A+ Preparatory Computer Repair Training Class

Computer Training ClassesWelcome to South Florida’s finest CompTIA-member computer repair school.   Our hands-on classes begin weekly and are taught by qualified instructors — each considered to be an industry expert.  Since 1989, PC Professor has been offering computer repair classes to those seeking condensed,  instructor-led training in a relaxed and  professional environment.  Visit us today to see why PC Professor Technical Institute has become synonymous with “Academic Excellence” .

Computer Repair Class Overview:
If you are getting ready for a career as an entry-level information technology (IT) professional or personal computer (PC) service technician, the CompTIA “A+Preparatory Certification” course is the first step in your preparation. The course will build on your existing user-level knowledge and experience with personal computer software and hardware to present fundamental skills and concepts that you will use on the job. In this course, you will acquire the essential skills and information you will need to install, upgrade, repair, configure, troubleshoot, optimize, and perform preventative maintenance of basic personal computer hardware and operating systems.

Course Objectives:
You will learn to install, upgrade, repair, configure, optimize, troubleshoot, and perform preventative maintenance on windows-based personal computer hardware and operating systems.

Course Materials:
Over a dozen intense chapters covering all the national exams.  Many useful illustrations, drawings, and helpful photographs are included as well. Also included are practice test questions, exercises, labs, etc.  Notes and highlighting can be done directly in the electronic book (class dependent), or instead, PC Professor may provided a physical book for each enrolled student.

Target Student:
The target student for the A+ Preparatory Computer Repair Class is anyone with basic computer user skills who is interested in pursuing a career as an IT (information technology) professional or as a PC (personal computer) technician.  Possible job environments include mobile and/or corporate settings with a high level of face-to face client interaction, remote-based work environments where client interaction, client training, operating systems, and connectivity issues are emphasized, or settings with limited customer interaction where hardware activities are emphasized.

In addition, this fast-paced course will help prepare students to achieve a nationally-recognized CompTIA A+ certification so it may be suitable for those seeking career enhancement and/or career advancement.

Prerequisites:
Students taking this course should have the following skills: End-user skills with Windows-based personal computers, including the ability to browse and search for information on the Internet.  Start up and shut down the computer.  Log on to a computer and/or computer network.  Run programs.  Move, copy, delete, and rename files in Windows Explorer.  Basic knowledge of computing concepts, including the difference between hardware and software.  The functions of software components, such as the operating system, applications, and file systems.  The function of a computer network, an operating system and the internet.

PC Professor’s computer repair classes begin regularly and fill quickly.  Contact an Admissions Rep today to discuss the enrollment process.

CompTIA’s pre-approved Continuing Education Units (CEU) list for certification renewal:

CERTIFICATION PROVIDER COURSE TITLE
AMAZON WEB SERVICES SECURITY OPERATIONS ON AWS
