• 918 34 713
  • kurs@sgpartner.no
  • Kurs
  • Startgaranti
  • Sertifisering
  • Om oss
    • Betalingsbetingelser
    • Privacy Policy
  • Kontakt oss
  • Handlekurv
    • Min konto
  • Kurs
  • Startgaranti
  • Sertifisering
  • Om oss
    • Betalingsbetingelser
    • Privacy Policy
  • Kontakt oss
  • Handlekurv
    • Min konto
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors

Security

Hjem Kurs Security

Viser alle 159 resultater

  • Administering and Positioning Cisco Umbrella Operations ADMUMB
    NOK 43.000

    Overview Cisco Umbrella is a cloud security platform that provides the first line of defense against threats on the Internet. Being able to understand and position how Cisco Umbrella…

    Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
  • Administering BIG-IP and Configuring BIG-IP LTM v.17.1 Local Traffic Manager Bundle ARR_F5N_BIGIPAD_LTM_BDLE

    Overview This 5-day bundle course covers the following 2 courses: Administering BIG-IP v15.1This 2-day course gives network administrators, networkoperators, and network engineers a functional understanding of the BIG-IPsystem as…

    Les mer
  • Administering BIG-IP v.17.1 ARR_F5N_BIG-OP-ADMIN

    Overview This 2-day course gives network administrators, networkoperators, and network engineers a functional understanding of the BIG-IPsystem as it is commonly deployed in an application delivery network.

    Les mer
  • Administering VELOS-F5OS ARR_F5N_BIG-VELOS

    Overview Not available. Please contact.

    Les mer
  • Advanced Juniper Security (AJSEC) ARR_JUN_AJSEC

    Overview This four-day course, which is designed to build off the current Juniper Security (JSEC) offering, delves deeper into Junos security, next-generation security features, and ATP supporting software. Through demonstrations…

    Les mer
  • Advanced Junos Troubleshooting (AJT) ARR_JUN_AJT

    Overview This three-day course provides students with the knowledge to troubleshoot switching, routing, and security features. This course builds off the Juniper Technical Support Fundamentals (JTSF) and Junos Troubleshooting (JT)…

    Les mer
  • Advanced Techniques for Cisco Firewall Threat Defense and Intrusion Prevention SFWIPA
    NOK 48.000

    Overview The Advanced Techniques for Cisco Firewall Threat Defense and Intrusion Prevention course shows you how to deploy and configure a Cisco Secure Firewall Threat Defense system and its features as a…

    Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
  • Automating BIG-IP with Ansible v.1.7 ARR_F5N_BIG-AUTO

    Overview This 2-day course introduces network administrators, operators, and DevOps engineers to the foundational and F5-specific technologies required to automate BIG-IP.Participants will gain exposure to multiple technologies for a…

    Les mer
  • Automating BIG-IP with AS3 v.1.7 ARR_F5N_BIG-AUTO-AS3

    Overview This course introduces network administrators, operators, and DevOps engineers to the foundational and F5-specific technologies required to automate BIG-IP. Participants will gain exposure to multiple technologies for a variety…

    Les mer
  • AWAF Modern Application v17.1. ARR_F5N_BIG-AWAF

    Overview In this 4-day course, students are provided with a functional understanding of how to deploy, tune, and operate F5 Advanced Web Application Firewall to protect their web applications…

    Les mer
  • AWS Jam – Security Engineering GK3338JAM

    Overview Accelerate your cloud adoption journey. Your team will gain practical knowledge and skills that they can take back and implement into your organizations cloud initiatives. With real-world challenges,…

    Les mer
  • Basics of z/OS RACF Administration TDS_ES19G

    Overview This course begins with an introduction to the z/OS environment, TSO and ISPF/PDF, batch processing, and z/OS data sets. Hands-on labs allow you to gain experience with viewing…

    Les mer
  • BCS Certificate in Information Security Management Principles (CISMP) – Including Exam CISMP
    NOK 32.000

    Overview This course follows the latest BCS syllabus and prepares delegates for the BCS examination.You will gain an understanding of the main principals required to be an effective member…

    Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
  • Certified CMMC Professional (CCP) CMMC-P

    Overview Certified CMMC Professional training course enables participants to acquire a comprehensive understanding of the Cybersecurity Maturity Model Certification (CMMC) model and its requirements. It is a gateway for…

    Les mer
  • Check Point Certified Harmony Endpoint Specialist (CCES) R81.20 ARR_CKT_CCES_R81_20
    NOK 23.000

    Overview Demonstrate an understanding of the Check Point Harmony Endpoint solution, including its features and capabilities. Apply knowledge and skills gained during training to manage and protect a Harmony Endpoint solution.

    Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
  • Check Point Certified Maestro Expert (CCME) R81.X ARR_CKT_CCME
    NOK 25.500

    Overview The Check Point Certified Maestro Expert course is intended to provide you with the theoretical knowledge and practical skills needed to deploy, manage, and troubleshoot the Check Point…

    Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
  • Check Point Certified Multi-Domain Security Management Specialist (CCMS) R81X (includes 180 days’ lab access) ARR_CKT_CCMS

    Overview This two-day course is designed for Security professionals who install, configure, and manage multiple security domains within their network security environment. Gain advanced skills for effectively securing and managing…

    Les mer
  • Check Point Certified Security Administrator (CCSA) & Troubleshooting Administrator (CCTA) R81.20 Bundle (includes 180 days’ lab access) ARR_CKT_CPSACCTA

    Overview This 5 day bundle course covers the following two Check Point training courses:Check Point Certified Security Administrator (CCSA) R81.x – 3 daysandCheck Point Certified Troubleshooting Administrator (CCTA) R81.x…

    Les mer
  • Check Point Certified Security Administrator (CCSA) and Expert (CCSE) R81.20 5-day Boot Camp (includes 180 days’ lab access) ARR_CKT_CCSAEBC_R81_20

    Overview The Check Point Cybersecurity Boot Camp is a fast-paced course intended for Security Experts and other technical professionals with prior training and/or practical experience with Check Point Security…

    Les mer
  • Check Point Certified Security Administrator (CCSA) R81.20 (includes 180 days’ lab access) ARR_CKT_CCSA_R81_20

    Overview This core course covers the fundamentals needed to deploy, configure, and manage daily operations of Check Point Security Gateways and Management Software Blades that run on the Gaia…

    Les mer
  • Check Point Certified Security Administrator (CCSA) R82 (includes 180 days’ lab access) ARR_CKT_CCSA_R82

    Overview This course provides students with the fundamental knowledge, skills, and hands-on experience needed to configure, manage, and monitor an existing Quantum Security Environment. Students…

    Les mer
  • Check Point Certified Security Expert (CCSE) & Troubleshooting Expert (CCTE) R81.20 Bundle (includes 180 days’ lab access) ARR_CKT_CPSECCTE

    Overview This 5 day bundle course covers the following two Check Point training courses:Check Point Certified Security Expert (CCSE) R81.10 – 3 daysandCheck Point Certified Troubleshooting Expert (CCTE) R81.10…

    Les mer
  • Check Point Certified Security Expert (CCSE) R81.20 (includes 180 days’ lab access) ARR_CKT_CCSE_R81_20

    Overview This core course covers the fundamentals needed to deploy, configure, and manage daily operations of Check Point Security Gateways and Management Software Blades that run on the Gaia…

    Les mer
  • Check Point Certified Security Expert (CCSE) R82 (includes 180 days’ lab access) ARR_CKT_CCSE_R82

    Overview This course provides students with the advanced knowledge, skills, and hands-on experience needed to deploy, manage, and monitor existing Quantum Security Environments. Students will learn how to deploy…

    Les mer
  • Check Point Certified Troubleshooting Administrator (CCTA) R81.20 (includes 180 days’ lab access) ARR_CKT_CCTA

    Overview The Check Point Certified Troubleshooting Administrator (CCTA) provides an understanding of the concepts and skills necessary to troubleshoot issues that may occur when managing the Check Point Security…

    Les mer
  • Check Point Certified Troubleshooting Expert (CCTE) R81.20 (includes 180 days’ lab access) ARR_CKT_CCTE

    Overview The 2-day Check Point Certified Troubleshooting Expert (CCTE) provides advanced troubleshooting skills to investigate and resolve more complex issues that may occur while managing your Check Point security…

    Les mer
  • Check Point Certified VSX Specialist (CCVS) R81.X (includes 180 days’ lab access) ARR_CKT_CCVS

    Overview This 2-day course provides a comprehensive understanding of the Check Point VSX solution and describe how to deploy it within the corporate network environment.

    Les mer
  • Check Point Deployment Administrator (CPDA) R82 (includes 180 days’ lab access) ARR_CKT_CPDA_R82

    Overview This course provides students with the fundamental knowledge, skills, and hands-on experience needed to deploy a new Quantum Security Environment. Students learn how to install and perform…

    Les mer
  • Check Point Threat Prevention Specialist (CTPS) R81_20 ARR_CKT_CTPS_R81_20

    Overview This two-day Specialist-level course is designed for security professionals who want to gain the concepts and skills necessary to deploy and manage Custom Threat Prevention within a Check…

    Les mer
  • Cisco DoD Comply-to-Connect C2C
    NOK 51.000

    Overview The Cisco DoD Comply-to-Connect (C2C) training teaches you how to implement and deploy a Department of Defense (DoD) Comply-to-Connect network architecture using Cisco Identity Services Engine (ISE). This…

    Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
  • Cisco Secure Workload Firewall Enforcement Agents, Data Flow Mapping, and Advanced Policy Deployment N1_(CSWADV)
    NOK 51.000

    Overview Cisco Secure Workload Firewall Enforcement Agents, Data Flow Mapping, and Advanced Policy Deployment, CSWADV, is a 5-day course exploring telemetry data, the flows corpus, and how Cisco Secure Workload…

    Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
  • Citrix NetScaler ADC 14.x Advanced Features (Security and Management) NS-301
    NOK 44.000

    Overview Designed for experienced IT professionals, this course is best suited for individuals who will be deploying and/or managing Application Firewall, AAA for Application Traffic, and NetScaler Console (ADM)…

    Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
  • CMMC Foundations (PECB Certified) + exam CMMC-F

    Overview The PECB CMMC Foundations training course enables participants to understand the fundamental concepts and principles of the CMMC model.The PECB CMMC Foundations training course allows you to learn…

    Les mer
  • CompTIA SecurityX Certification Prep Course GK2951
    NOK 39.500

    Overview Learn advanced security administration tools and techniques while preparing for the CompTIA SecurityX exam (CAS-005) in this hands-on course.The CompTIA SecurityX (CAS-005) Certification Prep Course is designed for…

    Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
  • Configuring BIG-IP AFM Advanced Firewall Manager v.17.1 ARR_F5N_BIG-AFM

