"Last
Chance For The Exec"™
Introduction
Training Courses
|
The
Internet has changed the marketplace, how
we function, operate, advertise, and
communicate in our daily lives. Computer
literacy, computer experience, and effective
communication are the minimum requirements
for employment, career advancement, and to
be business-effective in today's marketplace.
Don't
be classified as "Missing In Action"
in the 21st Century by not
knowing how to do tasks on your computer or
how to plan your money wisely when purchasing
one.
Courses #311, #312,
#313, and #323 (listed below) are
for those of you who want to become more computer-literate,
learn to complete tasks on a computer more
effectively and time-efficiently, advance
your business skills, and learn the basics
of effective computer security.
Course
#311
"Computer
Literacy, Terminology, and Purchasing"™
|
Who
Should Enroll? Anyone
who has a computer or plans to purchase
one. ($ Enoll
Now #311)
Enrollment
Benefits:
1) Improve
your computer
literacy and vocabulary for new employment
opportunities, career advancement, re-entry
into the business marketplace, to sustain
your employment or to advance yourself for
other ventures.
2)
Learn
how to make
informed and wiser technology-based
decisions instead
of guessing or depending upon
someone else's opinion.
Learn
why it is not wise to purchase technology
just on price alone. Learn how to make your
technology purchases last longer.
3)
Learn
the necessary computer terminology
that is vital for you to operate the computer
effectively and time-efficiently.
4)
Decrease
the "Communication Gaps" between
you and:
a) Computer technical support
individuals.
b) Those soliciting technical
products to you.
c)
Clients, prospects, and/or technical hiring
manager(s).
Course
#312
"Time-Efficient
Systematic Computer Maneuvering"™
|
Have
you ever asked a computer professional how
they manuever on a computer without using
a manual? They seem to make it look so easy,
right? What do they know that you don't?
Prerequisite:
Course #311.
Who Should Enroll?
Everyone
who answered yes to any question listed above.
($ Enroll
Now #312)
Enrollment Benefits:
1)
Learn
our “systematic”
computer maneuvering and operational techniques
that are essential for using Microsoft products
on Windows and/or Apple computers.
2)
Learn
to become more productive and time-efficient
by utilizing both the computer terminology
learned in Course #311 and the techniques
in this course.
3)
Learn
the Microsoft Windows Operating System (i.e,
W7, Vista, XP, 2000, 98, etc) or the Apple
MAC Operating System and how it functions
with other computer software applications
to perform targeted tasks.
4)
Learn
the purpose of the functions included on your
computer and how to use them effectively &
time-efficiently.
5)
Learn
the important computer
software
"Rules of Thumb"
to avoid frustration and project time delays.
Course
#313
"Maneuvering,
Troubleshooting, and Organizing"™
|
Have you ever
gotten frustrated when your computer and/or
its connected devices don't work? Can you
diagnose or solve the problem by yourself
or do you have to call someone else to help
you? Continue to utilize the terminology and
technical skills previously
learned in Courses #311 and #312.
Learn how to advance your computer
technical skills and how to organize the information
(data) on your computer. Prerequisites:
#311 and #312.
Who
Should Enroll?
Everyone.
($ Enroll
Now #313)
Enrollment
Benefits:
1) Learn
computer technical skills to eliminate or
decrease customer service/support calls you
place to software/hardware vendors or to your
company's internal support help desk.
2)
Learn
intermediate hardware and software
troubleshooting techniques to use for timely
results for solving problems with your computer
system and connected devices to it.
3)
Learn
more advanced steps to visually modify and
effectively manuever on your computer desktop
(i.e., color, size, layout, time, etc.).
4) Learn
how to save/store, organize, retrieve,
and backup information on your computer effectively
and timely.
5) Learn
how to effectively install single-user computer
programs on your computer and how to answer
the questions that you are posed with upon
the each installation process.
Course
#315
"Computer
Literacy, Terminology, and Purchasing
for Parents"™
|
Who
Should Enroll? This training
course is a must for any
family adult or parent who
has a computer
or plans to purchase one.
($ Enroll
Now #315)
Enrollment
Benefits:
1) Improve
your computer
literacy and vocabulary to improve your parenting
skills, improve your technical
communication skills with others, to update
your skills to re-entry into the business
marketplace or start a home-based business.
2)
Learn
how to make
informed and wiser technology-based
decisions instead
of guessing or depending upon
someone else's opinion.
Learn
why it is not wise to purchase technology
just on price alone and how to make your technology
last longer.
3)
Learn
the necessary computer terminology
that is vital for you to operate the computer
effectively and time-efficiently.
4)
Decrease
the "Communication Gaps" between
you and:
a)
Computer technical support individuals.
b)
Those soliciting technical products to you.
c)
Clients, prospects, and/or technical hiring
manager(s).
Courses
#391-#396
Introduction
To Project Management
|
Learn
How To Be Effective and Successful in Managing
Projects (technical and non-technical) and
People. Each course will include pertinent
business and technical information that is
applicable to the type of project you are
looking to manage. These are certified classes
that are taught by established and experienced
Project Managers who have held prior senior
executive and technical management positions.
Prerequisites:
#311, #312, #313.
Course
#391 - Extranet
Project Management |
Course
#392 - Business
Project Management |
Course
#393 - Network
Project Management |
Course
#395 - Training
Project Management |
Course
#396 - Business
Culture Change Management
|
Enrollment
Benefits:
Learn
how to use Microsoft Project as a management
tool.
Learn
Project Management Terminology.
Learn
how to Define a Project.
Learn
how to Organize a Project.
