CYBERSECURITY FUNDAMENTALS

Build your cybersecurity career on a solid foundation.

Microsoft Security, Compliance and Identity Fundamentals

By the end of this course, you’ll gain skills in: 

  • Describe basic concepts of security, compliance, and identity. 
  • Describe the concepts and capabilities of Microsoft identity and access management solutions. 
  • Describe the capabilities of Microsoft security solutions. 
  • Describe the compliance management capabilities in Microsoft. 

This 1-day course is intended for those looking to familiarize themselves with the fundamentals of security, compliance, and identity (SCI) across cloud-based and related Microsoft services. 

Learn More

 

CompTIA® Security+

This 5-day course is aimed at those with job responsibilities that include securing network services, devices, and traffic in your organization. 

By the end of this course, you’ll gain skills in: 

  • Identify the fundamental components of information security. 
  • Analyze risk. 
  • Identify various threats to information security. 
  • Conduct security assessments to detect vulnerabilities. 
  • Implement security for hosts and software. 
  • And much more.  
Learn More

 

Cisco Security Essentials v1.0 

This 2-day course will provide you essential insight about various security threats and the solutions offered by different vendors, for different business models, and throws light on where the security domain is moving towards in future. 

By the end of this course, you’ll gain skills in: 

  • Understanding the need for security 
  • Exploring various perspectives of security 
  • Exploring the security solutions offered in the market 
  • Insight on future of security 
Learn More

 

CBROPS: Understanding Cisco Cybersecurity Operations Fundamentals v1.0

The Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) v1.0 course teaches you security concepts, common network and application operations and attacks, and the types of data needed to investigate security incidents. This course teaches you how to monitor alerts and breaches, and how to understand and follow established procedures for response to alerts converted to incidents.

By the end of this course, you’ll gain skills in: 

  • Learn basics of Security and understand about Vulnerabilities and how defense technologies like Anti-Virus, Firewall work.
  • Understand how all the Latest Attacks are carried out with DEMOS. This will help the attendees to be more aware on the current threats and Risk.
  • Learn on how hackers manipulate and turn their mind and data against them for a successful attack.
  • Learn on different social engineering attacks including Facebook based attacks with DEMOS and Best practices on how to be aware and secure from these attacks.
  • Learn on importance of Strong Passwords and how wrong password usage opens up for data theft resulting in Identity theft and compromise with DEMOS.
Learn More

 

CSAU: Certified Security Aware User

It ensures that your users are aware that they are a target; it motivates and changes behavior by teaching them how to use technology securely and ensures your organization remains compliant. In addition, by teaching your users the indicators of compromise and how to report incidents, you go beyond just prevention and begin developing human sensors, creating a far more resilient organization.

By the end of this course, you’ll gain skills in: 

  • Learn basics of Security and understand about Vulnerabilities and how defense technologies like Anti-Virus, Firewall work
  • Understand how all the Latest Attacks are carried out with DEMOS. This will help the attendees to be more aware on the current threats and Risk
  • Learn on how hackers manipulate and turn their mind and data against them for a successful attack
  • Learn on different social engineering attacks including Facebook based attacks with DEMOS and Best practices on how to be aware and secure from these attacks
  • Learn on importance of Strong Passwords and how wrong password usage opens up for data theft resulting in Identity theft and compromise with DEMOS
Learn More

 

AWS-SE: AWS Security Essentials

This course covers fundamental AWS cloud security concepts, including AWS access control, data encryption methods, and how network access to your AWS infrastructure can be secured. We will address your security responsibilities in the AWS cloud and provide a brief introduction to the different security-oriented AWS services available.

By the end of this course, you’ll gain skills in: 

  • Assimilate Identify security benefits and responsibilities of using the AWS Cloud
  • Describe the access control and management features of AWS
  • Explain the available methods to encrypting data at rest and in transit
  • Describe how to secure network access to your AWS resources
  • Determine which AWS services can be used for monitoring and incident response
Learn More

© 2021 TRAINOCATE MALAYSIA SDN BHD. ALL RIGHTS RESERVED

CONNECT WITH US