ASA Essentials 3.0 (ASAE)ASAEASA Essentials 3.0 (ASAE)<p>Gain the essential skills required to configure, maintain, and operate Cisco ASA 5500-X Series Adaptive Security Appliances based on ASA Software v9.x. If you need to get up to speed quickly with Cisco's Adaptive Security Appliance (ASA), this is the course for you.</p><p>We have combined the most important content from Cisco's Authorized CCNP Security courses and added additional information on the new features in v9.x software to hone in on the most crucial aspects of the ASA. In just one week, students will cover: Firewall Basics, Network Address Translation (NAT), Access Control Lists (ACLs), Object Groups, Stateful Inspection, Modular Policy Framework, PKI Integration, Site-to-site and Remote Access VPN (both IPsec and SSL), Active/Standby Failover, Server-based Authentication, Authorization, and Accounting (AAA) using ACS 5.2.</p>http://springhouse.com/course-catalog/ASAE3/30/2018 6:46:17 PM04344aspxhttp://websource.springhouse.com/Lists/CRM Product List/AllItems.aspxFalse95298890-df9c-e411-a8aa-00155d0a1406
Interconnecting Cisco Networking Devices Accelerated (CCNAX)CCNAXInterconnecting Cisco Networking Devices Accelerated (CCNAX)The Cisco CCNA curriculum includes a third course, Interconnecting Cisco Networking Devices: Accelerated (CCNAX), consisting of <a href="http://www.sunsetlearning.com/course-catalog/interconnecting-cisco-networking-devices-part-1-icnd-1/">Interconnecting Cisco Networking Devices, Part 1 (ICND1)</a> and<a href="http://www.sunsetlearning.com/course-catalog/interconnecting-cisco-networking-devices-part-2-icnd-2/"> Interconnecting Cisco Networking Devices, Part 2 (ICND2)</a> content in its entirety, but with the content merged into a single course. Overlapping content between ICND1 and ICND2 is eliminated and content is rearranged for the purpose of the course flow.<br><br>Interconnecting Cisco Networking Devices: Accelerated (CCNAX), is a instructor-led training course that teaches learners how to install, operate, configure, and verify a basic IPv4 and IPv6 network, including configuring a LAN switch, configuring an IP router, connecting to a WAN, and identifying basic security threats. Also covers topics in more depth and teaches learners how to perform basic troubleshooting steps in enterprise branch office networks, preparing learners for Cisco CCNA certification.<br><br>Key additions to this latest revision include an understanding of Quality of Service (QoS) elements and their applicability, how virtualized and cloud services will interact and impact enterprise networks, and an overview of network programmability with the related controller types and tools that are available to support software defined network architectures.<br><br>Also included is the understanding of the interactions and network functions of firewalls, wireless controllers and access points, along with additional focus on IPv6 and basic network security A full suite of labs have been developed using the virtual IOS environment with flexible topologies that reinforce concepts with hands-on, guided discovery and challenge labs that align to each lesson module. http://springhouse.com/course-catalog/CCNAX7/20/2018 7:02:57 PM04163aspxhttp://websource.springhouse.com/Lists/CRM Product List/AllItems.aspxFalse7156260e-bd2e-e411-ab11-00155d00bf00
Cisco Unified Wireless Networking BootcampCUWNBCCisco Unified Wireless Networking Bootcamp​Cisco Unified Wireless Networking Bootcamp (CUWNBC) combines WDBWL (Deploying Basic Cisco Wireless LANs) and WDAWL (Deploying Advanced Cisco Wireless LANs) into a cohesive five day delivery. CUWNBC presents students with challenging real-world deployments such as client mobility between subnets, high client density deployments, and mesh network deployments. Students will be trained on how to make network design decisions about, configure, and troubleshoot WLANs with these challenges. The format of the course allows students and the instructor to explore realistic use cases and best practices around more challenging deployment scenarios. The course is written at software code level 7.5.http://springhouse.com/course-catalog/CUWNBC3/30/2018 6:46:18 PM04346aspxhttp://websource.springhouse.com/Lists/CRM Product List/AllItems.aspxFalseb8e4dee7-969d-e411-a8aa-00155d0a1406
Interconnecting Cisco Networking Devices Part 1 (ICND 1)ICND 1Interconnecting Cisco Networking Devices Part 1 (ICND 1)<p>​Interconnecting Cisco Networking Devices, Part 1 (ICND1) v3.0 is a five-day, instructor-led training course that teaches learners how to install, operate, configure, and verify a basic IPv4 and IPv6 network, including configuring a LAN switch, configuring an IP router, managing network devices, and identifying basic security threats.</p><p>Optionally, this course can be followed by the Interconnecting Cisco Networking Devices, Part 2 (ICND2) v3.0 course, which covers topics in more depth and teaches learners how to perform basic troubleshooting steps in enterprise branch office networks, preparing learners for Cisco CCNA certification.</p><p>Several topics have been added including; understanding the interactions and network functions of firewalls, wireless controllers and access points, along with additional focus on IPv6 and basic network security.</p><p>All configuration commands are introduced through examples and supported with lab exercises. A full suite of labs have been developed using the virtual IOS environment with flexible topologies that reinforce concepts with hands-on, guided discovery and challenge labs that align to each lesson module. </p>http://springhouse.com/course-catalog/ICND 17/20/2018 7:02:57 PM03996aspxhttp://websource.springhouse.com/Lists/CRM Product List/AllItems.aspxFalse0dfaad66-bc2e-e411-ab11-00155d00bf00
Interconnecting Cisco Networking Devices Part 2 (ICND 2)ICND 2Interconnecting Cisco Networking Devices Part 2 (ICND 2)<p>​Interconnecting Cisco Networking Devices, Part 2 (ICND2) v3.0 is a five-day, instructor-led training course that teaches learners how to perform basic troubleshooting steps in enterprise branch office networks, preparing learners for Cisco CCNA certification.</p><p>Key additions to this latest revision include; understanding of Quality of Service (QoS) elements and their applicability, how virtualized and cloud services will interact and impact enterprise networks, along with an overview of network programmability and the related controller types and tools that are available to support software defined network architectures.</p><p>A full suite of labs have been developed using the virtual IOS environment with flexible topologies that reinforce concepts with hands-on, guided discovery and challenge labs that align to each lesson module. </p>http://springhouse.com/course-catalog/ICND 27/20/2018 7:02:57 PM04129aspxhttp://websource.springhouse.com/Lists/CRM Product List/AllItems.aspxFalse45808ed5-bc2e-e411-ab11-00155d00bf00