Learn
how to Develop & Administer a Work Plan,
Develop Time Tables, and Design/Develop Report
Formats.
Learn
how to Assign & Allocate Project
Resources, Develop Project Assignments, and
Develop Tracking Mechanics.
Learn
about Business and Technical Obstacles in
Project Management, Trouble-Shooting, Analysis,
and Documentation Styles.
Learn
how business culture, reorganizations, down-sizing,
resignations, and retirement affect projects
and how to plan to manage that culture hange.
Courses
(#382 - #385)
Time
and Contact Management
|
Time and Contact Management
Software will allow you to formally organize
your daily, weekly, and monthly time schedules.
Learn How to Document and Keep Track of Your
Important Business and/or Personal Contacts
(i.e., Customers, Vendors, Friends, Relatives,
etc.). This software also allows you to identify
telemarketing and sales performance through
its different reports.
Prerequisites: #311, #312,
#313.
(Course #382)
Introduction To Microsoft
Outlook
(Course #383)
Introduction To ACT
(Course #384)
Introduction To Lotus Organizer
(Course #385)
Introduction To Goldmine
Enrollment
Benefits:
Learn
Time and Contact Management Computer Software.
Learn
How To Plan and Organize Your Daily Schedule.
Learn
How to Search.
Learn
How to Input, Categorize, and Update Contacts.
Learn
How to Utilize the Telemarketing Features
included in this category of computer software.
Learn
How to Track Results and Work Performed by
Creating and Printing Reports included in
the software.
Learn
How to Utilize the Web Software Features.
Learn
How to Integrate other computer applications
with these products.
Course
#351 - Introduction
to Microsoft Word |
Prerequisites:
#311, #312, and #313.
Enrollment
Benefits:
Learn How To Use Word Processing
Software. This program will allow you to create
letters, contracts, marketing literature,
forms, etc.
Learn
how to create, edit, view, insert, format,
save, and retrieve a word processing document.
Learn how to utilize the menu
bar, dialog boxes, toolbar, and ruler.
Learn how to retrieve the
Help Screens.
Learn and utilize the numerous
icons and tools included in this application.
Learn how to utilize the spell
and grammar checking features.
Learn
how to cut, paste, and copy items in your
document.
Learn how to create and edit
headers, footers, tabs, pagination, page #’s,
auto text, and auto correct.
Learn how to utilize features
such as bullets, indentation, framing, etc.
Course #352 -
Introduction to WordPerfect
|
Prerequisites:
#311, #312, and #313.
Enrollment
Benefits:
Learn
How To Use Word Processing Software. This
program will allow you to create letters,
contracts, marketing literature, forms, etc.
Learn
WordPerfect terminology, and
create, save, and close a document.
Learn
to open and edit a document by using the mouse,
keyboard, and menu choices.
Learn
to change the appearance of a document by
adding formatting and changing fonts, and
work with the Reveal Codes window.
Learn
to modify text in a document by replacing
text, reversing the last change made to a
document, and copying or moving text to a
new location.
Learn
to change paragraphs by creating and removing
paragraph indents, changing the justification
of the text, and setting the line spacing
for the document.
Learn
to set tabs by using the Ruler Bar, and create,
modify, and format a table.
Learn
to insert and delete manual page breaks and
create headers and footers in a document.
Learn
to check a document for potential errors by
using the Spell Checker, identify alternate
words by using the Thesaurus, and correct
common typing errors by using QuickCorrect.
Course
#314
"Computers
and Photography using Digital Camaras"™
|
This course is taught on
a customized One-On-One pre-scheduled basis.
Prerequisites: #311 and #312.
The enrollment benefits to
this course are that you will learn how to
effective use your camera and/or video camera
with your computer.
Course
#320
"Introduction To Internet Business
Planning"™
|
Do you have a business? Are
you looking to start a new business? Are you
a Realtor or a Real Estate Broker? Do you
have any ideas or current business plans to
promote your business products and/or services
locally, nationally, or worldwide? Do you
understand the power of the Internet, E-Commerce,
and Extranets in today's marketplace?
This course will help individuals
and business owners who want to market,
advertise, and sell products/services over
the Internet that result in positive business/finacial
results.
Enrollment
Benefits:
1) Learn
the types of business monetary investments
that are necessary to build and maintain an
effective web site.
2) Learn
about Marketing and Advertising Plans.
3) Learn
about Intranets and Extranets.
4) Learn
the steps to implement Internet Technology
Vehicles into your business and budget plans?
5) Learn
how to improve the "turn-around"
time it takes for your customers to pay you.
6) Learn
about Return On Investment (ROI) Plans?
7) Learn
how to evaluate web sites.
8) Learn
how to differentiate between web hosting plans,
email options, Internent-based marketing/advertisement
options, web design services, and business
data security.
Course
#322
“Identify,
Plan, and Improve Your $NET”™
|
This
is a Business Process Management Information
Security Course. Data Securirty Breaches
happen every day to many companies regardless
of their size or location. It
is the the responsibility of the company's
management to put a proactive effective
plan in place to protect the company's assets,
employee/client data, financials, operations,
and trade secrets. This course will
provide you a "road-map" that you
can customize for each company's departmental
requirements.
How
quickly can you effectively
identify, use, and/or recover the electronic
data on the computers of your employees,
contractors, and vendors after they:
a) Resign from your company and
work for competitors?
b) Resign from your company
and start their own company?
c) Take
a Leave of Absence or a Maternity Leave?
d)
Take their Vacation Time?
e) Retire
or Get Terminated?
f) Finish their assigend
projects?
g) Get promoted into
other departments/divisions within the company.
