Saudi Arabia , Dammam |
|||
---|---|---|---|
|
SECURING NETWORKS WITH FIREPOWER THREAT DEFENSE NGFWThe Securing Networks with Cisco Firepower Threat Defense NGFW (FIREPOWER200) course demonstrates the powerful features of Cisco Firepower Threat Defense, including VPN configuration, traffic control, NAT configuration, ... |
|
Register |
|
RED HAT IDENTITY MANAGEMENT AND ACTIVE DIRECTORY INTEGRATION WITH EXAM (EX362)This course teaches you skills on the most requested Red Hat Identity Management (IdM) capabilities, including Active Directory trusts, multi-product federation, configuration management with Ansible, integrated certific ... |
|
Register |
|
PANORAMA 8.1: MANAGING FIREWALLS AT SCALE (EDU-220)This course will help students to gain in-depth knowledge about how to configure and manage their Palo Alto Networks® Panorama TM management server. Upon completion of this course, administrators should be familiar with ... |
|
Register |
|
CONFIGURING JUNIPER NETWORKS FIREWALL/IPSEC VPN PRODUCTSThis course is the first in the Screen OS curriculum. It is a three-day, instructor-led course that focuses on configuration of the Screen OS firewall/virtual private network (VPN) products in a variety of situations, in ... |
|
Register |
|
BLUE COAT CERTIFIED PROXY PROFESSIONALIn the Blue Coat Certified Proxy Professional (BCCPP) course, you will learn to configure your Blue Coat Proxy appliance for high availability and multi-site deployments, advance policy features, web content control, P2P ... |
|
Register |
|
CERTIFIED IN THE GOVERNANCE OF ENTERPRISE ITAs technology has become more and more vital to the achievement of business goals and value delivery, enterprise leaders have realized that enterprise governance must be extended to information technology and information ... |
|
Register |
|
CISSP CERTIFICATION PREP COURSE V1.0Gain core knowledge and experience to successfully implement and manage security programs and prepare for the CISSP certification. This course is the most comprehensive review of information security concepts and industr ... |
|
Register |
|
Channel Partner Securing Email with Cisco Email Security ApplianceThis course is designed to help learners understand how to install, configure, and manage the Cisco Email Security Appliance in a small to medium-sized business and enterprise installation. Knowledge application and basi ... |
|
Register |
|
Implementing Cisco Identity Services Engine for Wireless EngineersThis course has been designed to enable wireless engineers understand the concepts, architecture, and use cases of the Cisco Identity Services Engine Solution. This course provides students with the knowledge and skills ... |
|
Register |
|
IBM QRADAR SIEM FOUNDATIONSIBM QRadar SIEM provides deep visibility into network, user, and application activity. It provides collection, normalization, correlation, and secure storage of events, flows, asset profiles, and vulnerabilities. QRadar ... |
|
Register |
|
COMPTIA CSA+ CYBERSECURITY ANALYSTThe CompTIA CSA+ certification is a vendor-neutral credential. The CompTIA CSA+ exam (Exam CS0-001) is an internationally targeted validation of intermediate-level security skills and knowledge. The course has a technica ... |
|
Register |
|
IMPLEMENTING AND CONFIGURING CISCO IDENTITY SERVICES ENGINEThe Implementing and Configuring Cisco Identity Services Engine course shows you how to deploy and use Cisco Identity Services Engine (ISE) v2.4, an identity and access control policy platform that simplifies the deliver ... |
|
Register |
|
CONFIGURING AND DEPLOYING A PRIVATE CLOUDThis course equips students with the skills they require to configure and deploy a cloud using Microsoft System Center 2012 R2. Using hands-on labs, students learn the following: - Produce a high-level design that acc ... |
|
Register |
|
CompTIA Pentest +As organizations scramble to protect themselves and their customers against privacy or security breaches, the ability to conduct penetration testing is an emerging skill set that is becoming ever more valuable to the org ... |
|
Register |
|
PALO ALTO EXTENDED FIREWALL MANAGEMENT (205)Extended Firewall Management is the next-level follow-on course to Palo Alto Networks® Installation, Configuration, and Management (PAN-EDU-201). Extended Firewall Management expands on 201 course topics, while introduci ... |
|
Register |
|
EC-COUNCIL CERTIFIED SOC ANALYST (CSA)The Certified SOC Analyst (CSA) program is the first step to joining a security operations center (SOC). It is engineered for current and aspiring Tier I and Tier II SOC analysts to achieve proficiency in performing entr ... |
|
Register |
|
IMPLEMENTING ADVANCED CISCO ASA SECURITY V2.0This course provides up-to-date training on the key features of the Cisco ASA 5500-X Series next-Generation Firewall, including ASAv, ASA IDFW, ASA Fire POWER Service Module, ASA Cloud Web Security and ASA Clustering. Ex ... |
|
Register |
|
IMPLEMENTING AND MANAGING WINDOWS 10This course is designed to provide students with the knowledge and skills required to install and configure Windows 10 desktops and devices in a Windows Server domain corporate environment. These skills include learning ... |
|
Register |
|
DEPLOYING AND MANAGING WINDOWS 10 USING ENTERPRISE SERVICESThis 5-day course provides administrators with the knowledge and skills needed to deploy and manage Windows 10 desktops, devices, and applications in an enterprise environment. Students learn how to plan and implement Wi ... |
|
Register |
|
SYMANTEC CLOUD SOC ADMINISTRATION R2The Cloud SOC R2 Administration course provides an overview of the Cloud SOC service, covering initial setup, deployment options and service configuration. The courseware introduces each topic with an accompanying workfl ... |
|
Register |
|
IBM ACCESS MANAGER PLATFORM FOUNDATIONSIBM Access Manager is a highly scalable and configurable access management solution. It simplifies and secures your user experience with single sign-on across applications and protects critical assets using strong multi- ... |
