- Administering and Positioning Cisco Umbrella Operations ADMUMBNOK 43.000Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
Overview Cisco Umbrella is a cloud security platform that provides the first line of defense against threats on the Internet. Being able to understand and position how Cisco Umbrella…
- Administering BIG-IP and Configuring BIG-IP LTM v.17.1 Local Traffic Manager Bundle ARR_F5N_BIGIPAD_LTM_BDLELes mer
Overview This 5-day bundle course covers the following 2 courses: Administering BIG-IP v15.1This 2-day course gives network administrators, networkoperators, and network engineers a functional understanding of the BIG-IPsystem as…
- Administering BIG-IP v.17.1 ARR_F5N_BIG-OP-ADMINLes mer
Overview This 2-day course gives network administrators, networkoperators, and network engineers a functional understanding of the BIG-IPsystem as it is commonly deployed in an application delivery network.
- Advanced Juniper Security (AJSEC) ARR_JUN_AJSECLes mer
Overview This four-day course, which is designed to build off the current Juniper Security (JSEC) offering, delves deeper into Junos security, next-generation security features, and ATP supporting software. Through demonstrations…
- Advanced Junos Troubleshooting (AJT) ARR_JUN_AJTLes mer
Overview This three-day course provides students with the knowledge to troubleshoot switching, routing, and security features. This course builds off the Juniper Technical Support Fundamentals (JTSF) and Junos Troubleshooting (JT)…
- Advanced Techniques for Cisco Firewall Threat Defense and Intrusion Prevention SFWIPANOK 48.000Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
Overview The Advanced Techniques for Cisco Firewall Threat Defense and Intrusion Prevention course shows you how to deploy and configure a Cisco Secure Firewall Threat Defense system and its features as a…
- Automating BIG-IP with Ansible v.1.7 ARR_F5N_BIG-AUTOLes mer
Overview This 2-day course introduces network administrators, operators, and DevOps engineers to the foundational and F5-specific technologies required to automate BIG-IP.Participants will gain exposure to multiple technologies for a…
- Automating BIG-IP with AS3 v.1.7 ARR_F5N_BIG-AUTO-AS3Les mer
Overview This course introduces network administrators, operators, and DevOps engineers to the foundational and F5-specific technologies required to automate BIG-IP. Participants will gain exposure to multiple technologies for a variety…
- AWAF Modern Application v17.1. ARR_F5N_BIG-AWAFLes mer
Overview In this 4-day course, students are provided with a functional understanding of how to deploy, tune, and operate F5 Advanced Web Application Firewall to protect their web applications…
- AWS Jam – Security Engineering GK3338JAMLes mer
Overview Accelerate your cloud adoption journey. Your team will gain practical knowledge and skills that they can take back and implement into your organizations cloud initiatives. With real-world challenges,…
- Basics of z/OS RACF Administration TDS_ES19GLes mer
Overview This course begins with an introduction to the z/OS environment, TSO and ISPF/PDF, batch processing, and z/OS data sets. Hands-on labs allow you to gain experience with viewing…
- BCS Certificate in Information Security Management Principles (CISMP) – Including Exam CISMPNOK 32.000Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
Overview This course follows the latest BCS syllabus and prepares delegates for the BCS examination.You will gain an understanding of the main principals required to be an effective member…
- Certified CMMC Professional (CCP) CMMC-PLes mer
Overview Certified CMMC Professional training course enables participants to acquire a comprehensive understanding of the Cybersecurity Maturity Model Certification (CMMC) model and its requirements. It is a gateway for…
- Check Point Certified Harmony Endpoint Specialist (CCES) R81.20 ARR_CKT_CCES_R81_20NOK 23.000Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
Overview Demonstrate an understanding of the Check Point Harmony Endpoint solution, including its features and capabilities. Apply knowledge and skills gained during training to manage and protect a Harmony Endpoint solution.