AWS SECURITY FUNDAMENTALS
APPLE EL CAPITAN 101 OS X SUPPORT ESSENTIALS 10.11
YOSEMITE 101 OS X SUPPORT ESSENTIALS 10.10
YOSEMITE 201 OS X SERVER ESSENTIALS 10.10
APPLE CERTIFIED MACINTOSH TECHNICIAN (ACMT)
MANAGING APPLE DEVICES 2.0 DEPLOYING, MAINTAINING IOS 9 & EL CAPITAN
MANAGING APPLE DEVICES 3.0 DEPLOYING, MAINTAINING IOS 9 AND EL CAPITAN
ARUBA ADVANCED TROUBLESHOOTING
AIRWAVE WIRELESS MANAGEMENT SUITE INSTALLATION, CONFIGURATION & USE
ARUBA INSTANT ACCESS POINTS (IAP)
CLEARPASS ESSENTIALS
HP ONLY – ARUBA MOBILITY BOOT CAMP
IMC ESSENTIALS FOR NETWORK ADMINISTRATORS
IMPLEMENTING ARUBA WLAN
MIGRATING FROM CISCO TO HP FLEXNETWORKS
MOBILITY ACCESS SWITCH
SCALABLE WLAN DESIGN & IMPLEMENTATION (SWDI)
SOLUTIONS PART 1
AVAYA IP OFFICE BASIC INTEGRATION AND CONFIGURATION (7720C)
INTRODUCTION TO SESSION INITIATION PROTOCOL (SIP) V2.0
MERIDIAN 1 OPTION 11C INSTALLATION, MAINTENANCE, AND DATABASE – COMMUNICATION SERVER 1000 RELEASE 5.5
STACKABLE ERS AND VSP INSTALLATION, CONFIGURATION, AND MAINTENANCE
AVAYA COMMUNICATION SERVER 1000 DIALING PLAN DESIGN AND IP PEER NETWORKING
ERS 8800/8600 INSTALLATION AND CONFIGURATION
BROCADE SAN 130-WBT BROCADE 8 GBPS FIBRE CHANNEL PRODUCT
SAN 140-WBT BROCADE 16 GBPS FIBRE CHANNEL PRODUCT
CFA 200 CORE GEN 5 SAN ADMINISTRATION
DCX 200 DCX BACKBONE PRODUCT ADMINISTRATION
CFP 300 ADVANCED GEN 5 SAN ADMINISTRATION
CFD 200 BROCADE GEN 5 SAN DESIGN
SAN-TS 300-ILT SAN TROUBLESHOOTING
EXT 110-WBT INTRODUCTION TO THE BROCADE 7840 EXTENSION SWITCH
NIP 200-ILT BROCADE NETWORK INDUSTRY PROTOCOL
CEF 260-WBT IP STORAGE NETWORKING
CEF 250-WBT BRIDGE TO BROCADE ETHERNET FABRICS FOR NETWORK PROFESSIONALS
VDX-TS 300-WBT ADVANCED ETHERNET FABRIC TROUBLESHOOTING
NOS 110-WBT NETWORK OS UPDATE
BPIPA 200-ILT BROCADE PROFESSIONAL IP ADMINISTRATOR
IPTS-300-ILT TROUBLESHOOTING IP NETWORKS
BGP 400 BORDER GATEWAY PROTOCOL (BGP) FOR SP AND ENTERPRISE NETWORKS
MPLS 400 BROCADE MPLS IMPLEMENTATION
MPLS-TE 450 MPLS TRAFFIC ENGINEERING
ICX 101-WBT IMPLEMENTING EFFORTLESS NETWORKS WITH THE BROCADE ICX FAMILY
ICX 150-WBT INTRODUCTION TO HYPEREDGE AND THE ICX 6430-C12 SWITCH
SMT 120-WBT BROCADE IP NETWORKING PRODUCTS, SERVICE, AND MAINTENANCE TRAINING
IPV6 101-WBT BROCADE IPV6 FUNDAMENTALS
IPV6 150-WBT BROCADE IPV6 IMPLEMENTATION
CLE 202 INTRODUCTION TO ADX APPLICATION SWITCHING AND LOAD BALANCING
VADC 200-ILT BROCADE VIRTUAL APPLICATION DELIVERY ESSENTIALS
VTM 200-WBT INTRODUCTION TO BROCADE VIRTUAL TRAFFIC MANAGER
VWAF 200-WBT INTRODUCTION TO BROCADE VIRTUAL WEB APPLICATION FIREWALL
VADX 101-WBT INTRODUCTION TO THE BROCADE VIRTUAL ADX APPLICATION DELIVERY SWITCH
BNA 101-WBT INTRODUCTION TO BROCADE NETWORK ADVISOR
BNA 150-WBT BROCADE NETWORK ADVISOR IMPLEMENTATION, MIGRATION, AND CONFIGURATION
BNA 200-SAN BROCADE NETWORK ADVISOR FOR SAN
BNA 200-IP BROCADE NETWORK ADVISOR FOR IP NETWORKS
BNA 160-WBT MANAGING STORAGE AREA NETWORKS WITH BROCADE NETWORK ADVISOR
BNA 170-WBT MANAGING IP NETWORKS WITH BROCADE NETWORK ADVISOR
BNA 180-WBT MANAGING ETHERNET FABRICS WITH BROCADE NETWORK ADVISOR
NFV 200 BROCADE 5600 VROUTER FUNDAMENTALS
NFV 900-WBT BROCADE VYATTA 5600 VROUTER ALL COURSES BUNDLE
SDN 900-WBT BROCADE VYATTA 5400 VROUTER ALL COURSES BUNDLE
CHECK POINT CHECK POINT CERTIFIED SECURITY ADMINISTRATOR (CCSA) R77.30
CHECK POINT CERTIFIED SECURITY ADMINISTRATOR (CCSA) R80
SECURITY ENGINEERING (CHECK POINT CERTIFIED SECURITY EXPERT (CCSE) R77.30)
THREAT PREVENTION
SECURE WEB GATEWAY
MDSM WITH VSX (MULTI-DOMAIN SECURITY MANAGEMENT WITH VIRTUAL SYSTEM EXTENSION)
CHECK POINT CERTIFIED SECURITY MASTER (CCSM) R77.30
