Back
Cover image
User Avatar

Certfirst

4624 Students
467 Courses

CertFirst, a global integrated knowledge solution company has partnered with leading vendors to provide high quality and effective professional training solutions in the several areas of critical importance to enterprises including Project Management, Open Source, Software and Application Development, Information Security including Biometrics and others.

  • course thumbnail

    Cloud Security – Cyber Security

    10 Weeks
    All levels
    3 Lessons
    0 Quizzes
    132 Students

    Topics Covered Cloud Model Cloud organization Cloud Components  

    $249.00
  • course thumbnail

    Data Protection

    10 Weeks
    All levels
    1 Lesson
    0 Quizzes
    164 Students

    Topics Covered Data in Transit Data in Use Data Retention Data Remnants Destruction Backups -redundancy Purging Wiping  

    $249.00
  • course thumbnail

    Access Control

    10 Weeks
    All levels
    1 Lesson
    0 Quizzes
    158 Students

    Topics Covered Access Control Models Permissions, Rights, Privileges Implicit Deny Access Control Matrix Constrained Interface Content Dependent Control (CDI) Context Dependent Control (UDI) POLP-Principle of Least Privilege Separation Duties Privilege  

    $249.00
  • course thumbnail

    IDM (PAM, IAM)

    10 Weeks
    All levels
    2 Lessons
    0 Quizzes
    260 Students

    Topics Covered Controlling Access to Assets Comparing Identification and Authentication Implementing Identity Management Managing Identity and Access Provisioning Lifecycle Remote Access Security Management VPN with respect to IAM/PAM Information Systems Capabilities Cloud+  

    $249.00
  • course thumbnail

    Security Architecture

    10 Weeks
    All levels
    3 Lessons
    0 Quizzes
    325 Students

    Topics Covered Implement and Manage Engineering Processes using Secure Design Principles Separation of Duties Principle of Least Privilege (POLP) Threat Modeling Methodologies Security Models Minimize Attack Surface Defense in Depth Understand Fundamentals of Security Models Select Controls Based on System Requirements Understand Capabilities of Information Systems Assess and Mitigate Security Vulnerabilities Client Based Systems -Network Essentials Server Based Systems Network Essentials Database Systems 3nf, 2nf, …

    $249.00
  • course thumbnail

    Network Design

    10 Weeks
    All levels
    3 Lessons
    0 Quizzes
    156 Students

    Topics Covered Packet Capture and Replay Packet Sniffer Protocol Analyzers (packet analyzer) Wireshark Who should use Wireshark? Wireshark Demo ➤ Tcpdump Packet sniffer in the cloud Wireshark’s cousin- tshark Tcpreplay Common Networking Protocols DNS Tools-nslookup, dig DNS Record Types Querying multiple servers DNS Poisoning  

    $249.00
  • course thumbnail

    Git and Github

    10 Weeks
    All levels
    1 Lesson
    0 Quizzes
    243 Students

    Topics Covered What is Github? Why is Github important for Linux How to Install Git and create a Github account How does git work? Basic Git commands Quick Example Of Git and GitHub Summary

    $249.00
  • course thumbnail

    Cybersecurity fundamentals – Network Essentials

    10 Weeks
    All levels
    2 Lessons
    0 Quizzes
    128 Students

    Topics Covered is the Internet of Things? How loT relates to IOT, Cloud and Big Data loT devices Smart home, Smart cars Home appliances Medical Devices Drones Industrial Control Systems (ICS) SCADA Systems – RTUs, PLCs Wearables loT Protocols loT Tools OWASP IoT Top 10  

    $249.00
  • course thumbnail

    Kali Linux

    10 Weeks
    All levels
    1 Lesson
    0 Quizzes
    166 Students

    Topics Covered What is Linux? Windows V/s Linux OS Components of Linux OS What is a Linux Distro? What is Kali Linux? Features of Kali Linux Choosing the version and Downloading of Kali Linux Installation of Kali Linux

    $249.00
  • course thumbnail

    Software as a Service

    10 Weeks
    All levels
    1 Lesson
    0 Quizzes
    192 Students

    Topics Covered What is a SaaS Key Differences between SaaS and other models • Common Examples of SaaS SaaS Delivery Official CertCop SaaS Characteristics When to use SaaS SaaS Limitations and Concerns Summary

