Network Security – Ethical Hacking
This five-day advanced course introduces and explains common hacking technics commonly used on current wired as well as wireless intranets which interconnect systems based on Microsoft Windows operating system platform.
Certified Information Systems Security Professional
If you are working or involved in cybersecurity or information governance, it is now time to take your experience to the next level. This course is ideal for individuals with security responsibilities, such as: ...
Azure Fundamentals
This one-day course will provide foundational level knowledge on cloud concepts; core Azure services; security, privacy, compliance, and trust; and Azure pricing and support..
Azure Network Engineer Associate
This course teaches Network Engineers how to design, implement, and maintain Azure networking solutions. This course covers the process of designing, implementing, and managing core Azure networking infrastructure, ...
AWS Security Essentials
In this course, you will learn to: Identify security benefits and responsibilities when using the AWS Cloud Describe the access control and management features of AWS Understand the different data encryption methods ...
AWS Technical Essentials
In this course, you will learn: Terminology and concepts related to the AWS platform How to navigate the AWS Management Console Key concepts of AWS security measures and AWS Identity and Access Management ...
Architecting on AWS
In this course, you will learn how to: Make architectural decisions based on AWS architectural principles and best practices Leverage AWS services to make your infrastructure scalable, reliable, and highly ...
Malware analysis
This one-day course covers basic techniques, tools and approaches used for identification and analysis of different types of malicious code and discovery of its main functions. It teaches the skills necessary for ...
Splunk Administration
The training aims to give participants the knowledge needed to understand, manage, configure, design, and troubleshoot Splunk deployment. This course is focused on architecture, license management, configuration, and ...
Firewall: Configuration and Management (EDU-210)
The Palo Alto Networks Firewall 10.0 Essentials: Configuration and Management (EDU-210) course is five days of instructor-led training that will help you to: Configure and manage the essential features of Palo Alto ...
Security Engineering on AWS
In this course, you will learn how to: Assimilate and leverage the AWS shared security responsibility model Architect and build AWS application infrastructures that are protected against the most common security ...
Splunk Data Onboarding
The content of this course is an extended explanation of data processing with Splunk technology. Participants will be introduced to the data onboarding process, with hands-on practical examples, and gain the ...