Certfirst
CertFirst, a global integrated knowledge solution company has partnered with leading vendors to provide high quality and effective professional training solutions in the several areas of critical importance to enterprises including Project Management, Open Source, Software and Application Development, Information Security including Biometrics and others.
Cloud Security – Cyber Security
Topics Covered Cloud Model Cloud organization Cloud Components
$249.00Data Protection
Topics Covered Data in Transit Data in Use Data Retention Data Remnants Destruction Backups -redundancy Purging Wiping
$249.00Access Control
Topics Covered Access Control Models Permissions, Rights, Privileges Implicit Deny Access Control Matrix Constrained Interface Content Dependent Control (CDI) Context Dependent Control (UDI) POLP-Principle of Least Privilege Separation Duties Privilege
$249.00IDM (PAM, IAM)
Topics Covered Controlling Access to Assets Comparing Identification and Authentication Implementing Identity Management Managing Identity and Access Provisioning Lifecycle Remote Access Security Management VPN with respect to IAM/PAM Information Systems Capabilities Cloud+
$249.00Security Architecture
Topics Covered Implement and Manage Engineering Processes using Secure Design Principles Separation of Duties Principle of Least Privilege (POLP) Threat Modeling Methodologies Security Models Minimize Attack Surface Defense in Depth Understand Fundamentals of Security Models Select Controls Based on System Requirements Understand Capabilities of Information Systems Assess and Mitigate Security Vulnerabilities Client Based Systems -Network Essentials Server Based Systems Network Essentials Database Systems 3nf, 2nf, …
$249.00Network Design
Topics Covered Packet Capture and Replay Packet Sniffer Protocol Analyzers (packet analyzer) Wireshark Who should use Wireshark? Wireshark Demo ➤ Tcpdump Packet sniffer in the cloud Wireshark’s cousin- tshark Tcpreplay Common Networking Protocols DNS Tools-nslookup, dig DNS Record Types Querying multiple servers DNS Poisoning
$249.00Git and Github
Topics Covered What is Github? Why is Github important for Linux How to Install Git and create a Github account How does git work? Basic Git commands Quick Example Of Git and GitHub Summary
$249.00Cybersecurity fundamentals – Network Essentials
Topics Covered is the Internet of Things? How loT relates to IOT, Cloud and Big Data loT devices Smart home, Smart cars Home appliances Medical Devices Drones Industrial Control Systems (ICS) SCADA Systems – RTUs, PLCs Wearables loT Protocols loT Tools OWASP IoT Top 10
$249.00Kali Linux
Topics Covered What is Linux? Windows V/s Linux OS Components of Linux OS What is a Linux Distro? What is Kali Linux? Features of Kali Linux Choosing the version and Downloading of Kali Linux Installation of Kali Linux
$249.00Software as a Service
Topics Covered What is a SaaS Key Differences between SaaS and other models • Common Examples of SaaS SaaS Delivery Official CertCop SaaS Characteristics When to use SaaS SaaS Limitations and Concerns Summary
$249.00Platform as a Service
Topics Covered What is Platform as a Service What type of Services are offered What are the responsibilities of the Consumer vs. the Cloud Service Provider PaaS Description Examples of PaaS PaaS Delivery Advantages of PaaS When to use PaaS Summary
$249.00Infrastructure as a Service
Topics Covered What is the laaS laas Delivery laaS Advantages laas Characteristics When to use laas laaS Limitations and Concerns Examples of laaS
$249.00Application Security
Topics Covered Cloud-Secure Software Development Lifecycle (SDLC) ISO ISO/IEC 27034-1 Standards for Secure Application Identity and Access Management (IAM) Cloud Application Architecture Cloud Application Assurance and Validation
$249.00Cloud Cybersecurity
Topics Covered Why Cybersecurity CIA Triad NIST Cloud Computing Cloud Security Alliance Cloud Benefits Cloud Models Components of Cloud: Cloud Security Best Practices Firewalls Data in Transit Data at Rest Stateful vs. Stateless Firewalls Intrusion Detection Systems (IDS) Intrusion Prevention Systems (IPS) Next Gen Firewalls Unified Threat Monitoring Vulnerability Scanning Penetration Test in the Cloud Networking Engineering Amazon Web Services Security Azure Security Google Cloud …
$249.00Fedramp System Security Plan (SSP) Control
Topics Covered What documents are required for initial package submission Why the SSP is one of the essential documents in the Security Package How to properly prepare for writing a SSP and submitting a Security Package How the SSP has organized an its relation to other documents included in the Security Package How to develop clear, concise, consistent, and complete information within each section of …
