Sort by
Filter
Online / Onsite Cancel filter
Guaranteed term
Technology Cancel filter
Location
Difficulty
Windows Infrastructure Security
The goal of the training is to provide participants with an insight into the workings of basic on-premise infrastructure built on the Windows Server operating system and enrich their understanding of principles of ...
Firewall: Configuration and Management (EDU-210)
The Palo Alto Networks Firewall 10.0 Essentials: Configuration and Management (EDU-210) course is five days of instructor-led training that will help you to: Configure and manage the essential features of Palo Alto ...
Panorama: Managing Firewalls at Scale (EDU-220)
Certified Ethical Hacker v11
Certified Ethical Hacker v11 is the latest version of the world's most popular and most prestigious EC-Council training. Students have the unique opportunity to become familiar with the strategies, techniques and ...
Network Security – Ethical Hacking
This five-day advanced course introduces and explains common hacking technics commonly used on current wired as well as wireless intranets which interconnect systems based on Microsoft Windows operating system platform.
IT for non IT
Theoretical course focused on non-professional attendees. In a fun and understandable way, the training will introduce you briefly to today's IT trends, how the Internet works, how does the enterprise IT looks like ...
Cyber Attack and Defense in Practice
After completion of the course, students will be able to: Perform basic security tests Detect the most common web application vulnerabilities Perform social engineering penetration tests Analyze e-mail ...
Security Monitoring and Incident Response
This two-day technical course covers basic theoretical and practical aspects of security monitoring, analysis and incident response in modern organizations. Students will learn basics of security monitoring and ...
Implementing and Operating Cisco Security Core Technologies
This is the main course, which is designed to prepare for CCNP Security certification, and the test from this course is also used to complete the CCIE Security lab. This five-day course will prepare network security ...
Introduction to Threat Hunting
This one-day technical training is an extension to the "Security monitoring and incident response" course and covers basic theoretical approaches and practical aspects of network and endpoint threat hunting.
Cortex XDR: Prevention, Analysis, and Response (EDU-260)
Describe the architecture and components of the Cortex XDR family Use the Cortex XDR management console, including reporting Create Cortex XDR agent installation packages, endpoint groups, and policies Deploy Cortex ...
Prisma Access SASE Security: Design and Operation (EDU-318)
The Prisma Access SASE Security: Design and Operation (EDU-318) course describes Prisma Access Secure Access Service Edge (SASE) and how it helps organizations embrace cloud and mobility by providing network and ...