-
Implementing and Configuring Cisco Identity Services Engine BootcampNOK 48.000Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
COURSE CONTENT: Introducing Cisco ISE Architecture • Introduction • Cisco ISE as a Network Access Policy Engine • Cisco ISE Use Cases • Cisco ISE Functions • Summary •…
-
Cisco Security FundamentalsLes mer
COURSE CONTENT: Network Security Technologies • Defense-in-Depth Strategy • Defending Across the Attack Continuum • Network Segmentation and Virtualization Overview • Stateful Firewall Overview • Cisco IOS Zone-Based Policy…
-
CompTIA SecAI+ Certification Prep CourseLes mer
COURSE CONTENT: Module 1: AI and Data Concepts for Cybersecurity Module 2: Implementing Threat Modeling and Securing AI Systems Module 3: Installing Access Controls for AI Module 4: Distinguishing…
-
EC-Council Certified Responsible AI Governance & Ethics (CRAGE) + Exam voucherLes mer
COURSE CONTENT: Module 01 AI Foundations and Technology Ecosystem Module 02 AI Concerns, Ethical Principles, and Responsible AI Module 03 AI Strategy and Planning Module 04 AI Governance and…
-
EC-Council Certified Offensive AI Security Professional (COASP) + Exam voucherLes mer
COURSE CONTENT: Module 1 Offensive AI and AI System Hacking Methodology Module 2 AI Reconnaissance and Attack Surface Mapping Module 3 AI Vulnerability Scanning and Fuzzing Module 4 Prompt…
-
FortiOS AdministratorLes mer
COURSE CONTENT: Not available. Please contact. TARGET AUDIENCE: Not available. Please contact. COURSE OBJECTIVE: Not available. Please contact. COURSE PREREQUISITES: Not available. Please contact. …
-
Check Point Certified Troubleshooting Administrator (CCTA) R82 (includes 180 days lab access)Les mer
COURSE CONTENT: Module 1: Introduction to Troubleshooting • Identify the principles of troubleshooting methodology. • Understand how to use the OSI (Open Systems Interconnection) model for cause isolation. •…
-
Check Point Certified Security Administrator (CCSA) & Troubleshooting Administrator (CCTA) Bundle R82 (includes 180 days lab access)NOK 42.000Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
COURSE CONTENT: Not available. Please contact. TARGET AUDIENCE: Not available. Please contact. COURSE OBJECTIVE: Not available. Please contact. COURSE PREREQUISITES: Not available. Please contact. FOLLOW ON COURSES: Not available….
-
ISO/IEC 27035 Information Security Incident Management Lead Incident Manager (PECB Certified) – Including ExamLes mer
COURSE CONTENT: • Day 1: Introduction to Information Security Incident Management concepts as recommended by ISO/IEC 27035 • Day 2: Designing and preparing an Information Security Incident Management plan • Day…
-
ISACA Advanced in AI Audit (AAIA)Les mer
COURSE CONTENT: Domain 1: AI Governance and Risk AI Models, Considerations and Requirements • Types of AI • Machine Learning/AI Models • Algorithms • AI Life Cycle • Business…
-
Palo Alto Networks: Prisma Access BrowserLes mer
COURSE CONTENT: Module 1 – Prisma Access Browser Overview Module 2 – Architecture Module 3 – Policy Module 4 – Monitoring, Logging, and Troubleshooting Module 5 – Prisma Access…
-
ISACA Advanced in AI Security Management (AAISM)NOK 28.000Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
COURSE CONTENT: 1. AI Governance and Program Management • Stakeholder Considerations, Industry Frameworks, and Regulatory Requirements • AI-related Strategies, Policies, and Procedures • AI Asset and Data Life Cycle…
-
Masterclass:Web Application PentestingLes mer
COURSE CONTENT: Not available. Please contact. TARGET AUDIENCE: Not available. Please contact. COURSE OBJECTIVE: Not available. Please contact. COURSE PREREQUISITES: Not available. Please contact. …
-
Check Point Certified Security Administrator (CCSA)Les mer
COURSE CONTENT: Not available. Please contact. TARGET AUDIENCE: Not available. Please contact. COURSE OBJECTIVE: Not available. Please contact. COURSE PREREQUISITES: Not available. Please contact. …
-
FortiAnalyzer AnalystLes mer
COURSE CONTENT: Not available. Please contact. TARGET AUDIENCE: Not available. Please contact. COURSE OBJECTIVE: Not available. Please contact. COURSE PREREQUISITES: Not available. Please contact. …
-
FortiManager AdministratorLes mer
COURSE CONTENT: Not available. Please contact. TARGET AUDIENCE: Not available. Please contact. COURSE OBJECTIVE: Not available. Please contact. COURSE PREREQUISITES: Not available. Please contact. …
-
Designing Cisco Security InfrastructureLes mer
COURSE CONTENT: Definition and Purpose of Security Architecture • Security Architecture Components • Security Architecture in Modern Networks • Security Design Principles Components of Security Infrastructure • Layers of…
-
Administering VELOS-F5OSLes mer
COURSE CONTENT: Not available. Please contact. TARGET AUDIENCE: Not available. Please contact. COURSE OBJECTIVE: Not available. Please contact. COURSE PREREQUISITES: Not available. Please contact. …
-
Cybersecurity Specialization: Artificial Intelligence Risk Management FrameworkNOK 24.000Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
COURSE CONTENT: 1- Introduction to AI Risk Management and Global Frameworks • Introduction to AI Risk Management • Overview of Key Global AI Frameworks • Mapping Global Frameworks to…
-
