Enhance Your Skills & Grow Your Career

Merit Network’s professional development program features an extensive curriculum of cybersecurity, information technology and management courses. Many provide opportunities for professional certification through respected organizations such as CompTIA, EC-Council and (ISC)2. If you are interested in a course for yourself or your organization, please contact Merit Professional Development.
Cybersecurity Courses – (ISC)2
CAP – Certified Authorization Professional
The CAP course provides a comprehensive review of information systems security concepts and industry best practices.
Prepares You For: (ISC)2 CAP Certification

The CAP course is designed for the information security practitioner who champions system security commensurate with an organization’s mission and risk tolerance, while meeting legal and regulatory requirements. It conceptually mirrors the NIST system authorization process in compliance with the Office of Management and Budget (OMB) Circular A-130, Appendix III. Led by an (ISC)2 authorized instructor, the CAP training seminar provides a comprehensive review of information systems security concepts and industry best practices, covering the 7 domains of the CAP CBK:

  • Risk Management Framework (RMF)
  • Categorization of Information Systems
  • Selection of Security Controls
  • Security Control Implementation
  • Security Control Assessment
  • Information System Authorization
  • Monitoring of Security Controls
Several types of activities are used throughout the course to reinforce topics and increase knowledge retention. These activities include open-ended questions from the instructor to the students, group assignments, matching and poll questions, group activities, open/closed questions, and group discussions. Each activity was developed to support the learning appropriate to the course topic.

This training course will help candidates review and refresh their information security knowledge and help identify areas they need to study for the CAP exam.

Audience:
IT Security, Information Assurance & Risk Professionals

Certification Exam:

After taking this course, the CAP certification exam is available through (ISC)2.

ISC2 logo
Cyber World Institute logo



CCFP – Certified Computer Forensics Professional
This course reviews cyber forensic concepts and industry best practices, helping attendees identify areas they need to study for the CCFP exam.
Prepares You For: (ISC)2 CCFP Certification

The evolving field of cyber forensics requires professionals who understand far more than just hard drive or intrusion analysis. The field requires CCFP professionals who demonstrate competence across a globally recognized common body of knowledge that includes established forensics disciplines as well as newer challenges, such as mobile forensics, cloud forensics, anti-forensics, and more.

The CCFP course provides a comprehensive review of cyber forensic concepts and industry best practices, covering the 6 domains of the CCFP CBK:

  • Legal and Ethical Principles
  • Investigations
  • Forensic Science
  • Digital Forensics
  • Application Forensics
  • Hybrid and Emerging Technologies
The CCFP course is a combination of instructor lecture, hands-on lab exercises, instructor demonstrations and practicum exam with after-exam review. The course instructors are (ISC)²-qualified cyber forensics professionals from law enforcement, academia, government service, and the private sector. The lab exercises include computer forensics using commercial tools, network forensics and Internet forensics. Such areas as email, applications, forensic timeliners, social media and mobile devices will be addressed in addition to the traditional computer forensics examinations. Outside of the laboratory exercises, students address legal and ethical considerations, the foundations of digital forensic science within the context of the forensic sciences, and emerging and hybrid technologies as they impact the digital forensic investigator.

This training course will help candidates review and refresh their cyber forensic knowledge and help identify areas they need to study for the CCFP exam.

Audience:
Law Enforcement, Digital Forensic Examiners, Cyber Crime Professionals

Certification Exam:

After taking this course, the CCFP certification exam is available through (ISC)2.

ISC2 logo
Cyber World Institute logo



CCSP – Certified Cloud Security Professional
The CCSP course thoroughly reviews cloud security best practices and concepts, covering six domains.
Prepares You For: (ISC)2 CCSP Certification

As powerful as cloud computing is for the organization, understanding its information security risks and mitigation strategies is critical. Legacy approaches are inadequate, and organizations need competent, experienced professionals equipped with the right cloud security knowledge and skills to be successful. They need CCSPs.

Backed by the two leading non-profits focused on cloud and information security, the Cloud Security Alliance (CSA) and (ISC)2, the CCSP credential denotes professionals with deep-seated knowledge and competency derived from hands-on experience with cyber, information, software and cloud computing infrastructure security. CCSPs help you achieve the highest standard for cloud security expertise and enable your organization to benefit from the power of cloud computing while keeping sensitive data secure.

The CCSP course provides a comprehensive review of cloud security concepts and industry best practices, covering the 6 domains of the CCSP CBK:

  • Architectural Concepts & Design Requirements
  • Cloud Data Security
  • Cloud Platform & Infrastructure Security
  • Cloud Application Security
  • Operations
  • Legal & Compliance
Several types of activities are used throughout the course to reinforce topics and increase knowledge retention. These activities include open ended questions from the instructor to the students, matching and poll questions, group activities, open/closed questions, and group discussions. This interactive learning technique is based on sound adult learning theories.

This training course will help candidates review and refresh their cloud security knowledge and help identify areas they need to study for the CCSP exam.

Audience:
IT Architect, Web and Cloud Security Engineer

Certification Exam:

After taking this course, the CCSP certification exam is available through (ISC)2.

ISC2 logo
Cyber World Institute logo



CISSP – Certified Information Systems Security Professional
This training course reviews information security practices and help attendees identify areas they need to study for the CISSP exam.
Prepares You For: (ISC)2 CISSP Certification

The vendor-neutral CISSP certification is the ideal credential for those with proven deep technical and managerial competence, skills, experience, and credibility to design, engineer, implement, and manage their overall information security program to protect organizations from growing sophisticated attacks.

Backed by (ISC)2, the globally recognized, not-for-profit organization dedicated to advancing the information security field, the CISSP was the first credential in the field of information security to meet the stringent requirements of ISO/IEC Standard 17024. Not only is the CISSP an objective measure of excellence, but also a globally recognized standard of achievement.

The CISSP course provides a comprehensive review of information security concepts and industry best practices, covering the 8 domains of the CISSP CBK:

  • Security and Risk Management
  • Asset Security
  • Security Engineering
  • Communications and Network Security
  • Identity and Access Management
  • Security Assessment and Testing
  • Security Operations
  • Software Development Security
Several types of activities are used throughout the course to reinforce topics and increase knowledge retention. These activities include open ended questions from the instructor to the students, matching and poll questions, group activities, open/closed questions, and group discussions. This interactive learning technique is based on sound adult learning theories.

This training course will help candidates review and refresh their information security knowledge and help identify areas they need to study for the CISSP exam.

Audience:
Security Analyst, IT Director/Manager, Security Architect, CISO

Certification Exam:

After taking this course, the CISSP certification exam is available through (ISC)2.

ISC2 logo
Cyber World Institute logo



CSSLP – Certified Secure Software Lifecycle Professional
This course provides a comprehensive review of application security concepts and industry best practices, covering eight domains.
Prepares You For: (ISC)2 CSSLP Certification

Attackers and researchers continue to expose new application vulnerabilities, and it’s no wonder that application vulnerabilities are ranked the #1 threat to cybersecurity professionals (according to the 2015 (ISC)2 Global Information Security Workforce Study). Web application security must be a priority for organizations to protect their business and reputation. For this reason, it is crucial that anyone involved in the software development lifecycle (SDLC) be knowledgeable and experienced in understanding how to build secure software.

The CSSLP certification validates software professionals have the expertise to incorporate security practices — authentication, authorization and auditing — into each phase of the SDLC, from software design and implementation to testing and deployment. CSSLPs have proven proficiency in:

  • Developing an application security program in their organization
  • Reducing production costs, application vulnerabilities and delivery delays
  • Enhancing the credibility of their organization and its development team
  • Reducing loss of revenue and reputation due to a breach resulting from insecure software
The CSSLP course provides a comprehensive review of application security concepts and industry best practices, covering the 8 domains of the CSSLP CBK:

  • Secure Software Concepts
  • Security Software Requirements
  • Secure Software Design
  • Secure Software Implementation/Coding
  • Secure Software Testing
  • Software Acceptance
  • Software Deployment, Operations, Maintenance and Disposal
  • Supply Chain and Software Acquisition
This training course will help candidates review and refresh their application security knowledge and help identify areas they need to study for the CSSLP exam.

Audience:
Software Developers, Business Analysts, Project Managers, Engineers and Architects

Certification Exam:

After taking this course, the CSSLP certification exam is available through (ISC)2.

ISC2 logo
Cyber World Institute logo



HCISPP – HealthCare Information Security and Privacy Practitioner
This course will equip attendees with the knowledge and tools needed to identify and defend against security vulnerabilities in software applications
Prepares You For: (ISC)2 HCISPP Certification

HCISPPs provide the front-line defense in protecting health information. Backed by (ISC)2, a global not-for-profit organization that delivers the gold standard for information security certifications, the HCISPP credential confirms a practitioner’s core knowledge and experience in security and privacy controls for personal health information.