- Check Point Certified Maestro Expert (CCME) R81.X ARR_CKT_CCMENOK 25.500Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
Overview The Check Point Certified Maestro Expert course is intended to provide you with the theoretical knowledge and practical skills needed to deploy, manage, and troubleshoot the Check Point…
- Check Point Certified Multi-Domain Security Management Specialist (CCMS) R81X (includes 180 days’ lab access) ARR_CKT_CCMSLes mer
Overview This two-day course is designed for Security professionals who install, configure, and manage multiple security domains within their network security environment. Gain advanced skills for effectively securing and managing…
- Check Point Certified Security Administrator (CCSA) & Troubleshooting Administrator (CCTA) R81.20 Bundle (includes 180 days’ lab access) ARR_CKT_CPSACCTALes mer
Overview This 5 day bundle course covers the following two Check Point training courses:Check Point Certified Security Administrator (CCSA) R81.x – 3 daysandCheck Point Certified Troubleshooting Administrator (CCTA) R81.x…
- Check Point Certified Security Administrator (CCSA) and Expert (CCSE) R81.20 5-day Boot Camp (includes 180 days’ lab access) ARR_CKT_CCSAEBC_R81_20Les mer
Overview The Check Point Cybersecurity Boot Camp is a fast-paced course intended for Security Experts and other technical professionals with prior training and/or practical experience with Check Point Security…
- Check Point Certified Security Administrator (CCSA) R81.20 (includes 180 days’ lab access) ARR_CKT_CCSA_R81_20Les mer
Overview This core course covers the fundamentals needed to deploy, configure, and manage daily operations of Check Point Security Gateways and Management Software Blades that run on the Gaia…
- Check Point Certified Security Administrator (CCSA) R82 (includes 180 days’ lab access) ARR_CKT_CCSA_R82Les mer
Overview This course provides students with the fundamental knowledge, skills, and hands-on experience needed to configure, manage, and monitor an existing Quantum Security Environment. Students…
- Check Point Certified Security Expert (CCSE) & Troubleshooting Expert (CCTE) R81.20 Bundle (includes 180 days’ lab access) ARR_CKT_CPSECCTELes mer
Overview This 5 day bundle course covers the following two Check Point training courses:Check Point Certified Security Expert (CCSE) R81.10 – 3 daysandCheck Point Certified Troubleshooting Expert (CCTE) R81.10…
- Check Point Certified Security Expert (CCSE) R81.20 (includes 180 days’ lab access) ARR_CKT_CCSE_R81_20Les mer
Overview This core course covers the fundamentals needed to deploy, configure, and manage daily operations of Check Point Security Gateways and Management Software Blades that run on the Gaia…
- Check Point Certified Security Expert (CCSE) R82 (includes 180 days’ lab access) ARR_CKT_CCSE_R82Les mer
Overview This course provides students with the advanced knowledge, skills, and hands-on experience needed to deploy, manage, and monitor existing Quantum Security Environments. Students will learn how to deploy…
- Check Point Certified Troubleshooting Administrator (CCTA) R81.20 (includes 180 days’ lab access) ARR_CKT_CCTALes mer
Overview The Check Point Certified Troubleshooting Administrator (CCTA) provides an understanding of the concepts and skills necessary to troubleshoot issues that may occur when managing the Check Point Security…
- Check Point Certified Troubleshooting Expert (CCTE) R81.20 (includes 180 days’ lab access) ARR_CKT_CCTELes mer
Overview The 2-day Check Point Certified Troubleshooting Expert (CCTE) provides advanced troubleshooting skills to investigate and resolve more complex issues that may occur while managing your Check Point security…
- Check Point Certified VSX Specialist (CCVS) R81.X (includes 180 days’ lab access) ARR_CKT_CCVSLes mer
Overview This 2-day course provides a comprehensive understanding of the Check Point VSX solution and describe how to deploy it within the corporate network environment.
- Check Point Deployment Administrator (CPDA) R82 (includes 180 days’ lab access) ARR_CKT_CPDA_R82Les mer
Overview This course provides students with the fundamental knowledge, skills, and hands-on experience needed to deploy a new Quantum Security Environment. Students learn how to install and perform…
- Check Point Threat Prevention Specialist (CTPS) R81_20 ARR_CKT_CTPS_R81_20Les mer
Overview This two-day Specialist-level course is designed for security professionals who want to gain the concepts and skills necessary to deploy and manage Custom Threat Prevention within a Check…
- Cisco DoD Comply-to-Connect C2CNOK 51.000Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
Overview The Cisco DoD Comply-to-Connect (C2C) training teaches you how to implement and deploy a Department of Defense (DoD) Comply-to-Connect network architecture using Cisco Identity Services Engine (ISE). This…
- Cisco Secure Workload Firewall Enforcement Agents, Data Flow Mapping, and Advanced Policy Deployment N1_(CSWADV)NOK 51.000Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
Overview Cisco Secure Workload Firewall Enforcement Agents, Data Flow Mapping, and Advanced Policy Deployment, CSWADV, is a 5-day course exploring telemetry data, the flows corpus, and how Cisco Secure Workload…
- Citrix NetScaler ADC 14.x Advanced Features (Security and Management) NS-301NOK 44.000Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
Overview Designed for experienced IT professionals, this course is best suited for individuals who will be deploying and/or managing Application Firewall, AAA for Application Traffic, and NetScaler Console (ADM)…
- CMMC Foundations (PECB Certified) + exam CMMC-FLes mer
Overview The PECB CMMC Foundations training course enables participants to understand the fundamental concepts and principles of the CMMC model.The PECB CMMC Foundations training course allows you to learn…
- CompTIA SecurityX Certification Prep Course GK2951NOK 39.500Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
Overview Learn advanced security administration tools and techniques while preparing for the CompTIA SecurityX exam (CAS-005) in this hands-on course.The CompTIA SecurityX (CAS-005) Certification Prep Course is designed for…
- Configuring BIG-IP AFM Advanced Firewall Manager v.17.1 ARR_F5N_BIG-AFMLes mer
Overview This 2-day course uses lectures and hands-on lab exercises to give participants real-time experience in setting up and configuring the BIG-IP® Advanced Firewall Manager system. Students are introduced to…
- Configuring BIG-IP APM Access Policy Manager v.17.1 ARR_F5N_BIGIP-APMNOK 32.500Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
Overview This 3-day course gives network administrators, network operators, and network engineers a functional understanding of BIG-IP Access Policy Manager as it is commonly deployed in both application delivery…
- Configuring BIG-IP DNS (formerly GTM) v.17.1 ARR_F5N_BIG-DNSLes mer
Overview This 2-day course gives networking professionals a functional understanding of the BIG-IP DNS system as it is commonly used. The course covers configuration and ongoing management of the BIG-IP…
- Configuring BIG-IP LTM Local Traffic Manager v.17.1 ARR_F5N_BIG-LTM-CFG-3Les mer
Overview This 3-day course gives network professionals a functional understanding of BIG-IP Local Traffic Manager, introducing students to both commonly used and advanced BIG-IP LTM features and functionality. Incorporating lecture,…
- Configuring BIG-IQ v.7.1 ARR_F5N_BIG_CFGLes mer
Overview This 2-day course uses lectures and hands-on exercises to give participants real-time experience in configuring and using the BIG-IQ® product.Students are introduced to BIG-IQ, its interface, and its…
- Configuring F5 Advanced WAF (previously licensed as ASM) ARR_F5N_BIG-AWF-CFGLes mer
Overview Not available. Please contact.
