Raymond Lacoste is a highly recognized instructor, and holds the Cisco Sirius Instructor Award. Raymond has authored the Cisco Press publications on the Cisco ENARSI and Cisco TSHOOT exams. Raymond’s engaging instruction style makes even the most obscenely complicated or obtuse concepts relatable and understandable. Outside of class, Raymond enjoys dominating both on the golf course and the basketball court.
Biography
Cisco CCNP Enterprise: ENCOR v1.1
The ENCOR exam was updated by Cisco on Sep. 20th 2023. This course will be ...
CompTIA® Security+ (SY0-701)
The CompTIA Security+ (SY0-601) exam is due to retire in July of 2024. This (SY0-701) ...
Security Technologies
Technologies like MFA, antivirus and antimalware are becoming essential to guard against the changing landscape ...
Ransomware Protection Measures
With ransomware concerns heightened, it is important to know how you can take a structured ...
Secured Infrastructure
The systems that build our infrastructure are secured from a diverse collection of solutions. This ...
Secured Mobile Devices
Our mobile devices are perhaps the most diverse and challenging to secure in our infrastructure. ...
Cybersecurity Risks
A structured approach to risk can allow our IT staff know where to direct their ...
Secured Workstations
At the perimeter of our environments reside our workstations. As part of a secure environment, ...
Guiding Strategies for IT Security
Thankfully, our IT professionals do not have to reinvent the wheel to secure their systems. ...
Emerging Security Concerns
In the ever-changing world of IT, new threats are often those that we must react ...
Persistent Security Concerns
Some threats are here to stay. Persistent threats endure because they are endemic to the ...
Organizational System Threats
Systems we use to operate efficiently as a business are often a target of attacks. ...
Key Security Skills Refresher
This course reviews the key stills central to being a safe and hardened end user. ...
Keeping Your Personal Systems Safe
This course details key practices that make their personal systems less likely to be compromised. ...
Staying Safe While Remote and Traveling
This course covers practices central to safe computing outside of the shelter of the corporate ...
Recognizing Social Engineering Attacks
This course covers the threat of social engineering and how it is likely to manifest. ...
Guarding Your Passwords
This course covers the importance of password security. Upon completing this course, students will be ...
Defensive Systems Usage
This course key practices that guard against careless system operation and the threats that occur ...
Recognize Dangerous Emails
This course covers skills to recognize threatening links and attachments in emails. Upon completing this ...
Guarding Your Email Account
In this course, students will learn skills that will be used to recognize malicious emails ...
Security Awareness Quickstart
In this course, you’ll be provided a jumpstart to being part of a secure workforce. ...
Safe Systems Practices to Combat Ransomware
In this course you’ll learn how features in our software can help guard against ransomware.
Best Practices to Thwart Ransomware
In this course, you’ll learn common ways of keeping good computer hygiene to reduce the ...
Vehicles for Ransomware
In this course, you’ll learn the common methods which make ransomware attacks successful.
Ransomware in the Modern World
You’ve likely heard the names of some ransomware attacks. In this course, you’ll see specific ...
Ransomware Explained
In this course you will see how ransomware works and how it’s impact extends beyond ...
Understanding the Threat of Ransomware
Ransomware is a threat that has exploded in recent years. Knowing how this threat can ...
Email-Based Social Engineering
You are likely to get an email that is part of a social engineering attack. ...
Exposing Spoofed Email Addresses
Many emails sent from hackers and criminals pretend to come from someone or something you ...
Safe Email Usage 101
Although email is an invaluable tool, it is a tool hackers and cyber criminals use ...
Guarding Against Email Attachments
Emails can come with files attached. Unfortunately, this is an all too common way for ...
Phishing Emails Exposed
Of all the email based attacks you are likely to receive, phishing is the most ...
Protected Email Use in Microsoft Office
Microsoft Office is the most popular suite for desktop applications. Knowing how to use Microsoft ...
AWS Cloud Practitioner (CLF-C02)
This instructor-led course is the first step in training for the industry-leading Amazon AWS product. ...
Getting to know SDN with Cisco ACI
In this online training course, students will be provided with a fundamental understanding of Software ...