The HCISPP course provides a comprehensive review of healthcare security and privacy concepts and industry best practices, covering the 6 domains of the HCISPP CBK:

  • Healthcare Industry
  • Regulatory Environment
  • Privacy and Security in Healthcare
  • Information Governance and Risk Management
  • Information Risk Assessment
  • Third Party Risk Management
Several types of activities are used throughout the course to reinforce topics and increase knowledge retention. These activities include open ended questions from the instructor to the students, matching and poll questions, group activities, open/closed questions, and group discussions. This interactive learning technique is based on sound adult learning theories.

This training course helps candidates review and refresh their healthcare information security and privacy knowledge and help identify areas they need to study for the HCISPP exam.

Audience:
Compliance Officers, Privacy Officers, Information Security Managers

Certification Exam:

After taking this course, the HCISPP certification exam is available through (ISC)2.

ISC2 logo
Cyber World Institute logo



Cybersecurity Courses – EC-Council
CCISO – Certified Chief Information Security Officer
CCISO equips information security leaders with the most effective toolset to defend organizations from cyber-attacks.
Prepares You For: EC-Council CCISO Certification

The Certified CISO (CCISO) program is the first of its kind training and certification program aimed at producing top-level information security executives. The program was developed by sitting CISOs for current and aspiring CISOs.

CCISO equips information security leaders with the most effective toolset to defend organizations from cyber-attacks. The CCISO does not focus solely on technical knowledge, but on the application of information security management principles from an executive management point of view.

Attendees will learn about policy, legal, and compliance aspects of governance, as well as audit management from the CISO’s perspective. The course will discuss a CISO’s role from a project and operations management perspective and summarize the day-to-day, technical aspects of the CISO position. Finally, the course will cover strategic planning and finance, which are crucial to drive information security throughout an organization.

Training Program Covers the Following Domains:

  • Governance (Policy, Legal & Compliance)
  • Information Security Core Competencies
  • IS Management Controls and Auditing Management
  • Strategic Planning & Finance
  • Management – Projects and Operations (Projects, Technology & Operations)
Audience:
Chief Information Security Officer

Exam Requirements:

Once training has been completed, applicants who would like to sit for the CCISO Exam will be required to fill out and return the Exam Eligibility Application proving that in addition to the the training, they also have 5 years of IS management experience in 3 of the 5 CCISO Domains. Once that application has been approved, instructions for purchasing a Pearson VUE voucher will be issued. Applicants who do not meet these requirements have the option of sitting for the EC-Council Information Security Manager (E|ISM) exam as part of the Associate CCISO Program.

EC-Council logo
Cyber World Institute logo



CEH – Certified Ethical Hacker
This accredited course provides the advanced hacking tools and techniques used by hackers and information security professionals.
Prepares You For: EC-Council CEH Certification

The Certified Ethical Hacker program is the pinnacle of the most desired information security training program any information security professional will ever want. To master the hacking technologies, you will need to become one, but an ethical one! The accredited course provides the advanced hacking tools and techniques used by hackers and information security professionals alike to break into an organization. This live-online course will immerse you in the hacker mindset, so that you will be able to defend against future attacks.

The CEH course focuses on hacking techniques and technology from an offensive perspective. The advanced security course is regularly updated to reflect latest developments in the domain, including new hacking techniques, exploits, automated programs as well as defensive recommendations as outlined by experts in the field.

Training Program Covers:

  • Information Security Overview
  • Information Security Threats and Attack Vectors
  • Hacking Concepts, Types, and Phases
  • Ethical Hacking Concepts and Scope
  • Information Security Controls
  • Information Security Laws and Standards
Audience:
Security Officers, Auditors, Security Professionals, Site Administrators

Certification Exam:

The certification exam is not included with the course. Your instructor will provide details on the exam.

EC-Council logo
Cyber World Institute logo



CHFI – Computer Hacking Forensic Investigator
This course covers major forensic investigation scenarios and enables students to acquire hands-on experience.
Prepares You For: EC-Council CHFI Certification

CHFI presents a detailed methodological approach to computer forensics and evidence analysis. It is a comprehensive course covering major forensic investigation scenarios that enables students to acquire necessary hands-on experience on various forensic investigation techniques and standard forensic tools necessary to successfully carryout a computer forensic investigation leading to prosecution of perpetrators.

The CHFI program certifies individuals in the specific security discipline of computer forensics from a vendor-neutral perspective. The CHFI certification will fortify the application knowledge of law enforcement personnel, system administrators, security officers, defense and military personal, legal professionals, bankers, security professionals, and anyone who is concerned about the integrity of the network infrastructure.

Training Program Covers:

  • The process of investigating cyber-crime, laws involved, and the details in obtaining a search warrant.
  • Information Security Threats and Attack Vectors
  • Different types of digital evidence, rules of evidence, digital evidence examination process, and electronic crime and digital evidence consideration by crime category
  • Roles of first responder, first responder toolkit, securing and evaluating electronic crime scene, conducting preliminary interviews, documenting electronic crime scene, collecting and preserving electronic evidence, packaging and transporting electronic evidence, reporting the crime scene
  • How to recover deleted files and deleted partitions in Windows, Mac OS X, and Linux
  • The process involved in forensic investigation using Access Data FTK and Encase Steganography and its techniques, Steganalysis, and image file forensics
  • Password cracking concepts, tools, types of password attacks and how to investigate password protected file breach
  • Different types of log capturing techniques, log management, time synchronization, log capturing tools
  • How to investigate logs, network traffic, wireless attacks, and web attacks
  • How to track e-mails and investigate e-mail crimes and many more.
Audience:
Forensic First Responders

Certification Exam:

The certification exam is not included with the course. Your instructor will provide details on the exam.

EC-Council logo
Cyber World Institute logo



ECIH – EC-Council Certified Incident Handler
Attendees learn to handle and respond to various security incidents such as network security incidents, malicious code incidents and insider attack threats.
Prepares You For: ECIH Certification

The EC-Council Certified Incident Handler program is designed to provide the fundamental skills to handle and respond to the computer security incidents in an information system. The course addresses various underlying principles and techniques for detecting and responding to current and emerging computer security threats.

The course teaches students to handle and respond to various security incidents such as network security incidents, malicious code incidents, and insider attack threats.

Students learn how to handle various types of incidents, risk assessment methodologies, and various laws and policy related to incident handling. After attending the course, you will be able to create incident handling and response policies and deal with various types of computer security incidents.

Training Program Covers:

  • Introduction to Incident Response and Handling
  • Risk Assessment
  • Incident Response and Handling Steps
  • CSIRT
  • Handling Network Security Incidents
  • Handling Malicious Code Incidents
  • Handling Insider Threats
  • Forensic Analysis and Incident Response
  • Incident Reporting
  • Incident Recovery
  • Security Policies and Laws
Audience:
Incident Handlers, Risk Admin, Pen Testers, Forensic Investigators

Certification Exam:

The certification exam is not included with the course. Your instructor will provide details on the exam.

EC-Council logo
Cyber World Institute logo



ECSA – EC-Council Certified Security Analyst
This course equips professionals with necessary knowledge, tools, tricks and templates to successfully plan and execute a pen testing engagement.
Prepares You For: ECSA Certification

ECSA pen testing course offers you a holistic security assessment methodology that goes beyond conventional attack vectors such as SQL injection, XSS, CSRF, DoS, etc. It equips professionals with necessary knowledge, tools, tricks and templates to successfully plan and execute a pen testing engagement.

The ECSA course is a fully hands-on program, with exercises covering real world scenarios. By practicing the skills that are provided to you in the ECSA class, we are able to bring you up to speed with the latest threats that organizations may be vulnerable to.

The ECSA pentest program takes the tools and techniques you learned in the Certified Ethical Hacker course (CEH) and elevates your ability into full exploitation by teaching you how to apply the skills learned in the CEH by utilizing EC-Council’s published penetration testing methodology.

Audience:
Ethical Hackers, Pen Testers, Network Server Admin, Firewall Admin, Security Testers, Risk Assessment Professionals

Certification Exam:

The certification exam is not included with the course. Your instructor will provide details on the exam.

EC-Council logo
Cyber World Institute logo



ENSA – EC-Council Network Security Administrator
Attendees will will learn how to evaluate network and internet security issues and how to implement successful security policies.
Prepares You For: ENSA Certification

The ENSA program is designed to provide fundamental skills needed to analyze the internal and external security threats against a network, and to develop security policies that will protect an organization’s information. Students will learn how to evaluate network and Internet security issues and design, and how to implement successful security policies and firewall strategies. In addition, they will learn how to expose system and network vulnerabilities and defend against them.

Training Program Covers:

  • Fundamentals of Computer Network
  • Network Protocols
  • Protocol Analysis
  • Hardening Physical Security
  • Network Security
  • Security Standards Organizations
  • Security Standards
  • Security Policy
  • IEEE Standards
  • Network Security Threats
  • Intrusion Detection System (IDS) and Intrusion Prevention Systems (IPS)
  • Firewalls
  • Packet Filtering and Proxy Servers
  • Bastion Host and Honeypots
  • Securing Modems
  • Troubleshooting Network
  • Hardening Routers
  • Hardening Operating Systems
  • Patch Management
  • Log Analysis
  • Web Security
  • E-mail Security
  • Authentication: Encryption, Cryptography and Digital Signatures
  • Virtual Private Networks and Remote Networking
  • Wireless Network Security
  • Incident Response
  • Disaster Recovery and Planning
  • Network Vulnerability Assessment
Audience:
Network Security Admin

Certification Exam:

The certification exam is not included with the course. Your instructor will provide details on the exam.

