SECURITY
INTRODUCTION TO LINUX
INTRODUCTION TO CLOUD INFRASTRUCTURE TECHNOLOGIES
LINUX NETWORKING AND ADMINISTRATION
LINUX SECURITY FUNDAMENTALS
OPENSTACK ADMINISTRATION FUNDAMENTALS
SOFTWARE DEFINED NETWORKING FUNDAMENTALS
FUNDAMENTALS OF LINUX
 MCAFEE  McAfee® Drive Encryption
McAfee® Endpoint Encryption Essentials
MCAFEE® NETWORK DATA LOSS PREVENTION
McAfee® VirusScan and ePolicy Orchestrator
McAfee® Advanced Threat Defense
McAfee® Host Intrusion Prevention
McAfee® Database Security
MCAFEE® NETWORK SECURITY PLATFORM
MCAFEE WEB GATEWAY ADMINISTRATION
MCAFEE THREAT INTELLIGENCE EXCHANGE ADMINISTRATION
MCAFEE POLICY AUDITOR ADMINISTRATION
MCAFEE® SECURITY INFORMATION EVENT MANAGEMENT (SIEM) ADMINISTRATION COURSE 101
MCAFEE ADVANCED THREAT DEFENSE
MCAFEE DATABASE SECURITY
McAfee Email Gateway
MCAFEE ENTERPRISE MOBILITY MANAGEMENT ESSENTIALS
McAfee Endpoint Encryption(PC&MAC)
MCAFEE SIEM
MCAFEE WEB GATEWAY
 MICROSOFT NETWORK SECURITY PLATFORM ESSENTIALS
VIRUSSCAN ENTERPRISE
MICROSOFT INSTALLING AND CONFIGURING WINDOWS
DEPLOYING AND MANAGING WINDOWS USING ENTERPRISE SERVICES
INSTALLING AND CONFIGURING WINDOWS® CLIENT
TROUBLESHOOTING AND SUPPORTING WINDOWS® IN THE ENTERPRISE
PLANNING AND MANAGING WINDOWS® DESKTOP DEPLOYMENTS AND ENVIRONMENTS
DEPLOYING WINDOWS DESKTOPS AND ENTERPRISE APPLICATIONS
SUPPORTING AND TROUBLESHOOTING WINDOWS
NETWORKING FUNDAMENTALS
SECURITY FUNDAMENTALS
OVERVIEW OF ACTIVE DIRECTORY RIGHTS MANAGEMENT SERVICES WITH WINDOWS SERVER
CONFIGURING AND TROUBLESHOOTING WINDOWS SERVER® ACTIVE DIRECTORY® DOMAIN SERVICES
CONFIGURING AND TROUBLESHOOTING IDENTITY AND ACCESS SOLUTIONS WITH WINDOWS SERVER® ACTIVE DIRECTORY®
CONFIGURING AND TROUBLESHOOTING A WINDOWS SERVER® NETWORK INFRASTRUCTURE
CONFIGURING WINDOWS®
SUPPORTING WINDOWS®
 NOVELL SERVICE DESK: SERVICE MANAGEMENT
SECURING WINDOWS WORKSTATIONS USING ZENWORKS ENDPOINT SECURITY MANAGEMENT
PENETRATION TESTINGWITH KALI LINUX
ADVANCED WINDOWS EXPLOITATION
 OFFENSIVE SECURITY OFFENSIVE SECURITY WIRELESS ATTACKS (WIFU)
CRACKING THE PERIMETER (CTP)
ADVANCED WEB ATTACKS AND EXPLOITATION
METASPLOIT UNLEASHED
OFFENSIVE SECURITY PENETRATIONTESTING LAB
 ORACLE ORACLE SECURITY ADMINISTRATION
ORACLE DATABASE: MANAGING SECURITY
USER SECURITY AND AUDITING IN ORACLE DATABASE
ORACLE DATABASE: INTRODUCTION TO DATABASE SECURITY AND SOLUTIONS
ORACLE DATABASE: DATABASE SECURITY
ORACLE DATABASE: BASIC USER AND STRONG AUTHENTICATION
ORACLE DATABASE: ENTERPRISE USER SECURITY AND PROXY AUTHENTICATION
ORACLE DATABASE: PRIVILEGES, ROLES, AND APPLICATION CONTEXTS
ORACLE DATABASE: ORACLE NET SERVICES AND LISTENER SECURITY
ORACLE DATABASE: FIREWALLS, ORACLE CONNECTION MANAGER, AND SQL*PLUS SECURITY