- Cybersecurity Masterclass: Managing and Defending Against Current Threats CBRLes mer
Overview This is a deep dive course on infrastructure attacks and its security. In this workshop you will identify the areas of vulnerability and gain knowledge about the most…
- Cybersecurity Specialization: Artificial Intelligence Risk Management Framework GK840108NOK 24.000Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
Overview Learn to navigate global AI risk and regulatory frameworks with confidence and clarity.As artificial intelligence becomes increasingly embedded in critical systems, managing its risks is no longer optional—it’s…
- Cybersecurity Specialization: Threat Modeling GK840103NOK 23.000Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
Overview Understand and apply threat modeling techniques to enhance cybersecurity.Cybersecurity Specialization: Threat Modeling dives into the critical practice of threat modeling, a key component in modern cybersecurity strategies. Participants…
- Defend against cyberthreats with Microsoft Defender XDR (SC-5004) M-SC5004Les mer
Overview Implement the Microsoft Defender for Endpoint environment to manage devices, perform investigations on endpoints, manage incidents in Defender XDR, and use Advanced Hunting with Kusto Query Language (KQL)…
- Deploying Juniper Security in AWS and Azure (JCNAA) ARR_JUN_JCNAALes mer
Overview This four-day course is designed to provide students with the knowledge required to implement Juniper Networks vSRX in AWS and Azure environments. Through demonstrations and hands-on labs, students…
- Deploying Junos Subscriber Management (JSM) ARR_JUN_JSMLes mer
Overview This four-day course is designed to provide students with the knowledge required to configure and manage subscriber management on devices running the Junos operating system. This course focuses on…
- Designing and Implementing Secure Cloud Access for Users and Endpoints SCAZTLes mer
Overview The Designing and Implementing Secure Cloud Access for Users and Endpoints course will provide you with the skills to design and implement cloud security architectures, user and device security, network and…
- Designing Cisco Security Infrastructure SDSILes mer
Overview The Designing Cisco Security Infrastructure (SDSI) course teaches you about security architecture design, including secure infrastructure, applications, risk, events, requirements, artificial intelligence (AI), automation, and DevSecOps.This training prepares…
- Developing iRules for BIG-IP v.17.1 ARR_F5N_BIG-IRULE-CFGLes mer
Overview This 3-day course provides networking professionals a functional understanding of iRules development. The course builds on the foundation of the Administering BIG-IP or Configuring LTM course, demonstrating how to…
- EC-Council Certified Application Security Engineer (CASE) Java + Exam voucher CASE-JAVALes mer
Overview The Certified Application Security Engineer (CASE) credential is developed in partnership with large application and software development experts globally. The CASE credential tests the critical security skills and…
- EC-Council Certified Application Security Engineer (CASE) Java Certified Application Security Engineer (CASE) . Net + Exam voucher CASE-NETLes mer
Overview The Certified Application Security Engineer (CASE) credential is developed in partnership with large application and software development experts globally. The CASE credential tests the critical security skills and…
- EC-Council Certified Encryption Specialist (ECES) + Exam voucher ECESNOK 27.000Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
Overview The EC-Council Certified Encryption Specialist (ECES) program introduces professionals and students to the field of cryptography. The participants will learn the foundations of modern symmetric and key cryptography…
- EC-Council Certified Secure Computer User (CCSU) + Exam voucher CSCUNOK 16.000Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
Overview The purpose of the CSCU training program is to provide individuals with the necessary knowledge and skills to protect their information assets. This class will immerse students into…
- EC-Council Certified SOC Analyst (CCSA) + Exam voucher EC-CSANOK 24.000Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
Overview The Certified SOC Analyst (CSA) program is the first step to joining a security operations center (SOC). It is engineered for current and aspiring Tier I and Tier…
- EC-Council Certified Threat Intelligence Analyst + Exam voucher CTIANOK 28.000Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
Overview Certified Threat Intelligence Analyst (C|TIA) is a training and credentialing program designed and developed in collaboration with cybersecurity and threat intelligence experts across the globe to help organizations…
- Effective RACF Administration TDS_BE87GLes mer
Overview This course prepares you to be a more effective security administrator as you gain experience and confidence in using the RACF component of the z/OS Security Server. To…
- Forescout Certified Associate (FSCA) ENW_ENFSCASSLes mer
Overview ForeScout Certified Associate training is a four-day course featuring instruction and includes hands-on labs in a simulated IT environment. Students learn how to establish security policies using all…
- FortiGate Administrator ARR_FNT_FT-FGT-ADMNOK 39.500Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
Overview In this course, you will learn how to use the most common FortiGate features.In interactive labs, you will explore firewall policies, user authentication, high availability, SSL…