EC-Council logo
Cyber World Institute logo



LPT – Licensed Penetration Tester
This course prepares you for the LPT practical exam, which is the capstone for EC-Council’s entire information security track.
Prepares You For: EC-Council LPT Certification

The Licensed Penetration Tester (LPT) program offered by EC-Council gives certified penetration testers the opportunity to practice their skills so that they are able to function as a licensed penetration tester. EC-Council’s licensed penetration testers use hands-on penetration testing methodologies and are trained by experts and specialists who are licensed penetration testers from EC-Council. The LPT standardizes the knowledge base for penetration testing professionals by incorporating best practices followed by experienced experts in the field.

The objective of the LPT is to ensure that each professional licensed by EC-Council follows a strict code of ethics, is exposed to the best practices in the domain of penetration testing course and aware of all the compliance requirements required by the industry.

The course prepares you for the LPT practical exam, which is the capstone for EC-Council’s entire information security track.

Prerequisite:

ECSA – EC-Council Certified Security Analyst

Audience:
Experienced Pen Testers
Certification Exam:

The certification exam is not included with the course. Your instructor will provide details on the exam.

EC-Council logo
Cyber World Institute logo



 

CompTIA Courses
A+ – CompTIA A+
The A+ course prepares you for the CompTIA A+ Essentials and Practical Application certification exams.
Prepares You For: CompTIA A+ Certification

The A+ course prepares you for the CompTIA A+ certification exams. The CompTIA A+ certification is the industry standard for computer support technicians. The international, vendor-neutral certification proves competence in areas such as installation, preventative maintenance, networking, security and troubleshooting. CompTIA A+ certified technicians also have excellent customer service and communication skills to work with clients.

This course will prepare you for the two exams that are necessary to be certified:

  • CompTIA A+ Essentials, exam code 220-801; and
  • CompTIA A+ Practical Application, exam code 220-802.
CompTIA A+ Essentials measures the necessary competencies of an entry-level IT professional with a recommended 500 hours of hands-on experience in the lab or field. It tests for technical understanding of computer technology, networking and security, as well as the communication skills and professionalism now required of all entry-level IT professionals.

CompTIA A+ Practical Application is an extension of the knowledge and skills identified in CompTIA A+ Essentials, with more of a “hands-on” orientation focused on scenarios in which

Topics covered during course include:
  • Motherboards and Expansion Cards
  • CPUs and Power Supplies
  • Memory and Physical Storage
  • Connections
  • Peripheral Devices
  • Printers
  • Notebooks
  • Networking Basics
  • The Physical Network
  • Networking Protocols
  • Web Application Penetration Testing
  • Wireless Networking
  • Professional Conduct
  • Troubleshooting Basics
  • Client Operating Systems
  • Configuring the Operating System
  • Configuring Hardware Settings
  • and more
Audience:
Entry Level IT Analysts
Certification Exams:

The certification exams are not included with the course. Your instructor will provide details on the CompTIA exams.

CompTIA logo
Cyber World Institute logo



N+ – Network+
The Network+ course prepares you for the CompTIA Network+ certification exam.
Prepares You For: CompTIA Network+ Certification

The Network+ course prepares you for the CompTIA Network+ certification exam. The CompTIA Network+ certification is the sign of a competent networking professional. It is an international, vendor-neutral certification that proves a technician’s competency in managing, maintaining, troubleshooting, installing and configuring basic network infrastructure.

Since its introduction in 1999, more than 235,000 people have become CompTIA Network+ certified. Microsoft includes CompTIA Network+ in their Microsoft Certified Systems Administrator (MCSA) program, and other corporations such as Novell, Cisco and HP also recognize CompTIA Network+ as part of their certification tracks.
Although not a prerequisite, it is recommended that CompTIA Network+ candidates have at least nine months of experience in network support or administration or academic training, along with a CompTIA A+ certification.

Topics covered during course include:
  • Network Theory
  • Network Communications Methods
  • Network Media and Hardware
  • Network Implementations
  • Networking Models
  • TCP/IP Addressing and Data Delivery
  • TCP/IP Services
  • LAN Infrastructure
  • WAN Infrastructure
  • Remote Networking
  • System Security
  • Network Security
  • Network Security Threats and Attacks
  • Network Management
  • Network Troubleshooting
Audience:
Entry Level IT Analysts
Certification Exam:

The certification exam is not included with the course. Your instructor will provide details on the CompTIA exam.

CompTIA logo
Cyber World Institute logo



S+ – Security+
The Security+ course prepares you for the CompTIA Network+ certification exam.
Prepares You For: CompTIA Security+ Certification

CompTIA Security+ certification designates knowledgeable professionals in the field of security, one of the fastest- growing fields in IT.

CompTIA Security+ not only ensures that candidates will apply knowledge of security concepts, tools, and procedures to react to security incidents, it ensures that security personnel are anticipating security risks and guarding against them.
CompTIA Security+ meets the ISO 17024 standard and is approved by U.S. Department of Defense to fulfill Directive 8570.01-M requirements. It is compliant with government regulations under the Federal Information Security Management Act (FISMA).

Topics covered during course include:
  • Security Threats and Controls
  • Cryptography and Access Control
  • Network Security
  • Host, Data, and Application Security
  • Operational Security
Audience:
Security Architect, Security Engineer, Information Assurance Technician, Security Administrator
Certification Exam:

The certification exam is not included with the course. Your instructor will provide details on the CompTIA exam.

CompTIA logo
Cyber World Institute logo



 

Information Technology Courses
Automating Administration with Windows PowerShell 4.0
This course thoroughly explains how to remotely manage single or multiple Windows-based servers and automate day-to-day management and administration tasks.

This 5-day instructor-led course thoroughly explains how to remotely manage single or multiple Windows-based servers and automate day-to-day management and administration tasks.

PowerShell is an automation platform and scripting language for Windows and Windows Server that allows you to simplify the management of your systems. Unlike other text-based shells, PowerShell harnesses the power of the .NET Framework, providing rich objects and a massive set of built-in functionality for taking control of your Windows environments.

Topics covered during course include:
  • Understanding basics of Windows PowerShell
  • Work with the Pipeline
  • Understand How the Pipeline Works
  • Use PSProviders and PSDrives
  • Use WMI and CIM
  • Moving From a Command to a Script to a Module
  • Prepare for Scripting
  • Format Output
  • Administer Remote Computers
  • Putting Windows PowerShell components together
  • Use Background Jobs and Scheduled Jobs
  • Advanced PowerShell Techniques and Profiles
Audience:
This course is intended for IT Professionals already experienced in general Windows Server and Windows Client administration or already experienced in administering and supporting Application servers and services including Exchange, SharePoint, SQL etc. It is broadly intended for students who want to use Windows PowerShell to automate administrative tasks from the command line, using any Microsoft or independent software vendor (ISV) product that supports Windows PowerShell manageability.
Merit Professional Development logo



BGP and Advanced Routing Concepts: A Practical Workshop
Learn BGP and related routing concepts, including configuration, path selection, best practices and examples of BGP problems and solutions.

During this advanced course, you will learn BGP and related routing concepts, including configuration, path selection, best practice recommendations and examples of BGP problems and solutions. You will configure Cisco routers in a lab environment to simulate different BGP configurations. This course is developed and presented by engineers from NYSERNet, New York’s research and education network.

Prerequisites and Computer Requirements:

To attend the workshop you must have experience with general router configuration. Some knowledge of routing protocols is recommended. You must have a computer that is capable of connecting with Adobe Connect. Your computer must have terminal emulation software installed.

Topics covered during course include:
  • Basic routing review
  • Introduction to BGP
  • Case studies
  • Tuning BGP
  • Configuring BGP
Audience:
Network Administrators
Merit Professional Development logo



CCNAX – Interconnecting Cisco Networking Devices: Accelerated Boot Camp
CCNAX combines Interconnecting Cisco Networking Devices Part 1 (ICND1) and Interconnecting Cisco Networking Devices Part 2 (ICND2) into a one week, extended hour “boot camp”.
Prepares You For: CCNA Routing and Switching Certification

Interconnecting Cisco Networking Devices: Accelerated (CCNAX) combines Interconnecting Cisco Networking Devices Part 1 (ICND1) and Interconnecting Cisco Networking Devices Part 2 (ICND2) into a one week, extended hour “boot camp”.

Cisco Certified Network Associate (CCNA) Routing and Switching is a certification program designed to make you a solid, well-rounded network engineer. Completing the certification process maximizes your investment in foundational networking knowledge and increases the value of your employer’s network, while validating your ability to install, configure, operate, and troubleshoot medium-size routed and switched networks.

