Browse Current Courses

Feel free to browse our catalog of courses and read more about each course you may be interested in. The courses are organized by either Vendor or Category. We have listed the most popular courses for each vendor or category on the initial page with all of the courses listed on the View All Courses for that selection.

When you see a course you like, click on it to read more detail such as What You Get, Ideal Candidate, Prerequisites, etc.

If there is a course you are looking for that we have not listed, please contact us and we will always try to accommodate.


Social Media Security Professional

There are more than one million active customers using Amazon Web Services (AWS) to perform faster, lower IT costs and scale applications. Global Knowledge can help you and your team get the most from AWS to ensure you capitalize on your cloud investment. UKI courses will teach you the skills to design, deploy, operate and secure your infrastructure and applications on the AWS cloud. Whether you are new, have some experience or are seeking AWS certification, we have a learning solution for you.

Most Popular Courses



Social Media Security Professional

Our intensive Avaya training provided by highly skilled and experienced instructors enables you to become an expert on Avaya unified communications, including Communication Manager, Communication Server 1000 (CS 1000), IP Office, and Session and System Manager, as well as Avaya Contact Center, Messaging, and networking solutions. UKI provides the broadest curriculum of Avaya technical training available. We provide the convenient training options that enable you to gain the skills you need to successfully implement and manage Avaya products.

Most Popular Courses



Social Media Security Professional

At CWNP, we offer Enterprise Wi-Fi certifications for entry-level professionals all the way up to seasoned network experts. Each certification level is designed to benchmark your deepening understanding of RF technologies and applications of 802.11 networks.

Most Popular Courses



Social Media Security Professional

UKI is proud to provide the widely respected Cisco certification training. The Cisco certifications bring valuable, measurable rewards to network professionals, their managers, and the organizations that employ them. UKI's Cisco training program delivered by experienced instructors offers hands-on training based on real-world scenarios to prepare you to take charge of your organization's network environment. Our Expert Cisco certified instructors use our patented Learn>Test>Certify™ methodology UKI Cisco training solution ensures training and certification success for you and your entire team maximizing your return on training investment.

Most Popular Courses



Social Media Security Professional

CompTIA® serves the IT industry as the world's largest developer of vendor-neutral IT certification exams. Experts and industry leaders from the public and private sectors, including training, academia and government work with CompTIA to develop broad-based, foundational exams that validate an individual's IT skill set. This group of experts provides the resources and subject matter expertise necessary to build a vendor-neutral industry-defined exam. To date, more than 900,000 CompTIA certifications have been earned worldwide.

Ultimate Knowledge  has achieved Platinum Authorized Partner status, the highest level of recognition for an IT training provider in their Channel Authorized Partner Program (CAPP).The selection process to join CompTIA's CAPP involves a rigorous audit on the capabilities of a training company providing CompTIA training. We train and certify thousands of technicians and industry specialists each year and our clients include the  Department of Defense, Federal Agencies, DOD Contracting Partners, and Fortune 500 companies.

Our Expert CompTIA® certified instructors use our patented Learn>Test>Certify™ methodology coupled with our proprietary Ultimate CMF™(Certification Management Framework). The CMF provides one portal for the organization’s Workforce Manager to track and update information about their entire workforce and it provides one location for the individual to track all of their professional training and certification.  Ultimate Knowledge’s CompTIA® training solution ensures training and certification success for you or your entire team maximizing your return on training investment.

Ultimate Knowledge delivers the following Official CompTIA training and certification classes:

Most Popular Courses



Social Media Security Professional

The International Council of E-Commerce Consultants (EC-Council) is a member-based organization that certifies individuals in various e-business and information security skills. It is the owner and developer of the world famous Certified Ethical Hacker (C|EH), Computer Hacking Forensics Investigator (C|HFI) and EC-Council Certified Security Analyst (E|CSA)/License Penetration Tester (L|PT) programs, and various others offered in over 60 countries around the globe. EC-Council has trained over 60,000 individuals and certified more than 22,000 members, through more than 450 training partners globally. These certifications are recognized worldwide and have received endorsements from various government agencies including the US Federal Government via the Montgomery GI Bill, National Security Agency (NSA) and the Committee on National Security Systems (CNSS).

