• 918 34 713
  • kurs@sgpartner.no
SG Partner AS
  • Kurs
  • Startgaranti
  • Sertifisering
  • Om oss
    • Betalingsbetingelser
    • Privacy Policy
  • Nyheter
  • Kontakt oss
  • Handlekurv
    • Min konto
  • Kurs
  • Startgaranti
  • Sertifisering
  • Om oss
    • Betalingsbetingelser
    • Privacy Policy
  • Nyheter
  • Kontakt oss
  • Handlekurv
    • Min konto

Security

Hjem Security

Viser 1–160 av 161 resultaterSortert etter propularitet

  • Implementing and Configuring Cisco Identity Services Engine Bootcamp
    NOK 48.000

    COURSE CONTENT: Introducing Cisco ISE Architecture • Introduction • Cisco ISE as a Network Access Policy Engine • Cisco ISE Use Cases • Cisco ISE Functions • Summary •…

    Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
  • Cisco Security Fundamentals

    COURSE CONTENT: Network Security Technologies • Defense-in-Depth Strategy • Defending Across the Attack Continuum • Network Segmentation and Virtualization Overview • Stateful Firewall Overview • Cisco IOS Zone-Based Policy…

    Les mer
  • CompTIA SecAI+ Certification Prep Course

    COURSE CONTENT: Module 1:  AI and Data Concepts for Cybersecurity Module 2:  Implementing Threat Modeling and Securing AI Systems Module 3:  Installing Access Controls for AI Module 4:  Distinguishing…

    Les mer
  • EC-Council Certified Responsible AI Governance & Ethics (CRAGE) + Exam voucher

    COURSE CONTENT: Module 01 AI Foundations and Technology Ecosystem Module 02 AI Concerns, Ethical Principles, and Responsible AI Module 03 AI Strategy and Planning Module 04 AI Governance and…

    Les mer
  • EC-Council Certified Offensive AI Security Professional (COASP) + Exam voucher

    COURSE CONTENT: Module 1 Offensive AI and AI System Hacking Methodology Module 2 AI Reconnaissance and Attack Surface Mapping Module 3 AI Vulnerability Scanning and Fuzzing Module 4 Prompt…

    Les mer
  • FortiOS Administrator

    COURSE CONTENT: Not available. Please contact.   TARGET AUDIENCE:  Not available. Please contact.   COURSE OBJECTIVE:  Not available. Please contact.     COURSE PREREQUISITES: Not available. Please contact.  …

    Les mer
  • Check Point Certified Troubleshooting Administrator (CCTA) R82 (includes 180 days lab access)

    COURSE CONTENT: Module 1: Introduction to Troubleshooting • Identify the principles of troubleshooting methodology. • Understand how to use the OSI (Open Systems Interconnection) model for cause isolation. •…

    Les mer
  • Check Point Certified Security Administrator (CCSA) & Troubleshooting Administrator (CCTA) Bundle R82 (includes 180 days lab access)
    NOK 42.000

    COURSE CONTENT: Not available. Please contact. TARGET AUDIENCE:  Not available. Please contact. COURSE OBJECTIVE:  Not available. Please contact. COURSE PREREQUISITES: Not available. Please contact. FOLLOW ON COURSES: Not available….

    Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
  • ISO/IEC 27035 Information Security Incident Management Lead Incident Manager (PECB Certified) – Including Exam

    COURSE CONTENT: • Day 1: Introduction to Information Security Incident Management concepts as recommended by ISO/IEC 27035 • Day 2: Designing and preparing an Information Security Incident Management plan • Day…

    Les mer
  • ISACA Advanced in AI Audit (AAIA)

    COURSE CONTENT: Domain 1: AI Governance and Risk AI Models, Considerations and Requirements • Types of AI • Machine Learning/AI Models • Algorithms • AI Life Cycle • Business…

    Les mer
  • Palo Alto Networks: Prisma Access Browser

    COURSE CONTENT: Module 1 – Prisma Access Browser Overview Module 2 – Architecture Module 3 – Policy Module 4 – Monitoring, Logging, and Troubleshooting Module 5 – Prisma Access…

    Les mer
  • ISACA Advanced in AI Security Management (AAISM)
    NOK 28.000

    COURSE CONTENT: 1. AI Governance and Program Management • Stakeholder Considerations, Industry Frameworks, and Regulatory Requirements • AI-related Strategies, Policies, and Procedures • AI Asset and Data Life Cycle…

    Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
  • Masterclass:Web Application Pentesting

    COURSE CONTENT: Not available. Please contact.   TARGET AUDIENCE:  Not available. Please contact.   COURSE OBJECTIVE:  Not available. Please contact.     COURSE PREREQUISITES: Not available. Please contact.  …

    Les mer
  • Check Point Certified Security Administrator (CCSA)

    COURSE CONTENT: Not available. Please contact.   TARGET AUDIENCE:  Not available. Please contact.   COURSE OBJECTIVE:  Not available. Please contact.     COURSE PREREQUISITES: Not available. Please contact.  …

    Les mer
  • FortiAnalyzer Analyst

    COURSE CONTENT: Not available. Please contact.   TARGET AUDIENCE:  Not available. Please contact.   COURSE OBJECTIVE:  Not available. Please contact.     COURSE PREREQUISITES: Not available. Please contact.  …

    Les mer
  • FortiManager Administrator

    COURSE CONTENT: Not available. Please contact.   TARGET AUDIENCE:  Not available. Please contact.   COURSE OBJECTIVE:  Not available. Please contact.     COURSE PREREQUISITES: Not available. Please contact.  …

    Les mer
  • Designing Cisco Security Infrastructure

    COURSE CONTENT: Definition and Purpose of Security Architecture • Security Architecture Components • Security Architecture in Modern Networks • Security Design Principles  Components of Security Infrastructure • Layers of…

    Les mer
  • Administering VELOS-F5OS

    COURSE CONTENT: Not available. Please contact.   TARGET AUDIENCE:  Not available. Please contact.   COURSE OBJECTIVE:  Not available. Please contact.     COURSE PREREQUISITES: Not available. Please contact.  …