Who Should
Enroll? Executives, Directors,
Managers, Business Owners, and those who
want to advance their careers. (Enroll
Now #322)
Enrollment
Benefits
1) Learn
which popular computer software products promote
lost data and how that equates
to a decrease in business profits and security
breaches.
2) Learn
and Retain Effective Business Security Vocabulary
required in today’s marketplace.
3) Learn
How to Implement New Business
and Operational Process Methodologies and
Techniques that will Improve Business Profits,
Decrease Operational Expenditures, Improve
The Identification & Security of your
Company's Electronic Data, and Improve your
Business Technology ROI.
4) Learn
How to Increase Employee Performance
by implementing effective technology-related
communication techniques between your company’s
non-technical computer users, technical support
departments, staff, and vendors.
5) Learn How
to Plan and Improve Data Security
regarding computer users, business
software applications, email, working with
vendors and contractors, etc.
Course
#361
"Business
Forecasting &
Financial Planning - MS Excel"™
|
Learn
how to advance your career path into
Sales Management, Finance, Information Technology
Management, Executive Support, or Business
Management by enrolling in our "fast-track"
training courses that will provide
you an advancement option rather than pursuing
another college degree that costs more money
and time. You will learn industry terminology
to use in business and in job interviews.
Our training courses are taught by those who
have accomplished similar goals and who have
the business knowledge, insight, and experience
required. This course will technically train
you how to use this software application as
a tool to create spreadsheets and forecasting
models that are used in planning, budgets,
financial applications, sales, and inventory
management. Prerequisites:
#311, #312, #313
Recommended
Courses: #363, #364,
and #901.
Enrollment
Benefits:
Learn
how to create, save, and retrieve spreadsheets.
Learn
how to insert, delete, copy, and move both
rows andcolumns.
Learn
to customize workspace and work with formulas,
constants, and objects.
Learn
about help keys, styles, and the toolbar.
Learn
how to format cell contents.
Learn
document enhancements, data series, and relative
vs. absolute copying.
Learn
to create “templates, arrange workbook
windows, linkspreadsheets, and group editing.
Course
#362
"Proformas
&
Macros -
MS Excel"™
|
Prerequisites: #311,
#312, #313, and #361
This
is a continuation of Course #361. Additional
business terminology will be provided from
those experience in business, accounting,
and finance. Enrollees will learn more advanced
technical skill required in designing, developing,
and testing proformas and macros.
Enrollment
Benefits:
Learn
How To Create Workbooks and Proformas
that are used in Budget Planning, Business
Projections, BusinessFinancing, Financial
and Accounting Application Processes, Sales
Management and Forecasting, and Inventory
Control.
Learn
about
Macros and how they are used in business and
how they can be implemented with other business
software applications. Learn the basics on
how to design, develop, and test Macros.
Course
#363
"Introduction
To Business Credit and Finance"™
|
Enrollment
Benefits
Learn
how to expand your business with the proper
and effective business financing and credit
tools.
Learn
the importance of Business Credit
and how to establish it.
Learn
the effective finance terminology and how
to use when you are speaking to an executive
or representative from a financial institution
for business loans, business lines, investors,
etc.
Learn
about
the available business financing options available
in the marketplace and how to evaluate which
option(s) best match your company's requirements.
Learn about
the "backside" of your business
banking/financing decision(s) prior to making
them solidified. In other words, learn about
things that can happen after you finance which
most lending institutions and their representative
won't tell you before you sign their binding
contracts.
Learn
how to be more "saavy" regarding
business finance and how to develop or prepare
a "Proactive Disaster/Recovering Finance
Plan" for your business.
Learn
about your legal and privacy
rights prior to selecting a financing institution
and disclosing your personal information
that are protected by state and federal
laws.
Learn
how to communicate more effectively to others,
in regards to, your company, its officers,
and shareholders with regards to finance,
accounting, and the business operations.
Courses
#364
"Introduction
To Business Operations Planning"™
|
Enrollment
Benefits:
Learn
how to expand a business proactively with
the important mechanics required for long-term
success.
Learn
about
Human Resouces Planning. Topics will include
State Labor Employement Laws, the EDD, Defining
Company Policies & Procedures, and Staff
Recruitment/Hiring.
Learn
how to qualify, assess, and select Legal and
Accounting Professionals.
Learn
how to plan for operational growth, vendor
selection(s), and company security.
Learn
about
business insurance options, corporate structure
options, and business state and city licences.
Course
#371
Introduction
to Microsoft PowerPoint
|
Prerequisites:
#311, #312, #313.
Enrollment
Benefits:
Learn
How To Create Formal Presentations for Business
and Personal Purposes
Learn
about vocabulary and how to design/modify/save
a formal presentation (create, open, view,
edit).
Learn the different presentation
layouts available.
Learn how to insert objects
and graphs.
Learn
how to create templates and slide shows.
Learn how to use the spelling
checker and the printing features.
Learn about custom toolbars,
importing, and exporting Learn about video,
viewer, sound, graphics, and color.
Course
#372
"Effective
Professional Business Presentations"™
|
Prerequisites: #311,
#312, #313, and #371.
This course will utilize
technical skills learned in Course #371 and
train you on additional intermediate/advanced
technical and business style techniques using
Microsoft PowerPoint.
Enrollment
Benefits:
Learn
different business presentation styles to
implement within your company that are tailored
to different industies.
Learn
of additional presentation tools and products
that will enhance your resentations for your
business.
Learn how
to automate your presentations.
Learn
how to implement animation into your presentations.
Learn
about color usage, graphics implementation,
corporate image, and sales/marketing/financial
business techniques to implement into your
presentations to be effective and conclusive.