EC-Council  offers the Ethical Hacking and Countermeasures Certification (CEH) which  is a vendor neutral certification measuring one's ability to preemptively thwart a malicious attack, while staying within legal guidelines. The certification is well suited for experienced technology professionals with previous experience and certifications.  A Certified Ethical Hacker is a skilled professional who understands and knows how to look for the weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker. Hacking is a crime in the United States in most other countries. Applying the techniques learned by preparing for this certification must only be done by request of the organization or business owning the system being "hacked."

Ultimate Knowledge is an established EC-Council Accredited Training Provider and offers the best EC-Council education solutions available.  We train and certify thousands of technicians and industry specialists each year and our clients include the  Department of Defense, Federal Agencies, DOD Contracting Partners, and Fortune 500 companies.  Our Expert EC-Council certified instructors;  including  EC-Council 2007,2008 & 2009 “Instructor of the Year” Steve DeFino, use our patented Learn>Test>Certify™ methodology coupled with our proprietary Ultimate CMF™(Certification Management Framework). The CMF provides one portal for the organization’s Workforce Manager to track and update information about their entire workforce and it provides one location for the individual to track all of their professional training and certification.  Ultimate Knowledge’s EC-Council training solution ensures training and certification success for you or your entire team maximizing your return on training investment.

Most Popular Courses



Social Media Security Professional
ETA

Founded in 1978 by electronics technicians, ETA International (Electronics Technicians Association International) is a not-for-profit, worldwide professional association whose mission is to represent and support the electronics professional. ETA aligns with individual professional goals, vocational and education curriculums, and businesses’ resource initiatives through certification programs, conferences, speaking engagements, and book and journal publications. Recognizing the need to verify that fellow electronics technicians had sufficient training in electronics industry standards, including troubleshooting techniques, knowledge of test equipment, and installation procedures, ETA began providing third-party assessment through its own certification programs in 1978. Aligning with the ISO 17024 standards, and collaborating with education providers and industry professionals, ETA certifications test the knowledge and hands-on skills needed in today’s electronics industry.

The organization currently has Stand-Alone Certifications and Journeyman Certifications for more than 30 certification programs in all electronics-related fields. The organization has its own Board of Directors, more than 500 subject matter experts serving on various certification advisory committees, a professional certification administration staff, training facilities, and more than 800 exam/certification administrators. ETA actively supports training and education through the development of study guides, technical monographs and seminars, as well as working with a large number of ETA-approved schools and courses. An ETA certification signifies that the holder has demonstrated professional proficiency and has the technical knowledge and skill to meet international electronics industry standards. ETA certification programs are non-discriminatory, objective, and reasonably priced, setting ETA apart from other manufacturer and product-related certifications.

Certification for ETA Fiber Optic InstallerETA Certified Fiber Optic Installer (CFOI) certification identifies you as a technician who has knowledge of basic concepts of fiber optics installation and service which are applicable to all the functions required to safely and competently install fiber optics communications cabling. Fiber Optic Installers are expected to obtain knowledge of basic concepts of fiber optics installation and service which are applicable to all the functions required to safely and competently install fiber optics communications cabling. Once a CFOI has acquired these skills, abilities and knowledge, he or she should be able to enter employment in the telecommunications cabling field. With minimal training in areas unique to the special requirements of individual products or systems designs, the Fiber Optics Installer should become a profitable and efficient part of the workforce.

Ultimate Knowledge is an Authorized ETA Fiber Optics Training Organization and offers the most effective learning solution available. We train and certify thousands of technicians and industry specialists each year and our clients include the Department of Defense, Federal Agencies, DOD Contracting Partners, and Fortune 500 companies. Our Expert ETA certified instructors use our patented Learn>Test>Certify™ methodology coupled with our proprietary Ultimate CMF™(Certification Management Framework). The CMF provides one portal for the organization’s Workforce Manager to track and update information about their entire workforce and it provides one location for the individual to track all of their professional training and certification. Ultimate Knowledge’s ETA training solution ensures training and certification success for you or your entire team maximizing your return on training investment.