Implementing Cisco IOS Network Security (IINS)IINSImplementing Cisco IOS Network Security (IINS)​Implementing Cisco Network Security (IINS) v3.0 is a 5-day instructor-led course focusing on security principles and technologies, using Cisco security products to provide hands-on examples. Using instructor-led discussions, extensive hands-on lab exercises, and supplemental materials, this course allows learners to understand common security concepts, and deploy basic security techniques utilizing a variety of popular security appliances within a real-life network infrastructure.http://springhouse.com/course-catalog/IINS3/30/2018 6:45:54 PM04336aspxhttp://websource.springhouse.com/Lists/CRM Product List/AllItems.aspxFalse72846c62-786a-e411-9237-00155d0a1406
IPv6 Fundamentals, Design, and Deployment (IP6FD)IP6FDIPv6 Fundamentals, Design, and Deployment (IP6FD)<p>​The IPv6 Fundamentals, Design, and Deployment (IP6FD) v3.0 course is a five-day course aimed at providing network engineers and technicians that are working in the enterprise sector with the knowledge and skills that are needed to study and configure Cisco IOS Software IPv6 features. The course also provides an overview of IPv6 technologies, covers IPv6 design and implementation, describes IPv6 operations, addressing, routing, services, transition, and deployment of IPv6 in enterprise as well as service provider networks, and includes case studies useful for deployment scenarios.</p><p>This course has been Gold certified by IPv6 Forum. After successfully completing the course, candidates can include on their resumes that they have attended the IPv6 Forum Gold Certified course.</p>http://springhouse.com/course-catalog/IP6FD3/30/2018 6:46:20 PM02649aspxhttp://websource.springhouse.com/Lists/CRM Product List/AllItems.aspxFalse2cdeea60-80a1-e411-a8aa-00155d0a1406
Implementing Cisco MPLS (MPLS)MPLSImplementing Cisco MPLS (MPLS)​Multiprotocol Label Switching integrates the performance and traffic-management capabilities of data link Layer 2 with the scalability and flexibility of network Layer 3 routing. So, when used in conjunction with other standard technologies, MPLS gives the ability to support value-added features and service offerings. <br><br>Implementing Cisco MPLS (MPLS) v3.0 is a 5-day instructor-led class providing students with in-depth knowledge of MPLS and MPLS VPNs design, implementation and configuration skills for new features and functions in an existing routed environment.  This class uses IoS (15.2)http://springhouse.com/course-catalog/MPLS3/30/2018 6:46:18 PM04351aspxhttp://websource.springhouse.com/Lists/CRM Product List/AllItems.aspxFalseca45660a-999d-e411-a8aa-00155d0a1406
Implementing Cisco Quality of Service (QOS)QOSImplementing Cisco Quality of Service (QOS)<p style="text-align:left;">​Implementing Cisco Quality of Service (QOS) v2.5 provides learners with in-depth knowledge of QoS requirements, conceptual models such as best effort, IntServ, and DiffServ, and the implementation of QoS on Cisco platforms. The curriculum covers the theory of QoS, design issues, and configuration of various QoS mechanisms to facilitate the creation of effective administrative policies providing QoS.</p><p style="text-align:left;">Case studies and lab exercises included in the course help learners to apply the concepts from the individual modules to real-life scenarios. The course also gives learners design and usage rule for advanced QoS features. This gives the learners the opportunity to design and implement efficient, optimal, and trouble-free multiservice networks.</p>http://springhouse.com/course-catalog/QOS3/30/2018 6:46:18 PM04352aspxhttp://websource.springhouse.com/Lists/CRM Product List/AllItems.aspxFalse2dd306f2-b79d-e411-a8aa-00155d0a1406
Implementing Cisco IP Routing (ROUTE)ROUTEImplementing Cisco IP Routing (ROUTE)<p>​Implementing Cisco IP Routing (ROUTE) v2.0 is an instructor-led five day training course developed to help students prepare for Cisco CCNP certification. The ROUTE course is a component of the CCNP Routing and Switching curriculum.</p><p>This course is designed to provide professionals working with medium to large networks with the skills and knowledge required to incorporate advanced routing concepts when implementing scalability for Cisco routers that are connected to LANs and WANs.  Students will build upon the knowledge and skills from CCNA Routing and Switching and help expand competencies to plan, implement, and monitor a scalable routing network.</p><p>The overall design of the new ROUTE training is now heavily focused on lab-based learning.  Some older topics have been removed or simplified from ROUTE v1.0, while several new IPv6 routing topics have been added. The course content has been adapted to Cisco IOS Software Release 15 and technically updated.</p>http://springhouse.com/course-catalog/ROUTE3/30/2018 6:45:45 PM04323aspxhttp://websource.springhouse.com/Lists/CRM Product List/AllItems.aspxFalse8f73fcfc-3969-e411-9237-00155d0a1406
Cisco ASA Express Security (SAEXS)SAEXSCisco ASA Express Security (SAEXS)<p>​The SAEXS course provides an understanding of the Cisco ASA solution portfolio and successfully configures various aspects of the Cisco ASA components, including Cisco ASA Firewall features and functions, Cisco ASA with FirePOWER Services and Cisco ASA Remote Access VPN including Clientless and AnyConnect. <span style="font-weight:bold;"> Special Note:</span> Course kits are available in digital format only.  The digital version is designed for online use only, not for printing.</p>http://springhouse.com/course-catalog/SAEXS3/30/2018 6:48:39 PM02537aspxhttp://websource.springhouse.com/Lists/CRM Product List/AllItems.aspxFalsec70040c5-e162-e611-aa97-00155d0a1406