    Overview This 2-day course uses lectures and hands-on lab exercises to give participants real-time experience in setting up and configuring the BIG-IP® Advanced Firewall Manager system. Students are introduced to…

    Les mer
  • Configuring BIG-IP APM Access Policy Manager v.17.1 ARR_F5N_BIGIP-APM
    NOK 32.500

    Overview This 3-day course gives network administrators, network operators, and network engineers a functional understanding of BIG-IP Access Policy Manager as it is commonly deployed in both application delivery…

    Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
  • Configuring BIG-IP DNS (formerly GTM) v.17.1 ARR_F5N_BIG-DNS

    Overview This 2-day course gives networking professionals a functional understanding of the BIG-IP DNS system as it is commonly used. The course covers configuration and ongoing management of the BIG-IP…

    Les mer
  • Configuring BIG-IP LTM Local Traffic Manager v.17.1 ARR_F5N_BIG-LTM-CFG-3

    Overview This 3-day course gives network professionals a functional understanding of BIG-IP Local Traffic Manager, introducing students to both commonly used and advanced BIG-IP LTM features and functionality. Incorporating lecture,…

    Les mer
  • Configuring BIG-IQ ARR_F5N_BIG-CFG

    Overview Not available. Please contact.

    Les mer
  • Configuring BIG-IQ v.7.1 ARR_F5N_BIG_CFG

    Overview This 2-day course uses lectures and hands-on exercises to give participants real-time experience in configuring and using the BIG-IQ® product.Students are introduced to BIG-IQ, its interface, and its…

    Les mer
  • Configuring F5 Advanced WAF (previously licensed as ASM) ARR_F5N_BIG-AWF-CFG

    Overview Not available. Please contact.

    Les mer
  • Cybersecurity Masterclass: Managing and Defending Against Current Threats CBR

    Overview This is a deep dive course on infrastructure attacks and its security. In this workshop you will identify the areas of vulnerability and gain knowledge about the most…

    Les mer
  • Cybersecurity Specialization: Artificial Intelligence Risk Management Framework GK840108
    NOK 24.000

    Overview Learn to navigate global AI risk and regulatory frameworks with confidence and clarity.As artificial intelligence becomes increasingly embedded in critical systems, managing its risks is no longer optional—it’s…

    Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
  • Cybersecurity Specialization: Threat Modeling GK840103
    NOK 23.000

    Overview Understand and apply threat modeling techniques to enhance cybersecurity.Cybersecurity Specialization: Threat Modeling dives into the critical practice of threat modeling, a key component in modern cybersecurity strategies. Participants…

    Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
  • Defend against cyberthreats with Microsoft Defender XDR (SC-5004) M-SC5004

    Overview Implement the Microsoft Defender for Endpoint environment to manage devices, perform investigations on endpoints, manage incidents in Defender XDR, and use Advanced Hunting with Kusto Query Language (KQL)…

    Les mer
  • Deploying Juniper Security in AWS and Azure (JCNAA) ARR_JUN_JCNAA

    Overview This four-day course is designed to provide students with the knowledge required to implement Juniper Networks vSRX in AWS and Azure environments. Through demonstrations and hands-on labs, students…

    Les mer
  • Deploying Junos Subscriber Management (JSM) ARR_JUN_JSM

    Overview This four-day course is designed to provide students with the knowledge required to configure and manage subscriber management on devices running the Junos operating system. This course focuses on…

    Les mer
  • Designing and Implementing Secure Cloud Access for Users and Endpoints SCAZT

    Overview The Designing and Implementing Secure Cloud Access for Users and Endpoints course will provide you with the skills to design and implement cloud security architectures, user and device security, network and…

    Les mer
  • Designing Cisco Security Infrastructure SDSI

    Overview The Designing Cisco Security Infrastructure (SDSI) course teaches you about security architecture design, including secure infrastructure, applications, risk, events, requirements, artificial intelligence (AI), automation, and DevSecOps.This training prepares…

    Les mer
  • Developing iRules for BIG-IP v.17.1 ARR_F5N_BIG-IRULE-CFG

    Overview This 3-day course provides networking professionals a functional understanding of iRules development. The course builds on the foundation of the Administering BIG-IP or Configuring LTM course, demonstrating how to…

    Les mer
  • EC-Council Certified Application Security Engineer (CASE) Java + Exam voucher CASE-JAVA

    Overview The Certified Application Security Engineer (CASE) credential is developed in partnership with large application and software development experts globally. The CASE credential tests the critical security skills and…

    Les mer
  • EC-Council Certified Application Security Engineer (CASE) Java Certified Application Security Engineer (CASE) . Net + Exam voucher CASE-NET

    Overview The Certified Application Security Engineer (CASE) credential is developed in partnership with large application and software development experts globally. The CASE credential tests the critical security skills and…

    Les mer
  • EC-Council Certified Encryption Specialist (ECES) + Exam voucher ECES
    NOK 27.000

    Overview The EC-Council Certified Encryption Specialist (ECES) program introduces professionals and students to the field of cryptography. The participants will learn the foundations of modern symmetric and key cryptography…

    Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
  • EC-Council Certified Secure Computer User (CCSU) + Exam voucher CSCU
    NOK 16.000

    Overview The purpose of the CSCU training program is to provide individuals with the necessary knowledge and skills to protect their information assets. This class will immerse students into…

    Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
  • EC-Council Certified SOC Analyst (CCSA) + Exam voucher EC-CSA
    NOK 24.000

