Raymond Lacoste is a highly recognized instructor, and holds the Cisco Sirius Instructor Award. Raymond has authored the Cisco Press publications on the Cisco ENARSI and Cisco TSHOOT exams. Raymond’s engaging instruction style makes even the most obscenely complicated or obtuse concepts relatable and understandable. Outside of class, Raymond enjoys dominating both on the golf course and the basketball court.
Biography

Security Technologies
Technologies like MFA, antivirus and antimalware are becoming essential to guard against the changing landscape ...

Ransomware Protection Measures
With ransomware concerns heightened, it is important to know how you can take a structured ...

Secured Infrastructure
The systems that build our infrastructure are secured from a diverse collection of solutions. This ...

Secured Mobile Devices
Our mobile devices are perhaps the most diverse and challenging to secure in our infrastructure. ...

Cybersecurity Risks
A structured approach to risk can allow our IT staff know where to direct their ...

Secured Workstations
At the perimeter of our environments reside our workstations. As part of a secure environment, ...

Guiding Strategies for IT Security
Thankfully, our IT professionals do not have to reinvent the wheel to secure their systems. ...

Emerging Security Concerns
In the ever-changing world of IT, new threats are often those that we must react ...

Persistent Security Concerns
Some threats are here to stay. Persistent threats endure because they are endemic to the ...

Organizational System Threats
Systems we use to operate efficiently as a business are often a target of attacks. ...

Key Security Skills Refresher
This course reviews the key stills central to being a safe and hardened end user. ...

Keeping Your Personal Systems Safe
This course details key practices that make their personal systems less likely to be compromised. ...

Staying Safe While Remote and Traveling
This course covers practices central to safe computing outside of the shelter of the corporate ...

Recognizing Social Engineering Attacks
This course covers the threat of social engineering and how it is likely to manifest. ...

Guarding Your Passwords
This course covers the importance of password security. Upon completing this course, students will be ...

Defensive Systems Usage
This course key practices that guard against careless system operation and the threats that occur ...

Recognize Dangerous Emails
This course covers skills to recognize threatening links and attachments in emails. Upon completing this ...

Guarding Your Email Account
In this course, students will learn skills that will be used to recognize malicious emails ...

Security Awareness Quickstart
In this course, you’ll be provided a jumpstart to being part of a secure workforce. ...

Safe Systems Practices to Combat Ransomware
In this course you’ll learn how features in our software can help guard against ransomware.

Best Practices to Thwart Ransomware
In this course, you’ll learn common ways of keeping good computer hygiene to reduce the ...

Vehicles for Ransomware
In this course, you’ll learn the common methods which make ransomware attacks successful.

Ransomware in the Modern World
You’ve likely heard the names of some ransomware attacks. In this course, you’ll see specific ...

Ransomware Explained
In this course you will see how ransomware works and how it’s impact extends beyond ...

Understanding the Threat of Ransomware
Ransomware is a threat that has exploded in recent years. Knowing how this threat can ...

Email-Based Social Engineering
You are likely to get an email that is part of a social engineering attack. ...

Exposing Spoofed Email Addresses
Many emails sent from hackers and criminals pretend to come from someone or something you ...

Safe Email Usage 101
Although email is an invaluable tool, it is a tool hackers and cyber criminals use ...

Guarding Against Email Attachments
Emails can come with files attached. Unfortunately, this is an all too common way for ...

Phishing Emails Exposed
Of all the email based attacks you are likely to receive, phishing is the most ...