    Les mer
  • Cybersecurity Specialization: Artificial Intelligence Risk Management Framework
    NOK 24.000

    COURSE CONTENT: 1- Introduction to AI Risk Management and Global Frameworks   • Introduction to AI Risk Management     • Overview of Key Global AI Frameworks   • Mapping Global Frameworks to…

    Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
  • Palo Alto Networks: Cortex XSOAR Engineering Security Automation Solutions

    COURSE CONTENT: Course Modules 0 – Course Introduction1 – XSOAR Overview2 – Incident Management3 – Threat Intelligence4 – Analyst Investigations5 – Dashboards, Reports, and Timers6 – Integrations and Content…

    Les mer
  • Check Point Deployment Administrator (CPDA) R82 (includes 180 days’ lab access)
    NOK 22.500

    COURSE CONTENT: Module 1: Introduction to Quantum Security  • Identify the primary components of a Check Point Three-Tier Architecture and explain how they work together in the Check Point…

    Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
  • Check Point Certified Security Expert (CCSE) R82 (includes 180 days’ lab access)
    NOK 25.000

    COURSE CONTENT: Module 1: Management High Availability ·       Explain the purpose of Management High Availability. ·       Identify the essential elements of Management High Availability. Lab Tasks ·       Deploy and…

    Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
  • Check Point Certified Security Administrator (CCSA) R82 (includes 180 days’ lab access)
    NOK 25.000

    COURSE CONTENT: Module 1: Introduction to Quantum Security  • Identify the primary components of the Check Point Three-Tier Architecture and explain how they work together in the Check Point…

    Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
  • Palo Alto Networks: Cortex XDR Security Operations and Integration

    COURSE CONTENT: • Course Overview • Overview of Cortex XDR • Software Components • Integrations • XQL • Detection Engineering • System Optimization • Dashboards and Reports   TARGET…

    Les mer
  • IBM Verify: Adoption

    COURSE CONTENT: Verify architecture and sizing This unit introduces the architecture, core features, and extensibility of IBM Verify. It covers key capabilities such as single sign-on (SSO), multi-factor authentication…

    Les mer
  • Protect sensitive information with Microsoft Purview in the AI era (SC-401)
    NOK 28.000

    COURSE CONTENT: Module 1: Implement Microsoft Purview Information Protection • Protect sensitive data in a digital world • Classify data for protection and governance • Review and analyze data…

    Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
  • Palo Alto Networks: Panorama NGFW Management
    NOK 22.000

    COURSE CONTENT: Course Modules 1 – Initial Configuration 2 – Adding Firewalls 3 – Templates 4 – Device Groups 5 – Log Collection and Forwarding 6 – Using Panorama…

    Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
  • Defend against cyberthreats with Microsoft Defender XDR (SC-5004)

    COURSE CONTENT: Module 1: Mitigate incidents using Microsoft Defender • Introduction • Use the Microsoft Defender portal • Manage incidents • Investigate incidents • Manage and investigate alerts •…

    Les mer
  • Masterclass: Windows Security and Infrastructure Management

    COURSE CONTENT: Module 1: Windows Internals & System Architecture a) Introduction to the Windows 10 and Windows Server 2019 security concepts b) Architecture overview and terms c) Key System…

    Les mer
  • Verify Access: PoPs- ACLs and Junctions

    COURSE CONTENT: • Managing access control • Explain the object space and the protected objects concept • Control access to the protected objects by using Access Control List (ACL)…

    Les mer
  • Verify Access: Deploy and Configure

    COURSE CONTENT: IBM Security Verify Access introduction • Understand the business context for identity and access management • Discuss the features and functions of IBM Security Verify Access Architecture…

    Les mer
  • IBM zSecure Audit Rule-based Compliance Evaluation and Customization

    COURSE CONTENT: Unit 1: Rule-based compliance introduction and concepts Unit 2: Running compliance evaluations and interpret results Unit 3: Customizing compliance standards, rules, or tests   TARGET AUDIENCE:  The…

    Les mer
  • IBM zSecure Admin Basic Administration and Reporting

    COURSE CONTENT: Unit 1: Run IBM Security zSecure Admin Unit 2: Select and display existing RACF profiles Unit 3: Perform profile maintenance Unit 4: Use Advanced options Unit 5:…

    Les mer
  • IBM zSecure RACF Management Workshop

    COURSE CONTENT: • Set up a RACF security environment for a hypothetical company based on their security policies and guidelines • Create and refresh the IBM Security zSecure Admin…

    Les mer
  • IBM zSecure RACF and SMF Auditing

    COURSE CONTENT: Unit 1: Introduction to RACF auditing Unit 2: Auditing user IDs and passwords Unit 3: Auditing sensitive resources Unit 4: Auditing subsystems Unit 5: Auditing SMF Unit…

    Les mer
  • IBM zSecure CARLa Auditing and Reporting Language

    COURSE CONTENT: Unit 1: Introduction and the CARLa interface Unit 2: CARLa SELECT, SORTLIST, and DEFINE statements Unit 3: Frequently used CARLa functions Unit 4: NEWLIST and SUMMARY options…

    Les mer
  • Securing Windows Infrastructure

    COURSE CONTENT: Not available. Please contact.   TARGET AUDIENCE:  Not available. Please contact.   COURSE OBJECTIVE:  Not available. Please contact.     COURSE PREREQUISITES: Not available. Please contact.  …

    Les mer
  • Designing and Implementing Secure Cloud Access for Users and Endpoints

    COURSE CONTENT: Certificate-Based User and Device Authentication • PKI Overview • PKI Operations • User versus Machine or Device-Based Certificates • 802.1X and EAP Methods • Cisco ISE Certificate Services…

    Les mer
  • Red Hat Security: Linux in Physical, Virtual, and Cloud with Exam

    COURSE CONTENT: • Manage security and risk: Define strategies to manage security on Red Hat Enterprise Linux servers. • Automate configuration and remediation with Ansible: Remediate configuration and security…