Learn
the presentation business "rules
of thumb" to follow for success.
Learn
the business mechanics to implement
within your presentations and how that equates
to improved sales, profits, and audience attendance.
Courses
#901
"Introduction
To Marketing and Sales Planning"™
|
Enrollment
Benefits:
Learn
how to grow a business with a defined and
documented "roadmap".
Learn
how to project an effective business image
into the marketplace.
Learn
the difference between advertising, marketing,
and sales.
Learn
how to grow a business with a defined and
documented "roadmap".
Learn
how to develop your Business Mission Statement
and "Elevator Talk".
Learn
about Marketing Plans, Research and Product
Positioning.
Learn
about Advertising Plans and the different
Advertisment Options.
Learn
about Sales Plans & Forecasting.
Learn
about NDA's and Proprietory Business Planning.
Courses
#902
"Sales
Qualifying and Business Negotiation"™
|
Enrollment
Benefits:
Learn
about Time Managment for effective and conclusive
business results.
Learn
how to qualify and differentiate
a prospect from a potential client
Learn
about the effective sales tools that aid in
important business decisions.
Learn
how to improve your business communication
for the targeted audience(s).
Learn
about canvassing, telemarketing styles, and
effective presentation skills.
Learn
the guidelines on how to effectively negotiate
contracts with different audiences for different
business purposes.
Learn
how to negotiate and amend existing "one-sided"
business contracts to become a "win-win"
business contracts and build long-term business
relationships.
Courses
(#341-#343)
"Introduction
To “Surfing” The Internet"™
|
Learn
How To “Surf The Internet” using
computer software called a WebBrowser. Prerequisites:
Course #311, Course #312, and Course #313.
Google Chrome Internet Browser (Course
#341)
Learn about Google Chrome browser and how to log into Google to set up an account. Learn how to “Surf The Internet”, Use
Help Functions, Bookmarks, and Identify or
Utilize Search Engines and their Capabilities. Learn how to ownload Files, Receive and Send Email,
Unzip Files, and Set Communicator Preferences. Learn why setting up your Internet Security is important. Learn what other Email product options are available.
Microsoft
Internet Explorer Edge Browser (Course
#342)
This course includes an Overview of Internet
Explorer Edge and Outlook Express (Email Only).
Learn how to “Surf
The Internet”, Use Help Functions, Bookmarks,
and Identify Searching Methods. Learn
How To Download Files, Receive Attachments,
View Attachments, Manage Contacts, etc.
Mozilla
Firefox (Course
#343)
Learn
how to “Surf The Internet”, Use
Help Functions, Bookmarks, and Identify or
Utilize Search Engines and their Capabilities.
Learn
how to ownload Files, Receive and Send Email,
Unzip Files, and Set Communicator Preferences.
Learn
why setting up your Internet Security is important.
Learn
what other Email product options are available.
Safari
Internet Browser (Course
#344)
Learn
how to “Surf The Internet”, Use
Help Functions, Bookmarks, and Identify or
Utilize Search Engines and their Capabilities.
Learn
how to Download Files, Receive and Send Email,
Unzip Files, and Set Preferences. Learn
why setting up your Internet Security is important.
Learn
what other Email product options are available.
Course
#324
"Effective
Computer Security - Intermediate"™
|
Prerequisites: #311 or #315,
#312, #313, #321, and #323
This Intermediate Seminar
Course is part 4
of our Identity Theft Prevention Training
Program™.
We will provide you security updates
to software tools available and tested, hardware
security updates, business use issues, personal
use issues, and noted vendor products.
Course
(#325-#330)
"Effective
Computer Security Software Installation"™
|
This technical "hands-on"
training course is part
3 of our Identity Theft Prevention Training
Program™.
It is important for you to proactively
learn what is necessary to prevent/reduce
computer predators and "hackers"
from harming your computer. The ongoing
attempts to seize your personal, family, amd
business financial information/data will continue
unless you take action.
Who
Should Enroll?
Anyone
who has taken the suggested Prerequisite Courses:
#311 or #315, #321, and #312. (Enroll
Now
#325),
(Enroll
Now #326),
(Enroll
Now #327),
(Enroll
Now #328),
(Enroll
Now #329),
(Enroll
Now #330)
Enrollment
Benefits:
1)
Learn
how to effectively install your
selected computer security software.
2) Learn
how to set up each security software menu
and its option(s) that are included with your
software.
3)
Learn
how to set up the parental controls
in your security software.
4)
Learn
how to implement your computer/technical
security and options.
5)
Learn the basic mechanics
and daily/weekly steps required to keep your
computer from being infected, attacked, and/or
incur hardware damages.
Suggested Prerequisites:
#311, #312, #323, and #321.
Course
# 325
- Security Software - (1 PC)
Course # 326
- Security Software
+ Additional Security Tool - (1 PC)
Course
# 327
- Security Software - (2 PCs)
Course # 328
-
Security Software
+ Additional Security Tool - (2 PCs)
Course
# 329 -
Security Software - (3 PCs)
Course # 330
- Security Software
+ Additional Security Tool - (3 PCs)
HOW
TO ENROLL OR GET MORE INFORMATION
Telephone: (307) 773-0124 /(702) 785-7720,
ext.1003
Enrollment:
Enroll@CompBaseTraining.com
Inquiries:
Training@CompBaseTraining.com
For
Class Enrollment Forms
(click
on the "$"
next to the course)
|
Identity
Security™
- Course
#321
“Learn Who Is
Not Protecting Your Identity and Why”™ |
Identity
Security™
is your responsibility and your
Economic Survival™
in the 21st Century.