|
Register |
|
Certified Cloud Security Professional Certification PreparationAs powerful as cloud computing is for the organization, understanding its information security risks and mitigation strategies is critical. Legacy approaches are inadequate, and organizations need competent, experienced ... |
|
Register |
|
CYBERSECURITY FOUNDATIONSWhen you consider just a few of the consequences of a security breach - your proprietary information completely accessible, hefty fines for security lapses, news headlines about your company's security breach, it becomes ... |
|
Register |
|
ETHICAL HACKING AND COUNTERMEASURES V.10The Certified Ethical Hacker (C|EH v10) program is a trusted and respected ethical hacking training Program that any information security professional will need. Since its inception in 2003, the Certified Ethical Hacker ... |
|
Register |
|
MASTER CLASS ISO 27001 IMPLEMENTATIONThis five-day intensive course enables the participants to develop the expertise to support an organization in implementing and managing an Information Security Management System (ISMS) as specified in ISO/IEC 27001:2013 ... |
|
Register |
|
EC-COUNCIL CERTIFIED SECURITY ANALYST V.10The ECSA program offers a seamless learning progress continuing where the CEH program left off. The new ECSAv10 includes updated curricula and an industry recognized comprehensive step-by step penetration testing method ... |
|
Register |
|
CLIENT MANAGEMENT SUITE 8.1 ADMINISTRATIONThe Client Management Suite 8.1 Administration course is designed for professionals tasked with using Symantec’s Client Management Suite (CMS) to manage their software and hardware resources in their organizations. This ... |
|
Register |
|
Blue Coat Certified Proxy AdministratorThe Blue Coat Certified Proxy SG Professional (BCCPP) Course is intended for IT professionals who wish to master the advance features of the Blue Coat Proxy SG. |
|
Register |
|
Implementing Forefront Unified Access Gateway 2010This three-day instructor-led course prepares you to design and deploy remote access solutions using Microsoft Forefront Unified Access Gateway 2010 (UAG). Forefront UAG provides organizations with unparalleled flexibili ... |
|
Register |
|
CYBER SEC FIRST RESPONDER: THREAT DETECTION AND RESPONSEThis course covers the duties of those who are responsible for monitoring and detecting security incidents in information systems and networks, and for executing a proper response to such incidents. Depending on the size ... |
|
Register |
|
CERTIFIED INFORMATION SYSTEMS AUDITORCISA® is a trademark of the Information Systems Audit and Control Association® (ISACA®) More than 60,000 security professionals hold CISA certification, which was awarded the "Best Professional Certification" for 2009 b ... |
|
Register |
|
EC - COUNCIL CERTIFIED SECURE PROGRAMMERSoftware defects, bugs, and flaws in the logic of the program are consistently the cause for software vulnerabilities. Analysis by software security professionals has proven that most vulnerabilities are due to errors i ... |
|
Register |
|
FIREWALL 8.1: TROUBLESHOOTING (EDU-330)Successful completion of this three-day, instructor-led course will enhance the participant’s understanding of how to troubleshoot the full line of Palo Alto Networks® next-generation firewalls. Participants will have o ... |
|
Register |
|
CERTIFIED INTERNET OF THINGS PRACTITIONER (CIOTP) CERTIFICATIONThe Internet of Things (IoT) promises a wide range of benefits for industry, energy and utility companies, municipalities, healthcare, and consumers. Data can be collected in extraordinary volume and detail regarding alm ... |
|
Register |
|
NSX-T: INSTALL, CONFIGURE, MANAGEThis five-day, fast-paced course provides comprehensive training on how to install, configure, and manage a VMware NSX-T™ Data Center environment. This course covers key NSX-T Data Center features and functionality offer ... |
|
Register |
|
Implementing Cisco Secure MobilityThis course is designed to prepare network security engineers with the knowledge and skills they need to protect data traversing a public or shared infrastructure such as the Internet by implementing and maintaining Cisc ... |
|
Register |
|
CISCO ASA WITH FIREPOWER SERVICES WORKSHOPThe Cisco Next-Generation Firewall (NGFW) is the industry’s first fully integrated, threat-focused NGFW. It delivers comprehensive, unified policy management of firewall functions, application control, threat prevention, ... |
|
Register |
|
RED HAT SECURITY: SECURING CONTAINERS AND OPEN SHIFT WITH EXAMYou will learn and validate your skills in using secure and trusted container images, registries, and source code; managing network and storage isolation; implementing application single sign-on; and configuring appropri ... |
|
Register |
|
JUNOS SPACE-SECURITY DIRECTORThis two-day course is designed to provide students with the knowledge required to manage the Junos Space Security Director application and manage devices with that application. Students will gain in-depth knowledge of h ... |
|
Register |
|
MANAGING AND DEFENDING AGAINST CURRENT THREATSThis is a deep dive course on security operations: vulnerability management, anomalies detection, discovery of industry attacks and threats, understanding how compromised system or solution looks like, defining the indic ... |
|
Register |
|
BLUE COAT CERTIFIED SECURITY ANALYTICS PROFESSIONALThe Blue Coat Certified Security Analytics Professional (BCSAP) course designed for participants who want to learn how to use the Blue Coat Security Analytics platform to perform virtually any type of network-based monit ... |
|
Register |
|
PERFORMANCE TUNING AND OPTIMIZING SQL DATABASESThis four-day instructor-led course provides students who manage and maintain SQL Server databases with the knowledge and skills to performance tune and optimize their databases. |