Implementing Advanced Cisco ASA Security (SASAA)SASAAImplementing Advanced Cisco ASA Security (SASAA)<p>The Implementing Advanced Cisco ASA Security (SASAA) v2.1 training course will provide you with knowledge of advanced features of Cisco ASA security products and enables you to implement the key features of ASA including FirePOWER services, ASA Identity Firewall, ASA Cloud Web security, ASA Clustering and virtual ASA (ASAv). This is an ideal Cisco security certification course to take if you want to further your knowledge on Cisco security matters or develop new skills for career advancement. This Cisco ASA training includes learning about the Cisco ASA product family, Identity Firewall, FirePOWER services, and more. </p>http://springhouse.com/course-catalog/SASAA3/30/2018 6:46:19 PM04353aspxhttp://websource.springhouse.com/Lists/CRM Product List/AllItems.aspxFalsec5c38f02-7ea1-e411-a8aa-00155d0a1406
Implementing Core Cisco ASA Security (SASAC)SASACImplementing Core Cisco ASA Security (SASAC)Cisco ASA Core is a five day course that covers the Cisco ASA 9.0 / 9.1 core firewall and VPN features.  This course offers hands-on labs and is designed to teach network security enginners working on the Cisco ASA Adaptive Security Appliance to implement core Cisco ASA features, including the new ASA 9.0 and 9.1 features.<br><br>If you are considering this course, you may also be interested in<a href="https://www.sunsetlearning.com/course-catalog/asa-essentials-3-0-asae/"> ASA Essentials (ASAE)</a>.  The content in SASAC is very similar to ASAE and we have dates for the ASAE class. http://springhouse.com/course-catalog/SASAC3/30/2018 6:46:22 PM01673aspxhttp://websource.springhouse.com/Lists/CRM Product List/AllItems.aspxFalse0f387071-6086-e611-879d-00155d0a1406
Understanding Cisco Cybersecurity Fundamentals (SECFND)SECFNDUnderstanding Cisco Cybersecurity Fundamentals (SECFND)<p>The Understanding Cisco Cybersecurity Fundamentals (SECFND) v1.0 course will provide you with an understanding of network infrastructure devices, operations and vulnerabilities of the TCP/IP protocol suite, basic information security concepts, common network application operations and attacks, the Windows and Linux operating systems, and the types of data that are used to investigate security incidents.</p><p>After completing this course, you will have basic knowledge that is required to perform the job role of an entry-level cybersecurity analyst in a threat-centric security operations center.</p>http://springhouse.com/course-catalog/SECFND3/30/2018 6:48:40 PM0252aspxhttp://websource.springhouse.com/Lists/CRM Product List/AllItems.aspxFalse21fc1fc2-83e6-e711-8b1b-00155d0a1406
Implementing Cisco Cybersecurity Operations (SECOPS)SECOPSImplementing Cisco Cybersecurity Operations (SECOPS)<p>This course allows learners to understand how a Security Operations Center (SOC) functions and the introductory-level skills and knowledge needed in this environment. It focuses on the introductory-level skills needed for a SOC Analyst at the associate level. Specifically, understanding basic threat analysis, event correlation, identifying malicious activity, and how to use a playbook for incident response.</p>http://springhouse.com/course-catalog/SECOPS3/30/2018 6:48:40 PM0259aspxhttp://websource.springhouse.com/Lists/CRM Product List/AllItems.aspxFalse42217ad8-83e6-e711-8b1b-00155d0a1406
Implementing Cisco Edge Network Security Solutions (SENSS)SENSSImplementing Cisco Edge Network Security Solutions (SENSS)<p>​Implementing Cisco Edge Network Security Solutions (SENSS) v1.0 is a newly created five-day instructor-led training (vILT) course is part of the curriculum path leading to the Cisco Certified Network Professional Security (CCNP© Security) certification. Additionally, it is designed to prepare security engineers with the knowledge and hands-on experience to prepare them to configure Cisco perimeter edge security solutions utilizing Cisco Switches, Cisco Routers, and Cisco Adaptive Security Appliance (ASA) Firewalls.</p><p>The goal of the course is to provide students with foundational knowledge and the capabilities to implement and managed security on Cisco ASA firewalls, Cisco Routers with the firewall feature set, and Cisco Switches.</p><p>The student will gain hands-on experience with configuring various perimeter security solutions for mitigating outside threats and securing network zones. At the end of the course, students will be able to reduce the risk to their IT infrastructures and applications using Cisco Switches, Cisco ASA, and Router security appliance feature and provide detailed operations support for these products.</p>http://springhouse.com/course-catalog/SENSS3/30/2018 6:46:19 PM04354aspxhttp://websource.springhouse.com/Lists/CRM Product List/AllItems.aspxFalse959c3a2f-7ea1-e411-a8aa-00155d0a1406
Implementing Cisco Secure Mobility Solutions (SIMOS)SIMOSImplementing Cisco Secure Mobility Solutions (SIMOS)<p>​Implementing Cisco Secure Mobility Solutions (SIMOS) v1.0 is a newly created five-day instructor-led training (vILT) course that is part of the curriculum path leading to the Cisco Certified Network Professional Security (CCNP© Security) certification. This course is designed to prepare network security engineers with the knowledge and skills they need to protect data traversing a public or shared infrastructure such as the Internet by implementing and maintaining Cisco VPN solutions. Students of this course will gain hands-on experience with configuring and troubleshooting remote access and site-to-site VPN solutions, using Cisco ASA adaptive security appliances and Cisco IOS routers.</p>http://springhouse.com/course-catalog/SIMOS3/30/2018 6:45:54 PM04340aspxhttp://websource.springhouse.com/Lists/CRM Product List/AllItems.aspxFalsebfa6374e-7ea1-e411-a8aa-00155d0a1406