    Les mer
  • Red Hat Security: Identity Management and Authentication with Exam

    COURSE CONTENT: • Identity Management in Red Hat Enterprise Linux Introduce Identity Management in Red Hat Enterprise Linux (IdM) and its high-level architecture. • Identity Management Core Technologies Review…

    Les mer
  • Masterclass: Red Team – Blue Team Operations

    COURSE CONTENT: Module 1: Identifying Areas of Vulnerability • Defining the assets which your company needs to protect • Defining the other sensitive information that needs to be protected…

    Les mer
  • Masterclass: Pentesting and Securing Mobile and Web Applications

    COURSE CONTENT: Module 1: OWASP Top 10 Application Security Risks • Injection • Broken Authentication • Sensitive Data Exposure • XXE • Broken Access Control • Security Misconfiguration •…

    Les mer
  • NIS 2 Directive Foundation (PECB Certified) – Including Exam

    COURSE CONTENT: • Day 1: Introduction to fundamental concepts and definitions of NIS 2 Directive • Day 2: NIS 2 Directive requirements for the implementation of a cybersecurity program    …

    Les mer
  • Lead Cloud Security Manager (PECB Certified) – Including Exam

    COURSE CONTENT: Day 1: Introduction to ISO/IEC 27017 and ISO/IEC 27018 and the initiation of a cloud security program • Training course objectives and structure • Standards and regulatory…

    Les mer
  • ISO/IEC 27002 Information Security Controls Manager (PECB Certified) – Including Exam

    COURSE CONTENT: • Day 1: Introduction to ISO/IEC 27002 • Day 2: Information assets, people controls, physical controls, and operational security controls • Day 3: Information security incident management and monitoring of…

    Les mer
  • ISO/IEC 27002 Information Security Controls Lead Manager (PECB Certified) – Including Exam

    COURSE CONTENT: • Day 1: Introduction to ISO/IEC 27002 • Day 2: Information security roles and responsibilities, people controls, and physical controls • Day 3: Information security assets, access controls, and protection…

    Les mer
  • ISO/IEC 27002 Information Security Controls Foundation (PECB Certified) – Including Exam

    COURSE CONTENT: • Day 1: Introduction to ISO/IEC 27002 and Information Security Management System • Day 2: ISO/IEC 27002 Controls and Certificate Exam   TARGET AUDIENCE:   • Individuals…

    Les mer
  • EXIN Information Security Management Professional based on ISO/IEC 27001 – Including Exam

    COURSE CONTENT: Information security perspectives: the perspectives of the business, the customer, and the service providerRisk Management: Analysis of the risks, choosing controls, dealing with remaining risksInformation security controls:…

    Les mer
  • ISO/IEC 27032 Lead Cybersecurity Manager (PECB certified) + exam

    COURSE CONTENT: • Day 1: Introduction to Cybersecurity and related concepts as recommended by ISO/IEC 27032 • Day 2: Cybersecurity policies, risk management and attack mechanisms • Day 3: Cybersecurity controls, information…

    Les mer
  • Installing and Configuring ArcSight Platform

    COURSE CONTENT: Not available. Please contact.   TARGET AUDIENCE:   Security Professionals and SOC Administrators, who are responsible for deploying and administrating the ArcSight Platform within their environment  …

    Les mer
  • HPE Security Governance and Policies

    COURSE CONTENT: hl948s.pdf (hpe.com)   TARGET AUDIENCE:  Not available. Please contact.   COURSE OBJECTIVE:  Not available. Please contact.     COURSE PREREQUISITES: HPE Security Foundation (HL945S), or equivalent knowledge,…

    Les mer
  • Information Security Risk Management and Business Continuity Planning

    COURSE CONTENT: Module 1: Mapping risk management and continuity planning to your business • Describe riskmanagement • Discuss the relationship between security, businesscontinuity management and risk management • Define…

    Les mer
  • NCSP Boot Camp Certification

    COURSE CONTENT: H0DV9S (hpe.com)   TARGET AUDIENCE:   • Candidates looking to pursue a career incybersecurity  • IT, cybersecurity and digital transformationdesign and implementation engineers  • IT, cybersecurity and…

    Les mer
  • NCSP Practitioner Training

    COURSE CONTENT: H0DV8S (hpe.com)   TARGET AUDIENCE:     • Candidates looking to pursue a career in cybersecurity • IT, cybersecurity and digital transformation design andimplementation engineers • IT,…

    Les mer
  • Implementing Aruba Network Security

    COURSE CONTENT: Aruba Security Strategy & ClearPass Fundamentals • Explain Aruba Zero Trust Security • Explain how Aruba solutions apply to different security vectors Deploy Trusted Certificates to Aruba…

    Les mer
  • Cybersecurity Specialization: Threat Modeling
    NOK 23.000

    COURSE CONTENT: Introduction to Advanced Threat ModelingReview of STRIDE, PASTA, and VAST in complex contextsIntegrating threat modeling with attack trees, attack vectors, and data flow analysisThreat modeling for large-scale…

    Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
  • Infoblox NIOS DDI Troubleshooting

    COURSE CONTENT: • Troubleshooting Basics in NIOS • DNS Troubleshooting Methodology • DHCP Troubleshooting Methodology • Describing DHCPv4 Failover • Troubleshooting DHCPv4 Failover in NIOS   Exam not included….

