CYBERSECURITY ENGINEER
Be empowered to secure your organization against serious cyber threats.
CCSP - Certified Cloud Security Professional
Gain insight from industry experts who understand the essentials and requirements of Cybersecurity. Get the most out of our trainings through the learning activities and real-world scenarios as case studies.
By the end of this course, you’ll gain skills in:
|
SSCP - Systems Security Certified Practitioner
Join 5-day this SSCP certification course which will provide you with in-depth coverage on the skills and concepts in the seven domains of systems security including Access Controls, Security Operations and Administration, Incident Response, Cryptography and Network Security among others.
By the end of this course, you’ll gain skills in:
|
Rocheston Certified Cybersecurity Engineer - Level 1
This RCCE® Level 1 course takes a deep dive into the fundamentals of cybersecurity along with hands-on labs. You will gain an insight into hacking technologies and tools. Level 1 covers the foundation of hacking technologies such as Web application attacks, Trojans and Malware, Denial of Service attacks, metasploit, firewalls, cryptography, cracking passwords, hacking the cloud and much more.
By the end of this course, you’ll gain skills in:
|
Rocheston Certified Cybersecurity Engineer - Level 2
This course is intended for individuals wanting to master hacking technologies and tools. The course provides you with detailed knowledge as well as hands-on labs. The Level 2 program covers advanced futuristic hacking tools such as advanced blockchain exploits, quantum computing and cryptography, advanced ransomware and cryptojacking, and much more.
By the end of this course, you’ll gain skills in:
|
Red Hat Certified Specialist in Server Security and Hardening
This course aims at building upon an individuals Red Hat Certified Engineer (RHCE®) certification or equivalent experience to teach how to secure a Red Hat Enterprise Linux® system to comply with security policy requirements. Many security policies and standards require systems administrators to address specific user authentication concerns, application of updates, system auditing and logging, file system integrity, and more. Red Hat Server Hardening provides strategies for addressing specific policy and configuration concerns.
By the end of this course, you’ll gain skills in:
|
Microsoft Identity and Access Administrator
The Microsoft Identity and Access Administrator course provides IT Identity and Access Professional, along with IT Security Professional, with the knowledge and skills that individuals might require for the implementation of identity management solutions based on Microsoft Azure AD, and it connected identity technologies. This course includes identity content for Azure AD, enterprise application registration, conditional access, identity governance, and other identity tools.
By the end of this course, you’ll gain skills in:
|
AWS-SEC: Security Engineering on AWS
This course demonstrates how to efficiently use AWS security services to stay secure in the AWS Cloud. The course focuses on the security practices that AWS recommends for enhancing the security of your data and systems in the cloud. The course highlights the security features of AWS key services including compute, storage, networking, and database services.
By the end of this course, you’ll gain skills in:
© 2021 TRAINOCATE MALAYSIA SDN BHD. ALL RIGHTS RESERVED