ORACLE DATABASE: ORACLE PARTITIONING AND SECURITY FEATURES
ORACLE DATABASE: STORAGE STRUCTURES AND USER SECURITY
 PALO ALTO FIREWALL: INSTALL, CONFIGURE, AND MANAGE
FIREWALL: CONFIGURE EXTENDED FEATURES
PANORAMA: MANAGE MULTIPLE FIREWALLS
FIREWALL: MANAGE CYBERTHREATS
FIREWALL: DEBUG AND TROUBLESHOOT
 PCI TRAPS: INSTALL, CONFIGURE AND MANAGE
QUALIFIED SECURITY ASSESSOR (QSA)™ QUALIFICATION
 RED HAT RED HAT SERVER HARDENING
RED HAT ENTERPRISE LINUX DIAGNOSTICS AND TROUBLESHOOTING
 RIVERBED OPTIMIZING ENTERPRISE APPLICATIONS AND PROTOCOLS
IMPLEMENTING ENTERPRISE OPTIMIZATION ARCHITECTURES
APPLICATION PERFORMANCE MANAGEMENT ESSENTIALS
NETWORK PERFORMANCE MANAGEMENT ESSENTIALS
NETWORK PLANNING AND CONFIGURATION MANAGEMENT ESSENTIALS
MODELER SUITE ESSENTIALS
STORAGE DELIVERY ESSENTIALS
HYPER CONVERGED BRANCH IMPLEMENTATION SOLUTIONS
 SABSA SABSA FOUNDATION
SABSA ADVANCED SABSA RISK ASSURANCE & GOVERNANCE
SABSA ADVANCED SABSA ARCHITECTURE & DESIGN
 SANS NETWARS – TOURNAMENT
NETWARS: CONTINUOUS
HOSTED: CRITICAL INFRASTRUCTURE AND CONTROL SYSTEM CYBERSECURITY
HOSTED: EMBEDDED DEVICE SECURITY ASSESSMENTS FOR THE REST OF US
HOSTED: (ISC)² CERTIFIED SECURE SOFTWARE LIFECYCLE PROFESSIONAL (CSSLP) CBK EDUCATION PROGRAM
HOSTED: OFFENSIVE COUNTERMEASURES: THE ART OF ACTIVE DEFENSES
HOSTED: PHYSICAL SECURITY SPECIALIST – FACILITIES EDITION
HOSTED: PHYSICAL PENETRATION TESTING – INTRODUCTION
AUDITING & MONITORING NETWORKS, PERIMETERS & SYSTEMS
IMPLEMENTING AND AUDITING THE CRITICAL SECURITY CONTROLS – IN-DEPTH
CRITICAL SECURITY CONTROLS: PLANNING, IMPLEMENTING AND AUDITING
TOP 4 MITIGATION STRATEGIES: IMPLEMENTING & AUDITING
DEFENDING WEB APPLICATIONS SECURITY ESSENTIALS
SECURE CODING IN JAVA/JEE: DEVELOPING DEFENSIBLE APPLICATIONS
SECURE CODING IN C & C++
SECURE CODING IN .NET: DEVELOPING DEFENSIBLE APPLICATIONS
WINDOWS FORENSIC ANALYSIS
ADVANCED COMPUTER FORENSIC ANALYSIS AND INCIDENT RESPONSE
MAC FORENSIC ANALYSIS
CYBER THREAT INTELLIGENCE
MEMORY FORENSICS IN-DEPTH
ADVANCED NETWORK FORENSICS AND ANALYSIS
ADVANCED SMARTPHONE AND MOBILE DEVICE FORENSICS
REVERSE-ENGINEERING MALWARE: MALWARE ANALYSIS TOOLS AND TECHNIQUES
ICS ACTIVE DEFENSE AND INCIDENT RESPONSE
ICS/SCADA SECURITY ESSENTIALS
ESSENTIALS FOR NERC CRITICAL INFRASTRUCTURE PROTECTION
CRITICAL INFRASTRUCTURE PROTECTION
SANS +S TRAINING PROGRAM FOR THE CISSP® CERTIFICATION EXAM
A PRACTICAL INTRODUCTION TO RISK ASSESSMENT
SECURING THE HUMAN: HOW TO BUILD, MAINTAIN AND MEASURE A HIGH-IMPACT AWARENESS
SANS SECURITY LEADERSHIP ESSENTIALS FOR MANAGERS WITH KNOWLEDGE COMPRESSION
IT SECURITY STRATEGIC PLANNING, POLICY AND LEADERSHIP
INCIDENT RESPONSE TEAM MANAGEMENT
 SYMANTEC LAW OF DATA SECURITY AND INVESTIGATIONS