This seminar will educate and empower you
to know facts, options, and choices available
to you to prevent and/or stop anyone from
breaching your personal identity and personal
data.
The
Problem:
In 2012, approximately
13 million people in the United States
were reported as new victims
of Identity Theft. Everyone
and every business is subject to some form
of Identity Theft. Many
products do not address or even stop the real
sources of the problem. Many
companies keep you uninformed
because they don't have the real solutions
and/or knowledge. Many companies advertise
their identity theft monitoring products to
you for a recurring monthly purchase price
but they do not solve the problem. Stop
wasting your money.
Who
Should Enroll? Everyone. ($ Enroll
Now #321)
Enrollment
Benefits:
1)
Learn
effective Identity Security™
Solutions verses the ineffective products
offered in the marketplace by many companies
and agencies who don't tell you what you need
to know but instead misinform you.
2)
Learn lifetime
skills and knowledge to help you prevent
and/or reduce the damages that can
occur when one's identity becomes breached.
Those of you who are not a victim statistic
yet, keep it this way and learn how
to initiate your proactive defense.
3) Learn
our "Identity Security
Basics™"
and how to protect what is yours and used
in the digital economy.
4)
Learn how
to protect your available legal constituional
rights with respect to your personal identity
and privacy. This seminar will educate and
empower you to know facts, options, and choices
available to you to prevent and/or stop anyone
from breaching your personal identity and
personal data.
5) Learn
some "fast-track" remedies to take
back the personal contol of your life, your
financial data, and your economic existance
for those of you who have had their identity
exposed.
Course
#323
"Introduction
To Effective Computer Security"™
|
Computer
hackers and predators are virtual and everywhere! This
course is Part 2 of our Identity Security
Training Program. In
this digital age, it
is your responsibility to have a proactive
security plan for you, your family, and/or
your business. This training course
will empower you to make better technology
decisions, enhancing
your computer security vocabulary, improve
your ability to understand, interpret, and
communicate with others.
Suggested Prerequisite Courses: #321.
Who
Should Enroll?
Everyone.
($ Enroll
Now #323)
Enrollment
Benefits:
1
) Learn
how
to become insightful to protect
your computer and secure its content
(data), no matter if you are in your home
or out in public.
2)
Learn
the correct
terminology of the many types of computer
threats/attacks. You will use this vocabulary
throughout your lifetime because we are in
the "digital age".
3)
Learn
which Internet Security Solutions don't
protect your computer(s) against computer
predators and hackers. There are differences
in products and what you find in the store
is not always your best choice.
4)
Learn
what
Internet Service Providers (i.e., Cable, DSL,
etc). do not provide you and why.
5)
Learn
how
to implement best security practices on any
Social Networking web site and the importance
of this topic.
The following training courses
are for those individuals who want to advance
their skills and achieve the industry recognized
certified credentials in Networks, Security,
Risk Management, Audit, and Forensics. Upon
selecting any of our Certified Training
Courses, you can achieve the appropriate
career path that can include: "Hands-On"
Technical Security Certification, and Management
Security Certification. Upon completing each
course, you are required to enroll and pass
the associated test(s), in rder to, receive
your certification.
CERTIFICATIONS
- Networks
& Technology
|
Course
#601 - MCSE
(Microsoft
Certified Systems Engineer) |
Course
#602 - MCSA
(Microsoft Certified Systems Admin.)
|
Course
#603 - A+
|
Course
#607 - CNE
(
Certified Novell Engineer)
|
Course
#608 -
CNA
(Certified Novell Administrator)
|
Course
#700 &
#700A
Certified
Secure Software Life-Cycle Professional
(CSSLP)
|
Completeing this course
will provide you a competitive edge in the
marketplace when pursing employment or advancing
your career. This certified five (5) day training
course details the best tools, techniques,
and processes for security in the various
stages of the SDLC.
Who
Should Enroll?
Anyone who in interested in
advancing your technical software programming
skills and/or career. You should have many
years of experiance as an applications/database
programmer. Additional suggested skills
would include two (2) years of professional
network experience and/or a certification
in either MCSE or Networking +.
($ Enroll
Now #700)
TBA:
($ Enroll Now #700A)
Enrollment
Benefits:
1)
Learn the exclusive
Security Best Practices and Industry Standards
in the Software Lifecycle.
2)
Learn about the
seven (7) domains and security measures
overed:
a. Secure
Software Concepts
b.
Secure Software Requirements
c.
Secure Software Design.
d.
Secure Software Implementation/Coding/Development.
e.
Secure Software Testing
f.
Secure Acceptance
g.
Software Deployment, Operations, Maintenance,
& Disposal.
3)
Learn how to deal with software
vulnerabilities.
4)
Learn when and where security
issues are examined.
5)
Learn which software stakeholder
is responsible.
6)
Learn what phase has the responsibility
for security and how it is evaluated.
Course
#701 &
#701A
CompTIA
Security +
|
This
is a five (5) day course. This course
and certification are the prerequisites
for courses (#702-#703) and (#704-#706). To
receive this certification, each attendee
must enroll and pass the certification
testing exam given at the appropriate
testing facility.
Who
Should Enroll?
Anyone who has two
(2) years of professional network
experience and/or a certification
in either MCSE or Networking +.
($ Enroll
Now #701)
or (Enroll
Now #701A)
Enrollment
Benefits:
1) Learn
the foundation concepts and technologies
for all of the fifteen (15) domains
comprising the security fundamentals
for the Security + Professional. Upon
completing this course, you will gain
the knowledge and learn a foundation
skill level in the following.