    $249.00
  • course thumbnail

    Platform as a Service

    10 Weeks
    All levels
    1 Lesson
    0 Quizzes
    160 Students

    Topics Covered What is Platform as a Service What type of Services are offered What are the responsibilities of the Consumer vs. the Cloud Service Provider PaaS Description Examples of PaaS PaaS Delivery Advantages of PaaS When to use PaaS Summary

    $249.00
  • course thumbnail

    Infrastructure as a Service

    10 Weeks
    All levels
    1 Lesson
    0 Quizzes
    258 Students

    Topics Covered What is the laaS laas Delivery laaS Advantages laas Characteristics When to use laas laaS Limitations and Concerns Examples of laaS

    $249.00
  • course thumbnail

    Application Security

    10 Weeks
    All levels
    1 Lesson
    0 Quizzes
    154 Students

    Topics Covered Cloud-Secure Software Development Lifecycle (SDLC) ISO ISO/IEC 27034-1 Standards for Secure Application Identity and Access Management (IAM) Cloud Application Architecture Cloud Application Assurance and Validation

    $249.00
  • course thumbnail

    Cloud Cybersecurity

    10 Weeks
    All levels
    1 Lesson
    0 Quizzes
    149 Students

    Topics Covered Why Cybersecurity CIA Triad NIST Cloud Computing Cloud Security Alliance Cloud Benefits Cloud Models Components of Cloud: Cloud Security Best Practices Firewalls Data in Transit Data at Rest Stateful vs. Stateless Firewalls Intrusion Detection Systems (IDS) Intrusion Prevention Systems (IPS) Next Gen Firewalls Unified Threat Monitoring Vulnerability Scanning Penetration Test in the Cloud Networking Engineering Amazon Web Services Security Azure Security Google Cloud …

    $249.00
  • course thumbnail

    Fedramp System Security Plan (SSP) Control

    10 Weeks
    All levels
    1 Lesson
    0 Quizzes
    271 Students

    Topics Covered What documents are required for initial package submission Why the SSP is one of the essential documents in the Security Package How to properly prepare for writing a SSP and submitting a Security Package How the SSP has organized an its relation to other documents included in the Security Package How to develop clear, concise, consistent, and complete information within each section of …

    $249.00
  • course thumbnail

    Fedramp Continuous Monitoring Strategy

    10 Weeks
    All levels
    1 Lesson
    0 Quizzes
    262 Students

    Topics Covered Roles and Responsibilities within the ConMon Process Expectation for monthly reports all the vulnerabilities within the Plan of Action and Milestones (POA&M) Impact of changes to the cloud service and how to properly address planned and unplanned changes What FedRAMP is looking for when a CSP delivers monthly authenticated scans Tips to Enable Successful and Effective ConMon strategies

    $249.00
  • course thumbnail

    Fedramp Security Assessment Plan

    10 Weeks
    All levels
    0 Lessons
    0 Quizzes
    137 Students

    Topics Covered What is a Security Assessment Plan? Laws, Regulations, Standards, Guidance Applicable Standards to FedRAMP FedRAMP Conops replaced by SAF Authorities for SAF 3PAO Accreditation Standards 3PAO Obligations FedRAMP Security Test Case Workbook Penetration Testing Plan and Methodology 3PAO Supplied Deliverables Penetration Test Rules of Engagement

    $249.00
  • course thumbnail

    Fedramp Best Practices

    10 Weeks
    All levels
    0 Lessons
    0 Quizzes
    254 Students

    Topics Covered FedRAMP process/flowchart Preparation/Authorization/Continuous Monitoring Selecting a FedRAMP 3PAO How to Become a 3PAO/Guidelines Security Testing SAP Template Security Test Procedure Workbooks SAR Template Running Scans Guidelines for CSPS Summary

    $249.00
  • course thumbnail

    FedRAMP

    10 Weeks
    All levels
    3 Lessons
    0 Quizzes
    165 Students

    Topics Covered FedRAMP Disclaimer FedRAMP Introduction FedRAMP Requirements

    $249.00
  • course thumbnail

    Internet of Things

    10 Weeks
    All levels
    1 Lesson
    0 Quizzes
    264 Students

    Topics Covered What is the Internet of Things? How loT relates to IOT, Cloud and Big Data loT devices Smart home, Smart cars Home appliances Medical Devices Drones Industrial Control Systems (ICS) SCADA Systems – RTUs, PLCs Wearables loT Protocols lot Tools OWASP IOT Top 10    

    $249.00
  • course thumbnail

    Purple Team (Red Team Interface with Blue Team)

    10 Weeks
    All levels
    1 Lesson
    0 Quizzes
    195 Students

    Topics Covered Introduction to Purple Team Why is purple teaming important? Traditional Approach Purple Teaming Conducting A Purple Teaming Exercise What Does A Purple Team Do? When Does An Organization Need A Purple Team?  