|
Register |
|
CITRIX ENTERPRISE SECURITY SOLUTIONSLearn to secure your Citrix environment in this hands-on course that encompasses the core Citrix technologies, including Citrix Virtual Apps and Desktops, ADC, Endpoint Management, Content Collaboration and Citrix Cloud. ... |
|
Register |
|
EC-COUNCIL CERTIFIED INCIDENT HANDLERThe EC-Council Certified Incident Handler (ECIH) program is designed to provide the fundamental skills to handle and respond to the computer security incidents in an information system. The course addresses various under ... |
|
Register |
|
SYMANTEC IT MANAGEMENT SUITE 8.1 DIAGNOSTICS AND TROUBLESHOOTINGThe Symantec IT Management Suite 8.1 Diagnostics and Troubleshooting course is designed for professionals tasked with maintaining and utilizing a Symantec IT Management Suite (ITMS) implementation in their organizations. ... |
|
Register |
|
EC-COUNCIL NETWORK SECURITY ADMINISTRATORThis course looks at the network security in defensive view. The ENSA program is designed to provide fundamental skills needed to analyze the internal and external security threats against a network, and to develop secur ... |
|
Register |
|
SYMANTEC DEPLOYMENT SOLUTION 8.1 ADMINISTRATIONThe Symantec Deployment Solution 8.1: Administration course is designed for the professional tasked with installing, configuring, and managing a Deployment Solution system. This five-day, instructor-led, hands-on course ... |
|
Register |
|
Implementing Cisco Identity Services Engine for Wireless EngineersThis course has been designed to enable wireless engineers understand the concepts, architecture, and use cases of the Cisco Identity Services Engine Solution. This course provides students with the knowledge and skills ... |
|
Register |
|
RHS333-BUNDLE: RED HAT ENTERPRISE SECURITY: NETWORK SERVICES + EX333Red Hat® Enterprise Security: Network Services with Exam is an intensive course that provides 4 days of instruction and labs that show students how to use the latest technologies to secure services. This class advances b ... |
|
Register |
|
BLUE COAT CERTIFIED PROXY PROFESSIONALIn the Blue Coat Certified Proxy Professional (BCCPP) course, you will learn to configure your Blue Coat Proxy appliance for high availability and multi-site deployments, advance policy features, web content control, P2P ... |
|
Register |
|
BLUE COAT CERTIFIED SECURITY ANALYTICS ADMINISTRATORThe Blue Coat Certified Security Analytics Administrator (BCSAA) course is intended for IT professionals who want to master the fundamentals of the Blue Coat Security Analytics solution. |
|
Register |
|
Certified Cloud Security Professional Certification PreparationAs powerful as cloud computing is for the organization, understanding its information security risks and mitigation strategies is critical. Legacy approaches are inadequate, and organizations need competent, experienced ... |
|
Register |
|
CISCO ASA WITH FIREPOWER SERVICES WORKSHOPThe Cisco Next-Generation Firewall (NGFW) is the industry’s first fully integrated, threat-focused NGFW. It delivers comprehensive, unified policy management of firewall functions, application control, threat prevention, ... |
|
Register |
|
CERTIFIED CHIEF INFORMATION SECURITY OFFICEREC-Council’s CCISO Program has certified leading information security professionals around the world. A core group of high-level information security executives, the CCISO Advisory Board, contributed by forming the found ... |
|
Register |
|
SYMANTEC CLIENT MANAGEMENT SUITE 8.5 ADMINISTRATIONThe Client Management Suite 8.5 Administration course is designed for professionals tasked with using Symantec’s Client Management Suite (CMS) to manage their software and hardware resources in their organizations. This ... |
|
Register |
|
CONFIGURING JUNIPER NETWORKS FIREWALL/IPSEC VPN PRODUCTSThis course is the first in the Screen OS curriculum. It is a three-day, instructor-led course that focuses on configuration of the Screen OS firewall/virtual private network (VPN) products in a variety of situations, in ... |
|
Register |
|
CERTIFIED SECURE COMPUTER USER - AWARENESS TRAININGThe purpose of the CSCU training program is to provide individuals with the necessary knowledge and skills to protect their information assets. This class will immerse students into an interactive environment where they ... |
|
Register |
UAE , Dubai |
|||
---|---|---|---|
|
CYBER SEC FIRST RESPONDER™ (CFR) CERTIFICATIONThis course covers network defense and incident response methods, tactics, and procedures are taught in alignment with industry frameworks such as NIST 800-61 r.2 (Computer Security Incident Handling), US-CERT’s NCISP (N ... |
|
Register |
|
PALO ALTO NETWORKS® TRAPS™ ADVANCED ENDPOINT PROTECTION (PAN-EDU-281)This instructor-led course teaches strategies in defense against advanced threats. Successful completion of this course enables administrators to better understand the threat landscape. Students will learn the use of Pal ... |
|
Register |
|
CERTIFIED SECURE COMPUTER USER - AWARENESS TRAININGThe purpose of the CSCU training program is to provide individuals with the necessary knowledge and skills to protect their information assets. This class will immerse students into an interactive environment where they ... |
|
Register |
|
NETWORK AND SECURITY MANAGER FUNDAMENTALSThis two-day course discusses the basic operations of Network and Security Manager. Key topics include server and domain administration, device configuration, template creation and management, policy creation and managem ... |
|
Register |
|
EC-COUNCIL CERTIFIED ENCRYPTION SPECIALISTThe EC-Council Certified Encryption Specialist (ECES) program introduces professionals and students to the field of cryptography. The participants will learn the foundations of modern symmetric and key cryptography inclu ... |
|
Register |
|