- Systems & Network Security
Concepts
- Secure Access To Systems &
Networks
- Evaluating Systems & Networks
- Operational/Organizational Security
- Cryptography
2) Provide
the necessary information to help
prepare the attendee for the required
exam.
Course
#702
Certified
Information Systems Security
Professional
(CISSP)
|
|
This is a five (5) day
course. This security training course
is for those who wish to pursue the
Management Career Path of Security.
To receive this life-time professional certification, each
student will be required to pass the
SSCP exam. After completing this training course, you will then be required to register, pay, take, and pass the CISSP Exam. You have up to 1-year to take the exam. You can re-take the exam up to 3 times in that year and must fulfill the passing requirements to recieve this life-time professiona certification.
Who
Should Enroll? Anyone who completed Course
#701, has 3-5 years of professional
experience in the computer security
field, and basic knowledge of networking
with other certifications (i.e., Net+,
Security+, CCNA, CNA, or MCP).
Enrollment
Benefits: ($ Enroll
Now #702)
1) Learn the foundation concepts and technologies
of all ten (10) domains comprising
the Common Base of Knowledge (CBK)
fundamentals for the CISSP Professional.
2) Provide provide the necessary information
to help prepare the attendee for the
required exam. |
Course
#703 & #703A
Certified
Information Security Manager
(CISM)
|
This is a four (4)
day training course that will further
advance your managment skills and
certification in security. To receive this life-time professional certification, each
student will be required to pass the
CISM exam. After completing this training course, you will then be required to register, pay, take, and pass the CISM Exam. You have up to 1-year to take the exam. You can re-take the exam up to 3 times in that year and must fulfill the passing requirements to recieve this life-time professiona certification.
Who
Should Enroll?
Anyone who has completed
Courses #701, Course #702, and has
Network Security Experience.
($ Enroll
Now #703)
or (Enroll
Now #703A)
Enrollment
Benefits:
1)
Learn
about the five (5) topics that include
the following:
- Information
Security Governance Risk Management
- Program Management
- Incident Response Management
- Information Security Management
- Practice Exam, Review, and Exam
Preparation
2)
Provide the necessary
information to help prepare the attendee
for the required exam.
Course
#704
Systems
Security Certified Practitioner
(SSCP)
|
This
is a five (5) day course. This is
a Common Base of Knowledge (CBK) review
training course for the common Information
Assurance and Computer Security component
training needs and requirements to
prepare the attendee to take the International
Information Systems Security Certification
Consortium (ISC2) SSCP examination.
To receive this life-time professional certification, each
student will be required to pass the
SSCP exam. After completing this training course, you will then be required to register, pay, take, and pass the SSCP Exam. You have up to 1-year to take the exam. You can re-take the exam up to 3 times in that year and must fulfill the passing requirements to recieve this life-time professiona certification.
Who
Should Enroll? Anyone who has completed
Courses #701 and has two (2) years
of professional network experience
and/or a certification in either MCSE
or Networking +.
($ Enroll
Now #704)
Enrollment
Benefits:
1) The ISC2 SSCP Certification is one
of the few professional security certifications
that will you to be able to attain
the ISO/IEC 17024 status.
2) This course offers detailed training
on the foundation concepts and technologies
of all seven (7) domains comprising
of the CBK fundamentals for the SSCP
professional. These 7 domains include:
- Access Control
- Administration
- Audit & Monitoring
- Cryptography
- Risk, Response, and Recovery
- Data Communications
- Malicious Code
3) This course will provide the necessary
information to help prepare the attendee
for the required exam.
Course
#705 & #705A
Certified
Risk& Information Systems Control
(CRISC)
|
The CRISC, the four (4) day
course, is the only certification
that prepares and enables IT professionals
for the unique challenges of IT and
enterprise risk management, and positions
them to become strategic partners
to the enterprise.
Who
Should Enroll? Anyone
who has interest in getting the Certified
Best Practices Security IT Risk/Audit credentials
to enhance your career.
($ Enroll
Now #705) or ($ Enroll
Now #705A)
We provide a CRISC
Domain Review training course for
the common Risk Management and Computer
Security Controls component training
needs and requirements in preparation
of the students to take the ISACA
CRISC examination. The ISACA CRISC
Certification is one of the few professional
security certifications to attain
ISO/IEC 17024 status.
The CRISC certification
is very beneficial for the individuals
who have risk management, risk response,
information security controls or information
security design-related work experience
such as a practitioner, auditor, consultant,
vendor, investigator or manager.
There are
five (5) domains to the CRISC certification
as follows:
1. Risk Identification, Assessment
and Evaluation (31%): Identify
assess and evaluate risk factors to
enable the execution of the enterprise
risk management strategy.
2. Risk Response (17%): Develop and implement risk responses
to ensure that risk factors and events
are addressed in a cost-effective
manner and in line with business objectives.
3. Risk Monitoring (17%): Monitor
risk and communicate information to
the relevant stakeholders to ensure
the continued effectiveness of the
enterprise’s risk management
strategy.
4. Information
Systems Control Design and Implementation
(17%): Design and implement
information systems controls in alignment
with the organization’s risk
appetite and tolerance levels to support
business objectives.
5. Information Systems Control
Monitoring and Maintenance (18%): Monitor and maintain information systems
controls to ensure that they function
effectively and efficiently.
CRISC is the Certified
in Risk and Information System Controls
certification from ISACA for professionals
who can integrate Enterprise Risk
Management (ERM) with discrete IS
control skills and ability to design,
implement and maintain these discrete
information systems (IS) controls
to mitigate such risk. Also covers
how governance and risk management
go hand in hand focusing on the benefits
to starting with effective governance.