Palo Alto Networks: Cortex XSOAR Engineering Security Automation SolutionsLes mer
COURSE CONTENT: Course Modules 0 – Course Introduction1 – XSOAR Overview2 – Incident Management3 – Threat Intelligence4 – Analyst Investigations5 – Dashboards, Reports, and Timers6 – Integrations and Content…
-
Check Point Deployment Administrator (CPDA) R82 (includes 180 days’ lab access)NOK 22.500Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
COURSE CONTENT: Module 1: Introduction to Quantum Security • Identify the primary components of a Check Point Three-Tier Architecture and explain how they work together in the Check Point…
-
Check Point Certified Security Expert (CCSE) R82 (includes 180 days’ lab access)NOK 25.000Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
COURSE CONTENT: Module 1: Management High Availability · Explain the purpose of Management High Availability. · Identify the essential elements of Management High Availability. Lab Tasks · Deploy and…
-
Check Point Certified Security Administrator (CCSA) R82 (includes 180 days’ lab access)NOK 25.000Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
COURSE CONTENT: Module 1: Introduction to Quantum Security • Identify the primary components of the Check Point Three-Tier Architecture and explain how they work together in the Check Point…
-
Palo Alto Networks: Cortex XDR Security Operations and IntegrationLes mer
COURSE CONTENT: • Course Overview • Overview of Cortex XDR • Software Components • Integrations • XQL • Detection Engineering • System Optimization • Dashboards and Reports TARGET…
-
IBM Verify: AdoptionLes mer
COURSE CONTENT: Verify architecture and sizing This unit introduces the architecture, core features, and extensibility of IBM Verify. It covers key capabilities such as single sign-on (SSO), multi-factor authentication…
-
Protect sensitive information with Microsoft Purview in the AI era (SC-401)NOK 28.000Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
COURSE CONTENT: Module 1: Implement Microsoft Purview Information Protection • Protect sensitive data in a digital world • Classify data for protection and governance • Review and analyze data…
-
Palo Alto Networks: Panorama NGFW ManagementNOK 22.000Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
COURSE CONTENT: Course Modules 1 – Initial Configuration 2 – Adding Firewalls 3 – Templates 4 – Device Groups 5 – Log Collection and Forwarding 6 – Using Panorama…
-
Defend against cyberthreats with Microsoft Defender XDR (SC-5004)Les mer
COURSE CONTENT: Module 1: Mitigate incidents using Microsoft Defender • Introduction • Use the Microsoft Defender portal • Manage incidents • Investigate incidents • Manage and investigate alerts •…
-
Masterclass: Windows Security and Infrastructure ManagementLes mer
COURSE CONTENT: Module 1: Windows Internals & System Architecture a) Introduction to the Windows 10 and Windows Server 2019 security concepts b) Architecture overview and terms c) Key System…
-
Verify Access: PoPs- ACLs and JunctionsLes mer
COURSE CONTENT: • Managing access control • Explain the object space and the protected objects concept • Control access to the protected objects by using Access Control List (ACL)…
-
Verify Access: Deploy and ConfigureLes mer
COURSE CONTENT: IBM Security Verify Access introduction • Understand the business context for identity and access management • Discuss the features and functions of IBM Security Verify Access Architecture…
-
IBM zSecure Audit Rule-based Compliance Evaluation and CustomizationLes mer
COURSE CONTENT: Unit 1: Rule-based compliance introduction and concepts Unit 2: Running compliance evaluations and interpret results Unit 3: Customizing compliance standards, rules, or tests TARGET AUDIENCE: The…
-
IBM zSecure Admin Basic Administration and ReportingLes mer
COURSE CONTENT: Unit 1: Run IBM Security zSecure Admin Unit 2: Select and display existing RACF profiles Unit 3: Perform profile maintenance Unit 4: Use Advanced options Unit 5:…
-
IBM zSecure RACF Management WorkshopLes mer
COURSE CONTENT: • Set up a RACF security environment for a hypothetical company based on their security policies and guidelines • Create and refresh the IBM Security zSecure Admin…
-
IBM zSecure RACF and SMF AuditingLes mer
COURSE CONTENT: Unit 1: Introduction to RACF auditing Unit 2: Auditing user IDs and passwords Unit 3: Auditing sensitive resources Unit 4: Auditing subsystems Unit 5: Auditing SMF Unit…
-
IBM zSecure CARLa Auditing and Reporting LanguageLes mer
COURSE CONTENT: Unit 1: Introduction and the CARLa interface Unit 2: CARLa SELECT, SORTLIST, and DEFINE statements Unit 3: Frequently used CARLa functions Unit 4: NEWLIST and SUMMARY options…
-
Securing Windows InfrastructureLes mer
COURSE CONTENT: Not available. Please contact. TARGET AUDIENCE: Not available. Please contact. COURSE OBJECTIVE: Not available. Please contact. COURSE PREREQUISITES: Not available. Please contact. …
-
Designing and Implementing Secure Cloud Access for Users and EndpointsLes mer
COURSE CONTENT: Certificate-Based User and Device Authentication • PKI Overview • PKI Operations • User versus Machine or Device-Based Certificates • 802.1X and EAP Methods • Cisco ISE Certificate Services…
-
Red Hat Security: Linux in Physical, Virtual, and Cloud with ExamLes mer
