SG Partner AS
  • Kurs
  • Startgaranti
  • Sertifisering
  • Om oss
    • Betalingsbetingelser
    • Privacy Policy
  • Kontakt oss
  • Handlekurv
    • Min konto
  • Kurs
  • Startgaranti
  • Sertifisering
  • Om oss
    • Betalingsbetingelser
    • Privacy Policy
  • Kontakt oss
  • Handlekurv
    • Min konto
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors

Forensics & Incident Response

Hjem Kurs Forensics & Incident Response

Viser alle 5 resultaterSortert etter propularitet

  • SNSIRI ServiceNow Security Incident Response (SIR) Implementation

    Learn the domain knowledge, technical aspects, and various processes needed to effectively manage a Security Incident Response implementation (SIRI).

    This two-day course covers the domain knowledge, common implementation technical aspects,…

    Bestill
  • GK2180 CyberSec First Responder: Threat Detection and Response (CFR)

    This course covers the duties of those who are responsible for monitoring and detecting security incidents in information systems and networks, and for executing a proper response to such…

    Bestill
  • FOR System Forensics and Incident Handling
    NOK 42.000

    The secure infrastructure configuration should be the most important line of defense in every organization. Unfortunately, people, the most valuable resource, are not always aware of the level of…

    Bestill Dette produktet har flere varianter. Alternativene kan velges på produktsiden
  • ECIH EC-Council Certified Incident Handler (ECIH) + Exam voucher
    NOK 30.000

    The latest revision of EC-Council's Certified Incident Handler (E|CIH) certified program has been designed and developed in collaboration with cybersecurity and incident handling/response practitioners across the globe.

    The ECIH program…

    Bestill Dette produktet har flere varianter. Alternativene kan velges på produktsiden
  • CHFI EC-Council Computer Hacking Forensic Investigator (CHFI) + Exam voucher
    NOK 35.000

    Computer forensics is simply the application of computer investigation and analysis techniques in the interests of determining potential legal evidence. Evidence might be sought in a wide range of…

    Bestill Dette produktet har flere varianter. Alternativene kan velges på produktsiden

Tech. Leverandører

  • 5G
  • Agile and Scrum
  • Amazon Web Services
  • Applications
  • Applications Development
  • Applications Development & Programming
  • Applied Skills
  • Artificial intelligence
  • Automation
  • Big Data
  • Blockchain
  • Business Analysis
  • Business Applications
  • Business Continuity and Disaster Recovery
  • Business Process
  • Check Point
  • Cisco
  • Cisco Advanced Services (HTDLS)
  • Citrix
  • Cloud Computing
  • Collaboration
  • Commerce Solutions
  • CompTIA
  • Contact Center
  • Containers
  • Content Management
  • CoPilot
  • CQURE Academy
  • CWNP
  • Cyber Threat intelligence
  • Cybersecurity Foundation & Awareness
  • Cybersecurity Operations
  • Data
  • Data & AI
  • Data Center
  • Data Center & Virtualisation
  • Data Loss Prevention
  • Data Privacy
  • Database Management & Development
  • Desktop Applications
  • DevOps
  • DevOps Tools
  • Docker
  • EC-Council
  • EMC
  • Enterprise Architecture
  • Enterprise Resource Management
  • Ethical Hacking and Penetration Testing
  • F5
  • Forensics & Incident Response
  • Forescout
  • FORTINET
  • Global Knowledge
  • Google
  • GRC - Governance Risk and Compliance
  • Hewlett Packard Enterprise (HPE)
  • IAPP
  • IBM
  • Identity & Access Management
  • Infoblox
  • Information Security Management and-or Cybersecurity Management
  • Infrastructure Design
  • Internet of Things (IoT)
  • ISACA
  • ISC2
  • ISO
  • ISTQB
  • ITIL & Service Management
  • Juniper
  • Kubernetes
  • Leadership & Business Skills
  • Lean IT
  • Lean Six Sigma
  • Linux
  • Micro Focus
  • Microsoft
  • Mirantis
  • Mobile Device Management (MDM)
  • Modern Workplace
  • NETAPP
  • Network Management
  • Network Storage
  • Nutanix
  • Omnissa
  • Operating Systems
  • Oracle
  • Other
  • Palo Alto Networks
  • PMI
  • PRINCE2
  • Programming Languages
  • Project Management
  • Protection and Recovery
  • Red Hat
  • Risk & Governance
  • Routing & Switching
  • SAFe
  • SAP
  • Security
  • Servers & Applications
  • Service Management
  • Service Management & ITIL
  • Service Provider
  • ServiceNow
  • Software Development
  • Software Testing
  • SolarWinds
  • Testing
  • Third Party Courses
  • Threat and Malware Protection
  • TOGAF
  • VEEAM
  • Virtualisation
  • VMware
  • Voice
  • Wireless