- Fundamentals of Cisco Firewall Threat Defense and Intrusion Prevention SFWIPFNOK 49.000Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
Overview This Fundamentals of Cisco Firewall Threat Defense and Intrusion Prevention (SFWIPF) course shows you how to implement and configure Cisco Secure Firewall Threat Defense for deployment as a…
- HPE Security Governance and Policies HPE_HL948SLes mer
Overview This 2-day course shows IT professionals and security officers how to develop an effective security governance strategy for their organization. Students also learn how compliance regulations and industry…
- IBM Guardium Data Protection Fundamentals TDS_8G103GLes mer
Overview Data security and privacy challengers are never-ending. IBM Guardium Data Protection (Guardium) provides a broad range of data security and protection capabilities that can protect sensitive and regulated…
- IBM QRadar SIEM Advanced Topics TDS_BQ205GLes mer
Overview QRadar SIEM provides deep visibility into network, user, and application activity. It provides collection, normalization, correlation, and secure storage of events, flows, assets, and vulnerabilities. Suspected attacks and…
- IBM QRadar SIEM Foundations TDS_BQ105GLes mer
Overview IBM Security QRadar enables deep visibility into network, endpoint, user, and application activity. It provides collection, normalization, correlation, and secure storage of events, flows, assets, and vulnerabilities. Suspected…
- IBM Verify: Adoption TDS_TW900GLes mer
Overview This course guides learners through the process of adopting IBM Verify in their organization. It covers the Verify architecture, integration with existing deployments, user import from existing sources,…
- IBM zSecure Admin Basic Administration and Reporting TDS_TK264GLes mer
Overview This is an instructor-led course that provides basic introduction of the IBM Security Admin ISPF interface for customers who administer RACF profiles and generate basic RACF overview reports.This…
- IBM zSecure Audit Rule-based Compliance Evaluation and Customization TDS_TK274GLes mer
Overview This course introduces the zSecure Audit rule-based compliance evaluation framework. The course explains rule-based compliance evaluation concepts and includes an overview and demonstration of the supported compliance evaluation…
- IBM zSecure CARLa Auditing and Reporting Language TDS_TK234GLes mer
Overview Learn the basics of the IBM Security zSecure programming language CARLa. This course teaches you to use the CARLa programming language to create reports for RACF, SMF, UNIX…
- IBM zSecure RACF and SMF Auditing TDS_TK244GLes mer
Overview This course describes audit concerns that IBM® Security zSecure Audit reports. The course explains auditing your RACF® database and z/OS subsystems such as CICS, IMS, and DB2. You…
- IBM zSecure RACF Management Workshop TDS_TK254GLes mer
Overview This workshop teaches the basics of the security administration process and how to implement company security policies and guidelines into specific RACF profile definitions and settings.In this workshop,…
- IBM zSecure UNIX System Services (USS) Security Overview TDS_TK224GLes mer
Overview In this workshop, you learn to maintain a RACFdatabase with IBM Security zSecure Admin and monitor the system with IBM Security zSecure Audit.During hands-on exercises, you act as…
- Implementing and Configuring Cisco Identity Services Engine Bootcamp SISENOK 48.000Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
Overview In the Implementing and Configuring Cisco Identity Services Engine (SISE) course you will learn to deploy and use Cisco Identity Services Engine (ISE) v3.x, an identity and access…
- Implementing and Operating Cisco Security Core Technologies SCORNOK 48.000Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
Overview The Implementing and Operating Cisco Security Core Technologies (SCOR) course helps you prepare for the Cisco® CCNP® Security and CCIE® Security certifications and for senior-level security roles. In…
- Implementing and Troubleshooting Networks using Cisco ThousandEyes ENTEITNOK 41.500Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
Overview The Implementing and Troubleshooting Networks Using Cisco ThousandEyes (ENTEIT) course is designed to introduce you to Cisco® ThousandEyes. Through a combination of lectures and hands-on experience, you will learn to…
- Implementing Aruba Network Security H38DHSLes mer
Overview The Implementing Aruba Network Security course covers intermediate security concepts and prepares candidates to take the exam to achieve Aruba Certified Networking Security Professional (ACNSP) certification. This course…
- Implementing Cisco SD-WAN Security and Cloud Solutions SDWSCSNOK 36.000Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
Overview The Implementing Cisco SD-WAN Security and Cloud Solutions (SDWSCS) course is an advanced training course focused on Cisco SD-WAN security and cloud services. Through a series of labs and…
- Implementing Secure Solutions with Virtual Private Networks SVPNNOK 48.000Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
Overview The Implementing Secure Solutions with Virtual Private Networks (SVPN) course teaches you how to implement, configure, monitor, and support enterprise Virtual Private Network (VPN) solutions. Through a combination…
- Infoblox NIOS DDI Operator & Administrator Bundle ENW_ENINIOSDDILes mer
Overview NIOS DDI OPERATOR Learn the fundamentals of the NIOS Grid and how to navigate the Grid Manager UI. Build a working knowledge of operator-level responsibilities in the NIOS Grid…
- Infoblox NIOS DDI Troubleshooting ENW_ENINIOSDDITLes mer