CISCO SECURING CISCO NETWORKS WITH THREAT DETECTION AND ANALYSIS (SCYBER) 1
INTERCONNECTING CISCO NETWORKING DEVICES, PART 1 (ICND1) 3.0
DESIGNING WITH CISCO NETWORK PROGRAMMABILITY V2.0
INTERCONNECTING CISCO NETWORKING DEVICES, PART 1 (ICND1)2.0
DESIGNING WITH CISCO NETWORK PROGRAMMABILITY FOR ACI V1.10
IMPLEMENTING CISCO NETWORK PROGRAMMABILITY V2.0
IMPLEMENTING CISCO NETWORK PROGRAMMABILITY FOR ACI V1.1
IMPLEMENTING CISCO SECURE MOBILITY SOLUTIONS (SIMOS) 1.0
IMPLEMENTING CISCO SECURE ACCESS CONTROL SYSTEM V5.2
DESIGNING FOR CISCO INTERNETWORK SOLUTIONS (DESGN) V3.0
DESIGNING THE CISCO CLOUD (CLDDES) 1.0
AUTOMATING THE CISCO ENTERPRISE CLOUD (CLDAUT) 1.0
IMPLEMENTING CISCO THREAT CONTROL SOLUTIONS (SITCS) 1.5
CITRIX IMPLEMENTING CITRIX NETSCALER 11 FOR APP AND DESKTOP SOLUTIONS (CNS-207)
CITRIX XENAPP AND XENDESKTOP HELPDESK SUPPORT
CITRIX NETSCALER 11 ADVANCED IMPLEMENTATION (CNS-301)
CITRIX NETSCALER 10 ESSENTIALS FOR ACE MIGRATION
DEPLOYING ENTERPRISE MOBILITY SOLUTIONS WITH CITRIX XENMOBILE (CXM-303)
COMPTIA COMPTIA MOBILITY+ (MB0-001)
COMPTIA ADVANCED SECURITY PRACTITIONER (CASP) (CAS-002)
COMPTIA NETWORK+ (N10-006)
COMPTIA SECURITY+ (SY0-401)
COMPTIA A+ 901/902 – APPROVED ONLY FOR THOSE CERTIFIED IN A+ 801/802 AND EARLIER
COMPTIA SERVER+ (SK0-004)
COMPTIA LINUX+ (LX0-103/LX0-104)
CSA CCSK
GRC STACK
CWNP CWTS – ENTERPRISE WI-FI FUNDAMENTALS
CWNA – ENTERPRISE WI-FI ADMINISTRATION
CWSP – ENTERPRISE WI-FI SECURITY
CWDP – ENTERPRISE WI-FI DESIGN
CWAP – ENTERPRISE WI-FI ANALYSIS & TROUBLESHOOTING
DELL Dell SC Series Installation and Configuration
Introduction to Dell PS Series Storage Arrays
Dell PS Series Storage Admin and Data Protection Tools
Integrating vSphere with Dell PS Series Storage
Dell SC Storage Center Administration and Management
Dell PS Series vSphere Integration
Dell Storage Networking Configuration
Dell Networking Planning
Dell Networking Installation and Configuration
Dell Networking Interoperability
Dell Networking Fundamentals-Routing
Dell Networking Fundamentals – Switching
Dell Networking Data Center Advanced Features & Administration
Dell Networking Campus Design, Advanced Features and Configuration
Dell Networking Fast Track from Cisco to Dell OS 9
Dell Campus Networking N-Series Features & Basic Administration
Dell Networking Data Center Overview & Basic Administration
Dell OpenManage Essentials Administration
Optimizing and Managing Dell PowerEdge Blade Server Solutions
Optimizing and Managing Dell PowerEdge Server Solutions
EC-COUNCIL CERTIFIED ETHICAL HACKER (CEH) V9
CERTIFIED SECURITY ANALYST (ECSA) V9
NETWORK SECURITY ADMINISTRATOR (ENSA)
DISASTER RECOVERY PROFESSIONAL (EDRP)
SECURE PROGRAMMER .NET (ECSP)
LICENSED PENETRATION TESTER (LPT)
COMPUTER HACKING FORENSICS INVESTIGATOR (CHFI)
CERTIFIED CHIEF INFORMATION SECURITY OFFICER (CCISO)
CERTIFIED ETHICAL HACKER (CEH) V9
CERTIFIED SECURITY SPECIALIST (ECSS)
CERTIFIED INCIDENT HANDLER (ECIH)
CERTIFIED ENCRYPTION SPECIALIST (ECES)
CERTIFIED VOIP PROFESSIONAL (ECVP)
EMC AVAMAR INTEGRATION AND PERFORMANCE MANAGEMENT
AVAMAR MANAGEMENT
BACKUP RECOVERY SOLUTIONS – AVAMAR TO DATA DOMAIN INTEGRATION
BACKUP RECOVERY SOLUTIONS – MICROSOFT EXCHANGE INTEGRATION
BACKUP RECOVERY SOLUTIONS – MICROSOFT SHAREPOINT INTEGRATION
BACKUP RECOVERY SOLUTIONS – NDMP INTEGRATION
BACKUP RECOVERY SOLUTIONS – NETWORKER TO AVAMAR INTEGRATION
BACKUP RECOVERY SOLUTIONS – NETWORKER TO DATA DOMAIN INTEGRATION
BACKUP RECOVERY SOLUTIONS – ORACLE INTEGRATION
BACKUP RECOVERY SOLUTIONS – VMWARE INTEGRATION
BUSINESS CONTINUITY SOLUTIONS DESIGNER (BCSD) FOR RECOVERPOINT
BUSINESS CONTINUITY SOLUTIONS DESIGNER (BCSD) FOR VPLEX
