Information Technology Program

ISO/IEC 27035 Lead Incident Manager

Course Information

Overview

ISO/IEC 27035 Lead Incident Manager training enables you to acquire the necessary expertise to support an organization in implementing an Information Security Incident Management plan based on ISO/IEC 27035. During this training course, you will gain a comprehensive knowledge of a process model for designing and developing an organizational incident management plan. The compatibility of this training course with ISO/IEC 27035 also supports the ISO/IEC 27001 by providing guidance for Information Security Incident Management. After mastering all the necessary concepts of Information Security Incident Management, you can sit for the exam and apply for a “PECB Certified ISO/IEC 27035 Lead Incident Manager” credential. By holding a PECB Lead Incident Manager Certificate, you will be able to demonstrate that you have the practical knowledge and professional capabilities to support and lead a team in managing Information Security Incidents.

CCNA Collaboration

Course Information

Overview

The exams and training courses for CCNA Video and CCNA Voice certification have evolved to CCNA Collaboration
certification. This document provides a summary of the topics that have been removed, as well as the incremental topics
that have been added from CCNA Video and CCNA Voice to CCNA Collaboration.

The CCNA Collaboration certification reflects the convergence of voice and video currently taking place in the IT world.
This new certification tests the knowledge and skills expected of today’s in-demand collaboration professionals.

A candidate is required to pass the following two exams to obtain a CCNA Collaboration certification:
 
210-060 (CICD) Implementing Cisco Collaboration Devices 
210-065 (CIVND)  Implementing Cisco Video Network Devices 
 

Domain Comparison of CCNA Video with CCNA Collaboration 

Candidates holding an active CCNA Video certification will have completed the requirements needed to earn a CCNA
Collaboration certification. However, the existing recertification period applies. For example, if your CCNA Video
certification is scheduled for recertification, you must recertify as a CCNA Collaboration candidate before your CCNA
Video certification lapses.

Minor updates to domain topics, as well as to hardware and software, have been made to the previous (VIVND)
curriculum, and these are reflected in the new CIVND content and exam. The tables below highlight the updates.
Candidates are encouraged to pay special attention to the updated portions of the curriculum before attempting to take
the new exams.

 

  

TOGAF 9.1 Level 1 & 2

Course Information

Overview

TOGAF® is the foremost generic framework in the field of IS/IT Architecture. It contains substantial guidance on what to do to establish an architecture practice and then how to use it in connection with planning the longer-term transformation of the enterprise (strategic architecture), and designing capabilities to support it.

The TOGAF® accredited course examines how practitioners can base their activities on a solid set of processes. It looks at the framework as a whole, including the numerous techniques to assist in organising, governing and now in the latest version, describing architecture. The recommendations on how to adapt the framework to deal with issues such as Security and Service-oriented Architecture are also covered. The course also spans the Learning Points required to take the combined TOGAF® 9.1 Foundation and Certified exams (Level 1 & 2), and during the course delegates will be helped to prepare for this combined exam.

 

 

Snort IDS/IPS

Course Information

Overview

This five (4) day course is designed to introduce the IT security professional to the world's most effective and widely used Intrusion Detection System (IDS), Snort. When the students complete the course they will have;

 

    (1) a fundamental understanding of the inner architecture of Snort;

 

    (2) an ability to write their own custom Snort rules;

 

    (3) configure Snort to output its alerts to a database for further analysis

 

    (4) tune Snort for optimal performance

 

    (5) how to install and configure Snort as an effective IDS/IPS

 

    (6) choose an appropriate GUI interface for analysis

 

This course will be taught with hand-on labs using Snort in a Debian Linux environment.

Web Application Penetration Testing with Kali Linux

Course Information

Overview

Web applications are getting more intricate by the day due to increasing demand for advanced capabilities. Therefore, from the perspective of security, managing apps is also becoming difficult day by day. Even small cracks and crevices in these web applications have caused various organizations to suffer at the cost of millions of dollars. The OWASP standard is being followed by organizations to cater to the prevalent information security threats. Web application security, specifically, handles security of websites, web services and web applications. At a higher level, web application security outlines principles of application security but it is applied exclusively to Internet and Web systems.

Pages