Ultimate Knowledge delivers the following Authorized ETA training and certification classes:

Most Popular Courses



Social Media Security Professional

FireEye, a leader in providing cyber security solutions, protects the most valuable assets in the world from those who have them in their sights. FireEye's combination of technology, intelligence, and expertise — reinforced with the most aggressive incident response team — helps eliminate the impact of security breaches. FireEye finds and stops attackers at every stage of an incursion. With FireEye, you'll detect cyber attacks as they happen, understand the risk they pose to your most valued assets, and have the resources to quickly respond and resolve security incidents. The FireEye Global Defense Community includes more than 2,500 customers across 65 countries, including over 150 of the Fortune 500.

Most Popular Courses



Social Media Security Professional
IBM

UKI delivers training that covers the full portfolio of IBM systems and software. From AIX to System z. We understand your skills development needs and can simplify the steps from your current challenge to the classroom and onward—helping you learn to use your IBM technology and tools to do your job more effectively.

Most Popular Courses



Social Media Security Professional

Since its inception, ISACA has become a pace-setting global organization for information governance, control, security and audit professionals. Its IS auditing and IS control standards are followed by practitioners worldwide. Its research pinpoints professional issues challenging its constituents. Its Certified Information Systems Auditor (CISA) certification is recognized globally and has been earned by more than 70,000 professionals since inception. The Certified Information Security Manager (CISM) certification uniquely targets the information security management audience and has been earned by more than 10,000 professionals.

CISA
The ISACA Certified Information Systems Auditor (CISA) is a highly prestigious and sought after security certification that is intended for upper level security associates and professionals. An auditor is an individual that routinely inspects the condition and level of security in an organization, who carefully monitors information activity in a business and is designed to protect against malicious intentions.
The CISA program is very difficult and the requirements are quite strict. In addition to being a long and extremely difficult test, the CISA certification requires a minimum of five years of direct professional security experience.  

CISM
Certified Information Security Manager is very high end, prestigious certification that indicates a mastery of the subject of IT security and the ability to manage the protection thereof. ISACA maintains vigorous standards for this certification and it is not to be taken lightly. A CISM will manage, oversee, or direct almost all portions of security within their organization and will most likely have a position such as "Director" or "Senior Administrator." At the minimum, ISACA requires 7 years PROFESSIONAL security experience. Only one exam is required to become a CISM, but it is considered extremely difficult and rarely passed.

Ultimate Knowledge is proud of our close relationship with ISACA and is one of the rare organizations authorized by ISACA to offer CISM and CISA training courses to the Department of Defense utilizing official training materials licensed by ISACA.  Ultimate Knowledge offers the best possible ISACA training solution available and we help hundreds of students each year to reach their ISACA certification goals. Our clients include the  Department of Defense, Federal Agencies, DOD Contracting Partners, and Fortune 500 companies.

Our Expert ISACA certified instructors use our patented Learn>Test>Certify™ methodology coupled with our proprietary Ultimate CMF™(Certification Management Framework). The CMF provides one portal for the organization’s Workforce Manager to track and update information about their entire workforce and it provides one location for the individual to track all of their professional training and certification.  Ultimate Knowledge’s ISACA training solution ensures training and certification success for you or your entire team maximizing your return on training investment.

Ultimate Knowledge delivers the following  Authorized ISACA training and certification classes:

Most Popular Courses



Social Media Security Professional

(ISC)2, the International Information System Security Certification Consortium, Inc., was founded in 1989. This not-for-profit organization manages the CISSP (Certified Information Systems Security Professional) certification. This advanced-level certification is meant for IT security professionals with the following level of experience: a minimum of four years of PROFESSIONAL experience in the field of information security. A bachelor's degree can substitute for one of these required years. Additionally, a Master's Degree in Information Security from a National Center of Excellence can substitute for one year towards the four-year requirement. This experience requirement essentially forms the prerequisite for this vendor-neutral certification, although (ISC)2's other, lower-level certification, the SSCP (Systems Security Certified Practitioner), is recommended. In terms of recertification, the term 'CPE' is an acronym for Continued Professional Education credits. After a candidate becomes certified, he/she is required to perform continuing education per 3-year certification period to become recertified. A CISSP must submit 120 CPEs during the 3-year recertification period. Of the 120 CPEs that are required, at least 80 must be 'A' credits and as many as 40 can be 'B' credits.