    Les mer
  • Infoblox NIOS DDI Operator & Administrator Bundle

    COURSE CONTENT: NIOS DDI OPERATOR• NIOS Grid Overview• Using the NIOS Grid Manager UI• NIOS DHCP Service Overview• Managing NIOS DHCP Objects• Using NIOS Extensible Attributes and Smart Folders•…

    Les mer
  • Forescout Certified Associate (FSCA)

    COURSE CONTENT: Day One • Chapter 1: Introduction A brief introduction to ForeScout’s vision and concepts of Network Access Control. • Chapter 2: Terms and Architecture This lesson introduces…

    Les mer
  • Cybersecurity Maturity Model Certification (CMMC) Certified Professional (PECB Certified) – Including Exam

    COURSE CONTENT: • Day 1: Introduction to CMMC stakeholders, ecosystem, references, FCI, and CUI • Day 2: CUI protection, CMMC model, domains, and CMMC levels 1 and 2 •…

    Les mer
  • Cybersecurity Maturity Model Certification (CMMC) Foundations (PECB Certified) – Including Exam

    COURSE CONTENT: • Day 1: Introduction to the CMMC ecosystem and the CMMC model • Day 2: CMMC practices, assessment process, and code of professional conduct   TARGET AUDIENCE:…

    Les mer
  • Cybersecurity Masterclass: Managing and Defending Against Current Threats

    COURSE CONTENT: Module 1: Identifying Areas of Vulnerability This part introduces the new cybersecurity challenges and trends, emphasizing on data security and integration through and into the cloud and…

    Les mer
  • EC-Council Certified Application Security Engineer (CASE) Java Certified Application Security Engineer (CASE) . Net + Exam voucher

    COURSE CONTENT: Understanding Application Security, Threats and Attacks • What is a Secure Application • Need for Application Security • Most Common Application Level Attacks • Why Applications become Vulnerable to…

    Les mer
  • EC-Council Certified Application Security Engineer (CASE) Java + Exam voucher

    COURSE CONTENT: Understanding Application Security, Threats and Attacks • What is a Secure Application • Need for Application Security • Most Common Application Level Attacks • Why Applications become…

    Les mer
  • Paragon Active Assurance for Automated WAN (PAAW)

    COURSE CONTENT: Day 1 Course Introduction PAA Solution Components • PAA Overview • Passive and Active Monitoring • Use Cases Test Agent Architecture • Test Agents Overview • Appliance…

    Les mer
  • Junos Troubleshooting (JT)

    COURSE CONTENT: Day 1 Course Introduction  Junos Product Families  • Describe the architectural philosophy of devices that run the Junos OS and understand how this relates to troubleshooting  •…

    Les mer
  • Deploying Junos Subscriber Management (JSM)

    COURSE CONTENT: Day 1 Course Introduction Introduction to Subscriber Management • Overview and Terminology • Broadband Access Network Design and Concepts • Configuration and Operational Flow • Software Licensing…

    Les mer
  • Junos Space Essentials (JSE)

    COURSE CONTENT: Day 1 Course Introduction Introduction to Junos Space • Junos Space Overview • Junos Space Architecture • Junos Space Applications • Junos Space Features Junos Space Deployment …

    Les mer
  • Junos Space-Security Director (JS-SD)

    COURSE CONTENT: Day 1 Course Introduction  Introduction to Security Director  • Security Director Overview  • Navigating the Security Director Application  • Device Support  • Basic Device Configuration and Setup …

    Les mer
  • Junos Space Network Director (JS-ND)

    COURSE CONTENT: Day 1 Course Introduction  Working with Network Director  • Network Director Overview  • Network Director Views  • Network Director Modes  Lab 1: Working with Network Director Managing…

    Les mer
  • Junos Class of Service (JCOS)

    COURSE CONTENT: DAY 1 Course Introduction CoS Overview • CoS History and Evolution • CoS and DiffServ • CoS Fields in Packet Headers • CoS Processing  Packet Classification •…

    Les mer
  • Deploying Juniper Security in AWS and Azure (JCNAA)

    COURSE CONTENT: DAY 1 Course Introduction Cloud Overview • Cloud Concepts • Cloud Virtualization • Cloud Security   Introduction to AWS • Describe AWS architecture • Access the AWS…

    Les mer
  • Introduction to Juniper Mist AI (IJMA)

    COURSE CONTENT: Day 1 1 Introduction to Juniper Mist • Outline Juniper Mist • Describe Marvis and Marvis Minis • Define Juniper Mist full stack • Outline Juniper Mist…

    Les mer
  • Advanced Junos Troubleshooting (AJT)

    COURSE CONTENT: Day 1 Introduction  Troubleshooting OSPF  • Troubleshoot OSPF adjacencies  • Troubleshoot OSPF inconsistencies  Lab 1: Troubleshooting OSPF  Troubleshooting IS-IS  • Troubleshoot IS-IS adjacencies  Lab 2: Troubleshooting IS-IS …

    Les mer
  • Configuring BIG-IQ v.7.1

    COURSE CONTENT: Day 1: 1Introducing BIG-IQ Build the BIG-IQ system. Perform the initial setup, licensing and configuration, then connect it to the network so it’s ready for use. 2Setting…

    Les mer
  • Configuring BIG-IQ

    COURSE CONTENT: Not available. Please contact.   TARGET AUDIENCE:  Not available. Please contact.   COURSE OBJECTIVE:  Not available. Please contact.     COURSE PREREQUISITES: Not available. Please contact.  …

    Les mer
  • Configuring F5 Advanced WAF (previously licensed as ASM)

    COURSE CONTENT: Not available. Please contact.   TARGET AUDIENCE:  Not available. Please contact.   COURSE OBJECTIVE:  Not available. Please contact.     COURSE PREREQUISITES: Not available. Please contact.  …

    Les mer
  • Configuring BIG-IP Advanced WAF Web Application Firewall 17.5

    COURSE CONTENT: Chapter 1: Introducing the BIG-IP System • Initially Setting Up the BIG-IP System • Archiving the BIG-IP System Configuration • Leveraging F5 Support Resources and Tools Chapter…

    Les mer
  • Automating BIG-IP with AS3 v.1.7

    COURSE CONTENT: Chapter 1: Linux Command Line Review •Navigating the Linux File System •Creating and Deleting Files and Directories •Copying and Moving Files •Command Line Auto-Completion and Editing •Tools…

    Les mer
  • Automating BIG-IP with Ansible v.1.7

    COURSE CONTENT: Chapter 1: Linux Command Line Review •Navigating the Linux File System •Creating and Deleting Files and Directories •Copying and Moving Files •Command Line Auto-Completion and Editing •Tools…

    Les mer
  • Configuring BIG-IP AFM Advanced Firewall Manager v.17.1

    COURSE CONTENT: Chapter 1: Setting up the BIG-IP System  • Introducing the BIG-IP System • Initially Setting Up the BIG-IP System • Archiving the BIG-IP System Configuration • Leveraging…