CERTIFIED IN RISK AND INFORMATION SYSTEMS CONTROLThe CRISC Review Manual and CRISC Review, Questions, Answers and Explanation Manual will be provided to delegates booked on the course. |
|
Register |
|
IBM SECURITY IDENTITY MANAGER FOUNDATIONSThis is an instructor-led course that introduces students to the foundational skills required to install, configure, and administer IBM Security Identity Manager,. IBM Security Identity Manager can be deployed using the ... |
|
Register |
|
CITRIX ENTERPRISE SECURITY SOLUTIONSLearn to secure your Citrix environment in this hands-on course that encompasses the core Citrix technologies, including Citrix Virtual Apps and Desktops, ADC, Endpoint Management, Content Collaboration and Citrix Cloud. ... |
|
Register |
|
IMPLEMENTING CISCO THREAT CONTROL SYSTEMSImplementing Cisco Threat Control Solutions is designed to provide security engineers with the knowledge and hands-on experience required to deploy Cisco’s Email Security (ESA); Web Security (CWS, WSA); Advanced Malware ... |
|
Register |
|
EC-COUNCIL CERTIFIED INCIDENT HANDLERThe EC-Council Certified Incident Handler (ECIH) program is designed to provide the fundamental skills to handle and respond to the computer security incidents in an information system. The course addresses various under ... |
|
Register |
|
MASTERCLASS: RED TEAM - BLUE TEAM OPERATIONSThis is a deep dive course on Red Team – Blue Team Operations: The cyber kill chain Security is a business enabler, and it is only when it is viewed from a business perspective that we can truly make the right decision ... |
|
Register |
|
CERTIFIED IN THE GOVERNANCE OF ENTERPRISE ITAs technology has become more and more vital to the achievement of business goals and value delivery, enterprise leaders have realized that enterprise governance must be extended to information technology and information ... |
|
Register |
|
JUNOS INTRUSION PREVENTION SYSTEM FUNCTIONALITYThe Junos Intrusion prevention System Functionality (JIPS) course is designed to provide an introduction to the Intrusion Prevention System (IPS) feature set available on the Juniper Networks SRX Series Services Gateway. ... |
|
Register |
|
BLUE COAT CERTIFIED PROXY PROFESSIONALIn the Blue Coat Certified Proxy Professional (BCCPP) course, you will learn to configure your Blue Coat Proxy appliance for high availability and multi-site deployments, advance policy features, web content control, P2P ... |
|
Register |
|
ADVANCED JUNOS SECURITYThis five-day course, which is designed to build off the current Junos Security (JSEC) offering, delves deeper into Junos security and next-generation security features. Through demonstrations and hands-on labs, you will ... |
|
Register |
|
SECURING CISCO NETWORKS WITH SNORT RULE WRITING BEST PRACTICESSecuring Cisco Networks with Snort Rule Writing Best Practices is a lab-intensive course that introduces students to the open source Snort community and rule-writing best practices. Users focus exclusively on the Snort r ... |
|
Register |
|
Certified Cloud Security Professional Certification PreparationAs powerful as cloud computing is for the organization, understanding its information security risks and mitigation strategies is critical. Legacy approaches are inadequate, and organizations need competent, experienced ... |
|
Register |
|
SYMANTEC DATA LOSS PREVENTION 14.6 ADMINISTRATIONThe Symantec Data Loss Prevention 14.X: Administration course is designed to provide you with the fundamental knowledge to configure and administer the Symantec Data Loss Prevention Enforce platform. The hands-on labs i ... |
|
Register |
|
VMWARE NSX-T DATA CENTER: INSTALL, CONFIGURE, MANAGEThis five-day, fast-paced course provides comprehensive training on how to install, configure, and manage a VMware NSX-T™ Data Center environment. This course covers key NSX-T Data Center features and functionality offer ... |
|
Register |
|
IMPLEMENTING CISCO UNIFIED COMMUNICATIONS SECURITYThe Implementing Cisco Unified Communications Security (UCSEC) course is designed to provide students with the necessary knowledge and skills to implement security features in a Cisco Unified Communications environment. ... |
|
Register |
|
SYMANTEC CLIENT MANAGEMENT SUITE 8.5 ADMINISTRATIONThe Client Management Suite 8.5 Administration course is designed for professionals tasked with using Symantec’s Client Management Suite (CMS) to manage their software and hardware resources in their organizations. This ... |
|
Register |
|
SYMANTEC MESSAGING GATEWAY 10.6 ADMINISTRATIONThe Symantec Messaging Gateway 10.6: Administration course is designed to provide you with the fundamental knowledge to configure and administer the Symantec Messaging Gateway. This two-day, instructor-led, hand son clas ... |
|
Register |
|
SECURITY FUNDAMENTALSIn this course, you will be introduced to security concepts for today's business and technology professionals. You will cover layered security philosophy, physical security, Internet security, and wireless security princ ... |
|
Register |
|
BLUE COAT PACKET SHAPER PROFESSIONALBlue Coat Certified Packet Shaper Administrator (BCPSA) certification or waiver exam; student should have practical experience with the Packet Shaper appliance in the field with a solid understanding of networking and ge ... |
|
Register |
|
RED TEAM VS BLUE TEAM CYBERWAR CHALLENGETwo Teams, two different approaches, Red Team vs Blue Team Cyberwar Challenge! The cyber kill chain - reconnaissance, attack planning and delivery, system exploitation, privilege escalation and lateral movement, anomalie ... |
|
Register |
|
Channel Partner Securing Email with Cisco Email Security ApplianceThis course is designed to help learners understand how to install, configure, and manage the Cisco Email Security Appliance in a small to medium-sized business and enterprise installation. Knowledge application and basi ... |
|
Register |
|