Implementing Cisco Secure Access Solutions (SISAS)SISASImplementing Cisco Secure Access Solutions (SISAS)<p>​Implementing Cisco Secure Access Solutions (SISAS) v1.0 is a newly created five-day instructor-led training (vILT) course is part of the curriculum path leading to the Cisco Certified Network Professional Security (CCNP© Security) certification. Additionally, it is designed to prepare security engineers with the knowledge and hands-on experience so that they can deploy Cisco's Identity Services Engine and 802.1X secure network access.</p><p>The goal of the course is to provide students with foundational knowledge and the capabilities to implement and managed network access security by utilizing Cisco ISE appliance product solution.</p><p>The student will gain hands-on experience with configuring various advance Cisco security solutions for mitigating outside threats and securing devices connecting to the network. At the end of the course, students will be able to reduce the risk to their IT infrastructures and applications using Cisco's ISE appliance feature and provide operational support identity and network access control<br><br><span style="font-weight:bold;">If you are considering this course, you may also be interested in</span><span style="font-weight:bold;"> </span><a href="https://www.sunsetlearning.com/course-catalog/implementing-configuring-cisco-identity-services-engine-sise/"><span style="font-weight:bold;">Implementing and Configuring Cisco Identity Services Engine (SISE)</span></a><span style="font-weight:bold;">. The content is very similar and we have dates for the SISE. </span></p>http://springhouse.com/course-catalog/SISAS3/30/2018 6:46:19 PM04355aspxhttp://websource.springhouse.com/Lists/CRM Product List/AllItems.aspxFalse32bbee76-7ea1-e411-a8aa-00155d0a1406
Implementing and Configuring Cisco Identity Services Engine (SISE)SISEImplementing and Configuring Cisco Identity Services Engine (SISE)​This course discusses the Cisco Identity Services Engine, an identity and access control policy platform that provides a single policy plane across the entire organization, combining multiple services, including authentication, authorization, and accounting (AAA), posture, profiling, device on-boarding, and guest management, into a single context-aware identity-based platform. The training provides students with the knowledge and skills to enforce security posture compliance for wired and wireless endpoints as well as enhance infrastructure security using the Cisco ISE. Special Note: Course kits are available in digital format only. The digital version is designed for online use only, not for printing.http://springhouse.com/course-catalog/SISE9/28/2018 2:35:58 PM04356aspxhttp://websource.springhouse.com/Lists/CRM Product List/AllItems.aspxFalse5c8f1fab-7ea1-e411-a8aa-00155d0a1406
Implementing Cisco Threat Control Solutions (SITCS)SITCSImplementing Cisco Threat Control Solutions (SITCS)​This course provides network professionals with the knowledge to implement Cisco FirePOWER NGIPS (Next Generation Intrusion Prevention System) and Cisco AMP (Advanced Malware Protection), as well as Web Security, Email Security, and Cloud Web Security.  Students will gain hands-on experience configuring various advanced Cisco security solutions for mitigating outside threats and securing traffic traversing the firewall. <span style="font-weight:bold;">Special Note:</span> This course is part of the Cisco Certified Network ProfessionalSecurity Certification (CCNP Security). Course kits are available in digital format only.  The digital version is designed for online use only, not for printing.http://springhouse.com/course-catalog/SITCS3/30/2018 6:46:20 PM04357aspxhttp://websource.springhouse.com/Lists/CRM Product List/AllItems.aspxFalseee754fe0-7ea1-e411-a8aa-00155d0a1406
Implementing Cisco IP Switched Networks (SWITCH)SWITCHImplementing Cisco IP Switched Networks (SWITCH)<p>​Implementing Cisco Switched Networks (SWITCH) v2.0 is a five-day instructor-led training course developed to help students prepare for Cisco CCNP certification. The ROUTE course is a component of the CCNP Routing and Switching curriculum.</p><p>This course is designed to help learners create an efficient and expandable enterprise network by installing, configuring, and verifying network infrastructure equipment according to the Cisco Enterprise Campus Architecture.  Some older topics from Version 1 have been removed or simplified, while several new IPv6 routing topics have been added. The course content has been adapted to Cisco IOS Software Release 15 and technically updated.  </p>http://springhouse.com/course-catalog/SWITCH3/30/2018 6:45:45 PM04324aspxhttp://websource.springhouse.com/Lists/CRM Product List/AllItems.aspxFalse426c2568-3a69-e411-9237-00155d0a1406
Troubleshooting and Maintaining Cisco IP Networks (TSHOOT)TShootTroubleshooting and Maintaining Cisco IP Networks (TSHOOT)<p>​Troubleshooting and Maintaining Cisco IP Networks (TSHOOT) v2.0 is a five-day instructor-led training course developed to help students prepare for the Cisco CCNP certification. The TSHOOT course is a component of the CCNP Routing and Switching curriculum.</p><p>This course is designed to train network engineers on monitoring and troubleshooting routed and switched networks through extensive use of hands-on lab exercises.  The goal is to help network professionals gain the skills and knowledge needed to diagnose and resolve network problems quickly and effectively.  Some older topics have been removed or simplified from TSHOOT v1.0, while several new IPv6 routing topics have been added. The course content has been adapted to Cisco IOS Software Release 15 and technically updated. </p>http://springhouse.com/course-catalog/TShoot3/30/2018 6:45:45 PM04325aspxhttp://websource.springhouse.com/Lists/CRM Product List/AllItems.aspxFalse76b0c2b3-3a69-e411-9237-00155d0a1406
Implementing Cisco Video Network Devices Part 2 (VIVND2)VIVND2Implementing Cisco Video Network Devices Part 2 (VIVND2)​Implementing Cisco Video Network Devices, Part 2 (VIVND2) v1.0 is a new five-day instructor-led training (ILT) class that is designed to provide students with the necessary knowledge and skills that are needed to implement various Cisco video endpoints in converged Cisco video infrastructures.<p style="text-align:justify;">Cisco business video solutions have four major Cisco Medianet application components:</p><ul><li>Cisco Unified Communications and Collaboration</li><li>Cisco TelePresence</li><li>Cisco Digital Media Suite</li><li>Cisco Video Surveillance</li></ul><p style="text-align:justify;">The Implementing Cisco Video Network Devices, Part 2 (VIVND2) v1.0 course describes Cisco business video solutions and enables students to implement and troubleshoot Cisco Unified Communications and Cisco Collaboration and Cisco TelePresence endpoints, in different Cisco business video solution architectures.</p>http://springhouse.com/course-catalog/VIVND23/30/2018 6:46:20 PM04358aspxhttp://websource.springhouse.com/Lists/CRM Product List/AllItems.aspxFalsedee94411-7fa1-e411-a8aa-00155d0a1406
