Securing Email with Cisco Email Security Appliance
At the end of the course, attendees will possess a working knowledge of how to use Cisco IronPort email security appliances to successfully manage and troubleshoot email traffic entering and leaving the enterprise ...
Implementing and Configuring the Cisco Identity Serv. Engine
The Implementing and Configuring Cisco Identity Services Engine (SISE) v3.0 course shows you how to deploy and use Cisco® Identity Services Engine (ISE) v2.4, an identity and access control policy platform that ...
Azure Fundamentals
This one-day course will provide foundational level knowledge on cloud concepts; core Azure services; security, privacy, compliance, and trust; and Azure pricing and support..
Azure Administrator Associate
This course teaches IT Professionals how to secure identities, manage their Azure subscriptions, administer the infrastructure, configure virtual networking, connect Azure and on-premises sites, manage network ...
AWS Security Essentials
In this course, you will learn to: Identify security benefits and responsibilities when using the AWS Cloud Describe the access control and management features of AWS Understand the different data encryption methods ...
Implementing and Operating Cisco Security Core Technologies
This is the main course, which is designed to prepare for CCNP Security certification, and the test from this course is also used to complete the CCIE Security lab. This five-day course will prepare network security ...
MITRE ATT&CK Practical
This one-day course covers practical use cases for development of cyber security capabilities in modern organizations with the help of MITRE ATT&CK framework. Trainees will learn to use MITRE ATT&CK in threat ...
CompTIA Cybersecurity Analyst - CySA+
After completion of the course, students will be able to: Assess information security risk in computing and network environments Analyze the cybersecurity threat landscape Analyze reconnaissance threats to computing ...
Network Security – Ethical Hacking
This five-day advanced course introduces and explains common hacking technics commonly used on current wired as well as wireless intranets which interconnect systems based on Microsoft Windows operating system platform.
CompTIA Security+
Objectives can be separated into these domains: Threats, Attacks and Vulnerabilities Technologies and Tools Architecture and Design Identity and Access Management Risk Management Cryptography and PKI Inside of ...
Firewall: Configuration and Management (EDU-210)
The Palo Alto Networks Firewall 10.0 Essentials: Configuration and Management (EDU-210) course is five days of instructor-led training that will help you to: Configure and manage the essential features of Palo Alto ...
Implement. and Operat. Cisco Service Prov. Net. Core Techn.
The course provides network engineers with the knowledge and skills needed to configure, verify, troubleshoot, and optimize, Service Provider IP network infrastructures. This course is intended to be a deep dive into ...
Public Key Infra. and Active Directory Certificate Services
In this course, you will learn how to: Choose adequate cryptographic algorithms for operating your public key infrastructure. Grasp the technical nature of certificates and meaning of individual fields of their ...