EC-COUNCIL CERTIFIED SOC ANALYST (CSA)The Certified SOC Analyst (CSA) program is the first step to joining a security operations center (SOC). It is engineered for current and aspiring Tier I and Tier II SOC analysts to achieve proficiency in performing entr ... |
|
Register |
|
Protecting Against Malware Threats with Cisco AMP for EndpointsThis lab-intensive course introduces students to the powerful features of Cisco AMP for Endpoints software. A number of step by step attack scenarios will provide an understanding of the operational uses of the product. ... |
|
Register |
|
Blue Coat Certified Proxy AdministratorThe Blue Coat Certified Proxy SG Professional (BCCPP) Course is intended for IT professionals who wish to master the advance features of the Blue Coat Proxy SG. |
|
Register |
|
DEV SEC OPS ENGINEERINGA Dev Sec Ops Engineer is an IT Security professional who is skilled at “security as code” with the intent of making security and compliance consumable as a service. A Dev Sec Ops Engineer uses data and security science ... |
|
Register |
|
CISCO ASA WITH FIREPOWER SERVICES WORKSHOPThe Cisco Next-Generation Firewall (NGFW) is the industry’s first fully integrated, threat-focused NGFW. It delivers comprehensive, unified policy management of firewall functions, application control, threat prevention, ... |
|
Register |
|
Implementing Cisco Identity Services Engine for Wireless EngineersThis course has been designed to enable wireless engineers understand the concepts, architecture, and use cases of the Cisco Identity Services Engine Solution. This course provides students with the knowledge and skills ... |
|
Register |
|
MASTERCLASS: RED TEAM - BLUE TEAM OPERATIONSThis is a deep dive course on Red Team – Blue Team Operations: The cyber kill chain Security is a business enabler, and it is only when it is viewed from a business perspective that we can truly make the right decision ... |
|
Register |
|
RED HAT IDENTITY MANAGEMENT AND ACTIVE DIRECTORY INTEGRATION WITH EXAM (EX362)This course teaches you skills on the most requested Red Hat Identity Management (IdM) capabilities, including Active Directory trusts, multi-product federation, configuration management with Ansible, integrated certific ... |
|
Register |
|
Blue Coat Certified Proxy AdministratorThe Blue Coat Certified Proxy SG Professional (BCCPP) Course is intended for IT professionals who wish to master the advance features of the Blue Coat Proxy SG. |
|
Register |
|
FIREWALL 8.1: TROUBLESHOOTING (EDU-330)Successful completion of this three-day, instructor-led course will enhance the participant’s understanding of how to troubleshoot the full line of Palo Alto Networks® next-generation firewalls. Participants will have o ... |
|
Register |
|
SECURING EMAIL WITH CISCO EMAIL SECURITY APPLIANCEThe Securing Email with Cisco Email Security Appliance (SESA) v3.0 course shows you how to deploy and use Cisco® Email Security Appliance to establish protection for your email systems against phishing, business email co ... |
|
Register |
|
PANORAMA 8.1: MANAGING FIREWALLS AT SCALE (EDU-220)This course will help students to gain in-depth knowledge about how to configure and manage their Palo Alto Networks® Panorama TM management server. Upon completion of this course, administrators should be familiar with ... |
|
Register |
|
SECURING CISCO NETWORKS WITH OPEN SOURCE SNORTSecuring Cisco Networks with Open Source Snort is a lab-intensive course that introduces students to the open source Snort technology as well as rule writing. You will learn how to build and manage a Snort system using o ... |
|
Register |
|
SYMANTEC NETBACKUP 7.5: MAINTAIN AND TROUBLESHOOTThe three day Symantec Net Backup Maintain and Troubleshoot course provides the IT professional with instruction on troubleshooting Symantec NetBackup 7.5 software. This course covers general error detection tools and t ... |
|
Register |
|
Implementing Forefront Unified Access Gateway 2010This three-day instructor-led course prepares you to design and deploy remote access solutions using Microsoft Forefront Unified Access Gateway 2010 (UAG). Forefront UAG provides organizations with unparalleled flexibili ... |
|
Register |
|
CYBER SEC FIRST RESPONDER: THREAT DETECTION AND RESPONSEThis course covers the duties of those who are responsible for monitoring and detecting security incidents in information systems and networks, and for executing a proper response to such incidents. Depending on the size ... |
|
Register |
|
EC-COUNCIL CERTIFIED ENCRYPTION SPECIALISTThe EC-Council Certified Encryption Specialist (ECES) program introduces professionals and students to the field of cryptography. The participants will learn the foundations of modern symmetric and key cryptography inclu ... |
|
Register |
|
SYSTEMS SECURITY CERTIFIED PRACTITIONERLooking to move up in the information security field? If you have at least one year of security experience, you qualify for the Systems Security Certified Practitioner (SSCP) certification, which offers junior security p ... |
|
Register |
|
WEB SECURITY SERVICE 6.10 DIAGNOSTICS AND TROUBLESHOOTINGThe WSS Diagnostics and Troubleshooting course is intended for IT professionals who will be diagnosing and troubleshooting the Symantec Web Security Service (WSS). |
|
Register |
|
MANAGING AND DEFENDING AGAINST CURRENT THREATSThis is a deep dive course on security operations: vulnerability management, anomalies detection, discovery of industry attacks and threats, understanding how compromised system or solution looks like, defining the indic ... |
|
Register |
|
EC - COUNCIL CERTIFIED SECURE PROGRAMMERSoftware defects, bugs, and flaws in the logic of the program are consistently the cause for software vulnerabilities. Analysis by software security professionals has proven that most vulnerabilities are due to errors i ... |
|
Register |
|