Implementing Cisco TelePresence Video Solutions Part 2 (VTVS2)VTVS2Implementing Cisco TelePresence Video Solutions Part 2 (VTVS2)<p>Implementing Cisco TelePresence Video Solutions, Part 2 (VTVS2) v1.0 is a 5-day instructor-led course that is designed to teach technicians who install and support Cisco TelePresence solutions to install and configure, operate, and maintain core visual communication components, including telepresence endpoints, gatekeepers, multipoint control units (MCUs), and management software. In this course, students will add Cisco TelePresence products to existing Cisco Unified Communications Manager (Unified CM) environments. This training is also appropriate for end-user technical staff, such as video system administrators and first-line support personnel.</p>http://springhouse.com/course-catalog/VTVS23/30/2018 6:46:20 PM04359aspxhttp://websource.springhouse.com/Lists/CRM Product List/AllItems.aspxFalse8bfccd03-80a1-e411-a8aa-00155d0a1406
Certified Ethical Hacking and Countermeasures v10cehv8Certified Ethical Hacking and Countermeasures v10<p>Certified Ethical Hacking and Countermeasures is a comprehensive ethical hacking and information systems security auditing program focusing on latest security threats, advanced attack vectors and practical real time demonstration of latest hacking techniques, methodologies, tools, tricks and security measures. It delivers technical depth of the content with an emphasis on vulnerability assessment, risk assessment, penetration testing and system protection.</p><p>This class immerses students in an interactive environment where they learn how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. The majority of the class is hands-on labs with instruction to explain, reinforce, and show how these hacking tools and techniques can be used to secure and defend real world networks.</p><p>Students begin by seeing how perimeter defenses work. They next learn how to scan and attack their own networks and how intruders escalate privileges. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When students leave this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking and what they can do to analyze and secure their own network without harming their own assets.</p><p>CEHv8 is now ANSI accredited and focuses on the latest hacking attacks targeted to mobile platform and tablet computers and covers countermeasures to secure mobile infrastructure. The latest development in mobile and web technologies including Google Android OS, Apple iOS 6, BlackBerry 7 OS, Windows Phone 8 and HTML 5 as well as mobile applications and mobile app stores.</p>http://springhouse.com/course-catalog/cehv87/20/2018 7:02:57 PM02347aspxhttp://websource.springhouse.com/Lists/CRM Product List/AllItems.aspxFalse65013f14-0af0-e411-abf8-00155d0a1406
Computer Hacking Forensic InvestigatorCHFIv8Computer Hacking Forensic Investigator<p>​CHFIv8 presents a detailed methodological approach to computer forensics and evidence analysis. It is a comprehensive course covering major forensic investigation scenarios that enables students to acquire necessary hands-on experience on various forensic investigation techniques and standard forensic tools necessary to successfully carryout a computer forensic investigation leading to prosecution of perpetrators.<br><br>Computer hacking forensic investigation is the process of detecting hacking attacks and properly extracting evidence to report the crime and conduct audits to prevent future attacks. Computer forensics is simply the application of computer investigation and analysis techniques in the interests of determining potential legal evidence. Evidence might be sought in a wide range of computer crime or misuse, including but not limited to theft of trade secrets, theft of or destruction of intellectual property, and fraud. Computer forensic investigators can draw on an array of methods for discovering data that resides in a computer system, or recovering deleted, encrypted, or damaged file information.  This includes recovering deleted email, restoring erased images, and more.<br><br>This five-day instructor-led course will give participants the necessary skills to identify an intruder's footprints and to properly gather the necessary evidence to prosecute. Many of today's top tools of the forensic trade will be taught during this course, including software, hardware and specialized techniques. The need for businesses to become more efficient and integrated with one another, as well as the home user, has given way to a new type of criminal, the "cyber-criminal." It is no longer a matter of "will your organization be hacked?" but, rather, "when?" Today's battles between corporations, governments, and countries are no longer fought only in the typical arenas of boardrooms or battlefields using physical force. Now the battlefield starts in the technical realm, which ties into most every facet of modern day life. If you or your organization requires the knowledge or skills to identify, track, and prosecute the cybercriminal, then this is the course for you.</p>http://springhouse.com/course-catalog/CHFIv83/14/2018 6:42:02 PM02854aspxhttp://websource.springhouse.com/Lists/CRM Product List/AllItems.aspxFalse6d694783-0af0-e411-abf8-00155d0a1406
F5 Networks Administering BIG-IP® v13TLG_NetworksAdminv13F5 Networks Administering BIG-IP® v13Obtain a functional understanding of the BIG-IP v13 Product Family for managing the normal day-to-day operation. The course will provide the prerequisite knowledge for many other of F5's BIG-IP instructor-led training courses, such as LTM, GTM, ASM and EM. http://springhouse.com/course-catalog/TLG_NetworksAdminv133/14/2018 6:42:40 PM01942aspxhttp://websource.springhouse.com/Lists/CRM Product List/AllItems.aspxFalse66d711b4-9f9f-e711-8b1b-00155d0a1406
F5 Networks Configuring BIG-IP® LTM v13: Local Traffic ManagerTLG_LTMv13F5 Networks Configuring BIG-IP® LTM v13: Local Traffic Manager<p>​Provides networking professionals a functional understanding of the BIG-IP LTM v13 system as it is commonly used, as well as an in-depth understanding of advanced features. The course covers installation, configuration, and management of BIG-IP LTM systems. This hands-on course includes lectures, labs, and discussions. </p>http://springhouse.com/course-catalog/TLG_LTMv133/14/2018 6:42:41 PM01958aspxhttp://websource.springhouse.com/Lists/CRM Product List/AllItems.aspxFalse6d190b94-af9f-e711-8b1b-00155d0a1406