COURSE CONTENT: • Manage security and risk: Define strategies to manage security on Red Hat Enterprise Linux servers. • Automate configuration and remediation with Ansible: Remediate configuration and security…
-
Red Hat Security: Identity Management and Authentication with ExamLes mer
COURSE CONTENT: • Identity Management in Red Hat Enterprise Linux Introduce Identity Management in Red Hat Enterprise Linux (IdM) and its high-level architecture. • Identity Management Core Technologies Review…
-
Masterclass: Red Team – Blue Team OperationsLes mer
COURSE CONTENT: Module 1: Identifying Areas of Vulnerability • Defining the assets which your company needs to protect • Defining the other sensitive information that needs to be protected…
-
Masterclass: Pentesting and Securing Mobile and Web ApplicationsLes mer
COURSE CONTENT: Module 1: OWASP Top 10 Application Security Risks • Injection • Broken Authentication • Sensitive Data Exposure • XXE • Broken Access Control • Security Misconfiguration •…
-
NIS 2 Directive Foundation (PECB Certified) – Including ExamLes mer
COURSE CONTENT: • Day 1: Introduction to fundamental concepts and definitions of NIS 2 Directive • Day 2: NIS 2 Directive requirements for the implementation of a cybersecurity program …
-
Lead Cloud Security Manager (PECB Certified) – Including ExamLes mer
COURSE CONTENT: Day 1: Introduction to ISO/IEC 27017 and ISO/IEC 27018 and the initiation of a cloud security program • Training course objectives and structure • Standards and regulatory…
-
ISO/IEC 27002 Information Security Controls Manager (PECB Certified) – Including ExamLes mer
COURSE CONTENT: • Day 1: Introduction to ISO/IEC 27002 • Day 2: Information assets, people controls, physical controls, and operational security controls • Day 3: Information security incident management and monitoring of…
-
ISO/IEC 27002 Information Security Controls Lead Manager (PECB Certified) – Including ExamLes mer
COURSE CONTENT: • Day 1: Introduction to ISO/IEC 27002 • Day 2: Information security roles and responsibilities, people controls, and physical controls • Day 3: Information security assets, access controls, and protection…
-
ISO/IEC 27002 Information Security Controls Foundation (PECB Certified) – Including ExamLes mer
COURSE CONTENT: • Day 1: Introduction to ISO/IEC 27002 and Information Security Management System • Day 2: ISO/IEC 27002 Controls and Certificate Exam TARGET AUDIENCE: • Individuals…
-
EXIN Information Security Management Professional based on ISO/IEC 27001 – Including ExamLes mer
COURSE CONTENT: Information security perspectives: the perspectives of the business, the customer, and the service providerRisk Management: Analysis of the risks, choosing controls, dealing with remaining risksInformation security controls:…
-
ISO/IEC 27032 Lead Cybersecurity Manager (PECB certified) + examLes mer
COURSE CONTENT: • Day 1: Introduction to Cybersecurity and related concepts as recommended by ISO/IEC 27032 • Day 2: Cybersecurity policies, risk management and attack mechanisms • Day 3: Cybersecurity controls, information…
-
Installing and Configuring ArcSight PlatformLes mer
COURSE CONTENT: Not available. Please contact. TARGET AUDIENCE: Security Professionals and SOC Administrators, who are responsible for deploying and administrating the ArcSight Platform within their environment …
-
HPE Security Governance and PoliciesLes mer
COURSE CONTENT: hl948s.pdf (hpe.com) TARGET AUDIENCE: Not available. Please contact. COURSE OBJECTIVE: Not available. Please contact. COURSE PREREQUISITES: HPE Security Foundation (HL945S), or equivalent knowledge,…
-
Information Security Risk Management and Business Continuity PlanningLes mer
COURSE CONTENT: Module 1: Mapping risk management and continuity planning to your business • Describe riskmanagement • Discuss the relationship between security, businesscontinuity management and risk management • Define…
-
NCSP Boot Camp CertificationLes mer
COURSE CONTENT: H0DV9S (hpe.com) TARGET AUDIENCE: • Candidates looking to pursue a career incybersecurity • IT, cybersecurity and digital transformationdesign and implementation engineers • IT, cybersecurity and…
-
NCSP Practitioner TrainingLes mer
COURSE CONTENT: H0DV8S (hpe.com) TARGET AUDIENCE: • Candidates looking to pursue a career in cybersecurity • IT, cybersecurity and digital transformation design andimplementation engineers • IT,…
-
Implementing Aruba Network SecurityLes mer
COURSE CONTENT: Aruba Security Strategy & ClearPass Fundamentals • Explain Aruba Zero Trust Security • Explain how Aruba solutions apply to different security vectors Deploy Trusted Certificates to Aruba…
-
Cybersecurity Specialization: Threat ModelingNOK 23.000Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
COURSE CONTENT: Introduction to Advanced Threat ModelingReview of STRIDE, PASTA, and VAST in complex contextsIntegrating threat modeling with attack trees, attack vectors, and data flow analysisThreat modeling for large-scale…
-
Infoblox NIOS DDI TroubleshootingLes mer
COURSE CONTENT: • Troubleshooting Basics in NIOS • DNS Troubleshooting Methodology • DHCP Troubleshooting Methodology • Describing DHCPv4 Failover • Troubleshooting DHCPv4 Failover in NIOS Exam not included….