Overview Previously known as “Core DDI Advanced Troubleshooting (CDAT)”. Troubleshoot the Infoblox Grid and HA (high availability) pairs. Study common root cause analysis and resolution strategies and techniques for…
- Information Security Administrator (SC-401) M-SC401NOK 28.000Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
Overview Implement information security of sensitive data by using Microsoft Purview and related services.The Information Security Administrator course equips you with the skills needed to plan and implement information…
- Information Security Foundation (ISFS) based on IEC/ISO 27001 + exam ISF-EXINNOK 18.500Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
Overview Information security is becoming more and more important. The globalisation of the economy leads to an increasing exchange of information between organisations (employees, customers and suppliers), an increasing…
- Information Security Management Professional (ISMP) based on IEC/ISO 27001 + exam ISMP-EXINLes mer
Overview Information is crucial for the continuity and proper functioning of both individual organizations and the economies they fuel; this information must be protected against access by unauthorized people,…
- Information Security Risk Management and Business Continuity Planning HPE_HL947SLes mer
Overview As we’ve learned, Information Security is ultimately about protecting the assets most crucial to your business through preserving the Confidentiality, Integrity, and Availability of your information. In…
- Installing and Configuring ArcSight Platform ICASPLes mer
Overview This instructor-led course teaches you how to install and configure ArcSight Platform on-premise with the ArcSight Platform Installation program.In this course, you learn how to installing ArcSight Platform,…
- Introduction to Juniper Mist AI (IJMA) ARR_JUN_IJMALes mer
Overview This introductory three-day course serves as the springboard to understanding the Mist AI™ Full Stack offerings. This course provides students a comprehensive understanding of a fully deployed, driven…
- Introduction to Juniper Security (IJSEC) ARR_JUN_IJSECLes mer
Overview This three-day course provides students with the foundational knowledge required to work with the Junos operating system and to configure Junos security devices. The course provides a brief overview…
- Introduction to Microsoft Security, Compliance, and Identity M-SC900NOK 9.900Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
Overview This course provides foundational level knowledge on security, compliance, and identity concepts and related cloud-based Microsoft solutions.
- Introduction to the Junos Operating System (IJOS) ARR_JUN_IJOSLes mer
Overview This four-day course provides students with the foundational knowledge required to configure, verify, and troubleshoot devices that run Junos OS.Students will gain a wide variety of practical experience…
- ISO 27002 Foundation (PECB certified) + exam ISO27002FLes mer
Overview ISO/IEC 27002 Foundation training enables you to learn the basic elements to implement Information Security Controls as specified in ISO/IEC 27002. During this training course, you will be…
- ISO/IEC 27001 Foundation (PECB certified) + exam ISO27001FNOK 17.500Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
Overview ISO/IEC 27001 Foundation training allows you to learn the basic elements to implement and manage an Information Security Management System as specified in ISO/IEC 27001. During this training course,…
- ISO/IEC 27001 Lead Auditor (PECB certified) + exam ISO27001LANOK 39.000Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
Overview The PECB ISO/IEC 27001 Lead Auditor training course is designed to prepare you to audit an information security management system (ISMS) based on ISO/IEC 27001. During this training…
- ISO/IEC 27001:2022 Information Security: Lead Implementer (PECB certified) – Including Exam ISO27001LINOK 39.000Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
Overview This ISO/IEC 27001 Lead Implementer training enables you to develop the necessary expertise to support an organization in establishing, implementing, managing and maintaining an Information Security Management System…
- ISO/IEC 27002 Lead Manager (PECB certified) + exam ISO27002LMLes mer
Overview The ISO/IEC 27002 Lead Manager training course enables participants to acquire a comprehensive knowledge and understanding of the implementation and management of information security controls based on ISO/IEC…
- ISO/IEC 27002 Manager (PECB certified) + exam ISO27002MLes mer
Overview ISO/IEC 27002 Manager training course provides information on the implementation and management of information security controls based on ISO/IEC 27002.Why should you attend?ISO/IEC 27002 Manager enables participants to…
- ISO/IEC 27032 Lead Cybersecurity Manager (PECB certified) + exam IS27032CMLes mer
Overview ISO/IEC 27032 Lead Cybersecurity Manager training enables you to acquire the expertise and competence needed to support an organization in implementing and managing a Cybersecurity program based on
- ISO/IEC 27035 Lead Incident Manager (PECB certified) + exam IS27035LINOK 39.000Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
Overview ISO/IEC 27035 Lead Incident Manager training enables you to acquire the necessary expertise to support an organization in implementing an Information Security Incident Management plan based on ISO/IEC…
- Juniper Security (JSEC) ARR_JUN_JSECLes mer
Overview This four-day, intermediate-level course provides students with the knowledge required to work with Juniper Connected Security devices. This course uses Junos CLI, Junos Space® Security Director. The course…
- Junos Class of Service (JCOS) ARR_JUN_JCOSLes mer