F5 Networks Troubleshooting BIG-IP LTM v13TLG_LTMTroublev13F5 Networks Troubleshooting BIG-IP LTM v13<p>​This two-day course provides networking professionals with an introduction to the hardware and software architecture of BIG-IP LTM and hands-on experience with the tools and techniques for troubleshooting. This course includes lectures, labs, and discussions.</p>http://springhouse.com/course-catalog/TLG_LTMTroublev133/14/2018 6:42:41 PM01959aspxhttp://websource.springhouse.com/Lists/CRM Product List/AllItems.aspxFalsedfb086f2-af9f-e711-8b1b-00155d0a1406
F5 Networks Configuring BIG-IP DNS v13: Domain Name SystemTLG_DNSv13F5 Networks Configuring BIG-IP DNS v13: Domain Name System<p>​This course gives networking professionals a functional understanding of the BIG-IP DNS system as it is commonly used. The course covers installation, configuration, and management of the BIG-IP DNS system, and includes a combination of lecture, discussion, and hands-on labs.</p>http://springhouse.com/course-catalog/TLG_DNSv133/14/2018 6:42:41 PM01956aspxhttp://websource.springhouse.com/Lists/CRM Product List/AllItems.aspxFalse2b27d141-af9f-e711-8b1b-00155d0a1406
F5 Networks Configuring BIG-IP® ASM v13: Application Security ManagerTLG_ASMv13F5 Networks Configuring BIG-IP® ASM v13: Application Security Manager<p>​Learn skills to manage Web-based and XML application attacks and use Application Security Manager to defend against these attacks, including building security policies, utilizing traffic learning, deploying Application Security Manager with various applications, and testing using realistic web site traffic. </p>http://springhouse.com/course-catalog/TLG_ASMv133/14/2018 6:42:40 PM01947aspxhttp://websource.springhouse.com/Lists/CRM Product List/AllItems.aspxFalseb776f211-af9f-e711-8b1b-00155d0a1406
F5 Networks Configuring BIG-IP® APM v13: Access Policy ManagerTLG_APMv13F5 Networks Configuring BIG-IP® APM v13: Access Policy Manager<p>​F5 BIG-IP Access Policy Manager (APM) is a flexible, high-performance access and security solution that provides unified global access to your business-critical applications and networks. In this class you will learn skills to install, configure, and manage the F5 BIG-IP APM system.</p>http://springhouse.com/course-catalog/TLG_APMv133/14/2018 6:42:40 PM01944aspxhttp://websource.springhouse.com/Lists/CRM Product List/AllItems.aspxFalse4cad9cc6-ae9f-e711-8b1b-00155d0a1406
F5 Networks Configuring BIG-IP® AFM v13: Advanced Firewall ManagerTLG_AFM_v13F5 Networks Configuring BIG-IP® AFM v13: Advanced Firewall Manager<p>​Students are introduced to the AFM user interface, stepping through various options that demonstrate how AFM is configured to build a network firewall and to detect and protect against DoS (Denial of Service) attacks. Reporting and log facilities are also explained and used in the course labs. Further Firewall functionality and additional DoS facilities for DNS and SIP traffic are discussed.</p>http://springhouse.com/course-catalog/TLG_AFM_v133/14/2018 6:42:40 PM01943aspxhttp://websource.springhouse.com/Lists/CRM Product List/AllItems.aspxFalse9cb24683-ae9f-e711-8b1b-00155d0a1406
Free Webinar - F5 BIG-IP Overview of Changes in v11 and v12TLG_Overviewofv11v12changesFree Webinar - F5 BIG-IP Overview of Changes in v11 and v12<p>​Put F5 Networks products to work for your organization to meet client demand and provide high levels of application availability and security. Covers new features in v11 and v12 with a focus on LTM and ASM. Free attendance is limited to three people per company. </p>http://springhouse.com/course-catalog/TLG_Overviewofv11v12changes3/14/2018 6:42:21 PM01739aspxhttp://websource.springhouse.com/Lists/CRM Product List/AllItems.aspxFalse04d6e53b-6c52-e611-aa97-00155d0a1406
F5 Networks Administering BIG-IP® v12TLG_NetworksAdminv12F5 Networks Administering BIG-IP® v12<p>​Obtain a functional understanding of the BIG-IP v12 Product Family for managing the normal day-to-day operation. The course will provide the prerequisite knowledge for many other of F5’s BIG-IP instructor-led training courses, such as LTM, GTM, ASM and EM. </p>http://springhouse.com/course-catalog/TLG_NetworksAdminv123/14/2018 6:42:21 PM01722aspxhttp://websource.springhouse.com/Lists/CRM Product List/AllItems.aspxFalse6c668ac4-6b52-e611-aa97-00155d0a1406
F5 Networks Configuring BIG-IP® LTM v12: Local Traffic ManagerTLG_LTMv12F5 Networks Configuring BIG-IP® LTM v12: Local Traffic Manager<p>​Provides networking professionals a functional understanding of the BIG-IP LTM v12 system as it is commonly used, as well as an in-depth understanding of advanced features. The course covers installation, configuration, and management of BIG-IP LTM systems. This hands-on course includes lectures, labs, and discussions. </p>http://springhouse.com/course-catalog/TLG_LTMv123/14/2018 6:42:21 PM01730aspxhttp://websource.springhouse.com/Lists/CRM Product List/AllItems.aspxFalse3b35deea-6b52-e611-aa97-00155d0a1406
F5 Networks Troubleshooting BIG-IP LTM v12TLG_LTMTroublev12F5 Networks Troubleshooting BIG-IP LTM v12<p>​This two-day course provides networking professionals with an introduction to the hardware and software architecture of BIG-IP LTM and hands-on experience with the tools and techniques for troubleshooting. This course includes lectures, labs, and discussions. </p>http://springhouse.com/course-catalog/TLG_LTMTroublev123/14/2018 6:42:21 PM01732aspxhttp://websource.springhouse.com/Lists/CRM Product List/AllItems.aspxFalse99730018-6c52-e611-aa97-00155d0a1406
F5 Networks Configuring BIG-IP DNS v12: Domain Name SystemTLG_DNSv12F5 Networks Configuring BIG-IP DNS v12: Domain Name System<p>​This course gives networking professionals a functional understanding of the BIG-IP DNS system as it is commonly used. The course covers installation, configuration, and management of the BIG-IP DNS system, and includes a combination of lecture, discussion, and hands-on labs.</p>http://springhouse.com/course-catalog/TLG_DNSv123/14/2018 6:42:21 PM01720aspxhttp://websource.springhouse.com/Lists/CRM Product List/AllItems.aspxFalse54f1cd52-6b52-e611-aa97-00155d0a1406