-
Infoblox NIOS DDI Operator & Administrator BundleLes mer
COURSE CONTENT: NIOS DDI OPERATOR• NIOS Grid Overview• Using the NIOS Grid Manager UI• NIOS DHCP Service Overview• Managing NIOS DHCP Objects• Using NIOS Extensible Attributes and Smart Folders•…
-
Forescout Certified Associate (FSCA)Les mer
COURSE CONTENT: Day One • Chapter 1: Introduction A brief introduction to ForeScout’s vision and concepts of Network Access Control. • Chapter 2: Terms and Architecture This lesson introduces…
-
Cybersecurity Maturity Model Certification (CMMC) Certified Professional (PECB Certified) – Including ExamLes mer
COURSE CONTENT: • Day 1: Introduction to CMMC stakeholders, ecosystem, references, FCI, and CUI • Day 2: CUI protection, CMMC model, domains, and CMMC levels 1 and 2 •…
-
Cybersecurity Maturity Model Certification (CMMC) Foundations (PECB Certified) – Including ExamLes mer
COURSE CONTENT: • Day 1: Introduction to the CMMC ecosystem and the CMMC model • Day 2: CMMC practices, assessment process, and code of professional conduct TARGET AUDIENCE:…
-
Cybersecurity Masterclass: Managing and Defending Against Current ThreatsLes mer
COURSE CONTENT: Module 1: Identifying Areas of Vulnerability This part introduces the new cybersecurity challenges and trends, emphasizing on data security and integration through and into the cloud and…
-
EC-Council Certified Application Security Engineer (CASE) Java Certified Application Security Engineer (CASE) . Net + Exam voucherLes mer
COURSE CONTENT: Understanding Application Security, Threats and Attacks • What is a Secure Application • Need for Application Security • Most Common Application Level Attacks • Why Applications become Vulnerable to…
-
EC-Council Certified Application Security Engineer (CASE) Java + Exam voucherLes mer
COURSE CONTENT: Understanding Application Security, Threats and Attacks • What is a Secure Application • Need for Application Security • Most Common Application Level Attacks • Why Applications become…
-
Paragon Active Assurance for Automated WAN (PAAW)Les mer
COURSE CONTENT: Day 1 Course Introduction PAA Solution Components • PAA Overview • Passive and Active Monitoring • Use Cases Test Agent Architecture • Test Agents Overview • Appliance…
-
Junos Troubleshooting (JT)Les mer
COURSE CONTENT: Day 1 Course Introduction Junos Product Families • Describe the architectural philosophy of devices that run the Junos OS and understand how this relates to troubleshooting •…
-
Deploying Junos Subscriber Management (JSM)Les mer
COURSE CONTENT: Day 1 Course Introduction Introduction to Subscriber Management • Overview and Terminology • Broadband Access Network Design and Concepts • Configuration and Operational Flow • Software Licensing…
-
Junos Space Essentials (JSE)Les mer
COURSE CONTENT: Day 1 Course Introduction Introduction to Junos Space • Junos Space Overview • Junos Space Architecture • Junos Space Applications • Junos Space Features Junos Space Deployment …
-
Junos Space-Security Director (JS-SD)Les mer
COURSE CONTENT: Day 1 Course Introduction Introduction to Security Director • Security Director Overview • Navigating the Security Director Application • Device Support • Basic Device Configuration and Setup …
-
Junos Space Network Director (JS-ND)Les mer
COURSE CONTENT: Day 1 Course Introduction Working with Network Director • Network Director Overview • Network Director Views • Network Director Modes Lab 1: Working with Network Director Managing…
-
Junos Class of Service (JCOS)Les mer
COURSE CONTENT: DAY 1 Course Introduction CoS Overview • CoS History and Evolution • CoS and DiffServ • CoS Fields in Packet Headers • CoS Processing Packet Classification •…
-
Deploying Juniper Security in AWS and Azure (JCNAA)Les mer
COURSE CONTENT: DAY 1 Course Introduction Cloud Overview • Cloud Concepts • Cloud Virtualization • Cloud Security Introduction to AWS • Describe AWS architecture • Access the AWS…
-
Introduction to Juniper Mist AI (IJMA)Les mer
COURSE CONTENT: Day 1 1 Introduction to Juniper Mist • Outline Juniper Mist • Describe Marvis and Marvis Minis • Define Juniper Mist full stack • Outline Juniper Mist…
-
Advanced Junos Troubleshooting (AJT)Les mer
COURSE CONTENT: Day 1 Introduction Troubleshooting OSPF • Troubleshoot OSPF adjacencies • Troubleshoot OSPF inconsistencies Lab 1: Troubleshooting OSPF Troubleshooting IS-IS • Troubleshoot IS-IS adjacencies Lab 2: Troubleshooting IS-IS …
-
Configuring BIG-IQ v.7.1Les mer
COURSE CONTENT: Day 1: 1Introducing BIG-IQ Build the BIG-IQ system. Perform the initial setup, licensing and configuration, then connect it to the network so it’s ready for use. 2Setting…
-
Configuring BIG-IQLes mer
COURSE CONTENT: Not available. Please contact. TARGET AUDIENCE: Not available. Please contact. COURSE OBJECTIVE: Not available. Please contact. COURSE PREREQUISITES: Not available. Please contact. …
-
Configuring F5 Advanced WAF (previously licensed as ASM)Les mer
COURSE CONTENT: Not available. Please contact. TARGET AUDIENCE: Not available. Please contact. COURSE OBJECTIVE: Not available. Please contact. COURSE PREREQUISITES: Not available. Please contact. …
-
Configuring BIG-IP Advanced WAF Web Application Firewall 17.5Les mer
COURSE CONTENT: Chapter 1: Introducing the BIG-IP System • Initially Setting Up the BIG-IP System • Archiving the BIG-IP System Configuration • Leveraging F5 Support Resources and Tools Chapter…
-
Automating BIG-IP with AS3 v.1.7Les mer
COURSE CONTENT: Chapter 1: Linux Command Line Review •Navigating the Linux File System •Creating and Deleting Files and Directories •Copying and Moving Files •Command Line Auto-Completion and Editing •Tools…
-
Automating BIG-IP with Ansible v.1.7Les mer
COURSE CONTENT: Chapter 1: Linux Command Line Review •Navigating the Linux File System •Creating and Deleting Files and Directories •Copying and Moving Files •Command Line Auto-Completion and Editing •Tools…