CELERRA NS SERIES INSTALLATION AND MAINTENANCE
CELERRA UNIFIED QUICKSTART: BASIC MANAGEMENT OVERVIEW
CELERRA UNIFIED QUICKSTART: INSTALLATION AND CONFIGURATION USING CSA
CELERRA UNIFIED QUICKSTART: NS-120 HARDWARE OVERVIEW & INSTALLATION
CELERRA UNIFIED QUICKSTART: NS-480 HARDWARE OVERVIEW & INSTALLATION
CELERRA UNIFIED QUICKSTART: NX4 HARDWARE OVERVIEW & INSTALLATION
CELERRA UNIFIED QUICKSTART: PRODUCT INSTALLATION AND CONFIGURATION OVERVIEW
CELERRA UNIFIED QUICKSTART: PROVISIONING FOR FCCONNECTED HOSTS
CENTERA FUNDAMENTALS
CENTERA HARDWARE CONFIGURATIONS
CENTERA INSTALLATION AND MAINTENANCE
CENTERA TOOLS AND INSTALLATION
CENTERA UNIVERSAL ACCESS
CENTERA UPGRADES AND MAINTENANCE
CLARIION BASIC MANAGEMENT
CLARIION CX3 INSTALLATION DIFFERENCES
CLARIION FOUNDATIONS
CLARIION HARDWARE
CLARIION INSTALLATION AND MAINTENANCE
CLOUD INFRASTRUCTURE PLANNING AND DESIGN
CLOUD SERVICES PLANNING AND DESIGN
CONNECTIVITY PROTOCOLS
EMC AVAILABILITY INFRASTRUCTURE SOLUTIONS AND DESIGN
EMC BACKUP RECOVERY INFRASTRUCTURE SOLUTIONS
EMC BACKUP RECOVERY SOLUTIONS DESIGN
ISILON FUNDAMENTALS
ISILON HARDWARE BASICS AND GUIDELINES
ISILON HARDWARE INSTALLATION
ISILON HARDWARE MAINTENANCE
ISILON INFRASTRUCTURE SOLUTIONS
ISILON INITIAL CONFIGURATION
ISILON SOLUTION DESIGN
NETWORKER INSTALLATION, CONFIGURATION AND ADMINISTRATION
RECOVERPOINT FUNDAMENTALS
SAN MANAGEMENT
VMAX FAMILY INSTALLATION AND MAINTENANCE
VMAX1 AND VMAX2 HARDWARE FUNDAMENTALS
VMAX3 – UNISPHERE FOR VMAX IMPLEMENTATION AND MANAGEMENT
VMAX3 CONFIGURATION MANAGEMENT
VMAX3 FUNDAMENTALS
VMAX3 HARDWARE FUNDAMENTALS
VMAX3 SECURITY CONCEPTS
VNX APPLICATION PROTECTION SUITE FUNDAMENTALS
VNX BASIC HARDWARE MAINTENANCE
VNX HARDWARE FUNDAMENTALS
VNX INSTALLATION AND INITIAL CONFIGURATION
XTREMIO HARDWARE FUNDAMENTALS
ENCASE DIGITAL MEDIA – ACQUISITION AND TRIAGE
ENCASE V7 FORENSICS AND ENTERPRISE FUNDAMENTALS
ENCASE® V7 COMPUTER FORENSICS I
INCIDENT INVESTIGATION
ENCASE® ENTERPRISE EXAMINATIONS
ENCASE® EXAMINATIONS OF THE MACINTOSH OPERATING SYSTEMS
HOST INTRUSION METHODOLOGY AND INVESTIGATION
ENCASE® CYBERSECURITY AND ANALYTICS V5
ENCASE® EXAMINATION OF NTFS
ENCASE® ADVANCED INTERNET EXAMINATIONS
ENCASE® ADVANCED COMPUTER FORENSICS
HP DESIGNING HP DATA CENTER AND CLOUD SOLUTIONS, REV. 15.11
DESIGNING HPE DATA CENTER AND CLOUD SOLUTIONS, REV. 16.11
DELTA – DESIGNING HPE DATA CENTER AND CLOUD SOLUTIONS, REV. 16.11
CREATING HPE SOFTWARE-DEFINED NETWORKS, REV. 15.41
BUILDING HP FLEXFABRIC DATA CENTERS, REV. 14.41
ARCHITECTING HP FLEXNETWORK SOLUTIONS, REV 14.21
DEPLOYING HP FLEXNETWORK CORE TECHNOLOGIES, REV 14.31
HP-UX SECURITY I
HP INTEGRITY VIRTUAL MACHINES V4.3 ADMINISTRATION
HP-UX LOGICAL VOLUME MANAGER
HP INTEGRITY VM V6 AND HP-UX VPARS V6 ADMINISTRATION
HP-UX PERFORMANCE AND TUNING
HP SERVICEGUARD I
HP SYSTEMS INSIGHT MANAGER
HPE ARCSIGHT MASTER ASE PREPARATION COURSE
ARCSIGHT ESM 6.5 ADVANCED ADMINISTRATOR
ARCSIGHT ESM 6.5 ADVANCED ANALYST
ARCSIGHT LOGGER – 6.0 ADMINISTRATION AND OPERATIONS
DYNAMIC APPLICATION TESTING WITH HP WEBINSPECT 10.3
HP FORTIFY STATIC CODE ANALYZER / SOFTWARE SECURITY CENTER 4.2
IBM SOFTLAYER FUNDAMENTALS
IBM SECURITY QRADAR SIEM 7.2 ADMINISTRATION AND CONFIGURATION
IBM SECURITY QRADAR SIEM FOUNDATIONS
IBM SECURITY DIRECTORY SERVER 6.3.1 SYSTEM ADMINISTRATION
IBM SECURITY IDENTITY MANAGER 6.0 BASIC ADMINISTRATION
IBM SECURITY QRADAR INCIDENT FORENSICS CONFIGURATION AND USAGE
WEB APPLICATION SECURITY FUNDAMENTALS
IBM SECURITY ACCESS MANAGER FOR ENTERPRISE SINGLE SIGN-ON 8.2.1 ADMINISTRATION
IBM SECURITY ACCESS MANAGER FOR MOBILE 8.0
IBM SECURITY ACCESS MANAGER FOR WEB