Topics covered during course include:
  • Network Fundamentals
  • Building Simple LANs
  • Network Security Management
  • IPv6 Basics
  • IP Connectivity Troubleshooting
  • EtherChannel Configuration
  • Layer 3 Redundancy
  • WAN Configuration
  • EIGRP Troubleshooting for IPv4
  • EIGRP Configuration for IPv6
  • Configure & Troubleshoot OSPF
  • SNMP, Syslog and NetFlow
  • Cisco Device Configurations
  • Internet Connectivity
Audience:
Network Administrators, Network Engineers, Network Support Technicians, Help Desk Technicians, Security Professionals
Merit Professional Development logo



Cloud, Big Data and Data Quality and Governance
This class examines cloud computing, big data, and data quality holistically as three interrelated topics requiring defined ownership, planning, oversight and governance to truly maximize their value to the organization.

This class examines cloud computing, big data, and data quality holistically as three interrelated topics requiring defined ownership, planning, oversight and governance to truly maximize their value to the organization.

Upon completing this course, the learner will have a thorough understanding of:

  • The implications of cloud computing from an IT management perspective
  • Financial and cost center ramifications of cloud computing
  • The effect that a cloud computing strategy has on your existing IT corporate data model
  • Understanding of data governance political and financial dynamics
  • Data Governance Group vision, mission and organizational structure
  • Big data governance and oversight
Course Objectives:
  • Data Quality – Causes of Bad Data
  • Data Quality – Data Friendly Topologies
  • Cloud Data Management Issues
  • Cloud Security Considerations
  • Cloud Operational Considerations
  • Big Data Considerations
  • Data Governance Concepts
  • Data Governance Structure
  • Big Data Governance
Audience:
This course is intended for database administrators, IT managers, programmers, auditors, project management office members and others who are interested in Cloud, Big Data, and Data Quality Oversight and Governance.
Merit Professional Development logo



Data Center Design Workshop
The Data Center Design workshop is intended to provide a practical guide to those engaged in, or considering, the building of a new data center, or those engaged in the critical review of a data center’s capability.

The Data Center Design workshop is intended to provide a practical guide to those engaged in, or considering, the building of a new data center, or those engaged in the critical review of a data center’s capability. This is accomplished by reviewing some basic theory, but mostly by learning about practical design elements according to the Turner CRIMMP© model; which considers the Capacity, Redundancy, Infrastructure, Monitoring, Maintenance and Policy elements of the major Data Center systems. These systems include: Power, Cooling, Network, Physical Structure, Floor Plan, Security, etc. of a Data Center.

After completing the data center design course, students will be able to create requirements for and review designs produced by an architect or data center design professional, be able to assess, from a pragmatic perspective, if the most important strategies and design elements present in the design are acceptable, and if the client’s “risk profile” has been properly considered.

Learn the Turner CRIMMP model, which covers:
  • Capacity
  • Infrastructure
  • Maintenance
  • Policy
  • Redundancy
  • Power
  • Cooling
  • Network
  • Monitoring
  • Security
  • Physical Structure
  • Floor Plan
Audience:
IT Professionals
Merit Professional Development logo



Deploying and Managing Windows 10 Using Enterprise Services
Administrators can gain the knowledge and skills needed to deploy and manage Windows 10 desktops, devices and applications in an enterprise environment.

Deploying and Managing Windows 10 Using Enterprise Services provides administrators with the knowledge and skills needed to deploy and manage Windows 10 desktops, devices and applications in an enterprise environment.

Students will learn to manage user profiles and user state virtualization, as well as manage Windows 10 sign-in and identity. You will learn to administer desktop and application settings by using Group Policy and gain an understanding of managing data access for Windows-based devices. Students will also learn to manage Windows 10 in virtualized and mobile environments, using client Hyper-V and Microsoft Intune.

Topics covered during course include:
  • Managing Windows 10 in the Enterprise
  • Managing a Mobile Workforce
  • Deploying Windows 10 Enterprise Desktops
  • Managing Volume License Activation for Windows 10
  • Managing User Profiles and User State Virtualization
  • Managing Windows 10 Sign-In and Identity
  • Managing Desktop and Application Settings by Using Group Policy
  • Managing Data Access for Windows-based Devices
  • Managing Remote Access Solutions
  • Configuring and Managing Client Hyper-V
  • Managing Windows 10 Devices Using Enterprise Mobility Solutions
  • Managing Desktop and Mobile Clients Using Microsoft Intune
  • Managing Updates and Endpoint Protection Using Microsoft Intune
  • Application and Resource Access Using Microsoft Intune
Audience:
IT Professionals
Merit Professional Development logo



Developing SQL Databases Course
This four-day instructor-led course provides students with the knowledge and skills to develop a Microsoft SQL Server 2016 database.

This four-day instructor-led course provides students with the knowledge and skills to develop a Microsoft SQL Server 2016 database. The course focuses on teaching individuals how to use SQL Server 2016 product features and tools related to developing a database.

You will learn how to design database tables and advanced techniques to partition and compress data. The course will introduce you indexes, views, spatial data, and much more.

Topics covered during course include:
  • Design and Implement Tables
  • Describe advanced table designs
  • Ensure Data Integrity through Constraints
  • Describe indexes, including Optimized and Columnstore indexes
  • Design and Implement Views
  • Design and Implement Stored Procedures
  • Design and Implement User Defined Functions
  • Respond to data manipulation using triggers
  • Design and Implement In-Memory Tables
  • Implement Managed Code in SQL Server
  • Store and Query XML Data
  • Work with Spatial Data
  • Store and Query Blobs and Text Documents
Audience:
The primary audience for this course is IT Professionals who want to become skilled on SQL Server 2016 product features and technologies for implementing a database. The secondary audiences for this course are individuals who are developers from other product platforms looking to become skilled in the implementation of a SQL Server 2016 database.
Merit Professional Development logo



DevOps Foundation
The course provides an introduction to DevOps — the cultural and professional movement that stresses communication, collaboration, integration and automation in order to improve the flow of work between software developers and IT operations professionals.

This two-day, live-online course provides an introduction to DevOps — the cultural and professional movement that stresses communication, collaboration, integration and automation in order to improve the flow of work between software developers and IT operations professionals. Improved workflows will result in an improved ability to design, develop, deploy and operate software and services faster.

Topics covered include:
  • DevOps objectives and vocabulary
  • Benefits to the business
  • VMware vCenter Server
  • Concepts and practices — including its relationship to Agile, Lean and IT Service Management (ITSM)
  • Improved workflows
  • Improved communication and feedback loops
  • Reliance on automation
  • Applying DevOps in an enterprise environment
  • Critical success factors and key performance indicators
  • Real-life examples and results
Audience:
Individuals and organizations seeking a foundational understanding of DevOps; Employees and managers responsible for designing, reengineering or improving processes; Consultants guiding their clients through process improvement initiatives Internal and external suppliers process stakeholders.
Merit Professional Development logo



Hands-On SELinux: A Practical Introduction
This intensive, hands-on course introduces Red Hat SELinux, a technology that adds mandatory access controls to the Linux kernel and can stop malicious attacks.

SELinux is a powerful security layer within the Linux kernel that provides control over which users and processes can access resources and execute programs on a system.

This short course is designed as an intensive, hands-on introduction to Red Hat SELinux, a technology that adds mandatory access controls to the Linux kernel and can stop buffer overflow and other malicious attacks. The focus will be on understanding the SELinux theory, components, installation, configuration and log records, and how to secure applications both by configuring existing SELinux policies and by creating new policies. You’ll come away from this course with the SELinux skills to secure your platform running your own applications.

This course is a hands-on experience with demonstration, student labs and a focus on understanding the function of SELinux policies. It is valuable for system administrators, advanced Linux users and others who need expertise in SELinux. The course can serve as a primer for a novice or a refresher for experienced SELinux users.

Course Prerequisites:

Students should possess a working knowledge of Linux or UNIX and be proficient with the command line. Specific additional skills will be covered in the course.

Topics covered during course include:
  • Brief Linux Review
  • Role-Based Access Control: Subjects, Objects & Policies
  • Introduction to SELinux: Identities, Roles, Types, Domains & Contexts
  • SELinux Components & Modes
  • SELinux Logs & GUIs
  • Lab: Track a policy violation
  • Dynamic Policy Modification & Enforcement
  • Writing SELinux Policies
  • Policy Creation Tools
  • Lab: Create and deploy a policy
  • Introduction to Multi-Level Security
Audience:
System Administrators, IT Professionals
Merit Professional Development logo



Implementing Cisco Switched Networks v2.0
SWITCH v2.0, a five-day ILT course, includes major updates such as new IPv6 routing topics. The course content has been adapted to Cisco IOS Software Release 15.

SWITCH v2.0, a five-day ILT course, includes major updates and follows an updated blueprint. (However, note that this course does not cover all items listed on the blueprint.) Some older topics have been removed or simplified, while several new IPv6 routing topics have been added. The course content has been adapted to Cisco IOS Software Release 15 and technically updated.

