Sort by
Filter
Online / Onsite Cancel filter
Guaranteed term
Technology Cancel filter
Location
Language
Difficulty
Secure coding
Identify the need for security in software development projects Eliminate vulnerabilities in software Implement basic security mechanisms to protect users and data Use multiple testing methodologies to find and ...
CompTIA Pentest+
The course is designed to give participants practical skills and theoretical knowledge in the area of penetration testing necessary to succeed in the CompTIA Pentest+ certification exam.
Implementing Secure Solutions with Virtual Private Networks
In this training, participants will learn how to secure data that goes through a network infrastructure by implementing a VPN solution built on Cisco products. Participants will gain experience in configuring ...
Security Monitoring and Incident Response
This two-day technical course covers basic theoretical and practical aspects of security monitoring, analysis and incident response in modern organizations. Students will learn basics of security monitoring and ...
Certified Information Systems Security Professional
If you are working or involved in cybersecurity or information governance, it is now time to take your experience to the next level. This course is ideal for individuals with security responsibilities, such as: ...
Windows Infrastructure Security
The goal of the training is to provide participants with an insight into the workings of basic on-premise infrastructure built on the Windows Server operating system and enrich their understanding of principles of ...
Securing Networks with Cisco Firepower Next Gen. Firewall
The goal of this course is to provide you with a solid foundation in Firepower Threat defense NGFW technology. You will gain the competency and skills required to implement and manage a Firepower system regardless ...
Introduction to Threat Hunting
This one-day technical training is an extension to the "Security monitoring and incident response" course and covers basic theoretical approaches and practical aspects of network and endpoint threat hunting.
Cortex XDR: Prevention, Analysis, and Response (EDU-260)
Describe the architecture and components of the Cortex XDR family Use the Cortex XDR management console, including reporting Create Cortex XDR agent installation packages, endpoint groups, and policies Deploy Cortex ...
Prisma Access SASE Security: Design and Operation (EDU-318)
The Prisma Access SASE Security: Design and Operation (EDU-318) course describes Prisma Access Secure Access Service Edge (SASE) and how it helps organizations embrace cloud and mobility by providing network and ...
Quantitative risk analysis
Understand the importance of risk analysis for cyber security Know how to do risk analysis Learn to perform a basic risk analysis and use it to solve problems in cyber security .
Administration NGINX plus and NAP
ALEF NGINX+ and NGINX App Protect(NAP) course provides you the foundation to the administering NGINX+ and NAP. In the lectures and hands-on lab activities you will administer NGINX+ and NAP, using NGINX commands and ...
Malware analysis
This one-day course covers basic techniques, tools and approaches used for identification and analysis of different types of malicious code and discovery of its main functions. It teaches the skills necessary for ...
Public Key Infra. and Active Directory Certificate Services
In this course, you will learn how to: Choose adequate cryptographic algorithms for operating your public key infrastructure. Grasp the technical nature of certificates and meaning of individual fields of their ...