Virtual Instructor-Led Training
Get certified or simply improve your skills with our virtual Instructors.
Categories
- Agile
- AI/ML
- All Courseware
- Application & Infrastructure
- Application and Infrastructure
- Business Analysis
- Cloud
- Data & Analytics
- Design Multimedia
- Developer
- DevOps
- Dynamics
- End User Application
- IT Service Management
- Leadership & Professional Development
- Modern Workplace
- Networking & Wireless
- Networking and Wireless
- Office Applications
- Programming
- Project Management
- Security
- Uncategorized
- Virtualization
- Workplace Fundamentals
Vendors
- Adobe
- Agile
- Amazon
- APMG
- Business Analysis
- Business Process
- CertNexus
- Cisco
- CMMC
- CompTIA
- Crystal Reports
- CyberSecurity Professionals
- Deep-Dive
- Development
- DevOps Institute
- EC-Council
- Fundamentals
- ISACA
- ISC2
- itSM
- Java
- JavaScript
- Leadership & Professional Development
- Microsoft
- Microsoft Apps
- Microsoft Technical
- PeopleCert
- PMI
- Project Management
- Python
- Red Hat
- SAP
- Scrum
- ScrumMaster
- SHRM
- Six Sigma
- Tableau
- TCM Security
- United Training
- VMware
- Web Development
- Workplace Fundamentals
Security
CertNexus
Cyber threats are constant—and escalating. To defend networks and critical assets, today’s IT professionals need more than just awareness—they need structured, tested methods to detect, respond, and recover. The average breach costs $4.45 million—making fast, skilled response more critical than ever.
The CyberSec First Responder (CFR) course from CertNexus equips practitioners with the skills to assess risk, monitor for intrusions, analyze threats, and respond to incidents in real time. Built around leading frameworks like NIST 800-61r2 and PPD-41, this 5-day course prepares learners to protect information systems and carry out Defensive Cyber Operations (DCO) effectively.
This course also prepares candidates for the CFR-410 certification exam, validating their ability to detect, contain, analyze, and recover from cybersecurity incidents across modern network environments.
- 5 Days Course
- Live Virtual
$3,495.00CertNexus
This course covers network defense and incident response methods, tactics, and procedures that are in alignment with industry frameworks such as NIST 800-61r2 (Computer Security Incident Handling Guide), US-CERT’s National Cyber Incident Response Plan (NCIRP), and Presidential Policy Directive (PPD)-41 on Cyber Incident Coordination, NIST 800.171r2 (Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations). It is ideal for candidates who have been tasked with the responsibility of monitoring and detecting security incidents in information systems and networks, and for executing standardized responses to such incidents. The course introduces tools, tactics, and procedures to manage cybersecurity risks, defend cybersecurity assets, identify various types of common threats, evaluate the organization’s security, collect and analyze cybersecurity intelligence, and remediate and report incidents as they occur. This course provides a comprehensive methodology for individuals responsible for defending the cybersecurity of their organization.
This course is designed to assist students in preparing for the CertNexus CyberSec First Responder (Exam CFR-410) certification examination. What you learn and practice in this course can be a significant part of your preparation.
Purchase of this course includes the associated exam voucher.- 5 Days Course
- Live Virtual
$3,495.00EC-Council
CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so you will be better positioned to setup your security infrastructure and defend against future attacks. An understanding of system weaknesses and vulnerabilities helps organizations strengthen their system security controls to minimize the risk of an incident. CEH was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to achieve the CEH credential. You will be exposed to an entirely different posture toward the responsibilities and measures required to be secure. Now in its 12th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies.- 5 Days Course
- Live Virtual
$3,495.00EC-Council
Certified Network Defender (CND) is a vendor-neutral, hands-on, instructor-led comprehensive network security certification training program. It is a skills-based, lab intensive program based on a job-task analysis and cybersecurity education framework presented by the National Initiative of Cybersecurity Education (NICE). The course has also been mapped to global job roles and responsibilities and the Department of Defense (DoD) job roles for system/network administrators. The course is designed and developed after extensive market research and surveys.- 5 Days Course
- Live Virtual
$3,495.00EC-Council
The CSCU program is designed to educate students on the safe operation of computers, devices, and networks by focusing on the more practical aspects of networking and security, allowing them to expand their skills. Students will develop a fundamental understanding of computer, device, and network security issues, including identity theft, credit card fraud, online banking phishing scams, malware, loss of sensitive information, and social engineering. This certification is an excellent complement to educational offerings for knowledge workers and end-users interested in becoming secure power users.- 2 Days Course
- Live Virtual
$1,095.00EC-Council
Do you possess an analytical mind? Is critical thinking a part of who you are? Then you’ve come to the right place. A Certified Threat Intelligence Analyst (CTIA) acts as a force multiplier for organizations looking to reinforce their cyber defense security measures. Threat intelligence is akin to what conventional intelligence agencies across the world engage in to perceive and neutralize threats before any harm can be done. As a certified threat intelligence analyst, you’ll be at the vanguard of your organization’s cybersecurity ecosystem, keeping a 360 degree vigil on existing and foreseen/unforeseen threats. The Certified Threat Intelligence Analyst (CTIA) program is designed and developed in collaboration with cybersecurity and threat intelligence experts across the globe. The aim is to help organizations hire qualified cyber intelligence trained professionals to identify and mitigate business risks by converting unknown internal and external threats into quantifiable threat entities and stop them in their tracks. Much like a ‘hunter-killer’ team, you’ll be deployed as a ‘Blue Team’ operative, tasked with threat identification, and asked to employ the tools at hand to thwart active and potential cyberattacks.- 3 Days Course
- Live Virtual
$2,097.00EC-Council
EC-Council’s C|HFI program prepares cybersecurity professionals with the knowledge and skills to perform effective digital forensics investigations and bring their organization into a state of forensic readiness. Establishing the forensics process, lab, evidence handling procedures, and investigation techniques are required to validate/triage incidents and point the incident response teams in the right direction. Forensic readiness is crucial as it can differentiate between a minor incident and a major cyber-attack that brings a company to its knees.