    Les mer
  • Masterclass: Administering and Configuring ADFS & Managing ADFS for Multiple Organizations

    COURSE CONTENT: ADF Module 1 • Introduction • What are Claims • Dynamic Access Control • LAB: Dynamic Access Control in 2016 • LAB (optional): DAC and Groups Module…

    Les mer
  • Masterclass: Managing Azure Active Directory from A to Z (ATZ)

    COURSE CONTENT: Module 1 • Introduction to Azure Active Directory Module 2 • Administration of users and groups • Azure AD Security Settings • Azure PowerShell • Licensing, Azure…

    Les mer
  • Palo Alto Networks: Cortex XSIAM for Investigation and Analysis

    COURSE CONTENT: Course Modules 1- Introduction to Cortex XSIAM 2- Endpoints 3- XQL 4- Alerting and Detection 5- Threat Intel Management 6- Automation 7- Attack Surface Management 8- Incident…

    Les mer
  • Palo Alto Networks Prisma Access SSE: Configuration and Deployment

    COURSE CONTENT: • Prisma SASE • Prisma Access Architecture • Strata Cloud Manager • Licensing and Activation • Service Connections • Remote Networks • Mobile Users • Prisma Access…

    Les mer
  • Verify Access: Administration

    COURSE CONTENT: Architecture and deployment • Describe the components • Understand the deployment options • Install and configure Verify Access in a containerized environment • Install and configure Verify…

    Les mer
  • IBM zSecure UNIX System Services (USS) Security Overview

    COURSE CONTENT: Unit 1: UNIX System Services security introduction Unit 2: Protect files and directories Unit 3: Report and audit UNIX System Services   TARGET AUDIENCE:   This intermediate-level course…

    Les mer
  • IBM Guardium Data Protection Fundamentals

    COURSE CONTENT: Unit 1: Guardium overview Unit 2: Guardium architecture Unit 3: Guardium user interfaces Unit 4: Access management Unit 5: Guardium groups Unit 6: System management Unit 7:…

    Les mer
  • Basics of z/OS RACF Administration

    COURSE CONTENT: • Review of z/Architecture, and z/O • An introduction to TSO/E and ISPF/PDF • An introduction to z/OS data sets • Batch processing • Security and RACF…

    Les mer
  • QRadar UBA: Detecting Insider Threats

    COURSE CONTENT: Unit 1: Architecture and Overview Unit 2: Setup • Installation • Configuration • User Import • Machine Learning configuration Unit 3: Tuning Unit 4: An overview to…

    Les mer
  • QRadar EDR: Integrating with QRadar SIEM

    COURSE CONTENT: Unit 1: Integrating with QRadar SIEM • Configure an API application in QRadar EDR • Install a new log source in QRadar SIEM • Configure the correct…

    Les mer
  • QRadar EDR: Foundations

    COURSE CONTENT: Getting started • Dashboard overview • Architecture • QRadar EDR on-prem installation • Downloading, installing, and updating the QRadar EDR Agent Protecting your endpoints • Investigating threats…

    Les mer
  • IBM QRadar SIEM Advanced Topics

    COURSE CONTENT: Unit 1: Custom log sources Unit 2: Reference data collections and custom rules Unit 3: IBM X-Force Threat Intelligence in QRadar Unit 4: User Behavior Analytics and…

    Les mer
  • IBM QRadar SIEM Foundations

    COURSE CONTENT: Topics • Unit 0: IBM Security QRadar 7.5 – Fundamentals • Unit 1: QRadar Architecture • Unit 2: QRadar UI – Overview • Unit 3: QRadar –…

    Les mer
  • Effective RACF Administration

    COURSE CONTENT: Day 1 • Welcome • Unit 1 – Security and RACF overview • Unit 2 – Administering groups and users • Exercise 1 – Log on to…

    Les mer
  • Cisco DoD Comply-to-Connect
    NOK 51.000

    COURSE CONTENT: C2C Fundamentals • Comply to Connect • From C2C to ZTA • Steps to Implement C2C Cisco Identity-Based Networking Services • Cisco IBNS Overview • AAA Role…

    Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
  • Citrix NetScaler ADC 14.x Advanced Features (Security and Management)
    NOK 44.000

    COURSE CONTENT: Module 1: Introduction to WAF • The Business Problem • Industry Standards • Protection Methodologies • Introducing NetScaler Web App Firewall Module 2: WAF Profiles, Policies, Monitoring…

    Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
  • Check Point Threat Prevention Specialist (CTPS) R81_20

    COURSE CONTENT: Module 1: History of Threat Prevention Lab Tasks • Verify the Security Environment • Verify Connectivity Between Systems Module 2: IPS Protections Lab Tasks • Enable and…

    Les mer
  • Cisco Secure Workload Firewall Enforcement Agents, Data Flow Mapping, and Advanced Policy Deployment
    NOK 51.000

    COURSE CONTENT: Module 1: Cisco Secure Workload Firewall Agent • How the Cisco Secure Workload Firewall Agent Enforces Firewall Rules • Deploying and Managing Linux Enforcement Agents • Deploying…

    Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
  • Masterclass: Managing Microsoft Entra ID From A to Z (ATZ)

    COURSE CONTENT: Module 1: Entra ID Intro 1. Introduction to Entra ID Module 2: Object Management 1. Administration of users and groups 2. Entra ID Security Settings 3. Azure…

    Les mer
  • Advanced Techniques for Cisco Firewall Threat Defense and Intrusion Prevention
    NOK 48.000

    COURSE CONTENT: Introducing Cisco Secure Firewall Threat Defense • Firewall Functionality • Cisco Secure Firewall Platform • Use Cases • Deployment Options • Management Options • Basic Network Settings…

    Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
  • NIS 2 Directive Lead Implementer (PECB Certified) – Including Exam
    NOK 41.000

    COURSE CONTENT: • Day 1: Introduction to NIS 2 Directive and initiation of the NIS 2 Directive implementation • Day 2: Analysis of NIS 2 Directive compliance program, asset management, and…

    Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
  • FortiGate Administrator
    NOK 39.500