The CISSP certification is well suited to IT professionals who aim to be IS (Information Security) professionals, network security professionals, or systems security professionals. The CISSP designation is achieved by passing one exam.

Ultimate Knowledge offers the best ISC2 CISSP training and certification solution available. We train and certify thousands of CISSP's each year and our clients include the  Department of Defense, Federal Agencies, DOD Contracting Partners, and Fortune 500 companies. Our certified instructors are well versed in the latest version of the CBK (Common Body of Knowledge) and use our patented Learn>Test>Certify TM. methodology coupled with our proprietary Ultimate CMF TM.(Certification Management Framework). The CMF provides one portal for the organization's Workforce Manager to track and update information about their entire workforce and it provides one location for the individual to track all of their professional training and certification.  Ultimate Knowledge's CISSP training solution ensures training and certification success for you or your entire team maximizing your return on training investment.

Ultimate Knowledge offers the following (ISC) 2 training and certification classes:

Most Popular Courses



Social Media Security Professional

ITIL® is the most widely accepted approach to IT service management in the world. ITIL provides a cohesive set of best practice, drawn from the public and private sectors internationally. IT Service Management (ITSM) derives enormous benefits from a best practice approach. Because ITSM is driven both by technology and the huge range of organizational environments in which it operates, it is in a state of constant evolution. Best practice, based on expert advice and input from ITIL users is both current and practical, combining the latest thinking with sound, common sense guidance.

Ultimate Knowledge in partnership with Bay-O-Wolf Corporation offers the best ITIL® training and certification solution available.  We train and certify thousands ITIL® industry specialists each year and our clients include the Department of Defense, Federal Agencies, DOD Contracting Partners, and Fortune 500 companies. Our Expert ITIL®  certified instructors use our patented Learn>Test>Certify™ methodology coupled with our proprietary Ultimate CMF™(Certification Management Framework). The CMF provides one portal for the organization’s Workforce Manager to track and update information about their entire workforce and it provides one location for the individual to track all of their professional training and certification.  Ultimate Knowledge’s ITIL®  training solution ensures training and certification success for you or your entire team maximizing your return on training investment.

Most Popular Courses



Social Media Security Professional

Microsoft Certification helps provide you with up-to-date, relevant IT skills that can help lead to a more fulfilling career, and offer valuable Microsoft Certified Professional (MCP) benefits, including access to the MCP member site and a vast, global network of other certified professionals. Individuals who hold certification gain validation of the ability to successfully execute on the job skills and give keep them competitive in the ever-changing marketplace and for companies it is a no brainer that their team will be more productive and valuable to the organization.

Most Popular Courses



Social Media Security Professional

In our Oracle 10g, Oracle 11g and Oracle 12c training courses, you'll gain the hands-on experience you need to improve productivity and efficiency in your organization. With our comprehensive curriculum, including Desktop Discoverer, PL/SQL, Solaris, Clusterware and Java, we can meet your Oracle training needs from start to finish.

Most Popular Courses



Social Media Security Professional

PMI is the world’s leading not-for-profit membership association for the project management profession, with more than half a million members and credential holders in 185 countries. Their worldwide advocacy for project management is supported by their globally-recognized standards and credentials, their extensive research program, and their professional development opportunities.

These products and services are the basis of greater recognition and acceptance of project management’s successful role in governments, organizations, academia and industries.

Project Management Institute Inc.’s Project Management Professional certification is meant for those IT professionals who have a solid foundation of project management knowledge that can be readily applied in the workplace. PMI®’s PMP® is a high-level, vendor-neutral certification which is a suitable complement to any technology focused certifications. On the job project management experience forms the prerequisite for this certification. This certification is well suited to IT project managers. The PMP® designation is achieved by passing one conventional format exam that is designed to objectively assess and measure your project management knowledge. Before challenging the exam, candidates must first meet specific education and experience requirements and agree to adhere to a code of professional conduct. The PMP® certification thus demonstrates the candidate’s ability to effectively manage projects in a structure and ethical manner.   