    Overview The Certified SOC Analyst (CSA) program is the first step to joining a security operations center (SOC). It is engineered for current and aspiring Tier I and Tier…

    Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
  • EC-Council Certified Threat Intelligence Analyst + Exam voucher CTIA
    NOK 28.000

    Overview Certified Threat Intelligence Analyst (C|TIA) is a training and credentialing program designed and developed in collaboration with cybersecurity and threat intelligence experts across the globe to help organizations…

    Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
  • Effective RACF Administration TDS_BE87G

    Overview This course prepares you to be a more effective security administrator as you gain experience and confidence in using the RACF component of the z/OS Security Server. To…

    Les mer
  • Forescout Certified Associate (FSCA) ENW_ENFSCASS

    Overview ForeScout Certified Associate training is a four-day course featuring instruction and includes hands-on labs in a simulated IT environment. Students learn how to establish security policies using all…

    Les mer
  • FortiAnalyzer Analyst ARR_FNT_FT-FAZ-ANS

    Overview Not available. Please contact.

    Les mer
  • FortiGate Administrator ARR_FNT_FT-FGT-ADM
    NOK 39.500

    Overview In this course, you will learn how to use the most common FortiGate features.In interactive labs, you will explore firewall policies, user authentication, high availability, SSL…

    Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
  • FortiManager Administrator ARR_FNT_FMG

    Overview Not available. Please contact.

    Les mer
  • Fundamentals of Cisco Firewall Threat Defense and Intrusion Prevention SFWIPF
    NOK 49.000

    Overview This Fundamentals of Cisco Firewall Threat Defense and Intrusion Prevention (SFWIPF) course shows you how to implement and configure Cisco Secure Firewall Threat Defense for deployment as a…

    Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
  • HPE Security Governance and Policies HPE_HL948S

    Overview This 2-day course shows IT professionals and security officers how to develop an effective security governance strategy for their organization. Students also learn how compliance regulations and industry…

    Les mer
  • IBM Guardium Data Protection Fundamentals TDS_8G103G

    Overview Data security and privacy challengers are never-ending. IBM Guardium Data Protection (Guardium) provides a broad range of data security and protection capabilities that can protect sensitive and regulated…

    Les mer
  • IBM QRadar SIEM Advanced Topics TDS_BQ205G

    Overview QRadar SIEM provides deep visibility into network, user, and application activity. It provides collection, normalization, correlation, and secure storage of events, flows, assets, and vulnerabilities. Suspected attacks and…

    Les mer
  • IBM QRadar SIEM Foundations TDS_BQ105G

    Overview IBM Security QRadar enables deep visibility into network, endpoint, user, and application activity. It provides collection, normalization, correlation, and secure storage of events, flows, assets, and vulnerabilities. Suspected…

    Les mer
  • IBM Verify: Adoption TDS_TW900G

    Overview This course guides learners through the process of adopting IBM Verify in their organization. It covers the Verify architecture, integration with existing deployments, user import from existing sources,…

    Les mer
  • IBM zSecure Admin Basic Administration and Reporting TDS_TK264G

    Overview This is an instructor-led course that provides basic introduction of the IBM Security Admin ISPF interface for customers who administer RACF profiles and generate basic RACF overview reports.This…

    Les mer
  • IBM zSecure Audit Rule-based Compliance Evaluation and Customization TDS_TK274G

    Overview This course introduces the zSecure Audit rule-based compliance evaluation framework. The course explains rule-based compliance evaluation concepts and includes an overview and demonstration of the supported compliance evaluation…

    Les mer
  • IBM zSecure CARLa Auditing and Reporting Language TDS_TK234G

    Overview Learn the basics of the IBM Security zSecure programming language CARLa. This course teaches you to use the CARLa programming language to create reports for RACF, SMF, UNIX…

    Les mer
  • IBM zSecure RACF and SMF Auditing TDS_TK244G

    Overview This course describes audit concerns that IBM® Security zSecure Audit reports. The course explains auditing your RACF® database and z/OS subsystems such as CICS, IMS, and DB2. You…

    Les mer
  • IBM zSecure RACF Management Workshop TDS_TK254G

    Overview This workshop teaches the basics of the security administration process and how to implement company security policies and guidelines into specific RACF profile definitions and settings.In this workshop,…

    Les mer
  • IBM zSecure UNIX System Services (USS) Security Overview TDS_TK224G

    Overview In this workshop, you learn to maintain a RACFdatabase with IBM Security zSecure Admin and monitor the system with IBM Security zSecure Audit.During hands-on exercises, you act as…

    Les mer
  • Implementing and Configuring Cisco Identity Services Engine Bootcamp SISE
    NOK 48.000

    Overview In the Implementing and Configuring Cisco Identity Services Engine (SISE) course you will learn to deploy and use Cisco Identity Services Engine (ISE) v3.x, an identity and access…

    Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
  • Implementing and Operating Cisco Security Core Technologies SCOR
    NOK 48.000

    Overview The Implementing and Operating Cisco Security Core Technologies (SCOR) course helps you prepare for the Cisco® CCNP® Security and CCIE® Security certifications and for senior-level security roles. In…

    Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
  • Implementing and Troubleshooting Networks using Cisco ThousandEyes ENTEIT
    NOK 41.500

    Overview The Implementing and Troubleshooting Networks Using Cisco ThousandEyes (ENTEIT) course is designed to introduce you to Cisco® ThousandEyes. Through a combination of lectures and hands-on experience, you will learn to…

    Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
  • Implementing Aruba Network Security H38DHS

    Overview The Implementing Aruba Network Security course covers intermediate security concepts and prepares candidates to take the exam to achieve Aruba Certified Networking Security Professional (ACNSP) certification. This course…

    Les mer
  • Implementing Cisco SD-WAN Security and Cloud Solutions SDWSCS
    NOK 36.000

    Overview The Implementing Cisco SD-WAN Security and Cloud Solutions (SDWSCS) course is an advanced training course focused on Cisco SD-WAN security and cloud services. Through a series of labs and…

    Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
  • Implementing Secure Solutions with Virtual Private Networks SVPN
    NOK 48.000

    Overview The Implementing Secure Solutions with Virtual Private Networks (SVPN) course teaches you how to implement, configure, monitor, and support enterprise Virtual Private Network (VPN) solutions. Through a combination…

    Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
  • Infoblox NIOS DDI Operator & Administrator Bundle ENW_ENINIOSDDI

    Overview NIOS DDI OPERATOR Learn the fundamentals of the NIOS Grid and how to navigate the Grid Manager UI. Build a working knowledge of operator-level responsibilities in the NIOS Grid…

    Les mer
  • Infoblox NIOS DDI Troubleshooting ENW_ENINIOSDDIT

    Overview Previously known as “Core DDI Advanced Troubleshooting (CDAT)”. Troubleshoot the Infoblox Grid and HA (high availability) pairs. Study common root cause analysis and resolution strategies and techniques for…

    Les mer
  • Information Security Administrator (SC-401) M-SC401
    NOK 28.000

    Overview Implement information security of sensitive data by using Microsoft Purview and related services.The Information Security Administrator course equips you with the skills needed to plan and implement information…

    Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
  • Information Security Foundation (ISFS) based on IEC/ISO 27001 + exam ISF-EXIN
    NOK 18.500

    Overview Information security is becoming more and more important. The globalisation of the economy leads to an increasing exchange of information between organisations (employees, customers and suppliers), an increasing…

    Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
  • Information Security Management Professional (ISMP) based on IEC/ISO 27001 + exam ISMP-EXIN

    Overview Information is crucial for the continuity and proper functioning of both individual organizations and the economies they fuel; this information must be protected against access by unauthorized people,…

    Les mer
  • Information Security Risk Management and Business Continuity Planning HPE_HL947S

    Overview As we’ve learned, Information Security is ultimately about protecting the assets most crucial to your business through preserving the Confidentiality, Integrity, and Availability of your information. In…

    Les mer
  • Installing and Configuring ArcSight Platform ICASP

    Overview This instructor-led course teaches you how to install and configure ArcSight Platform on-premise with the ArcSight Platform Installation program.In this course, you learn how to installing ArcSight Platform,…

    Les mer
  • Introduction to Juniper Mist AI (IJMA) ARR_JUN_IJMA

    Overview This introductory three-day course serves as the springboard to understanding the Mist AI™ Full Stack offerings. This course provides students a comprehensive understanding of a fully deployed, driven…

    Les mer
  • Introduction to Juniper Security (IJSEC) ARR_JUN_IJSEC

    Overview This three-day course provides students with the foundational knowledge required to work with the Junos operating system and to configure Junos security devices. The course provides a brief overview…

    Les mer
  • Introduction to Microsoft Security, Compliance, and Identity M-SC900
    NOK 9.900

    Overview This course provides foundational level knowledge on security, compliance, and identity concepts and related cloud-based Microsoft solutions.

    Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
  • Introduction to the Junos Operating System (IJOS) ARR_JUN_IJOS

    Overview This four-day course provides students with the foundational knowledge required to configure, verify, and troubleshoot devices that run Junos OS.Students will gain a wide variety of practical experience…

    Les mer
  • ISO 27002 Foundation (PECB certified) + exam ISO27002F

    Overview ISO/IEC 27002 Foundation training enables you to learn the basic elements to implement Information Security Controls as specified in ISO/IEC 27002. During this training course, you will be…

    Les mer
  • ISO/IEC 27001 Foundation (PECB certified) + exam ISO27001F
    NOK 17.500

    Overview ISO/IEC 27001 Foundation training allows you to learn the basic elements to implement and manage an Information Security Management System as specified in ISO/IEC 27001. During this training course,…

    Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
  • ISO/IEC 27001 Lead Auditor (PECB certified) + exam ISO27001LA
    NOK 39.000

    Overview The PECB ISO/IEC 27001 Lead Auditor training course is designed to prepare you to audit an information security management system (ISMS) based on ISO/IEC 27001. During this training…

    Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
  • ISO/IEC 27001:2022 Information Security: Lead Implementer (PECB certified) – Including Exam ISO27001LI
    NOK 39.000

    Overview This ISO/IEC 27001 Lead Implementer training enables you to develop the necessary expertise to support an organization in establishing, implementing, managing and maintaining an Information Security Management System…

    Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
  • ISO/IEC 27002 Lead Manager (PECB certified) + exam ISO27002LM

    Overview The ISO/IEC 27002 Lead Manager training course enables participants to acquire a comprehensive knowledge and understanding of the implementation and management of information security controls based on ISO/IEC…

    Les mer
  • ISO/IEC 27002 Manager (PECB certified) + exam ISO27002M

    Overview ISO/IEC 27002 Manager training course provides information on the implementation and management of information security controls based on ISO/IEC 27002.Why should you attend?ISO/IEC 27002 Manager enables participants to…