IBM SECURITY PRIVILEGED IDENTITY MANAGER FUNDAMENTALS
IBM ENDPOINT MANAGER 9.2 SECURITY AND COMPLIANCE FUNDAMENTALS
IBM SECURITY QRADAR ADVANCED TOPICS
IBM SECURITY APPSCAN STANDARD FUNDAMENTALS
LINUX BASIC AND INSTALLATION
INTRODUCTION TO IBM I FOR NEW USERS
LINUX SYSTEM ADMINISTRATION I: IMPLEMENTATION
LINUX ON POWER PERFORMANCE
ISACA WEB APPLICATION SECURITY FOR AUDITORS
COBIT 5 ASSESSOR FOR SECURITY
INFORMATION SECURITY MANAGEMENT
INFORMATION SECURITY MANAGEMENT (ADVANCED)
AUDIT & SECURITY OF FIREWALLS
SECURING & AUDITING MOBILE TECHNOLOGIES
SECURING & AUDITING WIRELESS & MOBILE TECHNOLOGIES
VIRTUALIZATION SECURITY & AUDIT
WINDOWS 8 SECURITY & AUDIT
CLOUD COMPUTING SECURITY & AUDIT
DATABASE SECURITY AND AUDIT
RISK-BASED APPROACH TO IT INFRASTRUCTURE SECURITY & CONTROL ASSESSMENTS
IT RISK MANAGEMENT
CISM EXAM REVIEW
CRISC EXAM REVIEW
CYBERSECURITY FUNDAMENTALS
CSX PRACTITIONER: IDENTIFICATION AND PROTECTION
CSX PRACTITIONER: RESPOND AND RECOVER
CSX PRACTITIONER BOOT CAMP
CSX PRACTITIONER: DETECTION
CSX SPECIALIST: IDENTIFY
CSX SPECIALIST: PROTECT
CSX SPECIALIST: DETECT
CSX SPECIALIST: RECOVER
CSX SPECIALIST: RESPOND
Real World Application of RMF for DoD IT
ISC(2) (ISC)2TRAINING FOR CAP
(ISC)2TRAINING FOR CCFP
(ISC)2TRAINING FOR CCSP
(ISC)2TRAINING FOR CISSP
(ISC)2TRAINING FOR CSSLP
(ISC)2TRAINING FOR HCISPP
(ISC)2TRAINING FOR CISSP-ISSAP
(ISC)2TRAINING FOR CISSP-ISSEP
(ISC)2TRAINING FOR CISSP-ISSMP
(ISC)2TRAINING FOR SSCP
JUNIPER ADVANCED DATA CENTER SWITCHING (ADCX)
JUNIPER NETWORKS DESIGN FUNDAMENTALS (JNDF)
ADVANCED JUNIPER NETWORKS VPN IMPLEMENTATIONS (AJVI)
ADVANCED JUNOS ENTERPRISE ROUTING (AJER)
ADVANCED JUNOS ENTERPRISE ROUTING TROUBLESHOOTING (AJERT)
ADVANCED JUNOS ENTERPRISE SECURITY TROUBLESHOOTING (AJEST)
ADVANCED JUNOS ENTERPRISE SWITCHING (AJEX)
ADVANCED JUNOS ENTERPRISE SWITCHING TROUBLESHOOTING (AJEXT)
ADVANCED JUNOS SECURITY (AJSEC)
ADVANCED JUNOS SERVICE PROVIDER ROUTING (AJSPR)
ADVANCED JUNOS ENTERPRISE SWITCHING USING ENHANCED LAYER 2 SOFTWARE (AJEX-ELS)
ADVANCED JUNOS SERVICE PROVIDER TROUBLESHOOTING (AJSPT)
ATTACK PREVENTION WITH JUNIPER NETWORKS FIREWALLS (APJF)
AX411 ACCESS POINT INSTALLATION AND CONFIGURATION
INTEGRATING JUNIPER NETWORKS FIREWALL/IPSEC VPN PRODUCTS INTO HIGH-PERFORMANCE NETWORKS (IFVH)
JUNOS ENTERPRISE SWITCHING (JEX)
JUNOS ENTERPRISE SWITCHING USING ELS (JEX-ELS)
JUNOS INTERMEDIATE ROUTING (JIR)
JUNOS INTRUSION PREVENTION SYSTEMS (JIPS)
JUNOS MULTICAST ROUTING (JMR)
JUNOS ROUTING ESSENTIALS (JRE)
JUNIPER NETWORKS DESIGN-WAN (JND-WAN)
JUNIPER NETWORKS SDN FUNDAMENTALS (JSDNF)
CONFIGURING JUNIPER NETWORKS FIREWALL/IPSEC VPN PRODUCTS (CJFV)
DATA CENTER SWITCHING (DCX)
JUNOS EDGE SECURITY SERVICES (JESS)
JNCIE SECURITY BOOTCAMP (JNCIE-SEC)
JNCIE SERVICE PROVIDER BOOTCAMP (JNCIE-SP)
JUNIPER NETWORKS DESIGN – DATA CENTER (JND-DC)
POLICY SECURE CONFIGURATION AND ADMINISTRATION
CONNECT SECURE ADMINISTRATION AND MAINTENANCE
JUNOS SECURITY (JSEC)
NETWORK AUTOMATION USING CONTRAIL CLOUD (NACC)
JUNOS SERVICE PROVIDER SWITCHING (JSPX)
NETWORKING FUNDAMENTALS
JUNOS UNIFIED THREAT MANAGEMENT (JUTM)
TROUBLESHOOTING DATA CENTER SWITCHING (TDCX)
WLAN FUNDAMENTALS
LINUX LINUX SECURITY
LINUX SYSTEM ADMINISTRATION
MASTERING THE LINUX COMMAND LINE
INTRODUCTION TO VMWARE ESXI
SOFTWARE DEFINED NETWORKING WITH OPENDAYLIGHT
ADVANCED LINUX SYSTEM ADMINISTRATION AND NETWORKING
ESSENTIALS OF SYSTEM ADMINISTRATION
PENETRATION TESTING WITH LINUX TOOLS
LINUX IN THE REAL WORLD
CENTOS SYSTEM ADMINISTRATOR PREP
LINUX ESSENTIALS
PUPPET FUNDAMENTALS
COMPLIANCE BASICS FOR DEVELOPERS
SOFTWARE DEFINED NETWORKING WITH OPENDAYLIGHT