Overview This two-day course provides students with advanced class-of-service (CoS) knowledge and configuration examples. The course begins with an overview of CoS before going into classification, policing, scheduling, and rewriting. The…
- Junos Layer 3 VPNs (JL3V) ARR_JUN_JL3VLes mer
Overview This three-day course is designed to provide students with MPLS-based Layer 3 virtual private network (VPN) knowledge and configuration examples. The course includes an overview of MPLS Layer 3…
- Junos Space Essentials (JSE) ARR_JUN_JSELes mer
Overview This three-day course provides students with the knowledge required to manage the Junos Space appliance and manage devices with Junos Space. Students will understand how to install Junos Space…
- Junos Space Network Director (JS-ND) ARR_JUN_JS-NDLes mer
Overview This one-day course is designed to provide students with the knowledge required to manage the Junos Space Network Director application and to manage devices with that application. Students will…
- Junos Space-Security Director (JS-SD) ARR_JUN_JS-SDLes mer
Overview This two-day course is designed to provide students with the knowledge required to manage the Junos Space Security Director application and manage devices with that application. Students will gain…
- Junos Troubleshooting (JT) ARR_JUN_JTLes mer
Overview This two-day course provides foundational troubleshooting skills. In this course, students will learn to use common Junos troubleshooting commands and tools. This course will help students to acquire the…
- Lead Cloud Security Manager (PECB certified) + exam LCSMLes mer
Overview The Lead Cloud Security Manager training course enables participants to develop the competence needed to implement and manage a cloud security program by following widely recognized best practices.The…
- Masterclass Internet Information Services Management AIISMLes mer
Overview Internet Information Services is a solution that can be delivered in a couple of hours as well as in 3 weeks – we practiced both options! IIS is…
- Masterclass Public Key Infrastructure Management PKINOK 46.000Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
Overview This 5 day course is considered essential for anyone who would like to expand knowledge about Public Key Infrastructure (PKI) in Microsoft technologies. During the course PKI is…
- Masterclass Secure Coding Techniques SCTLes mer
Overview Gartner reports states that over 70% of security vulnerabilities exist at the application layer. Industry standards including PCI DSS, NIST, FISMA are introducing requirements to comply with security…
- Masterclass: Administering and Configuring ADFS & Managing ADFS for Multiple Organizations ADFSLes mer
Overview This course will teach you the Active Directory Federation Services course and the Managing Active Directory Federation Services course.Included in the course:Active Directory Federation Services and Claims workshop…
- Masterclass: Administering and Configuring ADFS and Claims ADFNOK 34.000Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
Overview Active Directory Federation Services and Claims workshop is the best way to learn how to implement the most business oriented server role! Federated Identity and claims based applications…
- Masterclass: Hacking and Securing SQL Server HSSNOK 45.000Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
Overview In this course you will analyze, learn and practice critical tasks for implementing highly secure SQL Server infrastructure. We’ll start with identifying security needs regarding database servers and look at…
- Masterclass: Hacking and Securing Windows Infrastructure HSWLes mer
Overview This course combines two intensive courses that are focused on the security of a windows infrastructure, Part one covers the Hacking of a Windows Infrastructure and part 2 the Securing of…
- Masterclass: Managing Active Directory Federation Services for Multiple Organizations ADSNOK 30.000Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
Overview Multi organization ADFS is a perfect course if you need to implement ADFS across different organizations! Federated Identity is the most discussed topic in terms of organization cooperation…
- Masterclass: Managing Azure Active Directory from A to Z (ATZ) AADLes mer
Overview This advanced course will guide you through all aspects of deploying and managing Azure Active Directory (AAD) in an organization in a secure way. We will cover co-existence…
- Masterclass: Managing Microsoft Entra ID From A to Z (ATZ) ATZLes mer
Overview This advanced course will guide you through all aspects of administering and managing Entra ID in an organization in a secure way. We will cover co-existence with on-premises…
- Masterclass: Pentesting and Securing Mobile and Web Applications PTCMWLes mer
Overview The course teaches mobile and web application security concepts, including the techniques on how to attack and how to respond with an appropriate countermeasure implementation. Our course has…
- Masterclass: Red Team – Blue Team Operations RBOLes mer
Overview This is a deep dive course on Red Team – Blue Team Operations: The cyber kill chainSecurity is a business enabler, and it is only when it is…
- Masterclass: Windows Security and Infrastructure Management WSILes mer
Overview This is an international Live Virtual Class, which means you will share the learning experience in a group of IT pros from around the world! The class is…
- Microsoft Cybersecurity Architect (SC-100) M-SC100NOK 24.000Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