CompTIA® Security+ (SY0-601)
The CompTIA Security+ (SY-601) exam is due to retire in July of 2024. The updated ...
Certified Information Systems Security Professional (CISSP)
In this engaging and comprehensive online training course, you receive in-depth instruction covering the 8 ...
AWS Technical Essential
In this online training course, students will be introduced to Amazon Web Services (AWS) products, ...
AWS System Operations (SOA-C02)
In this online training course, students will be taught how to create automatable and repeatable ...
AWS Architect Associate
In this online training course, students will be taught the fundamental skills to architect your ...
Cisco CCNA: Implementing and Administering Cisco Solutions
The Implementing and Administering Cisco Solutions (CCNA) course is the first step into Cisco networking. ...
ICND2 v3
The Cisco CCNA R&S: ICND2 v3 course provides students with the key skills needed to ...
ROUTE
Cisco CCNP R&S: ROUTE online training course will provide students with the knowledge and skills ...
Cisco CCNP R&S: SWITCH
Cisco CCNP R&S: SWITCH online training course provides knowledge and skills needed to create an ...
Getting to Know Windows 10
In this online training course, students will be provided with an introduction to what’s new ...
Cisco CCNP Enterprise: ENARSI
The CCNP Enterprise: ENARSI online training course provides students with the knowledge of implementation and ...
Cisco CCENT R&S: ICND1 v3
The ICND1: Cisco CCENT R&S v3 course is the first step into Cisco networking. The ...
- Cisco Enterprise networking
- Cisco Routing and Switching
- Cisco Datacenter Networking
- ITIL
- Amazon AWS
- Cisco CCSI
- Cisco CCNP Routing and Switching
- Cisco CCNP Enterprise
- ITIL Foundations
- ITIL Practitioner
- ITIL Intermediate
- Amazon AWS System Operations
- Amazon AWS Architect
- Amazon AWS Developer
- CISSP
Monday, September 16
Tuesday, September 17
Wednesday, September 18
Thursday, September 19
Monday, September 23
Tuesday, September 24
Friday, September 27
Monday, October 21
Tuesday, October 22
Wednesday, October 23
Thursday, October 24
Monday, October 28
Tuesday, October 29
Wednesday, October 30
Thursday, October 31
Monday, November 4
Tuesday, November 5
Tuesday, November 12
Wednesday, November 13
Thursday, November 14
Friday, November 15
Monday, November 18
Tuesday, November 19
Wednesday, November 20
Thursday, November 21
Monday, November 25
Tuesday, November 26
Monday, December 2
Tuesday, December 3
Wednesday, December 4
Thursday, December 5
Monday, December 9
Tuesday, December 10
Wednesday, December 11
Thursday, December 12
Monday, December 16
Tuesday, December 17
Cisco CCNP Enterprise: ENCOR v1.1
The ENCOR exam was updated by Cisco on Sep. 20th 2023. This course will be ...
CompTIA® Security+ (SY0-701)
The CompTIA Security+ (SY0-601) exam is due to retire in July of 2024. This (SY0-701) ...
Security Technologies
Technologies like MFA, antivirus and antimalware are becoming essential to guard against the changing landscape ...
Ransomware Protection Measures
With ransomware concerns heightened, it is important to know how you can take a structured ...
Secured Infrastructure
The systems that build our infrastructure are secured from a diverse collection of solutions. This ...
Secured Mobile Devices
Our mobile devices are perhaps the most diverse and challenging to secure in our infrastructure. ...
Cybersecurity Risks
A structured approach to risk can allow our IT staff know where to direct their ...
Secured Workstations
At the perimeter of our environments reside our workstations. As part of a secure environment, ...
Guiding Strategies for IT Security
Thankfully, our IT professionals do not have to reinvent the wheel to secure their systems. ...
Emerging Security Concerns
In the ever-changing world of IT, new threats are often those that we must react ...
Persistent Security Concerns
Some threats are here to stay. Persistent threats endure because they are endemic to the ...
Organizational System Threats
Systems we use to operate efficiently as a business are often a target of attacks. ...
Key Security Skills Refresher
This course reviews the key stills central to being a safe and hardened end user. ...
Keeping Your Personal Systems Safe
This course details key practices that make their personal systems less likely to be compromised. ...