-
Configuring BIG-IP AFM Advanced Firewall Manager v.17.1Les mer
COURSE CONTENT: Chapter 1: Setting up the BIG-IP System • Introducing the BIG-IP System • Initially Setting Up the BIG-IP System • Archiving the BIG-IP System Configuration • Leveraging…
-
Masterclass: Administering and Configuring ADFS & Managing ADFS for Multiple OrganizationsLes mer
COURSE CONTENT: ADF Module 1 • Introduction • What are Claims • Dynamic Access Control • LAB: Dynamic Access Control in 2016 • LAB (optional): DAC and Groups Module…
-
Masterclass: Managing Azure Active Directory from A to Z (ATZ)Les mer
COURSE CONTENT: Module 1 • Introduction to Azure Active Directory Module 2 • Administration of users and groups • Azure AD Security Settings • Azure PowerShell • Licensing, Azure…
-
Palo Alto Networks: Cortex XSIAM for Investigation and AnalysisLes mer
COURSE CONTENT: Course Modules 1- Introduction to Cortex XSIAM 2- Endpoints 3- XQL 4- Alerting and Detection 5- Threat Intel Management 6- Automation 7- Attack Surface Management 8- Incident…
-
Palo Alto Networks Prisma Access SSE: Configuration and DeploymentLes mer
COURSE CONTENT: • Prisma SASE • Prisma Access Architecture • Strata Cloud Manager • Licensing and Activation • Service Connections • Remote Networks • Mobile Users • Prisma Access…
-
Verify Access: AdministrationLes mer
COURSE CONTENT: Architecture and deployment • Describe the components • Understand the deployment options • Install and configure Verify Access in a containerized environment • Install and configure Verify…
-
IBM zSecure UNIX System Services (USS) Security OverviewLes mer
COURSE CONTENT: Unit 1: UNIX System Services security introduction Unit 2: Protect files and directories Unit 3: Report and audit UNIX System Services TARGET AUDIENCE: This intermediate-level course…
-
IBM Guardium Data Protection FundamentalsLes mer
COURSE CONTENT: Unit 1: Guardium overview Unit 2: Guardium architecture Unit 3: Guardium user interfaces Unit 4: Access management Unit 5: Guardium groups Unit 6: System management Unit 7:…
-
Basics of z/OS RACF AdministrationLes mer
COURSE CONTENT: • Review of z/Architecture, and z/O • An introduction to TSO/E and ISPF/PDF • An introduction to z/OS data sets • Batch processing • Security and RACF…
-
QRadar UBA: Detecting Insider ThreatsLes mer
COURSE CONTENT: Unit 1: Architecture and Overview Unit 2: Setup • Installation • Configuration • User Import • Machine Learning configuration Unit 3: Tuning Unit 4: An overview to…
-
QRadar EDR: Integrating with QRadar SIEMLes mer
COURSE CONTENT: Unit 1: Integrating with QRadar SIEM • Configure an API application in QRadar EDR • Install a new log source in QRadar SIEM • Configure the correct…
-
QRadar EDR: FoundationsLes mer
COURSE CONTENT: Getting started • Dashboard overview • Architecture • QRadar EDR on-prem installation • Downloading, installing, and updating the QRadar EDR Agent Protecting your endpoints • Investigating threats…
-
IBM QRadar SIEM Advanced TopicsLes mer
COURSE CONTENT: Unit 1: Custom log sources Unit 2: Reference data collections and custom rules Unit 3: IBM X-Force Threat Intelligence in QRadar Unit 4: User Behavior Analytics and…
-
IBM QRadar SIEM FoundationsLes mer
COURSE CONTENT: Topics • Unit 0: IBM Security QRadar 7.5 – Fundamentals • Unit 1: QRadar Architecture • Unit 2: QRadar UI – Overview • Unit 3: QRadar –…
-
Effective RACF AdministrationLes mer
COURSE CONTENT: Day 1 • Welcome • Unit 1 – Security and RACF overview • Unit 2 – Administering groups and users • Exercise 1 – Log on to…
-
Cisco DoD Comply-to-ConnectNOK 51.000Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
COURSE CONTENT: C2C Fundamentals • Comply to Connect • From C2C to ZTA • Steps to Implement C2C Cisco Identity-Based Networking Services • Cisco IBNS Overview • AAA Role…
-
Citrix NetScaler ADC 14.x Advanced Features (Security and Management)NOK 44.000Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
COURSE CONTENT: Module 1: Introduction to WAF • The Business Problem • Industry Standards • Protection Methodologies • Introducing NetScaler Web App Firewall Module 2: WAF Profiles, Policies, Monitoring…
-
Check Point Threat Prevention Specialist (CTPS) R81_20Les mer
COURSE CONTENT: Module 1: History of Threat Prevention Lab Tasks • Verify the Security Environment • Verify Connectivity Between Systems Module 2: IPS Protections Lab Tasks • Enable and…
-
Cisco Secure Workload Firewall Enforcement Agents, Data Flow Mapping, and Advanced Policy DeploymentNOK 51.000Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
COURSE CONTENT: Module 1: Cisco Secure Workload Firewall Agent • How the Cisco Secure Workload Firewall Agent Enforces Firewall Rules • Deploying and Managing Linux Enforcement Agents • Deploying…
-
Masterclass: Managing Microsoft Entra ID From A to Z (ATZ)Les mer
COURSE CONTENT: Module 1: Entra ID Intro 1. Introduction to Entra ID Module 2: Object Management 1. Administration of users and groups 2. Entra ID Security Settings 3. Azure…
-
Advanced Techniques for Cisco Firewall Threat Defense and Intrusion PreventionNOK 48.000Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
COURSE CONTENT: Introducing Cisco Secure Firewall Threat Defense • Firewall Functionality • Cisco Secure Firewall Platform • Use Cases • Deployment Options • Management Options • Basic Network Settings…
-
NIS 2 Directive Lead Implementer (PECB Certified) – Including ExamNOK 41.000Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
COURSE CONTENT: • Day 1: Introduction to NIS 2 Directive and initiation of the NIS 2 Directive implementation • Day 2: Analysis of NIS 2 Directive compliance program, asset management, and…
-
FortiGate AdministratorNOK 39.500Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