The basic criteria is to understand
risk management, which is the identification,
assessment, and prioritization of
risk followed by coordinated and economical
application of resources to minimize,
monitor, and control the probability
and/or impact of adverse events or
to maximize the realization of opportunities.
Course
#706 & #706A
Certified
Governance Enterprise IT (CGEIT)
|
The certification
program called Certified in Governance
of Enterprise IT (CGEIT) was developed
by ISACA specifically for experienced
Information Technology (IT) governance
personnel and those who have responsibilities
for the stewardship of Information
Technology (IT) resources. This seminar
is designed specifically to assist
individuals planning to take CGEIT
examination. This four (4) day training course
will explain the CGEIT examination
process, help you prepare for the CGEIT exam, provide guidance
and test your readiness through sample
questions.
($ Enroll
Now #706) or (Enroll
Now #706A)
•
Domain 1: Framework for the Governance
of Enterprise IT (25%)
Ensure the definition, establishment,
and management of a framework for
the governance of enterprise IT in
alignment with the mission, vision
and values of the enterprise.
•
Domain 2: Strategic Management (20%)
Ensure that IT enables and supports
the achievement of enterprise objectives
through the integration and alignment
of IT strategic plans with enterprise
strategic plans.
•
Domain 3: Benefits Realization (16%)
Ensure that IT-enabled investments
are managed to deliver optimized business
benefits and that benefit realization
outcome and performance measures are
established, evaluated and progress
is reported to key stakeholders.
•
Domain 4: Risk Optimization (24%)
Ensure that an IT risk management
framework exists to identify, analyze,
mitigate, manage, monitor, and communicate
IT related business risk, and that
the framework for IT risk management
is in alignment with the enterprise
risk management (ERM) framework.
•
Domain 5: Resource Optimization (15%)
Ensure the optimization of IT resources
including information, services, infrastructure
and applications, and people, to support
the achievement of enterprise objectives.
Course
#707
Certified
Information Forensics Investigator
(CIFI)
|
This is a five (5)
day course. This course is designed
to give an in-depth knowledge of Informatin
Forensics Investigation and will assist
the attendee to prepare for the CIFI
exam that is required to pass to receive
this certification.
Who
Should Enroll? Anyone who has completed, passed,
and received the Certifications of
Course #701. ($ Enroll
Now #707)
Enrollment
Benefits:
1) Topics will include moving through
each of the Common Bodies of Knowledge
(CBK) areas and culminating with the
Information Forensics Tools and Process
session.
2) The theory behind the practice and
a detailed discussion of each major
tool available to the Forensics Investigator,
in order for, the attendee to gain
practical experience in the methods
of Information Forensics.
3) Auditing, Traceback, Investigation,
Incident Response, Information Forensics
Tools & Processes, Counter-measures
& Secure Design, and Law Enforcement
& Investigation will be included
in the course materials.
Course
#708
Network
Forensics
|
Who
Should Enroll? Anyone who has completed, passed,
and received the Certifications of
Course #701 and Course #707 ($ Enroll
Now #708)
Enrollment
Benefits:
This is a five (5)
day course. Within our "hands-on"
lab, you will be trained on techniques
and procedures that will include Forensics
Investigaton Basics, Investigation
Techniques, and Forensics Examination
Criteria.
Course
#709
Forensics
Manager
|
Who
Should Enroll? Anyone who has completed and passed
Course #701, Course #707, and Course
#708. ($ Enroll
Now #709)
Enrollment
Benefits:
This is a five (5)
day course. During this course you
will be trained on the following:
- Forensics
Management
- Forensics
Phases & Models
- Incident
Response Team Management
- Privacy,
Ethics, & Evidence
- Laws
& Bounderies of Investigations
- Critical
Relationships (i.e., technical,
management, law enforcement, and
civil).
Course
#710
Security
Modeling
|
Who
Should Enroll? Anyone
who has completed & passed Course
#701. ($ Enroll
Now #710)
Enrollment
Benefits:
This
is a five (5) day course. Learn how
to provide your company with the most
up-to-date, effective security measures,
concepts, and equipment to be tested
beforethe "incident".
Course
#711
Security
Management
|
Who
Should Enroll? Anyone
who has completed & passed Course
#701. ($ Enroll
Now #711)
Enrollment
Benefits:
This
is a five (5) day course. This Informaton
Security Practice Management includes
training on the following items:
Course
#712
Security
Tools
|
|
Who
Should Enroll? Anyone
who has completed & passed Course
#701 and Course #710. ($ Enroll
Now #712)
Enrollment
Benefits:
This
is a five (5) day course that provides
"hands-on" practical work
in a lab environment.to develop skills
in utilizing the various tools and
techniques of the industry. The variou
tools will include desktop tools,
server tools, laptop tools, cell phone
tools, PDA tools, network tools, and
Internet tools. |
Course
#713
Certified
Anti-Terrorism Specialist (CAS-IR)
|
This five (5) day
course will include ATAB ERM PPS,
Aviataion Security, Bioterrorism Response,
HazMat Information, International,
Military Manuals, Nuclear Safety &
Security, Planning & Operations,
Technology Information, in addition
to, Search and Rescue
Who
Should Enroll? Anyone
who has completed & passed Personal
Background Check, Natural-Born American
Citizen, etc.
($ Enroll
Now #713)
Enrollment
Benefits:
1) Learn how to manage
an Incident Response Team.
2) Learn the key steps
to a Computer Event Investigation.
3) Learn the requirements
for a Good Response Team Member.