Course Objectives:
Describe the hierarchical campus structure, basic switch operation, use of SDM templates, PoE, and LLDP. Implement VLANs and trunks, explain VTP, implement DHCP in IPv4 and IPv6 environments, and configure port aggregation. Implement and optimize the STP mechanism that best suits your network: PVST+, Rapid PVST+, or MST. Configure routing on a multilayer switch. Configure NTP, SNMP, IP SLA, and port mirroring, and verify StackWise and VSS operation. Implement first-hop redundancy in IPv4 and IPv6 environments. Secure the campus network according to recommended practices.
Audience:
Learners who aim to be network professionals and who have knowledge that is obtained from Cisco CCNA courses.
Merit Professional Development logo



Incident Response Plan Development & Testing
This workshop will help you get started on an incident response plan for your organization.
Next Class:

Incident Response Plan Development Workshop – NERC CIPv5 will help you get started on an incident response plan for your organization.

The workshop is based on the National Institute of Standards and Technology (NIST) 800 framework for managing computer security incidents.

Attendees will learn the format of an incident response plan, how to determine a reportable incident, how to articulate the roles of a response team, and much more. By the end of the workshop, attendees will have crafted the first draft of an incident response plan.

The workshop will greatly benefit individials from companies that must comply with the North American Electric Reliability Corporation (NERC) critical infrastructure protection (CIP) cybersecurity standards (Version 5).

Topics covered include:
  • Current cyber threats
  • Common hacker tools
  • Incident Reponse Plan format
  • Components of an IR plan
  • Defining a reportable incident
  • Assessing an incident’s impact
  • Determining IR team members
  • IR plan execution
  • Post-incident reporting
Audience:
Individuals from Power Companies, Accounting Firms, Emergency Managers, State and County Government Officials, Police, and others interested in incident response planning.
Merit Professional Development logo



Installing and Configuring Windows 10
Gain a thorough understanding of the installation and configuration Windows 10 desktops and devices in a Windows Server domain corporate environment.

Gain a thorough understanding of the installation and configuration Windows 10 desktops and devices in a Windows Server domain corporate environment. From account and storage management to network connectivity and security configurations, you will master the skills to prepare and configure a Windows 10 environment.

You will learn the important new features of Windows 10, install Windows 10 software, and perform device and network connectivity configurations. Students will learn to manage storage, folders, printers, and apps in Windows 10.

Gain a solid understanding of security in Windows 10. Learn to manage data and device security, and how to implement Windows 10 features to improve network security.

You will also understand how to monitor and update Windows 10 devices, as well as restore files, roll back drivers, and recover Windows 10 devices.

Topics covered include:
  • Navigating the User Interface
  • Upgrading to Windows 10
  • Configuring Your Device
  • Managing User Accounts
  • Configuring Network Connectivity
  • Managing Storage
  • Managing Files & Printers
  • Managing Apps in Windows 10
  • Managing Data Security
  • Managing Device Security
  • Managing Network Security
  • Maintaining Windows 10
  • Monitoring Windows 10
  • Optimizing Performance
  • Troubleshooting & Recovery
Audience:
IT Technicians, Systems Administrators
Merit Professional Development logo



Introducing Python and Web Services Programmability for Network Engineers
This course focuses on the interoperability of Python programming with Networking to prepare students for Software Defined Networking (SDN).

This course focuses on the interoperability of Python programming with Networking to prepare students for Software Defined Networking (SDN). This class is designed for students looking to add programming skills in preparation for various ACI & SDN technologies.

Upon completing this course, the learner will be able to meet these overall objectives:

  • Understand and describe basic and advanced Python terminologies
  • Identify and correct Python script errors
  • Pull and reconfigure networking devices using Python scripts
  • Understanding RESTful API utilizing JSON and XML
Topics covered include:
  • Basic Constructs
  • Advanced Constructs
  • Scaling Python
  • Dictionaries and Regular Expressions
  • XML and JSON
  • What is an XML Schema?
Audience:
This course is intended for Network Administrators, Network Engineers, Network Operations Technicians, and students interested in learning about programming.
Merit Professional Development logo



Introduction to Python 3
This course introduces the student to the Python language. Upon completion of this class, the student will be able to write non trivial Python programs dealing with a wide variety of subject matter domains.

This 3-day course introduces the student to the Python language. Upon completion of this class, the student will be able to write non trivial Python programs dealing with a wide variety of subject matter domains. Topics include language components, the IDLE environment, control flow constructs, strings, I/O, collections, classes, modules, and regular expressions. The course is supplemented with many hands on labs using either Linux or Windows.

Python is a programming language that lets you work more quickly and integrate your systems more effectively. You can learn to use Python and see almost immediate gains in productivity and lower maintenance costs.
Topics covered include:
  • An Introduction to Python: History, Installation, Naming Conventions, Editing
  • Basic Python Syntax: Comments, Strings, Functions
  • Language Components: If Statements, Operators, Loops
  • Functions: Defining, Parameters, Closure
  • Modules: Sys, Math, Time, dir Function
  • Exceptions: Errors, Hierarchy, Assert
  • Input and Output: Data Streams, Access Modes, Directories Metadata
  • Classes in Python: Object Orientation, Variables, Inheritance, Polymorphism
  • Regular Expressions: Characters, Quantifiers, The Dot Character
Audience:
This course is intended for Network Administrators, Network Engineers, Network Operations Technicians, and students interested in learning about programming.
Merit Professional Development logo



Introduction to Web Application Development with Groovy and Grails
Learn the basics of Groovy and how to use the Grails framework to rapidly create sophisticated web applications.

Groovy is an object-oriented programming language for the Java platform; Grails is an open source web application framework that uses Groovy. Groovy and Grails are key components of the newest releases of Ellucian’s Banner enterprise resource planning system, making the mastery of Groovy and Grails essential for developers who support Banner.

During the course, you will learn the basics of Groovy and how to use the Grails framework to rapidly create sophisticated web applications.

This class is 60% hands-on, 40% lecture and discussion, with the longest lecture segments lasting about 25 minutes. You will learn by doing, with immediate opportunities to apply the material to real-world problems.

Prerequisites:

All attendees should be familiar with web development in Java, including servlets, JSPs, and database access.

Computer Requirements:

The course requires use of a Windows computer loaded with a set of freely available software. You will have the option to bring your own computer or to have one provided for you.

Audience:
Software Developers, System Administrators
Merit Professional Development logo



IPv6 Workshop – Practical Tools for Implementation
This course introduces essential IPv6 concepts, discussing campus IPv6 implementations, configuration and troubleshooting techniques.

IPv6 will soon be the only option for adding new devices or hosts on the Internet. Is your staff ready? Begin the journey to IPv6 with Merit.

This course will prepare you for the extinction of IPv4 by introducing essential IPv6 concepts, discussing campus IPv6 implementations, explaining configuration and troubleshooting techniques, and allowing participants to configure Cisco networking equipment to build a working IPv6 network in a lab environment.

This expanded workshop also includes additional sections on IPv6 wireless, new information on IPv6 security and address management, and new hands-on lab exercises.

*Participants should bring a laptop computer with terminal editing software installed.

Pre-Requisite Skills:

Course participants must have experience with router and switch configuration, including the mechanics of configuration (CLI and config editor), internal and external routing (OSPF or EIGRP, and BGP), and switch and LAN setup.

Why IPv6?
  • Inevitability
  • Improved Security
  • Enhanced Transfer Speeds
  • Fewer URL Conflicts
  • Increased Efficiencies
  • Innate Traffic Encryption
  • More IP Addresses
  • No NAT Reliance
  • Support for widely deployed routing protocols
Audience:
Network Administrators, Network Engineers, Network Support Technicians
Merit Professional Development logo



ITIL v3 Foundation
Learn the fundamentals of the Information Technology Infrastructure Library (ITIL), an industry-standard methodology for managing and developing IT services.

TIL v3 Foundation is an interactive online course on the fundamentals of the Information Technology Infrastructure Library (ITIL), an industry-standard methodology for managing and developing IT services.

In this exciting and dynamic course, you will get an introduction to the lifecycle of managing IT services to deliver organizational expectations. Using an engaging case study, you’ll learn the core disciplines of ITIL best practices. Upon completing this course, you’ll be well positioned to successfully complete the associated ITIL exam required for entry into the future ITIL v3 intermediate-level training courses.

ITIL v3 covers five core disciplines:
  • Service Strategy
  • Service Design
  • Service Transition
  • Service Operations
  • Continual Service Improvement
These disciplines represent a lifecycle framework that can help an organization better align its services,
demonstrating business value and ROI and enabling IT to provide solutions for specific organizational needs.

This course includes handouts and references useful after the class, as well as practice sessions, quizzes, exam strategies and test-taking tips. The one-hour ITIL v3 Foundation exam will be offered on the last day of class.

Technical Information

You will need to provide the computer on which you will participate in the class. Most recent Windows and Mac OS operating systems are supported, as well as most current browsers. Before the class you will be provided with instructions for testing and logging into the virtual environment. Printed materials will be shipped to you.

Audience:
Auditors, Directors, Help Desk Managers, IT Analysts, IT Project/Program Managers, Service Desk Managers and those considering or adopting ITIL
Merit Professional Development logo



Managing Risk in Information Systems
This course provides a unique, in-depth look at how to manage and reduce IT-associated risks.