COURSE CONTENT: 1.System and Network Settings 2.Firewall Policies and NAT 3.Routing 4.Firewall Authentication 5.Fortinet Single Sign-On (FSSO) 6.Certificate Operations 7.Antivirus 8.Web Filtering 9.Intrusion Prevention and Application Control 10.SSL VPN …
-
Masterclass Internet Information Services ManagementLes mer
COURSE CONTENT: Module 1: Introducing, installing and configuring IIS 10 on Windows Server 2019 1. Introducing Internet Information Services 10 a. Administration tools b. Architecture overview c. Configuration System…
-
Check Point Certified Harmony Endpoint Specialist (CCES) R81.20NOK 23.000Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
COURSE CONTENT: Topics Introduction to Harmony Endpoint Harmony Endpoint Security Management Deploying Harmony Endpoint Data Security Protection Advanced Threat Prevention Large-Scale Harmony Endpoint Deployment Troubleshooting Harmony Endpoint Management as…
-
Understanding Cisco Wireless FoundationsNOK 42.000Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
COURSE CONTENT: Module 1: RF and WLAN Theory Module 2: WLAN Math and Antennas Module 3: Wi-Fi Operations Module 4: Basic WLAN Security Module 5: Advanced WLAN Security Module…
-
Securing the Web with Cisco Web Security ApplianceNOK 24.500Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
COURSE CONTENT: Cisco WSA Overview • Technology Use Case • Cisco WSA Solution • Cisco WSA Features • Cisco WSA Architecture • Proxy Service • Integrated Layer 4 Traffic…
-
Implementing Secure Solutions with Virtual Private NetworksNOK 48.000Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
COURSE CONTENT: Introducing VPN Technology Fundamentals • Role of VPNs in Network Security • VPNs and Cryptography Implementing Site-to-Site VPN Solutions • Site-to-Site VPN Solutions Overview • Cisco IOS…
-
Securing Cisco Networks with Open Source SnortLes mer
COURSE CONTENT: Snort Technology Introduction • Snort Basics • Snort Resources Snort Installation • Installation Prerequisites • Performing the Snort Installation Snort Operation Introduction • Running Snort from the…
-
Securing Cisco Networks with Snort Rule Writing Best PracticesNOK 36.500Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
COURSE CONTENT: Module 1: Welcome to the Cisco and Sourcefire Virtual Network Module 2: Basic Rule Syntax and Usage Module 3: Rule Optimization Module 4: Using Perl Compatible Regular…
-
ServiceNow Security Operations (SecOps) FundamentalsLes mer
COURSE CONTENT: Security Operations Overview • Current State of Security and Security Operations Maturity Levels • Introducing ServiceNow Security Operations • Essential Platform and Security Administration Concepts • Security…
-
Fundamentals of Cisco Firewall Threat Defense and Intrusion PreventionNOK 49.000Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
COURSE CONTENT: Introducing Cisco Secure Firewall Threat Defense • Need for a Firewall • Traditional Network Security and the New Reality • Cisco Secure Portfolio • Cisco Secure Firewall…
-
Securing Email with Cisco Email Security ApplianceNOK 38.500Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
COURSE CONTENT: Describing the Cisco Email Security Appliance • Cisco Email Security Appliance Overview • Technology Use Case • Cisco Email Security Appliance Data Sheet • SMTP Overview •…
-
Implementing Cisco SD-WAN Security and Cloud SolutionsNOK 36.000Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
COURSE CONTENT: Introducing Cisco SD-WAN Security • Cisco SD-WAN Security Overview • Cisco SD-WAN Platform • Cisco SD-WAN Security Types Deploying On-Premises Threat Prevention • Cisco SD-WAN Integrated Security…
-
Masterclass Secure Coding TechniquesLes mer
COURSE CONTENT: We will spend most of our time talking about securing ASP.NET applications and issues frequently observed. You will learn about OWASP TOP 10 – most critical web…
-
Implementing and Operating Cisco Security Core TechnologiesNOK 48.000Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
COURSE CONTENT: Network Security Technologies • Defense-in-Depth Strategy • Defending Across the Attack Continuum • Network Segmentation and Virtualization Overview • Stateful Firewall Overview • Cisco IOS Zone-Based Policy…
-
Red Hat Security: Linux in Physical, Virtual, and CloudLes mer
COURSE CONTENT: Manage security and risk • Define strategies to manage security on Red Hat Enterprise Linux servers. Automate configuration and remediation with Ansible • Remediate configuration and security…
-
Red Hat Security: Identity Management and AuthenticationLes mer
COURSE CONTENT: • Identity Management in Red Hat Enterprise Linux Introduce Identity Management in Red Hat Enterprise Linux (IdM) and its high-level architecture. • Identity Management Core Technologies Review…
-
Masterclass Public Key Infrastructure ManagementNOK 46.000Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
COURSE CONTENT: Module 1: Essence of PKI • Cryptography basics • Fundamentals of PKI • Certificate types (?X.509)? • Certification authorities • Certificate Revocation Lists Module 2: Designing and Implement…
-
Palo Alto Networks: Firewall Troubleshooting (EDU-330)NOK 32.000Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
COURSE CONTENT: Course Modules 1 – Tools and Resources 2 – Flow Logic 3 – Packet Captures 4 – Packet-Diagnostics Logs 5 – Host-Inbound Traffic 6 – Transit Traffic…
-
Palo Alto Networks: Firewall Essentials: Configuration and Management (EDU-210)NOK 41.500Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
COURSE CONTENT: Course Modules 1 – Palo Alto Networks Portfolio and Architecture 2 – Configuring Initial Firewall Settings 3 – Managing Firewall Configurations 4 – Managing Firewall Administrator Accounts…
-
Introduction to Microsoft Security, Compliance, and IdentityNOK 9.900Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
