TOIT Training

Cyber Security

Penetration Testing Linux - Reconnaissance

Overview In this online, instructor led training course students will get a hands-on feel for penetration testing. The instructor goes through many of the tools available through demonstrations allowing you to scan multiple port numbers…
3h
0
4

Certified Chief Information Security Officer (CCISO)

  • Define, implement, manage and maintain an information security governance program that includes leadership, organizational structures, and processes
  • Create risk assessment schedule and check lists
  • Create risk reporting metrics and processes
8h 30m
0
31

Computer Hacking Forensic Investigator (CHFI)

  • Perform evidence searching, seizing and acquisition methodologies in a legal and forensically sound manner
  • Better understand steganography and its techniques
  • Gather volatile and non-volatile information from Windows
31h
0
49

Exploring the NIST 2.0 Cybersecurity Framework

  • Understand the core concepts and structure of NIST CSF 2.0
  • Integrate the CSF with other frameworks and standards
  • Implement effective cybersecurity governance
4h
0
22

Wireless and Mobile Security

  • Designing of your security
  • Effective security mechanisms
  • Properly setting up your device to securely connect to your wireless network
2h
0
10

Ethical Hacking v12

  • Key issues plaguing the information security world, information security controls, penetration testing, and information security laws and standards
  • Different types of footprinting, footprinting tools, and countermeasures
  • Network scanning techniques and scanning countermeasures
24h
0
32

Certified Information Systems Security Professional (CISSP)

  • Security and Risk Management
  • Asset Security
  • Security Engineering
40h
0
62

Healthcare Certified Information Security and Privacy Practitioner (HCISPP)

  • Identify and describe the relevant legal and regulatory requirements regarding healthcare information
  • Describe security and privacy concept principles as they relate to the healthcare industry
  • Identify how organizations manage information risk, and what security and privacy governance means for that information
23h
0
0

Certified Cloud Security Professional (CCSP)

  • Architectural concepts and design requirements
  • Cloud data security
  • Cloud platform and infrastructure security
24h
0
24

Systems Security Certified Practitioner (SSCP)

  • Better understand Access Control
  • Better understand Security Operations and Administration
  • Better understand Risk Identification, Monitoring, and Analysis
16h
0
126

Penetration Testing Linux

  • Introduction to TCP and UDP scanning
  • FTP scanning of Linux OS
  • SSH scanning of Linux OS
3h
0
41

Penetration Testing Linux - Exploit

  • Introduction to MITRE
  • Watering hole attacks
  • SSL Strip
2h
0
37