Overview Learn how to design and architect solutions using zero trust principles and specify security requirements for cloud infrastructure in different service models (SaaS, PaaS, IaaS).This is an advanced,…
- Microsoft Identity and Access Administrator (SC-300) M-SC300NOK 28.000Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
Overview Exclusive – The Microsoft Identity and Access Administrator course explores how to design, implement, and operate an organization’s identity and access management systems by using Microsoft Entra ID.Learn to…
- Microsoft Security Operations Analyst (SC-200) M-SC200NOK 28.000Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
Overview Learn how to investigate, respond to, and hunt for threats using Microsoft Sentinel, Microsoft Defender XDR and Microsoft Defender for Cloud. In this course you will learn how…
- NCSP Boot Camp Certification HPE_H0DV9SLes mer
Overview Digital Transformation • Explain what it means to “become digital”• Discuss the difference between industrial and digital era enterprises • Explain how cybersecurity…
- NCSP Practitioner Training HPE_H0DV8SLes mer
Overview Chapter 1: Course Introduction • Course organization • Setting the stageChapter 2: Digital Transformation • DX as a practitioner• DX in the context…
- NIS 2 Directive Foundation (PECB Certified) incl Exam NIS2-FLes mer
Overview The NIS 2 Directive Foundation training course outlines the essential insights necessary for understanding the requirements of NIS 2 Directive regarding cybersecurity measures. It provides the core concepts…
- NIS 2 Directive Lead Implementer (PECB Certified) incl Exam NIS2-LINOK 41.000Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
Overview The importance of robust cybersecurity measures cannot be overstated, as organizations are increasingly facing all types of cyberattacks. The NIS 2 Directive is a legislation that has been…
- Palo Alto Networks Prisma Access SSE: Configuration and Deployment PAN-PASSECDLes mer
Overview The Prisma Access SSE: Configuration and Deployment course introduces you to the operational deployment of Prisma Access Secure Access Service Edge (SASE) and how it helps organizations embrace…
- Palo Alto Networks: Cortex XDR: Investigation and Response (EDU-262) PAN-EDU-262NOK 20.850Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
Overview This instructor-led course teaches you how to use the Incidents pages of the Cortex XDR management console to investigate attacks. It explains causality chains, detectors in the Analytics…
- Palo Alto Networks: Cortex XDR Security Operations and Integration PAN-CXDRSOILes mer
Overview This 3-day instructor-led course provides in-depth training on Cortex XDR, Palo Alto Networks’ powerful extended detection and response platform. You will gain hands-on expertise in security operations, incident…
- Palo Alto Networks: Cortex XSIAM for Investigation and Analysis PAN-XSIAM-IALes mer
Overview XSIAM is the industry’s most comprehensive security incident and asset management platform, offering extensive coverage for securing and managing infrastructure, workloads, and applications cross multiple environments.Throughout this course,…
- Palo Alto Networks: Cortex XSOAR Engineering Security Automation Solutions PAN-CXSOARESASLes mer
Overview The Palo Alto Networks Cortex XSOAR: Engineering Security Automation Solutions course is a four-day instructor-led training with a blend of lectures and hands-on labs. This training will enable…
- Palo Alto Networks: Firewall Essentials: Configuration and Management (EDU-210) PAN-EDU-210NOK 41.500Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
Overview The Palo Alto Networks Firewall Essentials: Configuration and Management (EDU-210) course is five days of instructor led training that will help you to:- Configure and manage the essential…
- Palo Alto Networks: Firewall Troubleshooting (EDU-330) PAN-EDU-330NOK 32.000Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
Overview The Palo Alto Networks Firewall: Troubleshooting course is three days of instructor-led training that will help you to:- Use firewall tools, including the CLI, to investigate networking issues-…
- Palo Alto Networks: Panorama NGFW Management PAN-PNGFWMNOK 22.000Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
Overview The Palo Alto Networks Panorama: NGFW Management course is two days of instructor-led training that should help you to:- Learn how to configure and manage the next-generation Panorama…
- PAN-EDU-260 Palo Alto Networks: Cortex XDR :Prevention and Deployment (EDU-260)NOK 31.000Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
This instructor-led training enables you to prevent attacks on your endpoints. After an overview of the Cortex XDR components, the training introduces the Cortex XDR management console and demonstrates…
- Paragon Active Assurance for Automated WAN (PAAW) ARR_JUN_PAAWLes mer
Overview This two-day course provides the opportunity for students to develop the knowledge and skills required to configure, operate, monitor, and maintain Paragon Active Assurance deployments. The goal of the…
- Performing CyberOps Using Cisco Security Technologies CBRCORNOK 50.000Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
Overview The Performing CyberOps Using Cisco Security Technologies (CBRCOR) course guides you through cybersecurity operations fundamentals, methods, and automation. The knowledge you gain in this course will prepare you…
- QRadar EDR: Foundations TDS_BQ505GLes mer
Overview In this course, you learn about the IBM Security® QRadar® EDR architecture and how to position the product within your company’s landscape of security solutions. You gain skills…
- QRadar EDR: Integrating with QRadar SIEM TDS_BQ530GLes mer