COURSE CONTENT: Module 1: Microsoft Security, Compliance, and Identity Fundamentals: Describe the concepts of security, compliance, and identity • Describe security and compliance concepts • Describe identity concepts Module…
-
Microsoft Identity and Access Administrator (SC-300)NOK 28.000Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
COURSE CONTENT: Module 1 : Explore identity in Microsoft Entra ID • Define common identity terms and explain how they’re used in the Microsoft Cloud • Explore the common…
-
Defend against cyberthreats with Microsoft’s security operations platform (SC-200)NOK 28.000Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
COURSE CONTENT: SC-200: Mitigate threats using Microsoft Defender XDR • Introduction to Microsoft Defender XDR threat protection • Mitigate incidents using Microsoft 365 Defender • Protect your identities with…
-
Microsoft Cybersecurity Architect (SC-100)NOK 24.000Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
COURSE CONTENT: Module 1: Design solutions that align with security best practices and priorities • Introduction to Zero Trust and best practice frameworks • Design security solutions that align…
-
ISO/IEC 27001 Information Security Management System Lead Implementer (PECB Certified) – Including ExamNOK 39.000Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
COURSE CONTENT: • Introduction to ISO/IEC 27001 and initiation of an ISMS • Plan the implementation of an ISMS • Implementation of an ISMS • ISMS monitoring, measurement, continuous…
-
ISO/IEC 27001 Lead Auditor (PECB certified) + examNOK 39.000Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
COURSE CONTENT: Day 1: Introduction to Information Security Management Systems (ISMS) and ISO/IEC 27001 • Training Course Objectives and Structure • Standards and Regulatory Frameworks • Certification Process • Fundamental…
-
ISO/IEC 27001 Information Security Management System Foundation (PECB Certified) – Including ExamNOK 17.500Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
COURSE CONTENT: Day 1: Introduction to Information Security Management System (ISMS) concepts as required by ISO/IEC 27001 Day 2: Information Security Management System requirements and Certification Exam TARGET…
-
EXIN Information Security Foundation based on ISO/IEC 27001 – Including ExamNOK 18.500Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
COURSE CONTENT: • Information and security • Threats and risks • Approach and organization • Measures • Legislation and regulation TARGET AUDIENCE: This foundation-level certification is suitable…
-
Masterclass: Hacking and Securing Windows InfrastructureLes mer
COURSE CONTENT: Module 1: Hacking Windows Platform • Detecting unnecessary services • Misusing service accounts • Implementing rights, permissions and privileges • Direct Kernel Object Modification Module 2: Top…
-
Masterclass: Hacking and Securing SQL ServerNOK 45.000Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
COURSE CONTENT: Module 1: Hacking SQL Server Infrastructure • Discovering SQL Server instances • SQL injection using men in the middle • Capturing SQL credentials using men in the…
-
AWS Jam – Security EngineeringLes mer
COURSE CONTENT: – Hands-on format, putting learners in the driver’s seat to make decisions and solve problems in an active AWS Cloud environment to amplify understanding – Challenges based…
-
CompTIA SecurityX Certification Prep CourseNOK 39.500Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
COURSE CONTENT: Module 1: Introduction • Preassessment Module 2: Summarizing Governance Risk and Compliance • Implement Appropriate Governance Components • Explain Legal Compliance • Apply Risk Management Strategies Module…
-
Implementing and Troubleshooting Networks using Cisco ThousandEyesNOK 41.500Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
COURSE CONTENT: Introduction to Cisco ThousandEyes • Cisco ThousandEyes Visibility • How Cisco ThousandEyes Does It • Cisco ThousandEyes Cloud Agents • Cisco ThousandEyes Enterprise Agents • Cisco ThousandEyes…
-
EC-Council Certified Encryption Specialist (ECES) + Exam voucherNOK 27.000Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
COURSE CONTENT: Types of Encryption Standards and their differencesHow to select the best standard for your organizationHow to enhance your pen-testing knowledge in encryptionCorrect and incorrect deployment of encryption…
-
EC-Council Certified SOC Analyst (CCSA) + Exam voucherNOK 24.000Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
COURSE CONTENT: SOC Essential Concepts • Computer Network Fundamentals • TCP/IP Protocol Suite • Application Layer Protocols • Transport Layer Protocols • Internet Layer Protocols • Link Layer Protocols…
-
EC-Council Certified Threat Intelligence Analyst + Exam voucherNOK 28.000Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
COURSE CONTENT: Introduction to Threat Intelligence • Understanding Intelligence • Understanding Cyber Threat Intelligence • Overview of Threat Intelligence Lifecycle and Frameworks Cyber Threats and Kill Chain Methodology •…
-
EC-Council Certified Secure Computer User (CCSU) + Exam voucherNOK 16.000Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
COURSE CONTENT: Introduction to SecuritySecuring Operating SystemsMalware and AntivirusInternet SecuritySecurity on Social Networking SitesSecuring Email CommunicationsSecuring Mobile DevicesSecuring the CloudSecuring Network ConnectionsData Backup and Disaster Recovery TARGET AUDIENCE:…
-
BCS Certificate in Information Security Management Principles (CISMP) – Including ExamNOK 32.000Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
COURSE CONTENT: 1. Information Security Management Principles – 10% • 1.1 Concepts and definitions • 1.2 The need for & benefits of Information Security 2. Information Risk – 10%…
-
Understanding Cisco Cybersecurity Operations FundamentalsNOK 47.000Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