Protected Email Use in Microsoft Office
Microsoft Office is the most popular suite for desktop applications. Knowing how to use Microsoft ...
AWS Cloud Practitioner
This instructor-led course is the first step in training for the industry-leading Amazon AWS product. ...
Getting to know SDN with Cisco ACI
In this online training course, students will be provided with a fundamental understanding of Software ...
CompTIA® Security+ (SY0-601)
In this instructor-led, online training course, you will be prepared for the CompTIA Security+ certification ...
AWS Technical Essential
In this online training course, students will be introduced to Amazon Web Services (AWS) products, ...
AWS System Operations
In this online training course, students will be taught how to create automatable and repeatable ...
AWS Architect Associate
In this online training course, students will be taught the fundamental skills to architect your ...
Cisco CCNA: Implementing and Administering Cisco Solutions
The Implementing and Administering Cisco Solutions (CCNA) course is the first step into Cisco networking. ...
ICND2 v3
The Cisco CCNA R&S: ICND2 v3 course provides students with the key skills needed to ...
ROUTE
Cisco CCNP R&S: ROUTE online training course will provide students with the knowledge and skills ...
Cisco CCNP R&S: SWITCH
Cisco CCNP R&S: SWITCH online training course provides knowledge and skills needed to create an ...
Getting to Know Windows 10
In this online training course, students will be provided with an introduction to what’s new ...
Cisco CCNP Enterprise: ENCOR
The CCNP Enterprise: ENCOR course is the first step to mastering the implementation of core ...
Cisco CCNP Enterprise: ENARSI
The CCNP Enterprise: ENARSI online training course provides students with the knowledge of implementation and ...
Cisco CCENT R&S: ICND1 v3
The ICND1: Cisco CCENT R&S v3 course is the first step into Cisco networking. The ...
- Cisco Enterprise networking
- Cisco Routing and Switching
- Cisco Datacenter Networking
- ITIL
- Amazon AWS
- Cisco CCSI
- Cisco CCNP Routing and Switching
- Cisco CCNP Enterprise
- ITIL Foundations
- ITIL Practitioner
- ITIL Intermediate
- Amazon AWS System Operations
- Amazon AWS Architect
- Amazon AWS Developer
- CISSP
Monday, June 26
Tuesday, June 27
Monday, July 10
Tuesday, July 11
Wednesday, July 12
Thursday, July 13
Monday, July 17
Tuesday, July 18
Wednesday, July 19
Thursday, July 20
Monday, July 31
Tuesday, August 1
Wednesday, August 2
Thursday, August 3
Tuesday, August 8
Wednesday, August 9
Thursday, August 10
Friday, August 11
Monday, September 11
Tuesday, September 12
Monday, September 25
Tuesday, September 26
Wednesday, September 27
Thursday, September 28
Monday, October 2
Tuesday, October 3
Wednesday, October 4
Thursday, October 5
Monday, October 23
Tuesday, October 24
Wednesday, October 25
Thursday, October 26
Monday, October 30
Tuesday, October 31
Wednesday, November 1
Thursday, November 2
Monday, November 13
Tuesday, November 14
Monday, November 27
Tuesday, November 28
Monday, December 4
Tuesday, December 5
Wednesday, December 6
Thursday, December 7
Monday, December 11
Tuesday, December 12
Wednesday, December 13
Thursday, December 14

Security Technologies
Technologies like MFA, antivirus and antimalware are becoming essential to guard against the changing landscape ...

Ransomware Protection Measures
With ransomware concerns heightened, it is important to know how you can take a structured ...

Secured Infrastructure
The systems that build our infrastructure are secured from a diverse collection of solutions. This ...

Secured Mobile Devices
Our mobile devices are perhaps the most diverse and challenging to secure in our infrastructure. ...

Cybersecurity Risks
A structured approach to risk can allow our IT staff know where to direct their ...

Secured Workstations
At the perimeter of our environments reside our workstations. As part of a secure environment, ...

Guiding Strategies for IT Security
Thankfully, our IT professionals do not have to reinvent the wheel to secure their systems. ...

Emerging Security Concerns
In the ever-changing world of IT, new threats are often those that we must react ...

Persistent Security Concerns
Some threats are here to stay. Persistent threats endure because they are endemic to the ...

Organizational System Threats
Systems we use to operate efficiently as a business are often a target of attacks. ...

Key Security Skills Refresher
This course reviews the key stills central to being a safe and hardened end user. ...

Keeping Your Personal Systems Safe
This course details key practices that make their personal systems less likely to be compromised. ...