This course provides a unique, in-depth look at how to manage and reduce IT-associated risks. You will learn about the Systems Security Certified Practitioner (SSCP) risk, response, and recovery domain in addition to risk management and its implications on IT infrastructures and compliance. Using examples and exercises, this course incorporates hands-on activities related to fundamentals of risk management, strategies, and approaches for mitigating risk. You will also learn how to create a plan that reduces risk. Additional course assets include case scenarios and handouts and eBook (via CourseSmart).

This course, written by Darril Gibson, author of the book CompTIA Security+: Get Certified, Get Ahead, covers content within the following industry certification exams:

  • Certified Information Systems Security Professional (CISSP) – two content domains covered
  • Security+ – “Compliance and Operational Security” domain covered
  • System Security Certified Practitioner (SSCP) – “Risk, Response, and Recovery” domain covered
  • National Institute of Standards and Technology (NIST) – “Incident Response” domain covered
  • 8570.01 – “Compliance and Operational Security” domain covered
What You’ll Learn:
  • Basic concepts of and need for risk management
  • Compliancy laws, standards, best practices, and policies of risk management
  • Components of an effective organizational risk management program
  • Techniques for identifying relevant threats, vulnerabilities, and exploits
  • Create a computer incident response team (CIRT) plan for an organization in a given scenario
  • Concepts for implementing risk mitigation throughout an organization
  • Perform a business impact analysis for a provided scenario
  • Create a business continuity plan (BCP) based on the findings of a given risk assessment for an organization
  • Create a disaster recovery plan (DRP) based on the findings of a given risk assessment for an organization
  • Risk mitigation security controls
Audience:
Information Security Analysts, Payroll Specialists, IT Infrastructure Security Specialists, and people who decide which information technology and cybersecurity products to acquire for their organization
Merit Professional Development logo



Network Security Fundamentals
This workshop provides practical solutions for addressing network security issues, studying attack methods, examining vulnerabilities, presenting recommended solutions and more.

This Network Security Fundamentals workshop is designed as a comprehensive learning experience to provide practical solutions for addressing major network security issues. The focus will be on studying current attack methodologies, examining your network for vulnerabilities, presenting recommended solutions and best practices for mitigation, and assessing the landscape of available tools and methods.

The course emphasizes practical applications of security principles and tools. It is appropriate for network administrators, system administrators and others who need expertise in network security fundamentals and best practices. The course can serve either as a basic primer for novices or as a refresher course for experienced administrators.

Course Prerequisites:

Students should possess a working knowledge of TCP/IP and internetworking fundamentals. Specific protocol details will be covered in the course.

Computer Requirement:

Online attendees will be taught using an online desktop learning environment. Students will need an Intel-based computer and a cable-modem network connection (or better) to participate. Your computer may run a Windows, Linux/UNIX, or Mac OS X operating system. Additional information about computer preparation will be provided as the class approaches.

Topics covered include:
  • Fundamental Tools
  • Network Attacks: Threats and Countermeasures
  • Password Strength & Cracking
  • Viruses & Worms
  • Firewalls & VPNs
  • Intrusion Detection & Prevention
  • Network Scanning
  • Linux Security & Logging
Audience:
Network Administrators, Network Technicians
Merit Professional Development logo



Puppet Fundamentals
The course introduces Puppet, automation software that enables system administrators to automate repetitive tasks, deploy applications and manage infrastructure.

The course introduces Puppet, an IT automation software product that gives system administrators the power to automate repetitive tasks, deploy critical applications, and manage infrastructure locally or in the cloud.

IT automation software has gained importance in recent years as services have grown in complexity and resources have migrated to cloud-based systems. System administrators need tools to efficiently manage system deployment and updates; automation software provides effective ways to instrument complex and repetitive configuration tasks within networks and server infrastructures. Puppet is among the most widely deployed IT automation products, with the ability to scale from handfuls of nodes locally to tens of thousands of nodes in the cloud.

Prerequisites:

This course has no prerequisites, but to complete the course successfully attendees need to have at least the equivalent experience of a junior Unix/Linux administrator.

Computer Requirement:

Please bring a laptop computer (any operating system) for use during the class. Your laptop should have wireless Internet capability and a version of VMware installed.

Topics covered include:
  • About Puppet
  • Why Puppet
  • The Classroom Environment
  • Modules & Classes
  • Puppet Agent & Master
  • Reporting
  • Resources
  • Resource Relationships
  • Language Constructs
  • Language & Templates
  • Defined Resource Types
  • Advanced Classes
  • Puppet Forge
  • Troubleshooting & Best Practices
  • Puppet Enterprise
  • Live Management
Audience:
System Administrators and those interested in implementing Puppet
Merit Professional Development logo



Secure Coding in PHP
This course discusses web vulnerabilities through PHP-based examples going beyond the OWASP top ten, tackling various injection attacks, script injections, attacks against session handling of PHP, insecure direct object references, issues with file upload, and many others.

InfoSec Institute’s Secure Coding in PHP course discusses web vulnerabilities through PHP-based examples going beyond the OWASP top ten, tackling various injection attacks, script injections, attacks against session handling of PHP, insecure direct object references, issues with file upload, and many others.

PHP-related vulnerabilities are introduced grouped into the standard vulnerability types of missing or improper input validation, incorrect error and exception handling, improper use of security features and time- and state-related problems. For this latter we discuss attacks like the open_basedir circumvention, denial-of-service through magic float or the hash table collision attack. In all cases participants will get familiar with the most important techniques and functions to be used to mitigate the enlisted risks.

Course Objectives:
  • Understand basic concepts of security, IT security and secure coding
  • Learn about typical coding mistakes and how to avoid them
  • Learn to use various security features of PHP
  • Get information about some recent vulnerabilities of the PHP framework
  • Learn Web vulnerabilities beyond OWASP Top Ten and know how to avoid them
  • Get practical knowledge in using security testing tools
  • Get sources and further reading on secure coding practices
Audience:
Web Developers, Architects and Testers
Merit Professional Development logo



The Threat at Your Doorstep: Cybersecurity for Executives
The Threat at Your Doorstep: Cybersecurity for Executives seminar is comprised of several 50-minute sessions focused on areas such as the current threat landscape, social engineering, critical controls, common attack vectors and more.

The Threat at Your Doorstep: Cybersecurity for Executives seminar is comprised of several 50-minute sessions focused on areas such as the current threat landscape, social engineering, critical controls, common attack vectors and more. Participants walk away with an in-depth overview of various hackers types, the nature and role of training programs and an exploration of social engineering. Attendees will also participate in a live phishing attack demo.

About the Instructor:

The workshop will be taught by Dr. Joe Adams, vice president of research and cyber security for Merit Network. “Joe” joined Merit after retiring from a 26-year career in the United States Army where he achieved the rank of Colonel. He was previously Chief Information Officer (CIO) of the National Defense University. He has also served as a professor and research scientist at West Point, and was a network engineer for the Supreme HQ, Allied Powers Europe.

Topics covered include:
  • Spam And Phishing
  • State Sponsored Cyber Terrorism
  • Advanced Persistent Threats
  • The Underground Cyber Crime Economy
  • Cyber Crime Targets
  • What is Social Engineering?
  • Who is Most Vulnerable?
  • Warning Signs of an Attack
  • Top Critical Controls for IT Managers
  • How to Enforce Critical Controls
  • Lone Wolfs, Collectives and Nation State Actors
  • The Cyber Ecosystem
Audience:
Executives, Managers, IT Professionals
Merit Professional Development logo



VMware vCloud Director ICM (Install, Configure, Manage) v5.5
Gain the knowledge to deploy and manage the ongoing operation of VMware vCloud Director for a small private cloud environment. This course focuses on the private cloud in an engineering or quality assurance solution.

Gain the knowledge to deploy and manage the ongoing operation of VMware vCloud Director for a small private cloud environment. This course focuses on the private cloud in an engineering or quality assurance solution. It covers all of the fundamentals needed to install, configure, and manage any small private cloud with vCloud Director. This course is the prerequisite for other courses that cover more advanced vCloud Director configurations in enterprise deployments.

Topics covered include:
  • Deploy vCloud Director
  • Manage vCloud Director for small private cloud businesses
  • Configure VMware vSphere Storage to enable multiple tiers in provider virtual data centers
  • Create and manage vCloud Director organizations and VMware vSphere vApps
  • Create and manage vCloud Director catalogs
  • Configure networking for organizations and vApps
  • Understand interactions between VMware vSphere Distributed Resource Scheduler clusters and vCloud Director
  • Create an interface between vCloud Director and Microsoft Active Directory servers
Audience:
Consultants, Systems Engineers, Data Center Administrators and Cloud Administrators
Merit Professional Development logo



VMware vSphere: Install, Configure, Manage
In this hands-on course, you will learn to install, configure and manage VMware vSphere, which consists of VMware ESXi and VMware vCenter Server.

In this hands-on course, you will learn to install, configure and manage VMware vSphere, which consists of VMware ESXi and VMware vCenter Server. Approximately 40% of instruction time is spent completing hands-on labs. Completion of this course satisfies the prerequisite for taking the VMware Certified Professional 5 exam (voucher not included). It also prepares you to enroll in any of several advanced vSphere 5.5 courses.

