BEGIN:VCALENDAR
VERSION:2.0
PRODID:-// - ECPv5.14.1//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-ORIGINAL-URL:https://cyberopsacademy.com
X-WR-CALDESC:Events for 
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:UTC
BEGIN:STANDARD
TZOFFSETFROM:+0000
TZOFFSETTO:+0000
TZNAME:UTC
DTSTART:20250101T000000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;VALUE=DATE:20250609
DTEND;VALUE=DATE:20250614
DTSTAMP:20260518T091618
CREATED:20241107T160101Z
LAST-MODIFIED:20241107T160102Z
UID:2518-1749427200-1749859199@cyberopsacademy.com
SUMMARY:Red Hat: Intro to Python
DESCRIPTION:This hands-on course shows how to rapidly develop and maintain effective Python programs; including a practical approach to creating and organizing Python programs using functions\, packages\, modules\, and classes as part of Python’s object- oriented paradigm.
URL:https://cyberopsacademy.com/event/red-hat-intro-to-python-3/
CATEGORIES:Events
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20250623
DTEND;VALUE=DATE:20250628
DTSTAMP:20260518T091618
CREATED:20250206T194402Z
LAST-MODIFIED:20250206T194403Z
UID:2524-1750636800-1751068799@cyberopsacademy.com
SUMMARY:CEH
DESCRIPTION:Students will begin by understanding how perimeter defenses work and then be led into scanning and attacking their own networks via virtual labs. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection\, Policy Creation\, Social Engineering\, DDoS Attacks\, Buffer Overflows and Virus Creation.
URL:https://cyberopsacademy.com/event/ceh-3/
CATEGORIES:Events
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20250707
DTEND;VALUE=DATE:20250712
DTSTAMP:20260518T091618
CREATED:20231218T142641Z
LAST-MODIFIED:20250418T163912Z
UID:2366-1751846400-1752278399@cyberopsacademy.com
SUMMARY:CEH
DESCRIPTION:Students will begin by understanding how perimeter defenses work and then be led into scanning and attacking their own networks via virtual labs. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection\, Policy Creation\, Social Engineering\, DDoS Attacks\, Buffer Overflows and Virus Creation.
URL:https://cyberopsacademy.com/event/ceh/
CATEGORIES:Events
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20250707
DTEND;VALUE=DATE:20250712
DTSTAMP:20260518T091618
CREATED:20241107T152808Z
LAST-MODIFIED:20250205T203744Z
UID:2512-1751846400-1752278399@cyberopsacademy.com
SUMMARY:CISSP
DESCRIPTION:This course will teach and apply concepts of confidentiality\, integrity\, and availability of security governance principles. An understanding of legal and regulatory issues that pertain to information security in a global context will be obtained. Threat recognition and management will be covered along with development and implementation of documented security policy\, standards\, procedures\, and guidelines.
URL:https://cyberopsacademy.com/event/cissp-3/
CATEGORIES:Events
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20250728
DTEND;VALUE=DATE:20250802
DTSTAMP:20260518T091618
CREATED:20231120T181321Z
LAST-MODIFIED:20250205T202834Z
UID:2006-1753660800-1754092799@cyberopsacademy.com
SUMMARY:CCNA
DESCRIPTION:The Implementing and Administering Cisco Solutions (CCNA) training gives you a broad range of fundamental knowledge for all IT\ncareers. Through a combination of lectures\, hands-on labs\, and self-study\, you will learn how to install\, operate\, configure\, and verify\nbasic IPv4 and IPv6 networks.
URL:https://cyberopsacademy.com/event/ccna-3/
CATEGORIES:Events
END:VEVENT
END:VCALENDAR