Overview In this course you learn how to integrate QRadar EDR and SIEM by creating an API application in QRadar EDR and by adding a new log source in…
- QRadar SOAR: Foundations TDS_BQ405GLes mer
Overview In this course, you learn about the IBM Security® QRadar® SOAR architecture, and how to position the product in your company’s security architecture design. You gain hands-on experience…
- QRadar SOAR: Integrating with SIEM TDS_BQ430GLes mer
Overview In this couse, you learn about the IBM Security® QRadar® SIEM and QRadar SOAR apps that automate data exchange and improve the security incident investigation. You gain knowledge…
- QRadar SOAR: Integration with Microsoft Active Directory TDS_BQ440GLes mer
Overview Gain hands-on experience with the IBM Security® QRadar® SOAR platform. Learn how to integrate with Active Directory by using the LDAP and Active Directory Function for SOAR app…
- QRadar UBA: Detecting Insider Threats TDS_BQ610GLes mer
Overview Learn how to detect insider threats triggered by anomalous or malicious user behavior. Get ready to install, configure, and tune IBM Security® QRadar UBA and the Machine Learning…
- Red Hat Security: Identity Management and Authentication RH362Les mer
Overview Provide help to secure, centralized identity management services to coordinate user authentication and authorization with client systems, network services, and Windows domains.Course DescriptionRed Hat Security: Identity Management and…
- Red Hat Security: Identity Management and Authentication with Exam RH363Les mer
Overview Provide help to secure, centralized identity management services to coordinate user authentication and authorization with client systems, network services, and Windows domains.Course DescriptionRed Hat Security: Identity Management and…
- Red Hat Security: Linux in Physical, Virtual, and Cloud RH415Les mer
Overview Manage security of Red Hat Enterprise Linux systems deployed in bare-metal, virtual, and cloud environmentsRed Hat Security: Linux in Physical, Virtual, and Cloud (RH415) is designed for security…
- Red Hat Security: Linux in Physical, Virtual, and Cloud with Exam RH416Les mer
Overview Maintaining security of computing systems is a process of managing risk through the implementation of processes and standards backed by technologies and tools. In this course, you will…
- Securing Email with Cisco Email Security Appliance SESANOK 38.500Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
Overview Learn how to deploy and use Cisco® Email Security Appliance to establish protection for your email systems against phishing, business email compromise and ransomware. Help streamline email security policy management. This…
- Securing Cisco Networks with Open Source Snort SSFSNORTLes mer
Overview The Securing Cisco Networks with Open Source Snort course shows you how to deploy a network intrusion detection system based on Snort. Through a combination of expert instruction…
- Securing Cisco Networks with Snort Rule Writing Best Practices SSFRULESNOK 36.500Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
Overview Securing Cisco Networks with Snort Rule Writing Best Practices is a lab-intensive course that introduces users of open source Snort or Sourcegire FIRESIGHT systems to the Snort rules language and rule-writing best…
- Securing the Web with Cisco Web Security Appliance SWSANOK 24.500Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
Overview The Securing the Web with Cisco Web Security Appliance (SWSA) course shows you how to implement, use, and maintain Cisco® Web Security Appliance (WSA), powered by Cisco Talos,…
- ServiceNow Security Operations (SecOps) Fundamentals SNSOFLes mer
Overview Learn about the Security Incident Response, Vulnerability Response, and Threat Intelligence applications.This two-day course covers the foundational topics of the ServiceNow Security Operation suite. The Security Operations Suite…
- Troubleshooting BIG-IP v.17.1 ARR_F5N_BIG-TRBL-INT2Les mer
Overview This 2-day course gives network administrators, network operators, and network engineers a functional understanding of the BIG-IP system as it is commonly deployed in an application delivery network. The…
- Understanding Cisco Cybersecurity Operations Fundamentals CBROPSNOK 47.000Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
Overview The Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) course teaches you security concepts, common network and application operations and attacks, and the types of data needed to investigate security…
- Understanding Cisco Wireless Foundations WLFNDUNOK 42.000Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
Overview The Understanding Cisco Wireless Foundations (WLFNDU) course provides the knowledge and skills needed to configure, manage, and troubleshoot a Cisco wireless LAN (WLAN) network. Topics include understanding critical aspects of…
- Verify Access: Administration TDS_TW112GLes mer
Overview In this course, you learn about the IBM Verify Access architecture and deployment options and how to position the product within your organization’s landscape of security solutions. You…
- Verify Access: Deploy and Configure TDS_TW110GLes mer
Overview In this course, you learn about the IBM Security® Verify Access architecture and deployment options and how to position the product within your organization’s landscape of security solutions….
- Verify Access: PoPs- ACLs and Junctions TDS_TW111GLes mer
Overview In this course, you learn about the IBM Verify Access access control mechanisms, Reverse Proxy junctions, authentication methods, as well as logging, auditing, and troubleshooting. You gain skills around…