OPEN SOURCE VIRTUALIZATION
LINUX ENTERPRISE AUTOMATION
ESSENTIALS OF OPENSTACK ADMINISTRATION
LINUX SECURITY
HIGH AVAILABILITY LINUX ARCHITECTURE
LINUX PERFORMANCE TUNING
LINUX SYSTEM ADMINISTRATION
ADVANCED LINUX SYSTEM ADMINISTRATION AND NETWORKING
INTRODUCTION TO LINUX, OPEN SOURCE DEVELOPMENT, AND GIT
INSIDE ANDROID: AN INTRO TO ANDROID INTERNALS
OPTIMIZING LINUX DEVICE DRIVERS FOR POWER EFFICIENCY
LINUX KERNEL DEBUGGING AND SECURITY
INTRODUCTION TO LINUX
INTRODUCTION TO CLOUD INFRASTRUCTURE TECHNOLOGIES
LINUX NETWORKING AND ADMINISTRATION
LINUX SECURITY FUNDAMENTALS
OPENSTACK ADMINISTRATION FUNDAMENTALS
SOFTWARE DEFINED NETWORKING FUNDAMENTALS
FUNDAMENTALS OF LINUX
MCAFEE McAfee Application Control / Change
MCAFEE VIRUSSCAN ENTERPRISE 8.8
Endpoint Security 10. x Administration
McAfee® Drive Encryption
McAfee Endpoint Encryption Essentials
MCAFEE NETWORK DATA LOSS PREVENTION
McAfee® VirusScan and ePolicy Orchestrator
McAfee® Advanced Threat Defense
McAfee Host Intrusion Prevention
McAfee Database Security
MCAFEE® NETWORK SECURITY PLATFORM
MCAFEE WEB GATEWAY ADMINISTRATION
MCAFEE THREAT INTELLIGENCE EXCHANGE ADMINISTRATION
MCAFEE POLICY AUDITOR ADMINISTRATION
MCAFEE® SECURITY INFORMATION EVENT MANAGEMENT (SIEM) ADMINISTRATION COURSE 101
MCAFEE ADVANCED THREAT DEFENSE 3.0
MCAFEE DATABASE SECURITY 5.0
McAfee Email Gateway 7.6
MCAFEE ENTERPRISE MOBILITY MANAGEMENT ESSENTIALS 11.0
McAfee Endpoint Encryption(PC&MAC) 7.0
MCAFEE SIEM 9.4
MCAFEE WEB GATEWAY 7.5
NETWORK SECURITY PLATFORM 8.2 ESSENTIALS
VIRUSSCAN ENTERPRISE
MICROSOFT INSTALLING AND CONFIGURING WINDOWS 10
DEPLOYING AND MANAGING WINDOWS 10 USING ENTERPRISE SERVICES
INSTALLING AND CONFIGURING WINDOWS® 7 CLIENT
TROUBLESHOOTING AND SUPPORTING WINDOWS® 7 IN THE ENTERPRISE
PLANNING AND MANAGING WINDOWS® 7 DESKTOP DEPLOYMENTS AND ENVIRONMENTS
DEPLOYING WINDOWS DESKTOPS AND ENTERPRISE APPLICATIONS
SUPPORTING AND TROUBLESHOOTING WINDOWS 10
NETWORKING FUNDAMENTALS
SECURITY FUNDAMENTALS
OVERVIEW OF ACTIVE DIRECTORY RIGHTS MANAGEMENT SERVICES WITH WINDOWS SERVER 2008 R2
CONFIGURING AND TROUBLESHOOTING WINDOWS SERVER® 2008 ACTIVE DIRECTORY® DOMAIN SERVICES
CONFIGURING AND TROUBLESHOOTING IDENTITY AND ACCESS SOLUTIONS WITH WINDOWS SERVER® 2008 ACTIVE DIRECTORY®
CONFIGURING AND TROUBLESHOOTING A WINDOWS SERVER® 2008 NETWORK INFRASTRUCTURE
CONFIGURING WINDOWS® 8.1
SUPPORTING WINDOWS® 8.1
NOVELL SERVICE DESK: SERVICE MANAGEMENT (COURSE 8522)
SECURING WINDOWS WORKSTATIONS USING ZENWORKS ENDPOINT SECURITY MANAGEMENT 11.X (COURSE 8520)
OFFENSIVE SECURITY PENETRATION TESTINGWITH KALI LINUX
ADVANCED WINDOWS EXPLOITATION
OFFENSIVE SECURITY WIRELESS ATTACKS (WIFU)
CRACKING THE PERIMETER (CTP)
ADVANCED WEB ATTACKS AND EXPLOITATION
METASPLOIT UNLEASHED
OFFENSIVE SECURITY PENETRATIONTESTING LAB
ORACLE ORACLE 12C SECURITY ADMINISTRATION
ORACLE DATABASE 12C: MANAGING SECURITY
USER SECURITY AND AUDITING IN ORACLE DATABASE 12C
ORACLE DATABASE 11G: INTRODUCTION TO DATABASE SECURITY AND SOLUTIONS
ORACLE DATABASE 11G: DATABASE SECURITY
ORACLE DATABASE 11G: BASIC USER AND STRONG AUTHENTICATION
ORACLE DATABASE 11G: ENTERPRISE USER SECURITY AND PROXY AUTHENTICATION
ORACLE DATABASE 11G: PRIVILEGES, ROLES, AND APPLICATION CONTEXTS
ORACLE DATABASE 11G: ORACLE NET SERVICES AND LISTENER SECURITY
ORACLE DATABASE 11G: FIREWALLS, ORACLE CONNECTION MANAGER, AND SQL*PLUS SECURITY
ORACLE DATABASE 11G RELEASE 2: ORACLE PARTITIONING AND SECURITY FEATURES
ORACLE DATABASE 11G RELEASE 2: STORAGE STRUCTURES AND USER SECURITY
PALO ALTO FIREWALL 7.1: INSTALL, CONFIGURE, AND MANAGE (EDU-201)
FIREWALL 7.1: CONFIGURE EXTENDED FEATURES (EDU-205)