Course
#714
Certified
Information Systems Auditor
(CISA)
|
In this four (4)
day course, you'll cover all six domains
of the Certified Information Systems
Auditor (CISA) exam and gain the knowledge
and technical concepts required to
obtain CISA certification. Since its
inception in 1978, the CISA exam has
become the gold standard of excellence
in IS auditing, control, and security. After completing this training course, you will then be required to register, pay, take, and pass the CISA Exam. You have up to 1-year to take the exam. You can re-take the exam up to 3 times in that year and must fulfill the passing requirements to recieve this life-time professiona certification.
Who
Should Enroll? Anyone
who has interest in getting the Certified
Best Practices Security IT Audit credentials
to enhance your career.
($ Enroll
Now #714)
In-depth
coverage of the six domains required
to pass the CISA exam :
1.
IS Audit Process
2. IT Governance
3. Systems and Infrastructure
Lifecycle Management
4. IT Service Delivery
and Support
5. Protection of
Information Assets
6. Business Continuity
and Disaster Recovery
(Course #715 & #715A)
Certified Cloud Security Professional (CCSP) |
Who
Should Enroll? The CCSP Certification is ideal for IT and Information Security Leaders responsible for applying best practices to cloud security architecture, design, operations and service orchestration, including those in the following positions:
- Enterprise Architect
- Security Administrator
- Systems Engineer
- Security Architect
($ Enroll
Now #715 ) ( $ Enroll
Now #715A )
The globally recognized CCSP- Certified Cloud Security Professional certification is a proven way to build your career and better secure critical assets in the cloud. This is a five (5) day course that includes the following topics. After completing this training course, you will then be required to register, pay, take, and pass the CCSP Exam. You have up to 1-year to take the exam. You can re-take the exam up to 3 times in that year and must fulfill the passing requirements to recieve this life-time professiona certification.
Learn Cloud Concepts, Architecture, and Design (Domain 1)
- Understand Cloud Computing Concepts
- Describe Cloud Reference Architecture
- Understand Security Concepts Relevant to Cloud Computing
- Understand the Design Principles of Secure Cloud Computing
- Evaluate Cloud Service Providers
Learn Cloud Data Security (Domain 2)
- Understand Cloud Data Lifecycle
- Design and Implement Cloud Data Storage Architectures
- Design and Apply Data Security Strategies
- Understand and Implement Data Discovery and Classification Technologies
- Design and Implement Relevant Jurisdictional Data Protections for Personally Identifiable Information
- Design and Implement Data Rights Management
- Plan and Implement Data Retention, Deletion, and Archiving Policies
- Design and Implement Auditability, Traceability and Accountability of Data Events
Learn Cloud Platform and Infrastructure Security (Domain 3)
- Comprehend Cloud Infrastructure Components
- Analyse Risks Associated to Cloud Infrastructure
- Design and Plan Security Controls
- Plan Disaster Recovery and Business Continuity Management
Learn Cloud Application Security (Domain 4)
- Training and Awareness in Application Security
- Understand Cloud Software Assurance and Validation
- Use Verified Secure Software
- Software Development Lifecycle (SDLC) Process
- Secure Software Development Lifecycle
- Cloud Application Architecture
- Identity and Access Management (IAM) Solutions
Learn Cloud Security Operations (Domain 5)
- Support the Planning Process of the Data Centre Design
- Implement and Build Physical Infrastructure on Cloud Environment
- Run Physical Infrastructure for Cloud Environment
- Manage Physical Infrastructure for Cloud Environment
- Build Logical Infrastructure for Cloud Environment
- Run Logical Infrastructure for Cloud Environment
- Manage Logical Infrastructure for Cloud Environment
- Ensure Compliance with Regulations and Controls
- Conduct Risk Assessment for Logical and Physical Infrastructure
- Understand the Collection and Preservation of Digital Evidence
- Manage Communications with Relevant Parties
Learn Legal, Risk, and Compliance (Domain 6)
- Legal Requirements and Unique Risks
- Privacy Issues Including Jurisdictional Variances
- Audit Process, Methodologies, and Required Adaptions
- Implications of Cloud to Enterprise Risk Management
- Outsourcing and Cloud Contract Design
- Execute Vendor Management
Course
#717
Certified
Authorization Professional
(CAP)
|
The ISC2 CAP Certification
is one of the few professional security
certifications to attain ISO/IEC 17024
status. The CAP certification is very
beneficial for the individuals who
have certification and accreditation-related
work experience such as a practitioner,
auditor, consultant, vendor, investigator,
and/or instructor.
($ Enroll
Now #717)
CAP certification
emphasizes the underlying methodologies
and processes associated with the
harmonized security authorization
process, including continuous monitoring
across the Federal IT workspace and
agencies. This certification applies
to all Federal Agencies Security Assessment
and Authorization efforts, projects,
and activities.
Course #717 is the
CAP CBK Review Training Course for
the common Information Assurance and
Computer Security component training
needs and requirements in preparation
of the students to take the International
Information Systems Security Certification
Consortium (ISC2) CAP examination.
Initially titled
Certification and Accreditation Professional,
CAP was renamed in May 2010. In addition
to the title change, there are now
seven (7) domains to match with the
new NIST Risk Management approach,
as follows:
1. Understanding
the Security Authorization of Information
Systems, formerly known as, Certification
and Accreditation (C&A).
2.
Categorize Information Systems.
3.
Establish the Security Control Baseline.
4. Apply
Security Controls.
5.
Assess Security Controls.
6.
Authorize Information System.
7.
Monitor Security Controls (also known
as Continuous Monitoring)
|
|