    COURSE CONTENT: 1.System and Network Settings  2.Firewall Policies and NAT  3.Routing  4.Firewall Authentication  5.Fortinet Single Sign-On (FSSO)  6.Certificate Operations  7.Antivirus  8.Web Filtering  9.Intrusion Prevention and Application Control  10.SSL VPN …

    Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
  • Masterclass Internet Information Services Management

    COURSE CONTENT: Module 1: Introducing, installing and configuring IIS 10 on Windows Server 2019 1. Introducing Internet Information Services 10 a. Administration tools b. Architecture overview c. Configuration System…

    Les mer
  • Check Point Certified Harmony Endpoint Specialist (CCES) R81.20
    NOK 23.000

    COURSE CONTENT: Topics Introduction to Harmony Endpoint  Harmony Endpoint Security Management  Deploying Harmony Endpoint  Data Security Protection Advanced Threat Prevention Large-Scale Harmony Endpoint Deployment Troubleshooting Harmony Endpoint Management as…

    Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
  • Understanding Cisco Wireless Foundations
    NOK 42.000

    COURSE CONTENT: Module 1: RF and WLAN Theory  Module 2: WLAN Math and Antennas  Module 3: Wi-Fi Operations  Module 4: Basic WLAN Security  Module 5: Advanced WLAN Security  Module…

    Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
  • Securing the Web with Cisco Web Security Appliance
    NOK 24.500

    COURSE CONTENT: Cisco WSA Overview • Technology Use Case • Cisco WSA Solution • Cisco WSA Features • Cisco WSA Architecture • Proxy Service • Integrated Layer 4 Traffic…

    Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
  • Implementing Secure Solutions with Virtual Private Networks
    NOK 48.000

    COURSE CONTENT: Introducing VPN Technology Fundamentals • Role of VPNs in Network Security • VPNs and Cryptography Implementing Site-to-Site VPN Solutions • Site-to-Site VPN Solutions Overview • Cisco IOS…

    Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
  • Securing Cisco Networks with Open Source Snort

    COURSE CONTENT: Snort Technology Introduction • Snort Basics • Snort Resources Snort Installation • Installation Prerequisites • Performing the Snort Installation Snort Operation Introduction • Running Snort from the…

    Les mer
  • Securing Cisco Networks with Snort Rule Writing Best Practices
    NOK 36.500

    COURSE CONTENT: Module 1: Welcome to the Cisco and Sourcefire Virtual Network Module 2: Basic Rule Syntax and Usage Module 3: Rule Optimization Module 4: Using Perl Compatible Regular…

    Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
  • ServiceNow Security Operations (SecOps) Fundamentals

    COURSE CONTENT: Security Operations Overview • Current State of Security and Security Operations Maturity Levels • Introducing ServiceNow Security Operations • Essential Platform and Security Administration Concepts • Security…

    Les mer
  • Fundamentals of Cisco Firewall Threat Defense and Intrusion Prevention
    NOK 49.000

    COURSE CONTENT: Introducing Cisco Secure Firewall Threat Defense • Need for a Firewall • Traditional Network Security and the New Reality • Cisco Secure Portfolio • Cisco Secure Firewall…

    Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
  • Securing Email with Cisco Email Security Appliance
    NOK 38.500

    COURSE CONTENT: Describing the Cisco Email Security Appliance • Cisco Email Security Appliance Overview • Technology Use Case • Cisco Email Security Appliance Data Sheet • SMTP Overview •…

    Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
  • Implementing Cisco SD-WAN Security and Cloud Solutions
    NOK 36.000

    COURSE CONTENT: Introducing Cisco SD-WAN Security • Cisco SD-WAN Security Overview • Cisco SD-WAN Platform • Cisco SD-WAN Security Types Deploying On-Premises Threat Prevention • Cisco SD-WAN Integrated Security…

    Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
  • Masterclass Secure Coding Techniques

    COURSE CONTENT: We will spend most of our time talking about securing ASP.NET applications and issues frequently observed. You will learn about OWASP TOP 10 – most critical web…

    Les mer
  • Implementing and Operating Cisco Security Core Technologies
    NOK 48.000

    COURSE CONTENT: Network Security Technologies • Defense-in-Depth Strategy • Defending Across the Attack Continuum • Network Segmentation and Virtualization Overview • Stateful Firewall Overview • Cisco IOS Zone-Based Policy…

    Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
  • Red Hat Security: Linux in Physical, Virtual, and Cloud

    COURSE CONTENT: Manage security and risk • Define strategies to manage security on Red Hat Enterprise Linux servers. Automate configuration and remediation with Ansible • Remediate configuration and security…

    Les mer
  • Red Hat Security: Identity Management and Authentication

    COURSE CONTENT: • Identity Management in Red Hat Enterprise Linux Introduce Identity Management in Red Hat Enterprise Linux (IdM) and its high-level architecture. • Identity Management Core Technologies Review…

    Les mer
  • Masterclass Public Key Infrastructure Management
    NOK 46.000

    COURSE CONTENT: Module 1: Essence of PKI • Cryptography basics • Fundamentals of PKI • Certificate types (?X.509)? • Certification authorities • Certificate Revocation Lists Module 2: Designing and Implement…

    Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
  • Palo Alto Networks: Firewall Troubleshooting (EDU-330)
    NOK 32.000

    COURSE CONTENT: Course Modules 1 – Tools and Resources 2 – Flow Logic 3 – Packet Captures 4 – Packet-Diagnostics Logs 5 – Host-Inbound Traffic 6 – Transit Traffic…

    Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
  • Palo Alto Networks: Firewall Essentials: Configuration and Management (EDU-210)
    NOK 41.500

    COURSE CONTENT: Course Modules 1 – Palo Alto Networks Portfolio and Architecture 2 – Configuring Initial Firewall Settings 3 – Managing Firewall Configurations 4 – Managing Firewall Administrator Accounts…

    Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
  • Introduction to Microsoft Security, Compliance, and Identity
    NOK 9.900

    COURSE CONTENT: Module 1: Microsoft Security, Compliance, and Identity Fundamentals: Describe the concepts of security, compliance, and identity • Describe security and compliance concepts • Describe identity concepts Module…

    Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
  • Microsoft Identity and Access Administrator (SC-300)
    NOK 28.000

    COURSE CONTENT: Module 1 : Explore identity in Microsoft Entra ID • Define common identity terms and explain how they’re used in the Microsoft Cloud • Explore the common…

    Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
  • Defend against cyberthreats with Microsoft’s security operations platform (SC-200)
    NOK 28.000

    COURSE CONTENT: SC-200: Mitigate threats using Microsoft Defender XDR • Introduction to Microsoft Defender XDR threat protection • Mitigate incidents using Microsoft 365 Defender • Protect your identities with…

    Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
  • Microsoft Cybersecurity Architect (SC-100)
    NOK 24.000

    COURSE CONTENT: Module 1:  Design solutions that align with security best practices and priorities • Introduction to Zero Trust and best practice frameworks • Design security solutions that align…

    Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
  • ISO/IEC 27001 Information Security Management System Lead Implementer (PECB Certified) – Including Exam
    NOK 39.000

    COURSE CONTENT: • Introduction to ISO/IEC 27001 and initiation of an ISMS • Plan the implementation of an ISMS • Implementation of an ISMS • ISMS monitoring, measurement, continuous…

    Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
  • ISO/IEC 27001 Lead Auditor (PECB certified) + exam
    NOK 39.000

    COURSE CONTENT: Day 1: Introduction to Information Security Management Systems (ISMS) and ISO/IEC 27001  • Training Course Objectives and Structure • Standards and Regulatory Frameworks • Certification Process • Fundamental…

    Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
  • ISO/IEC 27001 Information Security Management System Foundation (PECB Certified) – Including Exam
    NOK 17.500

    COURSE CONTENT: Day 1: Introduction to Information Security Management System (ISMS) concepts as required by ISO/IEC 27001 Day 2: Information Security Management System requirements and Certification Exam   TARGET…

    Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
  • EXIN Information Security Foundation based on ISO/IEC 27001 – Including Exam
    NOK 18.500

    COURSE CONTENT: • Information and security • Threats and risks • Approach and organization • Measures • Legislation and regulation   TARGET AUDIENCE:   This foundation-level certification is suitable…

    Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
  • Masterclass: Hacking and Securing Windows Infrastructure

    COURSE CONTENT: Module 1: Hacking Windows Platform • Detecting unnecessary services • Misusing service accounts • Implementing rights, permissions and privileges • Direct Kernel Object Modification Module 2: Top…

    Les mer
  • Masterclass: Hacking and Securing SQL Server
    NOK 45.000

    COURSE CONTENT: Module 1: Hacking SQL Server Infrastructure • Discovering SQL Server instances • SQL injection using men in the middle • Capturing SQL credentials using men in the…

    Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
  • AWS Jam – Security Engineering

    COURSE CONTENT: – Hands-on format, putting learners in the driver’s seat to make decisions and solve problems in an active AWS Cloud environment to amplify understanding – Challenges based…

    Les mer
  • CompTIA SecurityX Certification Prep Course
    NOK 39.500

    COURSE CONTENT: Module 1: Introduction • Preassessment Module 2: Summarizing Governance Risk and Compliance • Implement Appropriate Governance Components • Explain Legal Compliance • Apply Risk Management Strategies Module…

    Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
  • Implementing and Troubleshooting Networks using Cisco ThousandEyes
    NOK 41.500

    COURSE CONTENT: Introduction to Cisco ThousandEyes • Cisco ThousandEyes Visibility • How Cisco ThousandEyes Does It • Cisco ThousandEyes Cloud Agents • Cisco ThousandEyes Enterprise Agents • Cisco ThousandEyes…

    Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
  • EC-Council Certified Encryption Specialist (ECES) + Exam voucher
    NOK 27.000

    COURSE CONTENT: Types of Encryption Standards and their differencesHow to select the best standard for your organizationHow to enhance your pen-testing knowledge in encryptionCorrect and incorrect deployment of encryption…

    Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
  • EC-Council Certified SOC Analyst (CCSA) + Exam voucher
    NOK 24.000

    COURSE CONTENT: SOC Essential Concepts • Computer Network Fundamentals • TCP/IP Protocol Suite • Application Layer Protocols • Transport Layer Protocols • Internet Layer Protocols • Link Layer Protocols…

    Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
  • EC-Council Certified Threat Intelligence Analyst + Exam voucher
    NOK 28.000

    COURSE CONTENT: Introduction to Threat Intelligence • Understanding Intelligence • Understanding Cyber Threat Intelligence • Overview of Threat Intelligence Lifecycle and Frameworks Cyber Threats and Kill Chain Methodology •…

    Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
  • EC-Council Certified Secure Computer User (CCSU) + Exam voucher
    NOK 16.000

    COURSE CONTENT: Introduction to SecuritySecuring Operating SystemsMalware and AntivirusInternet SecuritySecurity on Social Networking SitesSecuring Email CommunicationsSecuring Mobile DevicesSecuring the CloudSecuring Network ConnectionsData Backup and Disaster Recovery   TARGET AUDIENCE:…

    Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
  • BCS Certificate in Information Security Management Principles (CISMP) – Including Exam
    NOK 32.000

    COURSE CONTENT:  1.  Information Security Management Principles – 10% • 1.1 Concepts and definitions • 1.2 The need for & benefits of Information Security 2.  Information Risk – 10%…

    Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
  • Understanding Cisco Cybersecurity Operations Fundamentals
    NOK 47.000

    COURSE CONTENT: Defining the Security Operations Center • Types of Security Operations Centers • SOC Analyst Tools • Data Analytics • Hybrid Installations: Automated Reports, Anomaly Alerts • Staffing…

    Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
  • Performing CyberOps Using Cisco Security Technologies
    NOK 50.000

    COURSE CONTENT: Understanding Risk Management and SOC Operations Understanding Analytical Processes and Playbooks Investigating Packet Captures, Logs, and Traffic Analysis Investigating Endpoint and Appliance Logs Understanding Cloud Service Model…

    Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
  • Juniper Security (JSEC)