INTRO TO INFORMATION SECURITY
SECURITY ESSENTIALS BOOTCAMP STYLE
CRITICAL SECURITY CONTROLS: PLANNING, IMPLEMENTING AND AUDITING
TOP 4 MITIGATION STRATEGIES: IMPLEMENTING & AUDITING
ADVANCED SECURITY ESSENTIALS – ENTERPRISE DEFENDER
PERIMETER PROTECTION IN-DEPTH
INTRUSION DETECTION IN-DEPTH
HACKER TOOLS, TECHNIQUES, EXPLOITS AND INCIDENT HANDLING
SECURING WINDOWS WITH THE CRITICAL SECURITY CONTROLS
SECURING LINUX/UNIX
CONTINUOUS MONITORING AND SECURITY OPERATIONS
CLOUD SECURITY FUNDAMENTALS
WEB APP PENETRATION TESTING AND ETHICAL HACKING
IPV6 ESSENTIALS
ACTIVE DEFENSE, OFFENSIVE COUNTERMEASURES AND CYBER DECEPTION
NETWORK PENETRATION TESTING AND ETHICAL HACKING
INTENSE HANDS-ON PEN TESTING SKILL DEVELOPMENT (WITH SANS NETWARS)
CYBERCITY HANDS-ON KINETIC CYBER RANGE EXERCISE
IMPLEMENTING AND AUDITING THE CRITICAL SECURITY CONTROLS – IN-DEPTH
PYTHON FOR PENETRATION TESTERS
MOBILE DEVICE SECURITY AND ETHICAL HACKING
VIRTUALIZATION AND PRIVATE CLOUD SECURITY
METASPLOIT KUNG FU FOR ENTERPRISE PEN TESTING
WIRELESS ETHICAL HACKING, PENETRATION TESTING, AND DEFENSES
ADVANCED WEB APP PENETRATION TESTING AND ETHICAL HACKING
ADVANCED PENETRATION TESTING, EXPLOIT WRITING, AND ETHICAL HACKING
ADVANCED EXPLOIT DEVELOPMENT FOR PENETRATION TESTERS
SPECIAL: HACKER GUARD: THREAT UPDATE
SPECIAL: COMPLIANCE TRAINING AND SECURING THE HUMAN
SPECIAL: SECURITY AWARENESS TRAINING FOR ELECTRIC ENTITIES
SPECIAL: SPECIAL FOR HIMSS – IMPLEMENTING HEALTHCARE CYBER-HYGIENE WITH THE CRITICAL SECURITY CONTROLS
SPECIAL: INTRODUCTION TO MALWARE ANALYSIS: HANDS-ON AND TECHNICAL
SYMANTEC ADVANCED THREAT PROTECTION 2.X: INCIDENT RESPONSE
ENDPOINT PROTECTION: ADMINISTRATION
ENDPOINT PROTECTION: MAINTAIN AND TROUBLESHOOT
ENDPOINT PROTECTION: INSTALL, CONFIGURE, AND DEPLOY
ENDPOINT PROTECTION: MANAGE AND ADMINISTER
MANAGED PKI
PATCH MANAGEMENT
RISK AUTOMATION SUITE
SERVICE DESK ADMINISTRATION
VALIDATION AND ID PROTECTION (VIP)

Important Note: PC Professor makes no claim to any of the registered trademarks used above.  Nor, unless otherwise specified in writing, does PC Professor claim to be an authorized vendor, trainer, partner or service provider for any of the companies, services, testing services, hardware, software or products mentioned herein.   Not all certification-preparatory classes and/or certification exams are offered at PC Professor nor is this list intended to imply State licensure, scheduled classes, vendor authorization, affiliation, trademark claim, partnership or endorsement of any type.

Contact a PC Professor Admissions Rep today to discuss the enrollment process.

Boca Raton: (561) 750-7879 or West Palm Beach: (561) 684-3333

Share This!