    Les mer
  • ISO/IEC 27032 Lead Cybersecurity Manager (PECB certified) + exam IS27032CM

    Overview ISO/IEC 27032 Lead Cybersecurity Manager training enables you to acquire the expertise and competence needed to support an organization in implementing and managing a Cybersecurity program based on 

    Les mer
  • ISO/IEC 27035 Lead Incident Manager (PECB certified) + exam IS27035LI
    NOK 39.000

    Overview ISO/IEC 27035 Lead Incident Manager training enables you to acquire the necessary expertise to support an organization in implementing an Information Security Incident Management plan based on ISO/IEC…

    Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
  • Juniper Security (JSEC) ARR_JUN_JSEC

    Overview This four-day, intermediate-level course provides students with the knowledge required to work with Juniper Connected Security devices. This course uses Junos CLI, Junos Space® Security Director. The course…

    Les mer
  • Junos Class of Service (JCOS) ARR_JUN_JCOS

    Overview This two-day course provides students with advanced class-of-service (CoS) knowledge and configuration examples. The course begins with an overview of CoS before going into classification, policing, scheduling, and rewriting. The…

    Les mer
  • Junos Layer 3 VPNs (JL3V) ARR_JUN_JL3V

    Overview This three-day course is designed to provide students with MPLS-based Layer 3 virtual private network (VPN) knowledge and configuration examples. The course includes an overview of MPLS Layer 3…

    Les mer
  • Junos Space Essentials (JSE) ARR_JUN_JSE

    Overview This three-day course provides students with the knowledge required to manage the Junos Space appliance and manage devices with Junos Space. Students will understand how to install Junos Space…

    Les mer
  • Junos Space Network Director (JS-ND) ARR_JUN_JS-ND

    Overview This one-day course is designed to provide students with the knowledge required to manage the Junos Space Network Director application and to manage devices with that application. Students will…

    Les mer
  • Junos Space-Security Director (JS-SD) ARR_JUN_JS-SD

    Overview This two-day course is designed to provide students with the knowledge required to manage the Junos Space Security Director application and manage devices with that application. Students will gain…

    Les mer
  • Junos Troubleshooting (JT) ARR_JUN_JT

    Overview This two-day course provides foundational troubleshooting skills. In this course, students will learn to use common Junos troubleshooting commands and tools. This course will help students to acquire the…

    Les mer
  • Lead Cloud Security Manager (PECB certified) + exam LCSM

    Overview The Lead Cloud Security Manager training course enables participants to develop the competence needed to implement and manage a cloud security program by following widely recognized best practices.The…

    Les mer
  • Masterclass Internet Information Services Management AIISM

    Overview Internet Information Services is a solution that can be delivered in a couple of hours as well as in 3 weeks – we practiced both options! IIS is…

    Les mer
  • Masterclass Public Key Infrastructure Management PKI
    NOK 46.000

    Overview This 5 day course is considered essential for anyone who would like to expand knowledge about Public Key Infrastructure (PKI) in Microsoft technologies. During the course PKI is…

    Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
  • Masterclass Secure Coding Techniques SCT

    Overview Gartner reports states that over 70% of security vulnerabilities exist at the application layer. Industry standards including PCI DSS, NIST, FISMA are introducing requirements to comply with security…

    Les mer
  • Masterclass: Administering and Configuring ADFS & Managing ADFS for Multiple Organizations ADFS

    Overview This course will teach you the Active Directory Federation Services course and the Managing Active Directory Federation Services course.Included in the course:Active Directory Federation Services and Claims workshop…

    Les mer
  • Masterclass: Administering and Configuring ADFS and Claims ADF
    NOK 34.000

    Overview Active Directory Federation Services and Claims workshop is the best way to learn how to implement the most business oriented server role! Federated Identity and claims based applications…

    Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
  • Masterclass: Hacking and Securing SQL Server HSS
    NOK 45.000

    Overview In this course you will analyze, learn and practice critical tasks for implementing highly secure SQL Server infrastructure. We’ll start with identifying security needs regarding database servers and look at…

    Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
  • Masterclass: Hacking and Securing Windows Infrastructure HSW

    Overview This course combines two intensive courses that are focused on the security of a windows infrastructure, Part one covers the Hacking of a Windows Infrastructure and part 2  the Securing of…

    Les mer
  • Masterclass: Managing Active Directory Federation Services for Multiple Organizations ADS
    NOK 30.000

    Overview Multi organization ADFS is a perfect course if you need to implement ADFS across different organizations! Federated Identity is the most discussed topic in terms of organization cooperation…

    Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
  • Masterclass: Managing Azure Active Directory from A to Z (ATZ) AAD

    Overview This advanced course will guide you through all aspects of deploying and managing Azure Active Directory (AAD) in an organization in a secure way. We will cover co-existence…

    Les mer
  • Masterclass: Managing Microsoft Entra ID From A to Z (ATZ) ATZ

    Overview This advanced course will guide you through all aspects of administering and managing Entra ID in an organization in a secure way. We will cover co-existence with on-premises…

    Les mer
  • Masterclass: Pentesting and Securing Mobile and Web Applications PTCMW

    Overview The course teaches mobile and web application security concepts, including the techniques on how to attack and how to respond with an appropriate countermeasure implementation. Our course has…

    Les mer
  • Masterclass: Red Team – Blue Team Operations RBO

    Overview This is a deep dive course on Red Team – Blue Team Operations: The cyber kill chainSecurity is a business enabler, and it is only when it is…

