Public Key Infra. and Active Directory Certificate Services
In this course, you will learn how to: Choose adequate cryptographic algorithms for operating your public key infrastructure. Grasp the technical nature of certificates and meaning of individual fields of their ...
Practical Introduction to Cloud Environments
" Explain basic cloud environment principles with compare traditional IT " Public cloud vendors overview " Hybrid cloud solutions as a new way " Service models " Basic architecting ...
Certified Information Systems Security Professional
If you are working or involved in cybersecurity or information governance, it is now time to take your experience to the next level. This course is ideal for individuals with security responsibilities, such as: ...
Security of industrial systems and OT environments
This one-day course provides introduction into the world of cyber security of industrial, control and specific systems and OT environments. During it, trainees will learn about relevant standards in this area, and ...
Windows Infrastructure Security
The goal of the training is to provide participants with an insight into the workings of basic on-premise infrastructure built on the Windows Server operating system and enrich their understanding of principles of ...
Malware analysis
This one-day course covers basic techniques, tools and approaches used for identification and analysis of different types of malicious code and discovery of its main functions. It teaches the skills necessary for ...
AI Robotics, Drone - UAV / UAS Practical Skills Building
Principals of UAVs and the Ground Control Station (UAS) Flight Safety and Check Regional Laws Flight Planning Software and Digital Data Storage USB Programmers / UART / JTAG System Hardware Architecture Software ...
Implem. Cisco Service Provider Advanced Routing Solutions
This course is for professionals who need knowledge about implementing various Service Provider core technologies and advanced routing technologies..
Purple Teaming and practical threat emulation
This one-day course covers basics of threat emulation and cooperative security testing - or "purple teaming" - in modern organizations. It teaches trainees about methodologies relevant for threat emulation ...
Quantitative risk analysis
Understand the importance of risk analysis for cyber security Know how to do risk analysis Learn to perform a basic risk analysis and use it to solve problems in cyber security .
Wi-Fi attacks and penetration testing
This course is introduction to Wi-Fi security testing and is meant for engineers that requires theoretical and practical knowledge to conduct security assessment on corporate and other Wi-Fi networks.
Cyber Attack and Defense in Practice
After completion of the course, students will be able to: Perform basic security tests Detect the most common web application vulnerabilities Perform social engineering penetration tests Analyze e-mail ...
Security Monitoring and Incident Response
This two-day technical course covers basic theoretical and practical aspects of security monitoring, analysis and incident response in modern organizations. Students will learn basics of security monitoring and ...
Introduction to Threat Hunting
This one-day technical training is an extension to the "Security monitoring and incident response" course and covers basic theoretical approaches and practical aspects of network and endpoint threat hunting.
Implement. and Operat. Cisco Service Prov. Net. Core Techn.
The course provides network engineers with the knowledge and skills needed to configure, verify, troubleshoot, and optimize, Service Provider IP network infrastructures. This course is intended to be a deep dive into ...