Sortare dupa
Filter
Online / Onsite
Termen garantat
Furnizor Anulează filtru
Tehnologie Anulează filtru
Localitate
Limbă
Dificultate
Microsoft Identity and Access Administrator
In this Microsoft Certified: Identity and Access Administrator Associate course, you’ll learn to design, implement and operate your business' identity and access management system by using Azure AD.
Microsoft Security Operations Analyst
About This Course Learn how to investigate, respond to, and hunt for threats using Microsoft Sentinel, Microsoft Defender for Cloud, and Microsoft 365 Defender. In this course you will learn how to ...
Microsoft Security, Compliance and Identity Fundamentals
The audience for this course is looking to familiarize themselves with the fundamentals of security, compliance, and identity (SCI) across cloud-based and related Microsoft services.
Microsoft Information Protection Administrator
Learn how to protect information in your Microsoft 365 deployment. This course focuses on data governance and information protection within your organization. The course covers implementation of data loss prevention ...
Understanding Cisco Wireless Foundations
This course will help you: Learn the skills, technologies, and best practices needed to manage a Cisco WLAN network Understand and implement a Cisco wireless network architecture Design and implement WLAN ...
Understanding Cisco CybersecurOperations Fundamentals v1.0
After taking this course, you should be able to: Explain how a Security Operations Center (SOC) operates and describe the different types of services that are performed from a Tier 1 SOC analyst’s perspective.
Security Monitoring and Incident Response
This two-day technical course covers basic theoretical and practical aspects of security monitoring, analysis and incident response in modern organizations. Students will learn basics of security monitoring and ...
Cyber Attack and Defense in Practice
After completion of the course, students will be able to: Perform basic security test Detect most common web application vulnerabilities Perform social engineering penetration test Analyze e-mail headers Analyze ...