$249.00Fedramp Continuous Monitoring Strategy
Topics Covered Roles and Responsibilities within the ConMon Process Expectation for monthly reports all the vulnerabilities within the Plan of Action and Milestones (POA&M) Impact of changes to the cloud service and how to properly address planned and unplanned changes What FedRAMP is looking for when a CSP delivers monthly authenticated scans Tips to Enable Successful and Effective ConMon strategies
$249.00Fedramp Security Assessment Plan
Topics Covered What is a Security Assessment Plan? Laws, Regulations, Standards, Guidance Applicable Standards to FedRAMP FedRAMP Conops replaced by SAF Authorities for SAF 3PAO Accreditation Standards 3PAO Obligations FedRAMP Security Test Case Workbook Penetration Testing Plan and Methodology 3PAO Supplied Deliverables Penetration Test Rules of Engagement
$249.00Fedramp Best Practices
Topics Covered FedRAMP process/flowchart Preparation/Authorization/Continuous Monitoring Selecting a FedRAMP 3PAO How to Become a 3PAO/Guidelines Security Testing SAP Template Security Test Procedure Workbooks SAR Template Running Scans Guidelines for CSPS Summary
$249.00Internet of Things
Topics Covered What is the Internet of Things? How loT relates to IOT, Cloud and Big Data loT devices Smart home, Smart cars Home appliances Medical Devices Drones Industrial Control Systems (ICS) SCADA Systems – RTUs, PLCs Wearables loT Protocols lot Tools OWASP IOT Top 10
$249.00Purple Team (Red Team Interface with Blue Team)
Topics Covered Introduction to Purple Team Why is purple teaming important? Traditional Approach Purple Teaming Conducting A Purple Teaming Exercise What Does A Purple Team Do? When Does An Organization Need A Purple Team?
$249.00Red Team Report Writing (Remediation/Action Plan)
Topics Covered Introduction to Report Writing Technical Writing Knowing your Audience Types of Reports Controlling Access to Reports Working with Various teams on reports Report Generation Tools Report Template
$249.00Social Engineering
Topics Covered What is Social Engineering How does Social Engineering Types of Social Engineering Examples of Social Engineering Preventing Social Engineering ❖ Social Engineering Tools
$249.00Physical Security Penetration Testing
Topics Covered Physical Security Penetration Testing Reconnaissance in Physical Security Types of Physical Security Controls Lockpicking Door Bypass Under door technique Bump keys Rec sensor bypass Physical Implant- USB Rubber Ducky, Bash Bunny, Bad USB Prox Card Bypass
$249.00Exploit Frameworks/Exploit Kits
Topics Covered Intro to Exploits Zero Day Exploit Vulnerabilities CVEs Vulnerabilities vs Exploits Gaining Access Maintaining Access Covering Tracks Intro to Exploit Tools Password Cracking
$249.00Cloud Penetration Testing
Topics Covered What Is Cloud Pen Testing What is laas, SaaS, PaaS (Cloud Service Models) Vulnerability Management In Cloud Cloud Pen Testing Tools Penetration Testing In The Cloud: AWS → Penetration Testing In The Cloud: Google Cloud How To Cloud Platforms Get Compromised? Cloud Security Biometrics Security And Cloud
$249.00Troubleshooting to resolve cloud-related issues.
Program Objectives Given A Scenario Use Troubleshooting Strategy To Resolve Cloud Issues. Given-A Scenario Troubleshoot Security Issues. Given a Scenario, Troubleshoot Deployment Issues. Given A Scenario Troubleshoot Connectivity Issues. Given A Scenario Troubleshoot Common Performance Issues. Troubleshoot Automation Orchestration Issues.
$249.00Cloud operations and support
Program Objectives Given a scenario, configure logging, monitoring, and alerting to maintain operational status. Given a scenario, maintain efficient operation of a cloud environment. Given a scenario, optimize cloud environments. Given a scenario, apply proper automation and orchestration techniques. Given A Scenario Apply Appropriate Backup and Restore Operations. Given a Scenario, Perform Disaster Recovery Tasks
$249.00Cloud Deployment
Program Objectives Given a scenario, integrate components into a cloud solution Given a scenario, provision storage in cloud environments. Given a scenario, deploy cloud networking solutions Given a scenario, configure the appropriate compute sizing for a deployment. Given a scenario, perform cloud migrations.
$249.00Cloud Security
Program Objectives Given a scenario, configure identity and access management. Given a scenario, secure a network in a cloud environment Given a scenario, apply the appropriate OS and application security controls Given a scenario, apply data security and compliance controls in cloud environments. Given a scenario, implement measures to meet security requirements Explain the importance of incident response procedures.
$249.00






