Staying Safe While Remote and Traveling
This course covers practices central to safe computing outside of the shelter of the corporate ...
Recognizing Social Engineering Attacks
This course covers the threat of social engineering and how it is likely to manifest. ...
Guarding Your Passwords
This course covers the importance of password security. Upon completing this course, students will be ...
Defensive Systems Usage
This course key practices that guard against careless system operation and the threats that occur ...
Recognize Dangerous Emails
This course covers skills to recognize threatening links and attachments in emails. Upon completing this ...
Guarding Your Email Account
In this course, students will learn skills that will be used to recognize malicious emails ...
Security Awareness Quickstart
In this course, you’ll be provided a jumpstart to being part of a secure workforce. ...
Safe Systems Practices to Combat Ransomware
In this course you’ll learn how features in our software can help guard against ransomware.
Best Practices to Thwart Ransomware
In this course, you’ll learn common ways of keeping good computer hygiene to reduce the ...
Vehicles for Ransomware
In this course, you’ll learn the common methods which make ransomware attacks successful.
Ransomware in the Modern World
You’ve likely heard the names of some ransomware attacks. In this course, you’ll see specific ...
Ransomware Explained
In this course you will see how ransomware works and how it’s impact extends beyond ...
Understanding the Threat of Ransomware
Ransomware is a threat that has exploded in recent years. Knowing how this threat can ...
Email-Based Social Engineering
You are likely to get an email that is part of a social engineering attack. ...
Exposing Spoofed Email Addresses
Many emails sent from hackers and criminals pretend to come from someone or something you ...
Safe Email Usage 101
Although email is an invaluable tool, it is a tool hackers and cyber criminals use ...
Guarding Against Email Attachments
Emails can come with files attached. Unfortunately, this is an all too common way for ...
Phishing Emails Exposed
Of all the email based attacks you are likely to receive, phishing is the most ...
Protected Email Use in Microsoft Office
Microsoft Office is the most popular suite for desktop applications. Knowing how to use Microsoft ...
AWS Cloud Practitioner (CLF-C02)
This instructor-led course is the first step in training for the industry-leading Amazon AWS product. ...
Getting to know SDN with Cisco ACI
In this online training course, students will be provided with a fundamental understanding of Software ...
CompTIA® Security+ (SY0-601)
The CompTIA Security+ (SY-601) exam is due to retire in July of 2024. The updated ...
Certified Information Systems Security Professional (CISSP)
In this engaging and comprehensive online training course, you receive in-depth instruction covering the 8 ...
AWS Technical Essential
In this online training course, students will be introduced to Amazon Web Services (AWS) products, ...
AWS System Operations (SOA-C02)
In this online training course, students will be taught how to create automatable and repeatable ...
AWS Architect Associate
In this online training course, students will be taught the fundamental skills to architect your ...
Cisco CCNA: Implementing and Administering Cisco Solutions
The Implementing and Administering Cisco Solutions (CCNA) course is the first step into Cisco networking. ...
ICND2 v3
The Cisco CCNA R&S: ICND2 v3 course provides students with the key skills needed to ...
ROUTE
Cisco CCNP R&S: ROUTE online training course will provide students with the knowledge and skills ...
Cisco CCNP R&S: SWITCH
Cisco CCNP R&S: SWITCH online training course provides knowledge and skills needed to create an ...
Getting to Know Windows 10
In this online training course, students will be provided with an introduction to what’s new ...
Cisco CCNP Enterprise: ENARSI
The CCNP Enterprise: ENARSI online training course provides students with the knowledge of implementation and ...
Cisco CCENT R&S: ICND1 v3
The ICND1: Cisco CCENT R&S v3 course is the first step into Cisco networking. The ...
- Cisco Enterprise networking
- Cisco Routing and Switching
- Cisco Datacenter Networking
- ITIL
- Amazon AWS
- Cisco CCSI
- Cisco CCNP Routing and Switching
- Cisco CCNP Enterprise
- ITIL Foundations
- ITIL Practitioner
- ITIL Intermediate
- Amazon AWS System Operations
- Amazon AWS Architect
- Amazon AWS Developer
- CISSP