Price:
$1,299.00
Days:
1
Virtual
• Block threats earlier: Stop malware before it reaches your network and endpoints, reducing the time spent remediating infections.
• Extend protection to the cloud: Remove blind spots and protect users anywhere they go and access the Internet.
• Secure users, information, and applications: Protect users, data, and applications in the cloud against compromised accounts, cloud-native threats, and data breaches. Support regulatory compliance.
• Enable highly secure cloud use: Improve security while boosting end user productivity.
• Basic computer literacy
• Basic Internet usage skills
• Basic PC operating system navigation skills
• Basic IP address knowledge
• Introducing the Cloud
• Introducing the Cloud
• Introducing the Cloud
• Introducing the Cloud
• Introducing Securing the Cloud
• Introducing Securing the Cloud
• Introducing Securing the Cloud
• Introducing Securing the Cloud
• Describing Cloud Security Solutions Using AWS
• Describing Cloud Security Solutions Using AWS
• Describing Cloud Security Solutions Using AWS
• Describing Cloud Security Solutions Using AWS
• Introducing Security in a SaaS Environment
• Introducing Security in a SaaS Environment
• Introducing Security in a SaaS Environment
• Introducing Security in a SaaS Environment
• Introducing the Cloud
• Introducing the Cloud
• Introducing the Cloud
• Introducing the Cloud
• Describe the Evolution of Cloud Computing
• Describe the Evolution of Cloud Computing
• Describe the Evolution of Cloud Computing
• Describe the Evolution of Cloud Computing
• Explain Cloud Service Models
• Explain Cloud Service Models
• Explain Cloud Service Models
• Explain Cloud Service Models
• Explore Cloud Deployment Models
• Explore Cloud Deployment Models
• Explore Cloud Deployment Models
• Explore Cloud Deployment Models
• Introducing Securing the Cloud
• Introducing Securing the Cloud
• Introducing Securing the Cloud
• Introducing Securing the Cloud
• Describe the Cisco Threat-Centric Approach to Network Security
• Describe the Cisco Threat-Centric Approach to Network Security
• Describe the Cisco Threat-Centric Approach to Network Security
• Describe the Cisco Threat-Centric Approach to Network Security
• Describe Cloud Physical Environment Security
• Describe Cloud Physical Environment Security
• Describe Cloud Physical Environment Security
• Describe Cloud Physical Environment Security
• Describe Cloud Network Infrastructure Security
• Describe Cloud Network Infrastructure Security
• Describe Cloud Network Infrastructure Security
• Describe Cloud Network Infrastructure Security
• Explain Application Security
• Explain Application Security
• Explain Application Security
• Explain Application Security
• Explore Cloud Management and API Security
• Explore Cloud Management and API Security
• Explore Cloud Management and API Security
• Explore Cloud Management and API Security
• Describe Cisco Cloud-Based Security Solutions
• Describe Cisco Cloud-Based Security Solutions
• Describe Cisco Cloud-Based Security Solutions
• Describe Cisco Cloud-Based Security Solutions
• Describe Network Functions Virtualization (NFV), Virtual Network Function (VNF), and Secure Agile Exchange (SAE)
• Describe Network Functions Virtualization (NFV), Virtual Network Function (VNF), and Secure Agile Exchange (SAE)
• Describe Network Functions Virtualization (NFV), Virtual Network Function (VNF), and Secure Agile Exchange (SAE)
• Describe Network Functions Virtualization (NFV), Virtual Network Function (VNF), and Secure Agile Exchange (SAE)
• Describe Cisco CloudCenter for MultiCloud Management
• Describe Cisco CloudCenter for MultiCloud Management
• Describe Cisco CloudCenter for MultiCloud Management
• Describe Cisco CloudCenter for MultiCloud Management
• Describe Cisco Stealthwatch
• Describe Cisco Stealthwatch
• Describe Cisco Stealthwatch
• Describe Cisco Stealthwatch
• Describing Cloud Security Solutions Using AWS
• Describing Cloud Security Solutions Using AWS
• Describing Cloud Security Solutions Using AWS
• Describing Cloud Security Solutions Using AWS
• Identify AWS Security Offerings
• Identify AWS Security Offerings
• Identify AWS Security Offerings
• Identify AWS Security Offerings
• Identify Cisco Security Solutions in AWS
• Identify Cisco Security Solutions in AWS
• Identify Cisco Security Solutions in AWS
• Identify Cisco Security Solutions in AWS
• Introducing Security in a SaaS Environment
• Introducing Security in a SaaS Environment
• Introducing Security in a SaaS Environment
• Introducing Security in a SaaS Environment
• Describe SaaS Applications
• Describe SaaS Applications
• Describe SaaS Applications
• Describe SaaS Applications
• Describe SaaS Security Challenges
• Describe SaaS Security Challenges
• Describe SaaS Security Challenges
• Describe SaaS Security Challenges
• Explain Cloud Access Security Broker
• Explain Cloud Access Security Broker
• Explain Cloud Access Security Broker
• Explain Cloud Access Security Broker
• Describe Cisco CloudLock
• Describe Cisco CloudLock
• Describe Cisco CloudLock
• Describe Cisco CloudLock
• Describe OAuth and OAuth Attacks
• Describe OAuth and OAuth Attacks
• Describe OAuth and OAuth Attacks
• Describe OAuth and OAuth Attacks
• Describe Cisco Advanced Malware Protection for Endpoints
• Describe Cisco Advanced Malware Protection for Endpoints
• Describe Cisco Advanced Malware Protection for Endpoints
• Describe Cisco Advanced Malware Protection for Endpoints
• Describe Cisco Cloud Email Security
• Describe Cisco Cloud Email Security
• Describe Cisco Cloud Email Security
• Describe Cisco Cloud Email Security
• Describe Cisco Umbrella
• Describe Cisco Umbrella
• Describe Cisco Umbrella
• Describe Cisco Umbrella
• Lab Outline
• Lab Outline
• Lab Outline
• Lab Outline
Support Diversity, Equity, and Inclusion with Every Purchase.
Great Horizons is a North Carolina Certified HUB Vendor and WOSB. By becoming a patron of our organization, you are not only supporting a historically underutilized business, but a woman-owned small business as well.
Give your organization the skills edge it needs. Our corporate training experts will work with you to design, deliver, and support a customized IT program that drives real business results.