Staying Safe While Remote and Traveling
This course covers practices central to safe computing outside of the shelter of the corporate ...

Recognizing Social Engineering Attacks
This course covers the threat of social engineering and how it is likely to manifest. ...

Guarding Your Passwords
This course covers the importance of password security. Upon completing this course, students will be ...

Defensive Systems Usage
This course key practices that guard against careless system operation and the threats that occur ...

Recognize Dangerous Emails
This course covers skills to recognize threatening links and attachments in emails. Upon completing this ...

Guarding Your Email Account
In this course, students will learn skills that will be used to recognize malicious emails ...

Security Awareness Quickstart
In this course, you’ll be provided a jumpstart to being part of a secure workforce. ...

Safe Systems Practices to Combat Ransomware
In this course you’ll learn how features in our software can help guard against ransomware.

Best Practices to Thwart Ransomware
In this course, you’ll learn common ways of keeping good computer hygiene to reduce the ...

Vehicles for Ransomware
In this course, you’ll learn the common methods which make ransomware attacks successful.

Ransomware in the Modern World
You’ve likely heard the names of some ransomware attacks. In this course, you’ll see specific ...

Ransomware Explained
In this course you will see how ransomware works and how it’s impact extends beyond ...

Understanding the Threat of Ransomware
Ransomware is a threat that has exploded in recent years. Knowing how this threat can ...

Email-Based Social Engineering
You are likely to get an email that is part of a social engineering attack. ...

Exposing Spoofed Email Addresses
Many emails sent from hackers and criminals pretend to come from someone or something you ...

Safe Email Usage 101
Although email is an invaluable tool, it is a tool hackers and cyber criminals use ...

Guarding Against Email Attachments
Emails can come with files attached. Unfortunately, this is an all too common way for ...

Phishing Emails Exposed
Of all the email based attacks you are likely to receive, phishing is the most ...

Protected Email Use in Microsoft Office
Microsoft Office is the most popular suite for desktop applications. Knowing how to use Microsoft ...
AWS Cloud Practitioner
This instructor-led course is the first step in training for the industry-leading Amazon AWS product. ...
Getting to know SDN with Cisco ACI
In this online training course, students will be provided with a fundamental understanding of Software ...
CompTIA® Security+ (SY0-601)
In this instructor-led, online training course, you will be prepared for the CompTIA Security+ certification ...
AWS Technical Essential
In this online training course, students will be introduced to Amazon Web Services (AWS) products, ...
AWS System Operations
In this online training course, students will be taught how to create automatable and repeatable ...
AWS Architect Associate
In this online training course, students will be taught the fundamental skills to architect your ...
Cisco CCNA: Implementing and Administering Cisco Solutions
The Implementing and Administering Cisco Solutions (CCNA) course is the first step into Cisco networking. ...
ICND2 v3
The Cisco CCNA R&S: ICND2 v3 course provides students with the key skills needed to ...
ROUTE
Cisco CCNP R&S: ROUTE online training course will provide students with the knowledge and skills ...
Cisco CCNP R&S: SWITCH
Cisco CCNP R&S: SWITCH online training course provides knowledge and skills needed to create an ...
Getting to Know Windows 10
In this online training course, students will be provided with an introduction to what’s new ...
Cisco CCNP Enterprise: ENCOR
The CCNP Enterprise: ENCOR course is the first step to mastering the implementation of core ...
Cisco CCNP Enterprise: ENARSI
The CCNP Enterprise: ENARSI online training course provides students with the knowledge of implementation and ...
Cisco CCENT R&S: ICND1 v3
The ICND1: Cisco CCENT R&S v3 course is the first step into Cisco networking. The ...
- Cisco Enterprise networking
- Cisco Routing and Switching
- Cisco Datacenter Networking
- ITIL
- Amazon AWS
- Cisco CCSI
- Cisco CCNP Routing and Switching
- Cisco CCNP Enterprise
- ITIL Foundations
- ITIL Practitioner
- ITIL Intermediate
- Amazon AWS System Operations
- Amazon AWS Architect
- Amazon AWS Developer
- CISSP