PANORAMA 7.1: MANAGE MULTIPLE FIREWALLS (EDU-221)
FIREWALL 7.1: MANAGE CYBERTHREATS (EDU-231)
FIREWALL 7.1: DEBUG AND TROUBLESHOOT (EDU-311)
TRAPS: INSTALL, CONFIGURE AND MANAGE
PCI QUALIFIED SECURITY ASSESSOR (QSA)™ QUALIFICATION
RED HAT RED HAT SERVER HARDENING (RH413)
RED HAT ENTERPRISE LINUX DIAGNOSTICS AND TROUBLESHOOTING (RH342)
RIVERBED WAN310 OPTIMIZING ENTERPRISE APPLICATIONS AND PROTOCOLS
WAN350 IMPLEMENTING ENTERPRISE OPTIMIZATION ARCHITECTURES
APM200 APPLICATION PERFORMANCE MANAGEMENT ESSENTIALS
NPM200 NETWORK PERFORMANCE MANAGEMENT ESSENTIALS
NOS200 NETWORK PLANNING AND CONFIGURATION MANAGEMENT ESSENTIALS
MDL200 MODELER SUITE ESSENTIALS
HCB200 STORAGE DELIVERY ESSENTIALS
HCB300 HYPER CONVERGED BRANCH IMPLEMENTATION SOLUTIONS
SABSA SABSA FOUNDATION
SABSA A1 – ADVANCED SABSA RISK ASSURANCE & GOVERNANCE
SABSA A3 – ADVANCED SABSA ARCHITECTURE & DESIGN
SANS NETWARS – TOURNAMENT
NETWARS: CONTINUOUS
HOSTED: CRITICAL INFRASTRUCTURE AND CONTROL SYSTEM CYBERSECURITY
HOSTED: EMBEDDED DEVICE SECURITY ASSESSMENTS FOR THE REST OF US
HOSTED: (ISC)² CERTIFIED SECURE SOFTWARE LIFECYCLE PROFESSIONAL (CSSLP) CBK EDUCATION PROGRAM
HOSTED: OFFENSIVE COUNTERMEASURES: THE ART OF ACTIVE DEFENSES
HOSTED: PHYSICAL SECURITY SPECIALIST – FACILITIES EDITION
HOSTED: PHYSICAL PENETRATION TESTING – INTRODUCTION
AUD507: AUDITING & MONITORING NETWORKS, PERIMETERS & SYSTEMS
AUD566: IMPLEMENTING AND AUDITING THE CRITICAL SECURITY CONTROLS – IN-DEPTH
AUD440: CRITICAL SECURITY CONTROLS: PLANNING, IMPLEMENTING AND AUDITING
AUD480: TOP 4 MITIGATION STRATEGIES: IMPLEMENTING & AUDITING
DEV522: DEFENDING WEB APPLICATIONS SECURITY ESSENTIALS
DEV541: SECURE CODING IN JAVA/JEE: DEVELOPING DEFENSIBLE APPLICATIONS
DEV543: SECURE CODING IN C & C++
DEV544: SECURE CODING IN .NET: DEVELOPING DEFENSIBLE APPLICATIONS
FOR408: WINDOWS FORENSIC ANALYSIS
FOR508: ADVANCED COMPUTER FORENSIC ANALYSIS AND INCIDENT RESPONSE
FOR518: MAC FORENSIC ANALYSIS
FOR578: CYBER THREAT INTELLIGENCE
FOR526: MEMORY FORENSICS IN-DEPTH
FOR572: ADVANCED NETWORK FORENSICS AND ANALYSIS
FOR585: ADVANCED SMARTPHONE AND MOBILE DEVICE FORENSICS
FOR610: REVERSE-ENGINEERING MALWARE: MALWARE ANALYSIS TOOLS AND TECHNIQUES
ICS515: ICS ACTIVE DEFENSE AND INCIDENT RESPONSE
ICS410: ICS/SCADA SECURITY ESSENTIALS
ICS456: ESSENTIALS FOR NERC CRITICAL INFRASTRUCTURE PROTECTION
MGT405: CRITICAL INFRASTRUCTURE PROTECTION
MGT414: SANS +S TRAINING PROGRAM FOR THE CISSP® CERTIFICATION EXAM
MGT415: A PRACTICAL INTRODUCTION TO RISK ASSESSMENT
MGT433: SECURING THE HUMAN: HOW TO BUILD, MAINTAIN AND MEASURE A HIGH-IMPACT AWARENESS PROGRAM
MGT512: SANS SECURITY LEADERSHIP ESSENTIALS FOR MANAGERS WITH KNOWLEDGE COMPRESSION
MGT514: IT SECURITY STRATEGIC PLANNING, POLICY AND LEADERSHIP
MGT535: INCIDENT RESPONSE TEAM MANAGEMENT
LEG523: LAW OF DATA SECURITY AND INVESTIGATIONS
SEC301: INTRO TO INFORMATION SECURITY
SEC401: SECURITY ESSENTIALS BOOTCAMP STYLE
SEC440: CRITICAL SECURITY CONTROLS: PLANNING, IMPLEMENTING AND AUDITING
SEC480: TOP 4 MITIGATION STRATEGIES: IMPLEMENTING & AUDITING
SEC501: ADVANCED SECURITY ESSENTIALS – ENTERPRISE DEFENDER
SEC502: PERIMETER PROTECTION IN-DEPTH
SEC503: INTRUSION DETECTION IN-DEPTH
SEC504: HACKER TOOLS, TECHNIQUES, EXPLOITS AND INCIDENT HANDLING
SEC505: SECURING WINDOWS WITH THE CRITICAL SECURITY CONTROLS
SEC506: SECURING LINUX/UNIX
SEC511: CONTINUOUS MONITORING AND SECURITY OPERATIONS
SEC524: CLOUD SECURITY FUNDAMENTALS
SEC542: WEB APP PENETRATION TESTING AND ETHICAL HACKING
SEC546: IPV6 ESSENTIALS
SEC550: ACTIVE DEFENSE, OFFENSIVE COUNTERMEASURES AND CYBER DECEPTION
SEC560: NETWORK PENETRATION TESTING AND ETHICAL HACKING
