CompTIA Cybersecurity Analyst - CySA+
After completion of the course, students will be able to: Assess information security risk in computing and network environments Analyze the cybersecurity threat landscape Analyze reconnaissance threats to computing ...
CompTIA Security+
Objectives can be separated into these domains: Threats, Attacks and Vulnerabilities Technologies and Tools Architecture and Design Identity and Access Management Risk Management Cryptography and PKI Inside of ...
Network Security – Ethical Hacking
This five-day advanced course introduces and explains common hacking technics commonly used on current wired as well as wireless intranets which interconnect systems based on Microsoft Windows operating system platform.
Certified Information Systems Security Professional
If you are working or involved in cybersecurity or information governance, it is now time to take your experience to the next level. This course is ideal for individuals with security responsibilities, such as: ...
TRN_SO_VYJ
You'll participate in 4 practical negotiation simulations and you'll receive feedback from your colleagues and an acknowledged negotiation expert. You'll see short films of negotiators and you'll learn from their ...
Malware analysis
This one-day course covers basic techniques, tools and approaches used for identification and analysis of different types of malicious code and discovery of its main functions. It teaches the skills necessary for ...
CompTIA Pentest+
The course is designed to give participants practical skills and theoretical knowledge in the area of penetration testing necessary to succeed in the CompTIA Pentest+ certification exam.
Certified Ethical Hacker v11
Certified Ethical Hacker v11 is the latest version of the world's most popular and most prestigious EC-Council training. Students have the unique opportunity to become familiar with the strategies, techniques and ...
Splunk Administration
The training aims to give participants the knowledge needed to understand, manage, configure, design, and troubleshoot Splunk deployment. This course is focused on architecture, license management, configuration, and ...
Splunk Reporting
Reporting course is a continuation of the Basics course and is primarily intended for Splunk users and knowledge managers. It can be also appreciated by anyone interested in furthering their knowledge of the SPL ...
Splunk Data Onboarding
The content of this course is an extended explanation of data processing with Splunk technology. Participants will be introduced to the data onboarding process, with hands-on practical examples, and gain the ...
Power User Fast Start
This course is for Splunk Power Users who want to become experts on the following Splunk topics : Working with Time : for power users who want to become experts at using time in searches.
FBI negotiator training with Radim Parik
Negotiate. There are some of the most difficult negotiations ahead of you. We will prepare you for them. During a 3-day intensive training course, we will form a negotiation team, and prepare your strategy and demands.