Hands-On Cybersecurity Operations Fundamentals

This course is a comprehensive two-day training for anyone interested in the field of Security Operations or CyberOps. It is meant to give you the core knowledge you need to further your career in security. Topics covered include security concepts, security monitoring, host-based analysis, network intrusion analysis, and security policies and procedures. This training is for security and network professionals who want to develop a security infrastructure, recognize threats and vulnerabilities to networks, and mitigate security threats. It also gives you a perspective on what you might expect working in a Cyber Operations role in a Security Operations Center.
This course includes deep dives into key topic areas as well as hands-on labs that students can utilize to test out some of the Cyber Operations techniques discussed in the course. This is an interactive course where we spend time whiteboarding and discussing the concepts covered in the schedule as well as demos of controls and tools used in the industry today.

Top 10 Defensive Tactics to Combat Cyber Attacks

Nobody wants to be hit with ransomware or to find their name all over the media because they just got hacked. This training course will give you the top ten defensive tactics needed to identify and protect your environments and provide a quick overview of actual cybersecurity concerns in today’s world. Ron Taylor, Security Architect at Cisco, will walk through the latest, top-of-mind security threats in the industry today. This course will additionally outline strategies for Cyber Defense against the current threats impacting technology today. Attendees will gain access to a cloud-based lab environment to give you the opportunity to dive in and get hands on experience with offensive and defensive tactics.

Cyber Resilience Bootcamp

This course is a comprehensive two-day training for anyone interested in the field of Security Operations or CyberOps. It is meant to give you the core knowledge you need to further your career in security. Topics covered include security concepts, security monitoring, host-based analysis, network intrusion analysis, and security policies and procedures. This training is for security and network professionals who want to develop a security infrastructure, recognize threats and vulnerabilities to networks, and mitigate security threats. It also gives you a perspective on what you might expect working in a Cyber Operations role in a Security Operations Center.
This course includes deep dives into key topic areas as well as hands-on labs that students can utilize to test out some of the Cyber Operations techniques discussed in the course. This is an interactive course where we spend time whiteboarding and discussing the concepts covered in the schedule as well as demos of controls and tools used in the industry today.

Keep in touch with Ron