This intense hands-on digital forensics program immerses students in over 68 forensic labs, working on crafted evidence files utilizing the tools of the world’s top digital forensics professionals. Students will go beyond traditional hardware and memory forensics, covering current topics in cloud forensics, mobile and IoT, and investigating web application attacks and malware forensics. The C|HFI presents a methodological approach to computer forensics, including searching and seizing, chain-of-custody, acquisition, preservation, analysis, and reporting of digital evidence. Students learn various forensic investigation techniques and standard forensic tools. As they learn how to acquire and manage evidence through various operating environments, students also learn the chain of custody and legal procedures required to preserve evidence and ensure it is admissible in court, enabling the eventual prosecution of cyber criminals and containing liability on the victim organization.
- 5 Days Course
- Live Virtual
$3,495.00Cisco
Is your network access policy protecting your data—or blocking your users?
Up to 70% of organizations say they lack full visibility into who’s accessing their systems—opening the door to both security risks and productivity gaps. The Implementing and Configuring Cisco Identity Services Engine (SISE) Training Course gives you the skills to fix that. You’ll learn to deploy Cisco ISE v3.x and enforce identity-based policies across wired, wireless, and VPN networks. Through expert instruction and hands-on labs, you’ll configure guest portals, BYOD onboarding, device profiling, posture checks, and TrustSec controls.
This course also prepares you for the SISE v4.0 certification exam, helping you validate your expertise in Cisco ISE deployment, configuration, and troubleshooting as part of a Zero Trust strategy.
- 5 Days Course
- Live Virtual
$3,995.00CertNexus
The Internet of Things (IoT) allows organization to collect an extraordinary volume of data and new analysis tools can enable you to use this data to make well-informed decisions to be made quickly. But before you can successfully plan and implement an IoT solution, you must understand the various factors that will drive your decisions. Putting IoT systems into place can be a complicated proposition with unique considerations distinctly different from traditional IT solutions. This course will familiarize you with IoT components, understand the challenges that you may face, and make design decisions about your IoT projects. This course prepares students for taking the CertNexus® IoTBIZ Credential (IOZ-110). This course includes a FREE exam voucher for IOZ-110.- 0.5 Course
- Live Virtual
$350.00Microsoft Technical
Did you know that 73% of IT professionals say identity management is their most complex challenge, yet only 12% feel truly confident managing it? That confidence gap represents both the biggest obstacle and the greatest opportunity in your IT career. In this course, you’ll bridge that gap by mastering the four critical pillars that separate overwhelmed administrators from confident Microsoft 365 Administrator Essentials experts.
This comprehensive course covers the essential elements every administrator must master: strategic tenant management that scales with your organization, seamless identity synchronization that connects your hybrid environment, robust security frameworks that stop threats before they start, and compliance management that keeps auditors smiling and executives sleeping soundly.
This course is essential for professionals pursuing the Microsoft 365 Certified: Administrator Expert credential.
- 5 Days Course
- Live Virtual
$2,975.00 – $2,995.00itSM
The NCSP® 800-53 Specialist looks at the impact of adapting a principled approach to enterprise risk management framework to better support cybersecurity decisions within the context of the NIST 800-53 informative reference. It guides students on the best approach to adapt, implement, and operate (AIO) a comprehensive cybersecurity program that integrates into existing organizational capabilities incorporating NIST 800-53. Study includes lectures, informative supplemental reference materials, workshops, and a formal examination – workshops are a critical aspect of the course and develop examinable material. Accredited through APMG International, certified in the UK by the National Cyber Security Centre (NCSC) and listed as qualified cyber training by Department of Homeland Security Cybersecurity and Infrastructure Security Agency (DHS CISA) in the US, the NIST Cyber Security Professional (NCSP®) training program teaches individuals and organizations how to engineer, operationalize and continually improve a NIST Cyber Security Framework (NIST-CSF) Program.- 5 Days Course
- Live Virtual
$3,655.00itSM
Accredited through APMG International, certified in the UK by the National Cyber Security Centre (NCSC) and listed as qualified cyber training by Department of Homeland Security Cybersecurity and Infrastructure Security Agency (DHS CISA) in the USA, the NIST Cyber Security Professional (NCSP®) training program teaches individuals and organizations how to engineer, operationalize and continually improve a NIST Cybersecurity Framework program. This NCSP® Foundation Certificate course is designed to teach IT, Business and Cybersecurity professionals the fundamentals of digital transformation, cyber security risk management and the NIST Cybersecurity Framework (NIST-CSF). Accredited through APMG International, certified in the UK by the National Cyber Security Centre (NCSC) and listed as qualified cyber training by Department of Homeland Security Cybersecurity and Infrastructure Security Agency (DHS CISA) in the US, the NIST Cyber Security Professional (NCSP®) training program teaches individuals and organizations how to engineer, operationalize and continually improve a NIST Cyber Security Framework (NIST-CSF) Program.- 2 Days Course
- Live Virtual
$2,010.00