Ultimate Knowledge offers the best PMI® learning solution available.  We train and certify thousands of PMI® professionals each year and our clients include the  Department of Defense, Federal Agencies, DOD Contracting Partners, and Fortune 500 companies. Our expert instructors have developed the Ultimate Knowledge’s proprietary PMI® courseware and use our patented Learn>Test>Certify™ methodology coupled with our Ultimate CMF™(Certification Management Framework). The CMF provides one portal for the organization’s Workforce Manager to track and update information about their entire workforce and it provides one location for the individual to track all of their professional training and certification.  Ultimate Knowledge’s PMI® training solution ensures training and certification success for you or your entire team maximizing your return on training investment.

Ultimate Knowledge delivers the following  PMI training and certification classes:

Most Popular Courses



Social Media Security Professional

Red Hat® is the world's leading provider of open source solutions, using a community-powered approach to provide reliable and high-performing cloud, virtualization, storage, Linux®, and middleware technologies.

Most Popular Courses



Social Media Security Professional

Splunk is a software that enables, and manages search data from any application, server, and network device in no time. Splunk makes machine data reachable, utilizable and helpful to everyone. It’s the secure way to examine the enormous streams of machine data produced by technology infrastructure and IT systems —virtual, physical, and in the cloud. A number of corporations around the world use Splunk to scrutinize their end-to-end infrastructures, shun service outages and gain real-time critical insights into client’s experience, transactions and key business metrics. This training focuses on large enterprise deployments. Participants will be able to understand the various best practices and steps for preparing, data collecting, and sizing. Workshop style labs provide participants with an opportunity to devise a deployment based on a common distributed use case.

Most Popular Courses



Social Media Security Professional

Social Media continues to be a focus of attention within the private and public sectors. Each sector has its own unique requirements for the secure integration and usage of Social Media within their organizations. To handle these unique requirements, management, technology and information security staffs must have a set of Social Media knowledge and skills. In addition to the unique integration and implementation requirements that exist within the private and public sectors, both have a common denominator these organizations have personnel working for them that are using Social Media platforms for personnel use and many organizations, both private and public have significant concerns that a data leakage or significant security event could occur through this personal usage. The curriculum and common body of knowledge within the UKI Social Media Training and Certification program will provide management, technology and information security staffs with the knowledge and skill necessary to design, engineer, integrate and operate Internet based Social Media Platforms through proprietary Enterprise 2.0 governance frameworks, policies, processes and technologies.

Most Popular Courses



Social Media Security Professional

The demand for skilled VMware professionals has never been greater due to the cost savings and efficiencies gained through server virtualization and the growth of new technologies like software-defined storage and network virtualization.

Most Popular Courses



Social Media Security Professional

Wireshark is the world's foremost network protocol analyzer. It lets you see what's happening on your network at a microscopic level. It is the de facto (and often de jure) standard across many industries and educational institutions. Wireshark development thrives thanks to the contributions of networking experts across the globe. It is the continuation of a project that started in 1998.

Most Popular Courses



Social Media Security Professional

Interested in increasing your knowledge of the Big Data landscape? These courses are for those new to data science and interested in understanding why the Big Data Era has come to be. It is for those who want to become conversant with the terminology and the core concepts behind big data problems, applications, and systems. It is for those who want to start thinking about how Big Data might be useful in their business or career. It provides an introduction to one of the most common frameworks, Hadoop, that has made big data analysis easier and more accessible -- increasing the potential for data to transform our world!

Most Popular Courses



Social Media Security Professional

In its most simple description, cloud computing is taking services ("cloud services") and moving them outside an organizations firewall on shared systems. Applications and services are accessed via the Web, instead of your hard drive. The services are delivered and used over the Internet and are paid for by cloud customer (your business), typically on an "as-needed, pay-per-use" business model. The cloud infrastructure is maintained by the cloud provider, not the individual cloud customer. Implement a robust, scalable and secure cloud strategy for your organization with UKI's Cloud Computing training curriculum. Gain skills in Microsoft Azure, Amazon Web Services (AWS), cloud security management and other cloud and virtualization topics to make your cloud migration a success.