    Les mer
  • Masterclass: Windows Security and Infrastructure Management WSI

    Overview This is an international Live Virtual Class, which means you will share the learning experience in a group of IT pros from around the world! The class is…

    Les mer
  • Microsoft Cybersecurity Architect (SC-100) M-SC100
    NOK 24.000

    Overview Learn how to design and architect solutions using zero trust principles and specify security requirements for cloud infrastructure in different service models (SaaS, PaaS, IaaS).This is an advanced,…

    Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
  • Microsoft Identity and Access Administrator (SC-300) M-SC300
    NOK 28.000

    Overview Exclusive – The Microsoft Identity and Access Administrator course explores how to design, implement, and operate an organization’s identity and access management systems by using Microsoft Entra ID.Learn to…

    Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
  • Microsoft Security Operations Analyst (SC-200) M-SC200
    NOK 28.000

    Overview Learn how to investigate, respond to, and hunt for threats using Microsoft Sentinel, Microsoft Defender XDR and  Microsoft Defender for Cloud. In this course you will learn how…

    Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
  • NCSP Boot Camp Certification HPE_H0DV9S

    Overview Digital Transformation • Explain what it means to “become digital”• Discuss the difference between industrial and digital era enterprises • Explain how cybersecurity…

    Les mer
  • NCSP Practitioner Training HPE_H0DV8S

    Overview Chapter 1: Course Introduction • Course organization • Setting the stageChapter 2: Digital Transformation • DX as a practitioner• DX in the context…

    Les mer
  • NIS 2 Directive Foundation (PECB Certified) incl Exam NIS2-F

    Overview The NIS 2 Directive Foundation training course outlines the essential insights necessary for understanding the requirements of NIS 2 Directive regarding cybersecurity measures. It provides the core concepts…

    Les mer
  • NIS 2 Directive Lead Implementer (PECB Certified) incl Exam NIS2-LI
    NOK 41.000

    Overview The importance of robust cybersecurity measures cannot be overstated, as organizations are increasingly facing all types of cyberattacks. The NIS 2 Directive is a legislation that has been…

    Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
  • Palo Alto Networks Prisma Access SSE: Configuration and Deployment PAN-PASSECD

    Overview The Prisma Access SSE: Configuration and Deployment course introduces you to the operational deployment of Prisma Access Secure Access Service Edge (SASE) and how it helps organizations embrace…

    Les mer
  • Palo Alto Networks: Cortex XDR: Investigation and Response (EDU-262) PAN-EDU-262
    NOK 20.850

    Overview This instructor-led course teaches you how to use the Incidents pages of the Cortex XDR management console to investigate attacks. It explains causality chains, detectors in the Analytics…

    Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
  • Palo Alto Networks: Cortex XDR Security Operations and Integration PAN-CXDRSOI

    Overview This 3-day instructor-led course provides in-depth training on Cortex XDR, Palo Alto Networks’ powerful extended detection and response platform. You will gain hands-on expertise in security operations, incident…

    Les mer
  • Palo Alto Networks: Cortex XSIAM for Investigation and Analysis PAN-XSIAM-IA

    Overview XSIAM is the industry’s most comprehensive security incident and asset management platform, offering extensive coverage for securing and managing infrastructure, workloads, and applications cross multiple environments.Throughout this course,…

    Les mer
  • Palo Alto Networks: Cortex XSOAR Engineering Security Automation Solutions PAN-CXSOARESAS

    Overview The Palo Alto Networks Cortex XSOAR: Engineering Security Automation Solutions course is a four-day instructor-led training with a blend of lectures and hands-on labs. This training will enable…

    Les mer
  • Palo Alto Networks: Firewall Essentials: Configuration and Management (EDU-210) PAN-EDU-210
    NOK 41.500

    Overview The Palo Alto Networks Firewall Essentials: Configuration and Management (EDU-210) course is five days of instructor led training that will help you to:- Configure and manage the essential…

    Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
  • Palo Alto Networks: Firewall Troubleshooting (EDU-330) PAN-EDU-330
    NOK 32.000

    Overview The Palo Alto Networks Firewall: Troubleshooting course is three days of instructor-led training that will help you to:- Use firewall tools, including the CLI, to investigate networking issues-…

    Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
  • Palo Alto Networks: Panorama NGFW Management PAN-PNGFWM
    NOK 22.000

    Overview The Palo Alto Networks Panorama: NGFW Management course is two days of instructor-led training that should help you to:- Learn how to configure and manage the next-generation Panorama…

    Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
  • PAN-EDU-260 Palo Alto Networks: Cortex XDR :Prevention and Deployment (EDU-260)
    NOK 31.000

    This instructor-led training enables you to prevent attacks on your endpoints. After an overview of the Cortex XDR components, the training introduces the Cortex XDR management console and demonstrates…

    Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
  • Paragon Active Assurance for Automated WAN (PAAW) ARR_JUN_PAAW

    Overview This two-day course provides the opportunity for students to develop the knowledge and skills required to configure, operate, monitor, and maintain Paragon Active Assurance deployments. The goal of the…

    Les mer
  • Performing CyberOps Using Cisco Security Technologies CBRCOR
    NOK 50.000

    Overview The Performing CyberOps Using Cisco Security Technologies (CBRCOR) course guides you through cybersecurity operations fundamentals, methods, and automation. The knowledge you gain in this course will prepare you…

    Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
  • QRadar EDR: Foundations TDS_BQ505G

