March 2021
April 2021
May 2021
23 - 27 May 2021
1 week, 8:00 AM - 5:00 PM
The Computer Hacking Forensic Investigator (CHFI) course delivers the security discipline of digital forensics from a vendor-neutral perspective. CHFI is a comprehensive course covering major forensic investigation scenarios and enabling students to acquire necessary hands-on experience with various forensic investigation techniques and standard forensic tools necessary to successfully carry out a computer forensic investigation leading to the prosecution of perpetrators.
Register More Information30 - 31 May 2021
2 days, 8:00 AM - 5:00 PM
The purpose of the Certified Secure Computer User (CSCU) training program is to provide students with the necessary knowledge and skills to protect their information assets. (Certificate accredited by EC-Council)
Register More InformationJune 2021
6 - 10 Jun 2021
1 week, 8:00 AM - 5:00 PM
The most comprehensive ethical hacking course to help information security professionals grasp the fundamentals of ethical hacking. The purpose of the CEH credential is to: establish and govern minimum standards for credentialing professional information security specialists in ethical hacking measures, inform the public that credentialed individuals meet or exceed the minimum standards, and reinforce ethical hacking as a unique and self-regulating profession. (Certificate accredited by EC-Council)
Register More Information11 - 13 Jun 2021
3 days, 8:00 AM - 5:00 PM
This program is the first step to joining a security operations center (SOC). It is engineered for current and aspiring Tier I and Tier II SOC analysts to achieve proficiency in performing entry-level and intermediate-level operations.
Register More Information13 - 15 Jun 2021
3 days, 8:00 AM - 5:00 PM
The IH&R process includes stages like incident handling and response preparation, incident validation and prioritization, incident escalation and notification, forensic evidence gathering and analysis, incident containment, systems recovery, and incident eradication. This systematic incident handling and response process creates awareness among incident responders in knowing how to respond to various types of security incidents.
Register More InformationJuly 2021
4 - 6 Jul 2021
3 days, 8:00 AM - 5:00 PM
The DevOps practices covered in this certification are derived from the Three Ways: The First Way is to enable the work to move fast from left to right, from Development to Operations to the customer. The Second Way is to enable feedback to go fast from right to left, from all stakeholders back into the value stream. The Third Way is to enable learning by creating a high-trust culture of experimentation and risk-taking.
Register More Information18 - 21 Jul 2021
4 days, 8:00 AM - 5:00 PM
The Certified Application Security Engineer (CASE .NET) credential tests the critical security skills and knowledge required throughout a typical software development life cycle (SDLC), focusing on the importance of the implementation of secure methodologies and practices in today’s insecure operating environment.
Register More Information27 - 29 Jul 2021
3 days, 8:00 AM - 5:00 PM
Agile Scrum is about working together to successfully reach a goal. Agile methodologies are popular approaches in software development and are increasingly being used in other areas. Scrum practices include establishing cross-functional and self-managed teams, producing a working deliverable at the end of each iteration or Sprint. This certification focuses on adopting Agile or or Scrum in the workplace and taking on the role of Scrum Master.
Register More InformationAugust 2021
2 - 4 Aug 2021
3 days, 8:00 AM - 5:00 PM
Agile Scrum Foundation shows a candidate’s knowledge of Agile principles and the Scrum framework. Agile and Scrum are about working together to successfully reach the goal. Agile principles are popular in software development and are increasingly being used in other areas. Scrum practices include establishing cross-functional and self-managing teams, producing a working increment of software at the end of each iteration or Sprint. (Certificate accredited by Exin)
Register More Information5 - 6 Aug 2021
2 days, 8:00 AM - 5:00 PM
The purpose of the Certified Secure Computer User (CSCU) training program is to provide students with the necessary knowledge and skills to protect their information assets. (Certificate accredited by EC-Council)
Register More Information9 - 11 Aug 2021
3 days, 8:00 AM - 5:00 PM
This DevOps Foundation certification has been designed to give IT and business professionals basic knowledge and understanding of DevOps. Created as a stepping-stone to the EXIN DevOps Professional certification, this certification confirms understanding the origins of DevOps and the benefits of DevOps principles and practices for the organization.
Register More Information16 - 18 Aug 2021
3 days, 8:00 AM - 5:00 PM
ITIL 4 provides an emphasis on the business and technology world, how it works today, and how it will work in the future with Agile, DevOps and digital transformation.
Register More Information19 - 21 Aug 2021
3 days, 8:00 AM - 5:00 PM
CTIA is a method-driven Threat Intelligence program that uses a holistic approach, covering concepts from planning the threat intelligence project to building a report to disseminating threat intelligence. These concepts are highly essential while building effective threat intelligence and, when used properly, can secure organizations from future threats or attacks.
Register More Information23 - 27 Aug 2021
1 week, 8:00 AM - 5:00 PM
The program prepares network administrators on network security technologies and operations to attain Defense-in-Depth network security preparedness. It covers the protect, detect, and respond approach to network security. The course contains hands-on labs, based on major network security tools and techniques which will provide network administrators real world expertise on current network security technologies and operations.
Register More InformationSeptember 2021
5 - 9 Sep 2021
1 week, 8:00 AM - 5:00 PM
The most comprehensive ethical hacking course to help information security professionals grasp the fundamentals of ethical hacking. The purpose of the CEH credential is to: establish and govern minimum standards for credentialing professional information security specialists in ethical hacking measures, inform the public that credentialed individuals meet or exceed the minimum standards, and reinforce ethical hacking as a unique and self-regulating profession. (Certificate accredited by EC-Council)
Register More InformationOctober 2021
3 - 5 Oct 2021
3 days, 8:00 AM - 5:00 PM
Agile Scrum is about working together to successfully reach a goal. Agile methodologies are popular approaches in software development and are increasingly being used in other areas. Scrum practices include establishing cross-functional and self-managed teams, producing a working deliverable at the end of each iteration or Sprint. This certification focuses on adopting Agile or or Scrum in the workplace and taking on the role of Scrum Master.
Register More Information10 - 12 Oct 2021
3 days, 8:00 AM - 5:00 PM
The IH&R process includes stages like incident handling and response preparation, incident validation and prioritization, incident escalation and notification, forensic evidence gathering and analysis, incident containment, systems recovery, and incident eradication. This systematic incident handling and response process creates awareness among incident responders in knowing how to respond to various types of security incidents.
Register More Information10 - 12 Oct 2021
3 days, 8:00 AM - 5:00 PM
The DevOps practices covered in this certification are derived from the Three Ways: The First Way is to enable the work to move fast from left to right, from Development to Operations to the customer. The Second Way is to enable feedback to go fast from right to left, from all stakeholders back into the value stream. The Third Way is to enable learning by creating a high-trust culture of experimentation and risk-taking.
Register More Information24 - 26 Oct 2021
3 days, 8:00 AM - 5:00 PM
The CASE Java program is designed to be a hands-on, comprehensive application security training course that trains software developers on the critical security skills and knowledge required throughout a typical software development life cycle (SDLC), focusing on the importance of the implementation of secure methodologies and practices required in today’s insecure operating environment.
Register More Information