F5 Networks Configuring BIG-IP® ASM v12: Application Security ManagerTLG_ASMv12F5 Networks Configuring BIG-IP® ASM v12: Application Security Manager<p>​Learn skills to manage Web-based and XML application attacks and use Application Security Manager to defend against these attacks, including building security policies, utilizing traffic learning, deploying Application Security Manager with various applications, and testing using realistic web site traffic. </p>http://springhouse.com/course-catalog/TLG_ASMv123/14/2018 6:42:21 PM01509aspxhttp://websource.springhouse.com/Lists/CRM Product List/AllItems.aspxFalse1d6c5028-6b52-e611-aa97-00155d0a1406
F5 Networks Configuring BIG-IP® AFM v12: Advanced Firewall ManagerTLG_AFM_v12F5 Networks Configuring BIG-IP® AFM v12: Advanced Firewall Manager<p>Students are introduced to the AFM user interface, stepping through various options that demonstrate how AFM is configured to build a network firewall and to detect and protect against DoS (Denial of Service) attacks. Reporting and log facilities are also explained and used in the course labs. Further Firewall functionality and additional DoS facilities for DNS and SIP traffic are discussed.</p>http://springhouse.com/course-catalog/TLG_AFM_v129/4/2018 3:58:42 PM01727aspxhttp://websource.springhouse.com/Lists/CRM Product List/AllItems.aspxFalse6621c98b-9889-e611-879d-00155d0a1406
F5 Networks Configuring BIG-IP® APM v12: Access Policy ManagerTLG_APMv12F5 Networks Configuring BIG-IP® APM v12: Access Policy Manager<p>​F5 BIG-IP Access Policy Manager (APM) is a flexible, high-performance access and security solution that provides unified global access to your business-critical applications and networks. In this class you will learn skills to install, configure, and manage the F5 BIG-IP APM system. </p>http://springhouse.com/course-catalog/TLG_APMv123/14/2018 6:42:21 PM0334aspxhttp://websource.springhouse.com/Lists/CRM Product List/AllItems.aspxFalse19e009f9-6a52-e611-aa97-00155d0a1406
Certified Information Security Manager Prep CourseCISMCertified Information Security Manager Prep Course<p>Obtaining an ISACA CISM certification provides executive management with assurance that those earning the certification have the required experience and knowledge to provide effective security management and consulting services. Individuals earning the CISM certification become part of an elite peer network, attaining a unique and respected credential.  The CISM training program will assist you in becoming part of that elite network, as we'll teach you all the knowledge and skills needed to earn the certification. </p>http://springhouse.com/course-catalog/CISM12/23/2016 8:56:51 PM01176aspxhttp://websource.springhouse.com/Lists/CRM Product List/AllItems.aspxFalse1698f1cd-633c-e511-abf8-00155d0a1406
Certified Information Systems Security ProfessionalCISSPCertified Information Systems Security Professional<p>Information security is part of every IT professional's job. Hackers are constantly trying to compromise your networks, steal sensitive data, and overwhelm your systems. Planning, implementing, enforcing, or even removing security are tasks we all do to keep users and systems safe. Performing these tasks properly and in alignment with industry best practices is critical to virtually every technology role, from decision maker to developer to operator.</p><p>This scenario-based course focuses on computer security as an applied process across job roles and industries. The course also helps to prepare students for achieving the Certified Information Systems Security Professional (CISSP) certification. CISSP is widely regarded as the most valuable vendor-neutral credential a computer security professional can hold. It is frequently identified as a prerequisite for security jobs across all industries including security design, implementation, maintenance, policy development, and management of secured systems, process/procedures, policies, applications and networks.</p><p>This course is primarily for Information Technology Security Professionals who want advance their security certifications such as Certified Information Systems Auditor (CISA), Certified Information Security Manager (CISM), Certified Ethical Hacker (CEH), and related courses. This course also covers most of the knowledge required to prepare for the Systems Security Certified Practitioner (SSCP) certification exam</p>http://springhouse.com/course-catalog/CISSP1/31/2017 8:02:58 PM01799aspx3http://websource.springhouse.com/Lists/CRM Product List/AllItems.aspxFalse8b8d3209-09f0-e411-abf8-00155d0a1406
Junos Security (JSEC)JSECJunos Security (JSEC)<p>​This five-day course covers the configuration, operation, and implementation of SRX Series Services Gateways in a typical network environment. Key topics within this course include security technologies such as security zones, security policies, Network Address Translation (NAT), IP Security (IPsec), and high availability clusters, as well as details pertaining to basic implementation, configuration, management, and troubleshooting.<br><br>Through demonstrations and hands-on labs, students will gain experience in configuring and monitoring the Junos OS and monitoring device operations. This course uses Juniper Networks SRX Series Services Gateways and Security Director for the hands-on component. This course is based on Junos OS Release 15.1X49-D70.3 and Junos Space Security Director 16.1.</p>http://springhouse.com/course-catalog/JSEC3/14/2018 8:00:19 PM01974aspxhttp://websource.springhouse.com/Lists/CRM Product List/AllItems.aspxFalsebcefefb4-821d-e811-87a1-00155d0a1406