    COURSE CONTENT: DAY 1 Module 1: Implementing Intrusion Detection and Prevention • Describe the purpose of IDP • Utilize and update the IDP signature database • Configure an IDP…

    Les mer
  • Junos Layer 3 VPNs (JL3V)

    COURSE CONTENT: Day 1 Course Introduction MPLS VPNs • MPLS VPNs • Provider-Provisioned VPNs Layer 3 VPNs  • Layer 3 VPN Terminology • VPN-IPv4 Address Structure • Operational Characteristics…

    Les mer
  • Introduction to Juniper Security (IJSEC)

    COURSE CONTENT: DAY 1 Course Introduction Juniper Connected Security • Identify the high-level security challenges in today’s network • Describe basic network security design • Identify the key factors…

    Les mer
  • Introduction to the Junos Operating System (IJOS)

    COURSE CONTENT: DAY 1 Course Introduction Introducing Junos OS and the Hardware It Powers • Test your knowledge of some networking fundamentals • Explain the advantages of Junos OS…

    Les mer
  • Advanced Juniper Security (AJSEC)

    COURSE CONTENT: Day 1 Course Introduction Junos Layer 2 Packet Handling and Security Features  •Transparent Mode Security  •Secure Wire  •Layer 2 Next Generation Ethernet Switching  •MACsec  LAB 1: Implementing…

    Les mer
  • Administering BIG-IP and Configuring BIG-IP LTM v.17.1 Local Traffic Manager Bundle

    COURSE CONTENT: Administering BIG-IP v16.1 Chapter 1: Setting Up the BIG-IP System • Introducing the BIG-IP System • Initially Setting Up the BIG-IP System • Configuring the Management Interface…

    Les mer
  • Configuring BIG-IP APM Access Policy Manager v.17.1
    NOK 32.500

    COURSE CONTENT: Chapter 1: Setting Up the BIG-IP System • Introducing the BIG-IP System • Initially Setting Up the BIG-IP System • Archiving the BIG-IP Configuration • Leveraging F5…

    Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
  • Troubleshooting BIG-IP v.17.1

    COURSE CONTENT: Chapter 1: Setting Up the BIG-IP System • Introducing the BIG-IP System • Initially Setting Up the BIG-IP System • Archiving the BIG-IP System Configuration Chapter 2:…

    Les mer
  • Administering BIG-IP v.17.1

    COURSE CONTENT: Chapter 1: Setting Up the BIG-IP System • Introducing the BIG-IP System • Initially Setting Up the BIG-IP System • Configuring the Management Interface • Activating the…

    Les mer
  • Configuring BIG-IP LTM Local Traffic Manager v.17.1

    COURSE CONTENT: Chapter 1: Setting Up the BIG-IP System • Introducing the BIG-IP System • Initially Setting Up the BIG-IP System • Archiving the BIG-IP Configuration • Leveraging F5…

    Les mer
  • Developing iRules for BIG-IP v.17.1

    COURSE CONTENT: Chapter 1: Setting Up the BIG-IP System • Introducing the BIG-IP System • Initially Setting Up the BIG-IP System • Archiving the BIG-IP System Configuration • Leveraging…

    Les mer
  • Configuring BIG-IP DNS (formerly GTM) v.17.1

    COURSE CONTENT: Chapter 1: Setting Up the BIG-IP System • Introducing the BIG-IP System • Initially Setting Up the BIG-IP System • Archiving the BIG-IP Configuration • Leveraging F5…

    Les mer
  • Check Point Certified Security Expert (CCSE) & Troubleshooting Expert (CCTE) R81.20 Bundle (includes 180 days’ lab access)

    COURSE CONTENT: CCSE – Topics: •Management Maintenance  •Management Migration  •Management  •High Availability  •Policy Automation  •Gateway Maintenance  •The Firewall Kernel  •User-Mode Processes  •ClusterXL  •Traffic Acceleration  •Core Acceleration  •Interface Acceleration  •Threat…

    Les mer
  • Check Point Certified VSX Specialist (CCVS) R81.X (includes 180 days’ lab access)

    COURSE CONTENT: Course Topics: • VSX Overview  • Virtual System Installation and Configuration  • VSX Clustering  • Advanced VSX Features  • Troubleshooting VSX Lab Exercises: • Configuring the VSX…

    Les mer
  • Check Point Certified Troubleshooting Expert (CCTE) R81.20 (includes 180 days’ lab access)

    COURSE CONTENT: Course Topics: • Advanced Troubleshooting Techniques  • Advanced Logs and and Monitoring  • Management Database and Processes  • Advanced Kernel Debugging  • User Mode Troubleshooting  • Advanced…

    Les mer
  • Check Point Certified Multi-Domain Security Management Specialist (CCMS) R81X (includes 180 days’ lab access)

    COURSE CONTENT: Course Topics: • Multi-Domain Installation and Configuration  • Multi-Domain Security Management • Multi-Domain Log Management • Multi-Domain High Availability  • Global Domain • Global Policy Management  •…

    Les mer
  • Check Point Certified Maestro Expert (CCME) R81.X
    NOK 25.500

    COURSE CONTENT: Course Topics: • Scalability and Hyperscale  • Maestro Security Groups and the Single Management Object  • Administrator Operations  • Traffic Flow  • System Diagnostics and Tracking Changes …

    Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
  • Masterclass: Managing Active Directory Federation Services for Multiple Organizations
    NOK 30.000

    COURSE CONTENT: Module 1 • Working with external parties • LAB: Installing ADFS in Forest/Domain trust environment • LAB (optional): Install ADFS in 2003 domain-level environment • LAB: Testing…

    Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
  • Administering and Positioning Cisco Umbrella Operations
    NOK 43.000

    COURSE CONTENT: Module 1: Describe Cisco Umbrella • What is Umbrella • Enforcement • DNS Overview • Why DNS? • Co-occurrence Model • Spike Rank Model • Predictive IP…

    Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
  • 1
  • 2
  • →

We use cookies to improve your experience, including essential cookies required for the website to function. By continuing, you agree to our use of cookies. Learn more.