IT automation software has gained importance in recent years as services have grown in complexity and resources have migrated to cloud-based systems. System administrators need tools to efficiently manage system deployment and updates; automation software provides effective ways to instrument complex and repetitive configuration tasks within networks and server infrastructures. Puppet is among the most widely deployed IT automation products, with the ability to scale from handfuls of nodes locally to tens of thousands of nodes in the cloud.

Computer Requirement:

For the class, each student must bring a Windows laptop (any Windows version). The laptop should have wired and wireless Ethernet connectivity. It should have RDP capability, which will generally be true of laptops with recent Windows operating systems. Macintosh computers, or Macs running Windows through a VM, are not recommended.

Topics covered include:
  • VMware Virtualization
  • Virtual Machines
  • VMware vCenter Server
  • Configure and Manage Virtual Networks
  • Configure and Manage vSphere Storage
  • Virtual Machine Management
  • Access and Authentication Control
  • Resource Management and Monitoring
  • Data Protection
  • High Availability and Fault Tolerance
  • Scalability
  • Patch Management
  • Installing VMware vSphere 5 Components
Audience:
System Administrators, Systems Engineers and Operators responsible for VMware ESX, ESXi, and VMware vCenter Server
Merit Professional Development logo



Windows Server 2016
This course is designed for IT professional who want to upgrade their technical skills from Windows Server 2008 or Windows Server 2012 to Windows Server 2016.

This 5-day instructor-led course explains how to implement and configure new features and functionality in Windows Server 2016. This course is designed for IT professional who want to upgrade their technical skills from Windows Server 2008 or Windows Server 2012 to Windows Server 2016. This course presumes a high level of knowledge about previous Windows Server technologies and skills equivalent to the MCSA: Windows Server 2008 or Windows Server 2012 credential. This course is not a product upgrade course, detailing considerations for migrating and upgrading your specific environment to Windows Server 2016. Rather, this course will update students’ existing Windows Server knowledge and skills to Windows Server 2016.

After completing this course, students will be able to:
  • Install and configure Windows Server 2016
  • Implement Hyper-V
  • Implement Directory Services
  • Implement AD FS
  • Manage and Optimize Storage in Windows Server 2016
  • Implement Secure Data Access for Users and Devices
  • Implement Network Services
  • Implement Remote Access
  • Implement Failover Clustering
  • Implement Failover Clustering with Hyper-V
  • Recover Data in Windows Servers 2016
Audience:
This course is intended for Information Technology (IT) Professionals who are experienced Windows Server 2012 or Windows Server 2008 system administrators and who have real world experience working in a Windows Server 2008 R2 or Windows Server 2008 enterprise environment, and have obtained the credential Microsoft Certified Solutions Associate (MCSA) Windows Server 2008 or Windows Server 2012 or have equivalent knowledge. IT professionals wanting to take the Microsoft Certified Solutions Expert (MCSE) exams will also be interested in taking this course as they prepare for the MCSA exams, which are a prerequisite for the MCSE specialties.
Merit Professional Development logo



 

Management & Leadership Courses
A Practical Approach to Developing and Retaining Staff Workshop
This course will introduce a practical, easy-to-use tool for supervisors and managers at all levels to create retention plans and opportunities for each member of their team, focusing on plans that engage the employee, provide focus for the teams and productivity for the organization.

After months of searching, you have found a top candidate, and they have joined your organization; they have the tools they need, the training required to do their job, and they have been oriented to your organization. So you can relax right? Not likely, because just at the point they are becoming top contributors they are recruited away, and you get to start all over again.

In the highly competitive employment market we spend a great deal of time, resources and energy on recruiting top talent, but to sustain success, productivity and cohesion in our teams on a daily basis we need to find ways to also retain that talent. We may use professional recruiters to aid in getting talent in the door, but we need to rely on our internal supervisors, managers and executives to keep them there.

This course is designed to introduce a practical, easy-to-use tool for supervisors and managers at all levels to create retention plans and opportunities for each member of their team, focusing on plans that engage the employee, provide focus for the teams and productivity for the organization.

Following this session attendees will:
  • Have a completed tool for their reference to use with their team
  • Have identified options and opportunities for their staff’s retention plans
  • Be able to articulate a plan for implementing and maintaining a retention plan
About the Instructors
Pamela Gabel is the executive director of the University of Michigan Shared Services Center (U-M SSC). Roxanne Ross is the human resource administrator for the U-M SSC. The U-M SSC utilizes a team-based, continuous improvement environment to meet transactional goals, and employee development and retention strategies.
Merit Professional Development logo



Agile Project Management (LLAMA) Workshop
During this hands-on workshop, you will learn about Agile Project Management methods and how to incorporate them into your team’s project planning and work flow.

How do you keep your project from falling short in delivering client (internal or external) needs on time, and within budget? How do you adjust when client needs are often changing? The software development industry is embracing Agile development methods to address these issues, and there is much that other organizational functions can learn from them. Agile provides a framework for authorizing and adapting to change as it happens and working with the client (internal or external) to produce the deliverables most-needed by end users. TorranceLearning has adapted Agile for instructional design and development projects – they call it the LLAMA (the Lot Like Agile Management Approach) – and the model has gained traction with other kinds of non-IT projects as well.

During this hands-on workshop, you will learn about Agile Project Management methods and how to incorporate them into your team’s project planning and work flow. The workshop will introduce you to the tools and supplies needed to succeed and help you pilot a project to get started.

Topics covered include:
  • Building the Case for Agile
  • Describing Agile to Others
  • Building Instructional Success with Story Mapping
  • Estimating the Project
  • Planning the Project
  • The Project’s MVP and Iterations
  • Agile Practices in Action
  • Hands-on Implementation and Coaching
Audience:
Entry Executives, Project Managers, Business Analysts, Business and IT Stakeholders, Quality and Process Engineers, Technicians, Process Operators.
Merit Professional Development logo



Change Management Workshop
This interactive workshop will introduce you to effective strategies for implementing and managing change, including John Kotter’s 8-Step Model of Change and Kurt Lewin’s Unfreeze/Change/Refreeze Model.

More than 70% of transformational efforts within organizations fail, often due to a lack of focus on human capital. Employees are fundamental in a change effort—it is their enthusiasm, engagement, understanding and implementation that makes or breaks an organizations’ change effort.

This interactive workshop will introduce you to effective strategies for implementing and managing change, including John Kotter’s 8-Step Model of Change and Kurt Lewin’s Unfreeze/Change/Refreeze Model. You will gain real-world approaches that can be applied to any type of organization.

Constant agility is demanded of 21st century organizations, and often changes are required quickly to get ahead of economic, environmental and industry challenges. Learn how to expedite change, minimize resistance and increase the likelihood of adoption during this half-day change management workshop.

About the Instructor

The workshop will be taught by Pierrette Templeton, director of communications and marketing for Merit Network. Pierrette has led organizational change efforts several times during her professional career, including the redesign of Crain’s Detroit Business, a 30 year-old news-magazine in partnership with Ron Reason consulting. She is the recipient of multiple awards from the Society of Professional Journalists, PRism, the National Academy of Television Officers and Advisors and an Emmy nominee. In addition, Pierrette was named the 2014 Distinguished Graduating Scholar from the University of Toledo.

Topics covered:
  • Why change management is needed
  • Step-by-step exploration of multiple change management approaches
  • Pitfalls and consequences of poorly managed change leadership
  • The necessary and varying roles of a 21st century leader
  • Change management approaches for different generational needs
  • Techniques for overcoming barriers to change
  • Motivation and rewards—are you truly encouraging the behavior you desire?
  • Discussions on further resources for study
Audience:
Anyone involved in organizational change processes, leaders and human resources professionals
Merit Professional Development logo



Critical Tools and Techniques to Recruit and Retain the Best Staff Possible
Learn ways to recruit, develop and maintain your staff and improve your workplace culture.
Next Class:

As change becomes a constant in all organizations, it is critical that leaders are prepared to recruit, develop, and maintain the best IT and other staff possible to serve an increasingly diverse customer base amid shrinking budgets, workforce succession, and competition for the best staff. Dr. Denise Williams will discuss the following topics:

  • The importance of maximizing diversity and inclusion efforts in order to recruit widely and ensure that all qualified applicants are aware of your positions,
  • How to understand the phenomenon of “unconscious bias” and how such bias may thwart your efforts to attract and retain the talent you wish to attract,
  • How building “organizational health” and an optimal workplace culture will help local governments compete with other companies and establish an attractive employer brand,
  • How your workplace’s processes for decision-making, problem-solving, and conflict resolution can help or hinder recruitment and retention of the best staff
  • Practical behaviors and strategies to implement immediately to improve organizational culture and diminish the damaging effects of unconscious bias in the workplace.
After attending the session, participants will be able to articulate the business case for optimizing the health of their workplace’s culture and will be equipped with practical knowledge, tools, and techniques that are immediately actionable.