IBM GUARDIUM FOUNDATIONSAre you getting ready to administer database security policies? Learn how to configure Guardium to discover, classify, analyze, protect, and control access to sensitive data. You learn to perform vulnerability assessment ... |
|
Register |
|
SYMANTEC DEPLOYMENT SOLUTION 8.1 ADMINISTRATIONThe Symantec Deployment Solution 8.1: Administration course is designed for the professional tasked with installing, configuring, and managing a Deployment Solution system. This five-day, instructor-led, hands-on course ... |
|
Register |
|
IMPLEMENTING CISCO UNIFIED COMMUNICATIONS SECURITYThe Implementing Cisco Unified Communications Security (UCSEC) course is designed to provide students with the necessary knowledge and skills to implement security features in a Cisco Unified Communications environment. ... |
|
Register |
|
SYMANTEC DATA CENTER SECURITY SERVER ADVANCED 6.7 DIAGNOSTICS AND TROUBLESHOOTINGThe Symantec Data Center Server Advanced 6.7 Diagnostics and Troubleshooting course is designed for the IT security management professional tasked with troubleshooting Data Center Security Server Advanced (SDCSSA). Stud ... |
|
Register |
|
EC-COUNCIL CERTIFIED SECURITY ANALYST V.10The ECSA program offers a seamless learning progress continuing where the CEH program left off. The new ECSAv10 includes updated curricula and an industry recognized comprehensive step-by step penetration testing method ... |
|
Register |
|
VMWARE NSX-T DATA CENTER: INSTALL, CONFIGURE, MANAGEThis five-day, fast-paced course provides comprehensive training on how to install, configure, and manage a VMware NSX-T™ Data Center environment. This course covers key NSX-T Data Center features and functionality offer ... |
|
Register |
|
SYMANTEC DATA LOSS PREVENTION 15.0 ADMINISTRATIONThe Symantec Data Loss Prevention 15.0 Administration course is designed to provide you with the fundamental knowledge to configure and administer the Symantec Data Loss Prevention Enforce platform. The hands-on labs inc ... |
|
Register |
|
SYMANTEC ASSET MANAGEMENT SUITE 8.1 ADMINISTRATIONThe Symantec Asset Management Suite 8.1 Administration course is designed for professionals tasked with using Symantec Asset Management Suite (AMS) to manage their software and hardware resources in their organizations. ... |
|
Register |
|
COMPTIA CSA+ CYBERSECURITY ANALYSTThe CompTIA CSA+ certification is a vendor-neutral credential. The CompTIA CSA+ exam (Exam CS0-001) is an internationally targeted validation of intermediate-level security skills and knowledge. The course has a technica ... |
|
Register |
|
RED HAT SERVER HARDENINGSecure a Red Hat Enterprise Linux system to comply with security policy requirements Red Hat® Server Hardening (RH413) builds on a student's Red Hat Certified Engineer (RHCE®) certification or equivalent experience to t ... |
|
Register |
|
IBM SECURITY IDENTITY MANAGER FOUNDATIONSThis is an instructor-led course that introduces students to the foundational skills required to install, configure, and administer IBM Security Identity Manager,. IBM Security Identity Manager can be deployed using the ... |
|
Register |
|
SYMANTEC PROXY SG V6.6: ADVANCED ADMINISTRATIONThe Proxy SG v6.6 Advanced Administration course is intended for IT professionals who wish to learn to master the advanced features of Proxy SG. |
|
Register |
|
PALO ALTO EXTENDED FIREWALL MANAGEMENT (205)Extended Firewall Management is the next-level follow-on course to Palo Alto Networks® Installation, Configuration, and Management (PAN-EDU-201). Extended Firewall Management expands on 201 course topics, while introduci ... |
|
Register |
|
DEPLOYING AND MANAGING WINDOWS 10 USING ENTERPRISE SERVICESThis 5-day course provides administrators with the knowledge and skills needed to deploy and manage Windows 10 desktops, devices, and applications in an enterprise environment. Students learn how to plan and implement Wi ... |
|
Register |
|
Implementing Cisco Secure MobilityThis course is designed to prepare network security engineers with the knowledge and skills they need to protect data traversing a public or shared infrastructure such as the Internet by implementing and maintaining Cisc ... |
|
Register |
|
SYMANTEC IT MANAGEMENT SUITE 8.1 DIAGNOSTICS AND TROUBLESHOOTINGThe Symantec IT Management Suite 8.1 Diagnostics and Troubleshooting course is designed for professionals tasked with maintaining and utilizing a Symantec IT Management Suite (ITMS) implementation in their organizations. ... |
|
Register |
|
CISSP CERTIFICATION PREP COURSE V1.0Gain core knowledge and experience to successfully implement and manage security programs and prepare for the CISSP certification. This course is the most comprehensive review of information security concepts and industr ... |
|
Register |
|
EC-COUNCIL NETWORK SECURITY ADMINISTRATORThis course looks at the network security in defensive view. The ENSA program is designed to provide fundamental skills needed to analyze the internal and external security threats against a network, and to develop secur ... |
|
Register |
|
SYMANTEC DATA LOSS PREVENTION 15.5 ADMINISTRATIONThe Symantec Data Loss Prevention 15.5 Administration course is designed to provide you with the fundamental knowledge to configure and administer the Symantec Data Loss Prevention Enforce platform. The hands‐on labs inc ... |
|
Register |
|
IMPLEMENTING ADVANCED CISCO ASA SECURITY V2.0This course provides up-to-date training on the key features of the Cisco ASA 5500-X Series next-Generation Firewall, including ASAv, ASA IDFW, ASA Fire POWER Service Module, ASA Cloud Web Security and ASA Clustering. Ex ... |
|
Register |
|
PALO ALTO ADVANCED FIREWALL TROUBLESHOOTING (311)Advanced Firewall Troubleshooting is the next-level follow-on course to Palo Alto Networks® Essentials 1: Installation, Configuration, and Management (PAN-EDU-201) and Essentials 2: Extended Firewall Manager (PAN-EDU-205 ... |
|
Register |
|