    $249.00
  • course thumbnail

    Red Team Report Writing (Remediation/Action Plan)

    10 Weeks
    All levels
    1 Lesson
    0 Quizzes
    278 Students

    Topics Covered Introduction to Report Writing Technical Writing Knowing your Audience Types of Reports Controlling Access to Reports Working with Various teams on reports Report Generation Tools Report Template

    $249.00
  • course thumbnail

    Social Engineering

    10 Weeks
    All levels
    1 Lesson
    0 Quizzes
    256 Students

    Topics Covered What is Social Engineering How does Social Engineering Types of Social Engineering Examples of Social Engineering Preventing Social Engineering ❖ Social Engineering Tools  

    $249.00
  • course thumbnail

    Physical Security Penetration Testing

    10 Weeks
    All levels
    1 Lesson
    0 Quizzes
    283 Students

    Topics Covered Physical Security Penetration Testing Reconnaissance in Physical Security Types of Physical Security Controls Lockpicking Door Bypass Under door technique Bump keys Rec sensor bypass Physical Implant- USB Rubber Ducky, Bash Bunny, Bad USB Prox Card Bypass    

    $249.00
  • course thumbnail

    Exploit Frameworks/Exploit Kits

    10 Weeks
    All levels
    3 Lessons
    0 Quizzes
    193 Students

    Topics Covered Intro to Exploits Zero Day Exploit Vulnerabilities CVEs Vulnerabilities vs Exploits Gaining Access Maintaining Access Covering Tracks Intro to Exploit Tools Password Cracking  

    $249.00
  • course thumbnail

    Cloud Penetration Testing

    10 Weeks
    All levels
    1 Lesson
    0 Quizzes
    345 Students

    Topics Covered What Is Cloud Pen Testing What is laas, SaaS, PaaS (Cloud Service Models) Vulnerability Management In Cloud Cloud Pen Testing Tools Penetration Testing In The Cloud: AWS → Penetration Testing In The Cloud: Google Cloud How To Cloud Platforms Get Compromised? Cloud Security Biometrics Security And Cloud  

    $249.00
  • course thumbnail

    Troubleshooting to resolve cloud-related issues.

    10 Weeks
    All levels
    6 Lessons
    0 Quizzes
    179 Students

    Program Objectives Given A Scenario Use Troubleshooting Strategy To Resolve Cloud Issues. Given-A Scenario Troubleshoot Security Issues. Given a Scenario, Troubleshoot Deployment Issues. Given A Scenario Troubleshoot Connectivity Issues. Given A Scenario Troubleshoot Common Performance Issues. Troubleshoot Automation Orchestration Issues.

    $249.00
  • course thumbnail

    Cloud operations and support

    10 Weeks
    All levels
    7 Lessons
    0 Quizzes
    142 Students

    Program Objectives Given a scenario, configure logging, monitoring, and alerting to maintain operational status. Given a scenario, maintain efficient operation of a cloud environment. Given a scenario, optimize cloud environments. Given a scenario, apply proper automation and orchestration techniques. Given A Scenario Apply Appropriate Backup and Restore Operations. Given a Scenario, Perform Disaster Recovery Tasks

    $249.00
  • course thumbnail

    Cloud Deployment

    10 Weeks
    All levels
    6 Lessons
    0 Quizzes
    271 Students

    Program Objectives Given a scenario, integrate components into a cloud solution Given a scenario, provision storage in cloud environments. Given a scenario, deploy cloud networking solutions Given a scenario, configure the appropriate compute sizing for a deployment. Given a scenario, perform cloud migrations.

    $249.00
  • course thumbnail

    Cloud Security

    10 Weeks
    All levels
    10 Lessons
    0 Quizzes
    206 Students

    Program Objectives Given a scenario, configure identity and access management. Given a scenario, secure a network in a cloud environment Given a scenario, apply the appropriate OS and application security controls Given a scenario, apply data security and compliance controls in cloud environments. Given a scenario, implement measures to meet security requirements Explain the importance of incident response procedures.

    $249.00