SEC561: INTENSE HANDS-ON PEN TESTING SKILL DEVELOPMENT (WITH SANS NETWARS)
SEC562: CYBERCITY HANDS-ON KINETIC CYBER RANGE EXERCISE
SEC566: IMPLEMENTING AND AUDITING THE CRITICAL SECURITY CONTROLS – IN-DEPTH
SEC573: PYTHON FOR PENETRATION TESTERS
SEC575: MOBILE DEVICE SECURITY AND ETHICAL HACKING
SEC579: VIRTUALIZATION AND PRIVATE CLOUD SECURITY
SEC580: METASPLOIT KUNG FU FOR ENTERPRISE PEN TESTING
SEC617: WIRELESS ETHICAL HACKING, PENETRATION TESTING, AND DEFENSES
SEC642: ADVANCED WEB APP PENETRATION TESTING AND ETHICAL HACKING
SEC660: ADVANCED PENETRATION TESTING, EXPLOIT WRITING, AND ETHICAL HACKING
SEC760: ADVANCED EXPLOIT DEVELOPMENT FOR PENETRATION TESTERS
SPECIAL: HACKER GUARD: THREAT UPDATE
SPECIAL: COMPLIANCE TRAINING AND SECURING THE HUMAN
SPECIAL: SECURITY AWARENESS TRAINING FOR ELECTRIC ENTITIES
SPECIAL: SPECIAL FOR HIMSS – IMPLEMENTING HEALTHCARE CYBER-HYGIENE WITH THE CRITICAL SECURITY CONTROLS
SPECIAL: INTRODUCTION TO MALWARE ANALYSIS: HANDS-ON AND TECHNICAL
SYMANTEC ADVANCED THREAT PROTECTION 2.X: INCIDENT RESPONSE
ENDPOINT PROTECTION 12.1: ADMINISTRATION
ENDPOINT PROTECTION 12.1: MAINTAIN AND TROUBLESHOOT
ENDPOINT PROTECTION 12.X: INSTALL, CONFIGURE, AND DEPLOY
ENDPOINT PROTECTION 12.X: MANAGE AND ADMINISTER
MANAGED PKI
PATCH MANAGEMENT 6.2
SYMANTEC RISK AUTOMATION SUITE (SRAS)
SERVICE DESK ADMINISTRATION 7.1
VALIDATION AND ID PROTECTION (VIP)

Contact a PC Professor Admissions Rep today to discuss the enrollment process.

Share this:
Share this page via Email Share this page via Stumble Upon Share this page via Digg this Share this page via Facebook Share this page via Twitter
PrintFriendly and PDF
Microsoft, Word, Excel, PowerPoint, SharePoint, Access, Windows, Windows 7, Windows 8, Windows 10, Office, Outlook, Live, Project, Publisher, FrontPage, Silverlight, Internet Explorer, Visio, Dynamics, Exchange, SQL Server, Visual Basic, .NET, IT Academy, MCITP, MCSE, MCP, MCDBA, MCSD and other terms, logos, certificatons and designations used herein are exclusive trademarks of the Microsoft Corporation and PC Professor makes no claim to them other than educational use. VMWare, vShpere, vShield, vCenter, vFabric, vCloud and other terms, logos, certifications and designations are exclusive trademarks of the VMWare Corporation and PC Professor makes no claim to them other than educational use. Intuit, Quicken, QuickBooks and other terms, logos, certifications and designations used herein are exclusive trademarks of the Intuit Corporation and PC Professor makes no claim to them other than educational use. Adobe, PageMaker, Photoshop, Acrobat, Elements, Creative Suite, Digital Marketing Suite, Flash, Connect, Director, Dreamweaver, Fireworks, Illustrator, InDesign, Premiere, Reader, Captivate and other terms, logos, certifications and designations used herein are exclusive trademarks of the Adobe Corporation and PC Professor makes no claim to them other than educational use. The "A+" and "Network +" designations are trademarks of the CompTIA Corporation and PC Professor makes no claim to them other than education use. Cisco, CCNA, CCIE, CCDA, CCDP, CCNP, CCENT and other terms, logos, certifications and designations used herein are exclusive trademarks of the Cisco Corporation and PC Professor makes no claim to them other than educational use. PC Professor claims only exclusive use of the "PC Professor" and "PC Paramedic" marks. All trademarks, logos, designations and certifications used herein belong exclusively to their respective trademark holders and are used only in the context of educational use.