Most Popular Courses



Social Media Security Professional

Our vast cybersecurity training portfolio can help you and your team build fundamental to advanced cybersecurity techniques, prepare for top industry-recognized certifications or master product-specific skills. You and your team will learn to approach cybersecurity offensively and defensively through real-world examples and exercises, hands-on labs and expert instruction. You will gain knowledge to close skill set gaps, meet and maintain mandates and sustain and retain a highly-qualified workforce to secure your critical systems and assets.

Most Popular Courses



Social Media Security Professional

Enterprise architecture is an important enabler for strategic change. As organizations like yours seek to become more agile and responsive, adopting a solid architectural approach is key. Taking advantage of new technologies and cleaning up legacy systems requires more than simply implementing a framework. It’s about connecting corporate strategy to each individual project — for which you'll need new knowledge and skills to accomplish. Our enterprise architecture courses provide practitioners opportunities to learn from experts with real-world experience to design capabilities that support and sustain your organizational transformation efforts.

Most Popular Courses



Social Media Security Professional

We have the hands-on networking and wireless training you need to master the skills required to understand, build and maintain your networks. Build your foundation of networking knowledge in a real-world, multivendor environment, and then focus on specialized disciplines with TCP/IP training, IPv6 training and more. Our networking courses help you gain the skills to implement, support, optimize and defend networks, while preparing for industry-recognized networking and wireless certifications including CWNP, Wireshark, Cisco, VMware, CompTIA's A+ and Network+ certifications.

Most Popular Courses



Social Media Security Professional

Organizations are under pressure to respond rapidly to change, meet customer needs and maximize resources. As a project manager, you can help your organization meet these challenges by establishing consistent, repeatable methodologies that reduce risk, cut waste and provide a competitive advantage. We offer training in IT project management, Microsoft Project, Project Management Professional (PMP)® certification preparation and much more. You will learn techniques to manage projects that are on time, meet specifications, on budget and result in higher quality products and services. PMP is a registered mark of the Project Management Institute, Inc.

Most Popular Courses



Social Media Security Professional

Social media is among the Internet's biggest achievements. With nearly 850 million monthly users and 100 billion social connections on Facebook alone, there is no doubt that social media dominates our personal communications. But individuals are not alone in using social media. Organizations are increasingly aware of the potential for social networking to address strategic needs and use social media as tools to support marketing efforts, enable greater collaboration, spread important causes and generate change. But undeniably, social networking poses serious security risks, and every organization is a potential victim.

Most Popular Courses



Social Media Security Professional

You may have heard that there will be more than 1 million developer jobs available by 2022. This illustrates a 21 percent growth since 2012 and makes developer skills highly desired. What are you doing to make sure your skills remain current? Learn from industry experts who have not only the passion and knowledge, but also the real-world experience of being a fellow developer. Their technical expertise and support will enable you to apply acquired skills right to your work. Whether you're looking to learn a new programming language, would like to understand user experience (UX) and DevOps, or want to make sure you're designing secure databases, Global Knowledge has a course that will teach the latest technology trends and embed lifelong application development and programming skills.

Most Popular Courses



Social Media Security Professional

One major catalyst of change is the advancement of technology. As the hardware of war improves through technological development, so must the tactical, operational, and strategic usage adapt to its improved capabilities both to maximize our own capabilities and to counteract our enemy's. For the first time in history, the cyber and warfare climate have intertwined. The blending of these two worlds has shown the importance of functional, practical and aggressive cybersecurity. UKI’s Tactical Courses focus on enhancing foundational policies and best practices, with advanced fundamentals, empowering cybersecurity teams to protect their enterprise network. In counteracting adversarial advancements, cybersecurity teams must expose intrusions, and respond immediately with evolving action. This Counteract-Expose-Respond strategy is required for end-to-end enterprise security, utilizing “Adapt and Overcome” as the pillar of truth and tactics.

Most Popular Courses



Social Media Security Professional

Virtualization is a trend that is not going away. From reduced operating costs to decreased downtime and increased IT productivity and efficiency, the benefits are real. Regardless of your organization’s vendor of choice, our broad-based virtualization curriculum consisting of VMware, Cisco, Citrix, EMC, IBM, Red Hat® and Microsoft classes, will give you the skills you'll need to succeed in a virtualized environment.

Most Popular Courses