COURSE CONTENT: Defining the Security Operations Center • Types of Security Operations Centers • SOC Analyst Tools • Data Analytics • Hybrid Installations: Automated Reports, Anomaly Alerts • Staffing…
-
Performing CyberOps Using Cisco Security TechnologiesNOK 50.000Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
COURSE CONTENT: Understanding Risk Management and SOC Operations Understanding Analytical Processes and Playbooks Investigating Packet Captures, Logs, and Traffic Analysis Investigating Endpoint and Appliance Logs Understanding Cloud Service Model…
-
Juniper Security (JSEC)Les mer
COURSE CONTENT: DAY 1 Module 1: Implementing Intrusion Detection and Prevention • Describe the purpose of IDP • Utilize and update the IDP signature database • Configure an IDP…
-
Junos Layer 3 VPNs (JL3V)Les mer
COURSE CONTENT: Day 1 Course Introduction MPLS VPNs • MPLS VPNs • Provider-Provisioned VPNs Layer 3 VPNs • Layer 3 VPN Terminology • VPN-IPv4 Address Structure • Operational Characteristics…
-
Introduction to Juniper Security (IJSEC)Les mer
COURSE CONTENT: DAY 1 Course Introduction Juniper Connected Security • Identify the high-level security challenges in today’s network • Describe basic network security design • Identify the key factors…
-
Introduction to the Junos Operating System (IJOS)Les mer
COURSE CONTENT: DAY 1 Course Introduction Introducing Junos OS and the Hardware It Powers • Test your knowledge of some networking fundamentals • Explain the advantages of Junos OS…
-
Advanced Juniper Security (AJSEC)Les mer
COURSE CONTENT: Day 1 Course Introduction Junos Layer 2 Packet Handling and Security Features •Transparent Mode Security •Secure Wire •Layer 2 Next Generation Ethernet Switching •MACsec LAB 1: Implementing…
-
Administering BIG-IP and Configuring BIG-IP LTM v.17.1 Local Traffic Manager BundleLes mer
COURSE CONTENT: Administering BIG-IP v16.1 Chapter 1: Setting Up the BIG-IP System • Introducing the BIG-IP System • Initially Setting Up the BIG-IP System • Configuring the Management Interface…
-
Configuring BIG-IP APM Access Policy Manager v.17.1NOK 32.500Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
COURSE CONTENT: Chapter 1: Setting Up the BIG-IP System • Introducing the BIG-IP System • Initially Setting Up the BIG-IP System • Archiving the BIG-IP Configuration • Leveraging F5…
-
Troubleshooting BIG-IP v.17.1Les mer
COURSE CONTENT: Chapter 1: Setting Up the BIG-IP System • Introducing the BIG-IP System • Initially Setting Up the BIG-IP System • Archiving the BIG-IP System Configuration Chapter 2:…
-
Administering BIG-IP v.17.1Les mer
COURSE CONTENT: Chapter 1: Setting Up the BIG-IP System • Introducing the BIG-IP System • Initially Setting Up the BIG-IP System • Configuring the Management Interface • Activating the…
-
Configuring BIG-IP LTM Local Traffic Manager v.17.1Les mer
COURSE CONTENT: Chapter 1: Setting Up the BIG-IP System • Introducing the BIG-IP System • Initially Setting Up the BIG-IP System • Archiving the BIG-IP Configuration • Leveraging F5…
-
Developing iRules for BIG-IP v.17.1Les mer
COURSE CONTENT: Chapter 1: Setting Up the BIG-IP System • Introducing the BIG-IP System • Initially Setting Up the BIG-IP System • Archiving the BIG-IP System Configuration • Leveraging…
-
Configuring BIG-IP DNS (formerly GTM) v.17.1Les mer
COURSE CONTENT: Chapter 1: Setting Up the BIG-IP System • Introducing the BIG-IP System • Initially Setting Up the BIG-IP System • Archiving the BIG-IP Configuration • Leveraging F5…
-
Check Point Certified Security Expert (CCSE) & Troubleshooting Expert (CCTE) R81.20 Bundle (includes 180 days’ lab access)Les mer
COURSE CONTENT: CCSE – Topics: •Management Maintenance •Management Migration •Management •High Availability •Policy Automation •Gateway Maintenance •The Firewall Kernel •User-Mode Processes •ClusterXL •Traffic Acceleration •Core Acceleration •Interface Acceleration •Threat…
-
Check Point Certified VSX Specialist (CCVS) R81.X (includes 180 days’ lab access)Les mer
COURSE CONTENT: Course Topics: • VSX Overview • Virtual System Installation and Configuration • VSX Clustering • Advanced VSX Features • Troubleshooting VSX Lab Exercises: • Configuring the VSX…
-
Check Point Certified Troubleshooting Expert (CCTE) R81.20 (includes 180 days’ lab access)Les mer
COURSE CONTENT: Course Topics: • Advanced Troubleshooting Techniques • Advanced Logs and and Monitoring • Management Database and Processes • Advanced Kernel Debugging • User Mode Troubleshooting • Advanced…
-
Check Point Certified Multi-Domain Security Management Specialist (CCMS) R81X (includes 180 days’ lab access)Les mer
COURSE CONTENT: Course Topics: • Multi-Domain Installation and Configuration • Multi-Domain Security Management • Multi-Domain Log Management • Multi-Domain High Availability • Global Domain • Global Policy Management •…
-
Check Point Certified Maestro Expert (CCME) R81.XNOK 25.500Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
COURSE CONTENT: Course Topics: • Scalability and Hyperscale • Maestro Security Groups and the Single Management Object • Administrator Operations • Traffic Flow • System Diagnostics and Tracking Changes …
-
Masterclass: Managing Active Directory Federation Services for Multiple OrganizationsNOK 30.000Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
COURSE CONTENT: Module 1 • Working with external parties • LAB: Installing ADFS in Forest/Domain trust environment • LAB (optional): Install ADFS in 2003 domain-level environment • LAB: Testing…
-
Administering and Positioning Cisco Umbrella OperationsNOK 43.000Les mer Dette produktet har flere varianter. Alternativene kan velges på produktsiden
COURSE CONTENT: Module 1: Describe Cisco Umbrella • What is Umbrella • Enforcement • DNS Overview • Why DNS? • Co-occurrence Model • Spike Rank Model • Predictive IP…