SYMANTEC CLOUD SOC ADMINISTRATION R2The Cloud SOC R2 Administration course provides an overview of the Cloud SOC service, covering initial setup, deployment options and service configuration. The courseware introduces each topic with an accompanying workfl ... |
|
Register |
|
IBM QRADAR SIEM FOUNDATIONSIBM QRadar SIEM provides deep visibility into network, user, and application activity. It provides collection, normalization, correlation, and secure storage of events, flows, asset profiles, and vulnerabilities. QRadar ... |
|
Register |
|
SECURITY+The Security+ Certification Prep Course provides the basic knowledge needed to plan, implement, and maintain information security in a vendor-neutral format. This includes risk management, host and network security, auth ... |
|
Register |
|
NSX-T: INSTALL, CONFIGURE, MANAGEThis five-day, fast-paced course provides comprehensive training on how to install, configure, and manage a VMware NSX-T™ Data Center environment. This course covers key NSX-T Data Center features and functionality offer ... |
|
Register |
|
IMPLEMENTING AND MANAGING WINDOWS 10This course is designed to provide students with the knowledge and skills required to install and configure Windows 10 desktops and devices in a Windows Server domain corporate environment. These skills include learning ... |
|
Register |
|
EC-COUNCIL CERTIFIED INCIDENT HANDLERThe EC-Council Certified Incident Handler (ECIH) program is designed to provide the fundamental skills to handle and respond to the computer security incidents in an information system. The course addresses various under ... |
|
Register |
|
CompTIA Pentest +As organizations scramble to protect themselves and their customers against privacy or security breaches, the ability to conduct penetration testing is an emerging skill set that is becoming ever more valuable to the org ... |
|
Register |
|
IMPLEMENTING FOREFRONT IDENTITY MANAGER 2010This four-day instructor-led course introduces and explains the features and capabilities of Microsoft Forefront Identity Manager 2010 (FIM), and provides an overview of the solution scenarios that FIM addresses. The cou ... |
|
Register |
|
SYMANTEC NET BACKUP 7.6.X: ADMINISTRATIONThis Symantec Net Backup 7.6.x: Administration course provides the IT professional with instruction on the functionality of Symantec NetBackup 7.6.1 software. This course covers the general principles of using NetBackup ... |
|
Register |
|
SECURING CISCO NETWORKS WITH SNORT RULE WRITING BEST PRACTICESSecuring Cisco Networks with Snort Rule Writing Best Practices is a lab-intensive course that introduces students to the open source Snort community and rule-writing best practices. Users focus exclusively on the Snort r ... |
|
Register |
|
NETWORK AND SECURITY MANAGER FUNDAMENTALSThis two-day course discusses the basic operations of Network and Security Manager. Key topics include server and domain administration, device configuration, template creation and management, policy creation and managem ... |
|
Register |
|
ETHICAL HACKING AND COUNTERMEASURES V.10The Certified Ethical Hacker (C|EH v10) program is a trusted and respected ethical hacking training Program that any information security professional will need. Since its inception in 2003, the Certified Ethical Hacker ... |
|
Register |
|
MASTER CLASS ISO 27001 IMPLEMENTATIONThis five-day intensive course enables the participants to develop the expertise to support an organization in implementing and managing an Information Security Management System (ISMS) as specified in ISO/IEC 27001:2013 ... |
|
Register |
|
JUNOS INTRUSION PREVENTION SYSTEM FUNCTIONALITYThe Junos Intrusion prevention System Functionality (JIPS) course is designed to provide an introduction to the Intrusion Prevention System (IPS) feature set available on the Juniper Networks SRX Series Services Gateway. ... |
|
Register |
|
CERTIFIED SECURE COMPUTER USER - AWARENESS TRAININGThe purpose of the CSCU training program is to provide individuals with the necessary knowledge and skills to protect their information assets. This class will immerse students into an interactive environment where they ... |
|
Register |
|
Certified Cloud Security Professional Certification PreparationAs powerful as cloud computing is for the organization, understanding its information security risks and mitigation strategies is critical. Legacy approaches are inadequate, and organizations need competent, experienced ... |
|
Register |
|
SYMANTEC CLIENT MANAGEMENT SUITE 8.5 ADMINISTRATIONThe Client Management Suite 8.5 Administration course is designed for professionals tasked with using Symantec’s Client Management Suite (CMS) to manage their software and hardware resources in their organizations. This ... |
|
Register |
|
UNDERSTANDING CISCO CYBER SECURITY FUNDAMENTALSThe Understanding Cisco Cyber security Fundamentals (SECFND) v1.0 course provides you with an understanding of network infrastructure devices, operations and vulnerabilities of the TCP/IP protocol suite, basic informatio ... |
|
Register |
|
IMPLEMENTING AND CONFIGURING CISCO IDENTITY SERVICES ENGINEThe Implementing and Configuring Cisco Identity Services Engine course shows you how to deploy and use Cisco Identity Services Engine (ISE) v2.4, an identity and access control policy platform that simplifies the deliver ... |
|
Register |
|
LEAD AUDITOR TRAINING (IRCA CERTIFIED)This five-day intensive course enables participants to develop the expertise needed to audit an Information Security Management System (ISMS) and to manage a team of auditors by applying widely recognized audit principle ... |
|
Register |
|
Protecting Against Malware Threats with Cisco AMP for EndpointsThis lab-intensive course introduces students to the powerful features of Cisco AMP for Endpoints software. A number of step by step attack scenarios will provide an understanding of the operational uses of the product. ... |
|
Register |
|