About Denise Williams, PhD:

Dr. Denise Williams is a Performance Consultant with the University of Michigan Health System, and works to promote and optimize a culture of inclusion, equity, and diversity that supports the health, engagement, and productivity of employees.

Audience:
Managers, Human Resources and those interested in new techniques for staff retention
Merit Professional Development logo



Leadership Excellence and Executive Coaching
This intensive course is a three-day experience in the vital tools of becoming an effective leader.

Leadership Excellence and Executive Coaching is a three-day experience in the vital tools of becoming an effective leader. In this intensive course, you will create your own personal leadership philosophy, become a better leader and master skills that can help you improve your business results and accelerate your career.

The course is led by Graydon Krapohl, director of business operations for Merit Network and former colonel in the United States Marine Corps Reserve. Graydon is excited to present this inspiring leadership development program to the Merit Community.

Transforming Managers Into Leaders

The leadership and management skills taught at Leadership Excellence and Executive Coaching were developed and tested by an elite group of service academy graduates/ex-military officers turned successful entrepreneurs and CEOs. Their leadership strategies and tactics have been battle-tested and proven in the real world.

The course is built on the belief that leadership can be learned—and that all leaders need to develop and nurture their skills throughout their careers. In a recent survey, CEOs said they were born with only 40% of their leadership abilities. They developed the remaining 60% of their leadership skills through education and experience.

Course Credits:

Completion of Leadership Excellence and Executive Coaching qualifies you for:

  • 36 PDUs from the Project Management Institute
  • 21 HRCI Recertification Credits from the H.R. Certification Institute
  • 36 CPEs from the National Association of State Boards of Accountancy (NABSA)
After attending the Leadership course, attendees report that:
  • They are more focused on their key performance indicators for accomplishing organizational goals.
  • Everyone in their organization understands their contribution to the overall mission.
  • Their people are aligned and working together as a team.
  • Communications are dramatically improved because team members now understand expectations.
  • Turnover in their organizations shrinks, because workers now respect their bosses as leaders.
  • Key performance indicators improve significantly, demonstrating that the organization is now getting the results it needs.
Your Tuition Includes:
  • A three-day, goal-focused, outcome-driven workshop
  • 90 days of follow-up executive coaching
  • Audio MP3 files of the Leadership Excellence course readings
  • Workbook including self-evaluation, application and action exercises
  • Your Personal Leader’s Journal Software
  • Your Personal Energize2Lead™ Leadership Profile
  • A copy of The Leader’s Compass: A Personal Leadership Philosophy Is Your Key to Success, 2nd Edition, by Ed Ruggero and Dennis F. Haley. This new edition of The Leader’s Compass features the personal leadership philosophy of Bob McDonald, Chief Executive Officer, Procter & Gamble
  • Bonus: Personal Leader’s Journal software
Audience:
Directors, Executives, Managers and those interested becoming managers
Merit Professional Development logo



Planning and Managing Agile Projects
This class introduces attendees to the core values, principles, and practices of Agile.

Planning and Managing Agile Projects introduces attendees to the core values, principles, and practices of Agile.

This course is a more elaborate version of the Certified Scrum Master training as it discusses how to plan and manage Agile practices. The course also goes into greater depth about all the roles and responsibilities on the team, beyond the ScrumMaster and Product Owner roles. Agile is now becoming a standard for business flow over and above just software development.

Why use Agile?
  • Increased Efficiency
  • Increased Revenue
  • Better Risk Management
  • Cost Control
  • Higher Customer Satisfaction
  • More Flexibility
The use of agile as an approach to managing projects has been increasing dramatically over the last several years. Gartner had predicted that by the end of 2012, agile development methods would be used on 80% of all software development projects. This class will focus on using Agile methodology beyond software development.

Audience:
Project Managers, Supervisors, Team Leaders, Business Analysts, Business and IT Stakeholders
Merit Professional Development logo



Project Management Fundamentals
In this comprehensive course, you will learn the fundamentals of project management: how to initiate, plan, and execute a project that meets objectives and satisfies stakeholders.

In this comprehensive course, you will learn the fundamentals of project management: how to initiate, plan, and execute a project that meets objectives and satisfies stakeholders.

Aligned with the Project Management Institute (PMI®) Guide to the Project Management Body of Knowledge (PMBOK® Guide), this course provides a step-by-step guide to planning and executing a project. Working through case studies with real-world scenarios, you will interact with fellow students to learn and apply the methodologies and good practices of formal project management.

You will discover the approaches and techniques that make project managers successful, covering topics such as:

  • Analyzing stakeholders
  • Defining expectations
  • Defining project deliverables
  • Analyzing scope
  • Developing schedules
  • Mitigating risk
  • Contingency planning
  • Establishing and applying effective change controls
  • Performance reporting
  • Communicating status to project stakeholders
During class, project management theory will be interspersed with practical, hands-on workshops. Seventy percent of class time is dedicated to experience-based skills development. In the remaining class time, you will learn about methodologies and put practical skills into context.

University Credit:

Students pursuing a university-recognized and/or accredited certificate in Canada or continuing education units in the US must attend at least 90% of class time, participate in class exercises and section-knowledge checks, and score at least 72% on an end-of-class, multiple-choice assessment.

Technical Information:

You will need to provide the computer on which you will participate in the class. Most recent Windows and Mac OS operating systems are supported, as well as most current browsers. Before the class you will be provided with instructions for testing and logging into the virtual environment. Printed materials will be shipped to you.

What You’ll Learn:
  • Manage a project through each stage of the project management life cycle
  • Document the needs and priorities of key stakeholders
  • Develop an execution strategy that will fulfill stakeholders’ expectations
  • Develop a project plan that balances scope, time, cost, and risk
  • Assess project complexity and analyze scope to a suitable degree of granularity
  • Establish project controls to ensure a successful outcome
  • Monitor project activities and effectively assess progress
  • Report status and performance efficiently and effectively
  • Collect lessons learned and create a project archive that contributes to an organization’s experience base
Audience:
Anyone who is involved in, or affected by, projects or change management within an organization, including Project Managers, IT Project Managers, Project Coordinators, Team Leaders, Product Managers, Program Managers, Project Team Members, Subject Matter Experts, Analysts, Stakeholders, and Senior Managers who want to get more out of their project teams.
Merit Professional Development logo



Sticky Situations: A Workshop on Dealing with Challenging People, Conflict & Change
The half-day workshop will provide you with ways to deal with challenging situations.

We as human beings bring with us to work all our challenges, beliefs, personalities, baggage, issues, skills, and experiences — and more. There is much we don’t know that we don’t know. Learn (and apply) what we need to know when it comes to handling ourselves, difficult people and challenging situations.

Sarah Brabbs, M.A. spends her time training, coaching and inspiring people to proactively improve their communication skills, experience immediate impactful change, and enjoy deeper, more meaningful and productive relationships both at work and at home. Jody Heath, a Vice President at Manpower in Ann Arbor, says this about Sarah: “I enjoyed the presentation so much that I attended it a second time to reinforce what I learned.” Sarah’s book entitled “So People Say You’re an Asshole: A Book for You, People Who Love You, & People Who Work with You” came out last year.

Sarah works with the business community as well as individuals. A more detailed description of what she does can be found at optimizingrelationships.com. She can be reached at sarah@optimizingrelationships.com.

Merit Professional Development logo



ZingTrain – The Art of Giving Great Service
Relevant for any service organization, the seminar identifies the principles of great service and strategies for satisfying customer needs.

ZingTrain, the training arm of Ann Arbor’s legendary Zingerman’s Deli, presents a seminar on the art of building a customer service culture. Relevant for any service organization, the seminar identifies the principles of great service and strategies for satisfying customer needs.

From its opening day in 1982, Zingerman’s has focused on delivering a great food and great service experience every day with every customer.

Zingerman’s approach to giving great service:
  • is a tangible concept of service that can be defined, taught, lived, measured and rewarded
  • is a recipe for great service that works equally well for 16-year-old busboys and 60-year-old corporate execs
  • is just the thing for large and small organizations, for-profits and not-for-profits
  • can be easily adapted to improve the quality of service in your organization
  • is how your organization can stand out from your competition
  • enables the deli to create an open, caring, supportive and positive place where staff get to work with and wait on people who share their values
One seminar attendee exclaimed, “I’ve never seen anywhere that great service is treated like this. It’s like a religion and everyone here believes in it.” But this seminar isn’t just spiritual – you’ll go home with the same tools and techniques used at Zingerman’s to make great service the reality of daily life.

By the end of the workshop, you will be able to:
  • Name the elements of building/strengthening a customer service culture.
  • Explain Zingerman’s approach to customer service and how it can be adapted to work within your organization.
  • Develop a draft recipe for great service and handling customer service complaints to be used internally and externally.
  • Use new tools and techniques to support in-house customer service improvement initiatives.
  • Explore methods of measuring and rewarding customer service.
  • Call upon a network of peers to help get past roadblocks.
Audience:
Help Desk Managers, Student Services Administrators, Front-line Supervisors, and Executives responsible for customer-facing organizations
Merit Professional Development logo



 

If you are interested in a course for yourself or your organization, please contact Merit Professional Development.