Junos Security Bundle - JSEC & AJSECJunos Security BundleJunos Security Bundle - JSEC & AJSEC<p style="text-align:center;">This bundle combines <a href="https://www.sunsetlearning.com/course-catalog/junos-security-jsec2/">JSEC</a> & <a href="https://www.sunsetlearning.com/course-catalog/advanced-junos-security-ajsec/">AJSEC </a>at a discounted rate.  Please <a href="https://www.sunsetlearning.com/contact-us/">Contact SLI</a> to purchase this bundle.</p><p><br><a href="https://www.sunsetlearning.com/course-catalog/junos-security-jsec2/">JUNOS SECURITY (JSEC)</a><br>This five-day course covers the configuration, operation, and implementation of SRX Series Services Gateways in a typical network environment. Key topics within this course include security technologies such as security zones, security policies, Network Address Translation (NAT), IP Security (IPsec), and high availability clusters, as well as details pertaining to basic implementation, configuration, management, and troubleshooting.<br><br>Through demonstrations and hands-on labs, students will gain experience in configuring and monitoring the Junos OS and monitoring device operations. This course uses Juniper Networks SRX Series Services Gateways and Security Director for the hands-on component. This course is based on Junos OS Release 15.1X49-D70.3 and Junos Space Security Director 16.1.<br><br><a href="https://www.sunsetlearning.com/course-catalog/advanced-junos-security-ajsec/">ADVANCED JUNOS SECURITY (AJSEC)</a><br>This five-day course, which is designed to build off of the current Junos Security (JSEC) offering, delves deeper into Junos security. <br><br>Through demonstrations and hands-on labs, you will gain experience in configuring and monitoring the advanced Junos OS security features with advanced coverage of virtualization, AppSecure, advanced Network Address Translation (NAT) deployments, Layer 2 security, and Sky ATP. This course uses Juniper Networks SRX Series Services Gateways for the hands-on component. This course is based on Junos OS Release 15.1X49-D70.3 and Junos Space Security Director 16.1. </p>http://springhouse.com/course-catalog/Junos Security Bundle3/14/2018 8:00:20 PM02091aspxhttp://websource.springhouse.com/Lists/CRM Product List/AllItems.aspxFalse34742e5e-2f1e-e811-87a1-00155d0a1406
50357 Implementing Forefront Threat Management Gateway 20105035750357 Implementing Forefront Threat Management Gateway 2010<p>This course provides students with the knowledge and skills to envision, design, and deploy web access, remote access and mail protection solutions using Microsoft Forefront Threat Management Gateway 2010 (TMG), enabling them to identify the requirements and make the appropriate design decisions that will come up during the deployment process, and providing hands-on experience with the products.</p>http://springhouse.com/course-catalog/503573/14/2018 6:40:57 PM0103aspxhttp://websource.springhouse.com/Lists/CRM Product List/AllItems.aspxFalse44739df2-1f4c-e011-a198-00155d00bf00
NIST Cybersecurity Framework (NCSF) FoundationNIST_CYBERSEC_FRAMEWORK_FOUNDATIONNIST Cybersecurity Framework (NCSF) Foundation<p>​The NIST Cybersecurity Framework (NCSF) course introduces the NIST Cybersecurity Framework (NIST CSF). The Framework is a risk-based approach to managing cybersecurity risk, and is composed of three parts: the Framework Core, the Framework Implementation Tiers, and the Framework Profiles. Each Framework component reinforces the connection between business drivers and cybersecurity activities. The NCSF Foundation training course outlines current cybersecurity challenges and explains how organizations who implement a NCSF program can mitigate these challenges.<br><br>This course discusses how an organization can use the Framework as a key part of its systematic process for identifying, assessing, and managing cybersecurity risk. The Framework is not designed to replace existing processes; an organization can use its current process and overlay it onto the Framework to determine gaps in its current cybersecurity risk approach and develop a roadmap to improvement. Utilizing the Framework as a cybersecurity risk management tool, an organization can determine activities that are most important to critical service delivery and prioritize expenditures to maximize the impact of the investment.<br><br>The class will include lectures, informative supplemental reference materials, quizzes, and tests. Outcomes and benefits from this class is a fundamental understanding of cybersecurity and the NIST CSF.<br><br>The optional certification exam is through ACQUIROS. Student must pass a 90 minute, 100 question closed book multiple choice, examination with a passing score of 70% in order to receive this certification. </p>http://springhouse.com/course-catalog/NIST_CYBERSEC_FRAMEWORK_FOUNDATION11/1/2017 7:31:40 PM03801aspxhttp://websource.springhouse.com/Lists/CRM Product List/AllItems.aspxFalse398678c7-40a9-e711-8b1b-00155d0a1406
NIST Cybersecurity Framework (NCSF) PractitionerNIST_CYBERSECURITY_FRAMEWORK_NCSF_PRACTICTIONERNIST Cybersecurity Framework (NCSF) Practitioner<p>​The NIST Cybersecurity Framework (NCSF) Practitioner program teaches the knowledge to prepare for the NSCF Practitioner exam plus the skills and abilities to design, build, test, manage and improve a cybersecurity program based on the NCSF. This program is positioned to IT and Cybersecurity professionals looking to become certified on how to operationalize the NIST Cybersecurity Framework (NCSF) across an enterprise and its supply chain. <br><br>This course looks at cybersecurity risks and instructs students on the best approach to design and build a comprehensive technology focused cybersecurity program and business focused cyber-risk management program that will minimize risks, and at the same time, protect critical assets.<br>The class will include lectures, informative supplemental reference materials, quizzes, exercises and tests. Outcomes and benefits from this class is a practical approach that students can use to build and maintain comprehensive cybersecurity and cyber-risk management programs.<br><br>The optional certification exam is through ACQUIROS. Student must pass a 180 minute, 100 question closed book multiple choice, examination with a passing score of 70% in order to receive this certification. </p>http://springhouse.com/course-catalog/NIST_CYBERSECURITY_FRAMEWORK_NCSF_PRACTICTIONER11/1/2017 7:31:45 PM03802aspxhttp://websource.springhouse.com/Lists/CRM Product List/AllItems.aspxFalsed3cbfbdf-40a9-e711-8b1b-00155d0a1406

Microsoft Gold Partner

PMI R.E.P.

AXELOS Limited

The Microsoft Gold CPLS logo is a mark of Microsoft, Inc.

The PMI R.E.P. logo is a mark of the Project Management Institute, Inc.

ITIL® is a registered trade mark of AXELOS Limited.
IT Infrastructure Library® is a registered trade mark of AXELOS Limited
The Swirl logo™ is a registered trade mark of AXELOS Limited
Accredited course material is property of ITSM Academy.

Connect with us

Springhouse Education & Consulting Services

Corporate HQ:Eagleview Corporate Park
707 Eagleview Boulevard
Suite 207
Exton, PA 19341

610-321-3500 - info@springhouse.com