Microsoft Azure SecurityTechnologies
This course provides IT Security Professionals with the knowledge and skills needed to implement security controls, maintain an organization’s security posture, and identify and remediate security vulnerabilities.
Securing Networks with Cisco Firepower Next Gen. Firewall
This class will help you: Implement Cisco Firepower NGFW to provide advanced threat protection before, during, and after attacks Gain leading-edge skills for high-demand responsibilities focused on security Earn 40 ...
Understanding Cisco CybersecurOperations Fundamentals v1.0
After taking this course, you should be able to: Explain how a Security Operations Center (SOC) operates and describe the different types of services that are performed from a Tier 1 SOC analyst’s perspective.
Designing and Implementing aData Science Solution on Azure
The Azure Data Scientist applies their knowledge of data science and machine learning to implementing and running machine learning workloads on Microsoft Azure; in particular, using Azure Machine Learning Service.
Cortex XDR:Prevention and Deployment (EDU-260)
Describe the architecture and components of the Cortex XDR family Use the Cortex XDR management console, including reporting Create Cortex XDR agent installation packages, endpoint groups, and policies Deploy Cortex ...
Prisma Access SASE Security:Design and Operation (EDU-318)
The Prisma Access SASE Security: Design and Operation (EDU-318) course describes Prisma Access Secure Access Service Edge (SASE) and how it helps organizations embrace cloud and mobility by providing network and ...
Security Monitoring and Incident Response
This two-day technical course covers basic theoretical and practical aspects of security monitoring, analysis and incident response in modern organizations. Students will learn basics of security monitoring and ...
Cyber Attack and Defense in Practice
After completion of the course, students will be able to: Perform basic security test Detect most common web application vulnerabilities Perform social engineering penetration test Analyze e-mail headers Analyze ...