    Overview In this course, you learn about the IBM Security® QRadar® EDR architecture and how to position the product within your company’s landscape of security solutions. You gain skills…

    Les mer
  • QRadar EDR: Integrating with QRadar SIEM TDS_BQ530G

    Overview In this course you learn how to integrate QRadar EDR and SIEM by creating an API application in QRadar EDR and by adding a new log source in…

    Les mer
  • QRadar SOAR: Foundations TDS_BQ405G

    Overview In this course, you learn about the IBM Security® QRadar® SOAR architecture, and how to position the product in your company’s security architecture design. You gain hands-on experience…

    Les mer
  • QRadar SOAR: Integrating with SIEM TDS_BQ430G

    Overview In this couse, you learn about the IBM Security® QRadar® SIEM and QRadar SOAR apps that automate data exchange and improve the security incident investigation. You gain knowledge…

    Les mer
  • QRadar SOAR: Integration with Microsoft Active Directory TDS_BQ440G

    Overview Gain hands-on experience with the IBM Security® QRadar® SOAR platform. Learn how to integrate with Active Directory by using the LDAP and Active Directory Function for SOAR app…

    Les mer
  • QRadar UBA: Detecting Insider Threats TDS_BQ610G

    Overview Learn how to detect insider threats triggered by anomalous or malicious user behavior. Get ready to install, configure, and tune IBM Security® QRadar UBA and the Machine Learning…

    Les mer
  • Red Hat Security: Identity Management and Authentication RH362

    Overview Provide help to secure, centralized identity management services to coordinate user authentication and authorization with client systems, network services, and Windows domains.Course DescriptionRed Hat Security: Identity Management and…

    Les mer
  • Red Hat Security: Identity Management and Authentication with Exam RH363

    Overview Provide help to secure, centralized identity management services to coordinate user authentication and authorization with client systems, network services, and Windows domains.Course DescriptionRed Hat Security: Identity Management and…

    Les mer
  • Red Hat Security: Linux in Physical, Virtual, and Cloud RH415

    Overview Manage security of Red Hat Enterprise Linux systems deployed in bare-metal, virtual, and cloud environmentsRed Hat Security: Linux in Physical, Virtual, and Cloud (RH415) is designed for security…

    Les mer
  • Red Hat Security: Linux in Physical, Virtual, and Cloud with Exam RH416

    Overview Maintaining security of computing systems is a process of managing risk through the implementation of processes and standards backed by technologies and tools. In this course, you will…

    Les mer
  • Securing Email with Cisco Email Security Appliance SESA
    NOK 38.500

    Overview Learn how to deploy and use Cisco® Email Security Appliance to establish protection for your email systems against phishing, business email compromise and ransomware. Help streamline email security policy management. This…

    Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
  • Securing Cisco Networks with Open Source Snort SSFSNORT

    Overview The Securing Cisco Networks with Open Source Snort course shows you how to deploy a network intrusion detection system based on Snort. Through a combination of expert instruction…

    Les mer
  • Securing Cisco Networks with Snort Rule Writing Best Practices SSFRULES
    NOK 36.500

    Overview Securing Cisco Networks with Snort Rule Writing Best Practices is a lab-intensive course that introduces users of open source Snort or Sourcegire FIRESIGHT systems to the Snort rules language and rule-writing best…

    Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
  • Securing the Web with Cisco Web Security Appliance SWSA
    NOK 24.500

    Overview The Securing the Web with Cisco Web Security Appliance (SWSA) course shows you how to implement, use, and maintain Cisco® Web Security Appliance (WSA), powered by Cisco Talos,…

    Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
  • Securing Windows Infrastructure SWI

    Overview Not available. Please contact.

    Les mer
  • ServiceNow Security Operations (SecOps) Fundamentals SNSOF

    Overview Learn about the Security Incident Response, Vulnerability Response, and Threat Intelligence applications.This two-day course covers the foundational topics of the ServiceNow Security Operation suite. The Security Operations Suite…

    Les mer
  • Troubleshooting BIG-IP v.17.1 ARR_F5N_BIG-TRBL-INT2

    Overview This 2-day course gives network administrators, network operators, and network engineers a functional understanding of the BIG-IP system as it is commonly deployed in an application delivery network. The…

    Les mer
  • Understanding Cisco Cybersecurity Operations Fundamentals CBROPS
    NOK 47.000

    Overview The Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) course teaches you security concepts, common network and application operations and attacks, and the types of data needed to investigate security…

    Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
  • Understanding Cisco Wireless Foundations WLFNDU
    NOK 42.000

    Overview The Understanding Cisco Wireless Foundations (WLFNDU) course provides the knowledge and skills needed to configure, manage, and troubleshoot a Cisco wireless LAN (WLAN) network. Topics include understanding critical aspects of…

    Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
  • Verify Access: Administration TDS_TW112G

    Overview In this course, you learn about the IBM Verify Access architecture and deployment options and how to position the product within your organization’s landscape of security solutions. You…

    Les mer
  • Verify Access: Deploy and Configure TDS_TW110G

    Overview In this course, you learn about the IBM Security® Verify Access architecture and deployment options and how to position the product within your organization’s landscape of security solutions….

    Les mer
  • Verify Access: PoPs- ACLs and Junctions TDS_TW111G

    Overview In this course, you learn about the IBM Verify Access access control mechanisms, Reverse Proxy junctions, authentication methods, as well as logging, auditing, and troubleshooting. You gain skills around…

    Les mer