SECURITY FUNDAMENTALSIn this course, you will be introduced to security concepts for today's business and technology professionals. You will cover layered security philosophy, physical security, Internet security, and wireless security princ ... |
|
Register |
|
SYMANTEC MESSAGING GATEWAY 10.5: ADMINISTRATIONThe Symantec Messaging Gateway 10.5: Administration course is designed to provide you with the fundamental knowledge to configure and administer the Symantec Messaging Gateway. This three-day, instructor-led, hands-on cl ... |
|
Register |
|
CONFIGURING JUNIPER NETWORKS FIREWALL/IPSEC VPN PRODUCTSThis course is the first in the Screen OS curriculum. It is a three-day, instructor-led course that focuses on configuration of the Screen OS firewall/virtual private network (VPN) products in a variety of situations, in ... |
|
Register |
|
SYMANTEC DATA LOSS PREVENTION 14.6 ADMINISTRATIONThe Symantec Data Loss Prevention 14.X: Administration course is designed to provide you with the fundamental knowledge to configure and administer the Symantec Data Loss Prevention Enforce platform. The hands-on labs i ... |
|
Register |
|
SYMANTEC WEB SECURITY SERVICE CORE ADMINISTRATION R1The Web Security Service Core Administration course is intended for IT professionals who will be installing, configuring or administering the Symantec Web Security Service (WSS). |
|
Register |
|
IBM SECURITY QRADAR SIEM ADVANCED TOPICSThis is an advanced course for the QRadar Analyst and Administrator and is a follow-on to BQ103G. This course uses the IBM QRadar SIEM 7.3 platform for lab exercises. |
|
Register |
|
SYMANTEC DATA LOSS PREVENTION 15.0 ADMINISTRATIONThe Symantec Data Loss Prevention 15.0 Administration course is designed to provide you with the fundamental knowledge to configure and administer the Symantec Data Loss Prevention Enforce platform. The hands-on labs inc ... |
|
Register |
|
SYMANTEC ASSET MANAGEMENT SUITE 8.5 ADMINISTRATIONThe Symantec Asset Management Suite 8.5 Administration course is designed for professionals tasked with using Symantec Asset Management Suite (AMS) to manage their software and hardware resources in their organizations. ... |
|
Register |
|
SECURING THE WEB WITH CISCO WEB SECURITY APPLIANCEThis course has been designed to help learners understand how to install, configure, manage, and troubleshoot a Cisco Web Security Appliance (WSA). Students will learn how to design, configure, administer, monitor, and t ... |
|
Register |
|
FIREWALL 8.1: OPTIMIZING FIREWALL THREAT PREVENTION (EDU-214)Successful completion of this four-day, instructor-led course will enhance the student’s understanding of how to better configure, manage, and monitor PAN-OS® threat prevention features. The student will get hands-on exp ... |
|
Register |
|
IBM QRADAR SIEM FOUNDATIONSIBM QRadar SIEM provides deep visibility into network, user, and application activity. It provides collection, normalization, correlation, and secure storage of events, flows, asset profiles, and vulnerabilities. QRadar ... |
|
Register |
|
SECURITY+The Security+ Certification Prep Course provides the basic knowledge needed to plan, implement, and maintain information security in a vendor-neutral format. This includes risk management, host and network security, auth ... |
|
Register |
|
IBM ACCESS MANAGER PLATFORM FOUNDATIONSIBM Access Manager is a highly scalable and configurable access management solution. It simplifies and secures your user experience with single sign-on across applications and protects critical assets using strong multi- ... |
|
Register |
|
IBM IDENTITY GOVERNANCE AND INTELLIGENCE FOUNDATIONSIBM Identity Governance and Intelligence is an advanced identity governance system. This course provides the foundational skills necessary to operate, administer, and accomplish the major business functions and analyses ... |
|
Register |
|
WORKSHOP: WINDOWS SERVER 2019Learn about the new enhanced capabilities of the Windows 2019 starting from server virtualization, storage, software-defined networking, server management and automation, web and application platform, access to informati ... |
|
Register |
|
WEB SECURITY SERVICE 6.10 DIAGNOSTICS AND TROUBLESHOOTINGThe WSS Diagnostics and Troubleshooting course is intended for IT professionals who will be diagnosing and troubleshooting the Symantec Web Security Service (WSS). |
|
Register |
|
JUNOS SPACE-SECURITY DIRECTORThis two-day course is designed to provide students with the knowledge required to manage the Junos Space Security Director application and manage devices with that application. Students will gain in-depth knowledge of h ... |
|
Register |
|
SECURING CISCO NETWORKS WITH SOURCE FIRE INTRUSION PREVENTION SYSTEMThe Securing Networks with Cisco Firepower Next-Generation IPS course shows you how to deploy and use Cisco Firepower Next-Generation Intrusion Prevention System (NGIPS). This hands-on course gives you the knowledge and ... |
|
Register |
|
DEEP SECURITY TRAINING FOR CERTIFIED PROFESSIONALSIn this course, you will learn how to use Trend Micro™ Deep Security. This course provides information about the basic architecture, deployment scenarios, installation processes, policy configuration and administration o ... |
|
Register |
|
RED HAT SECURITY: SECURING CONTAINERS AND OPEN SHIFT WITH EXAMYou will learn and validate your skills in using secure and trusted container images, registries, and source code; managing network and storage isolation; implementing application single sign-on; and configuring appropri ... |
|
Register |
|
SYMANTEC IDENTITY AND AUTHENTICATION SERVICES R1The Symantec Identity and Authentication Services R1 course is designed for the IT security professional needing to develop an understanding of the principles and use cases behind the Symantec VIP Service and VIP Access ... |
|
Register |
|
ETHICAL HACKING AND COUNTERMEASURES V.10The Certified Ethical Hacker (C|EH v10) program is a trusted and respected ethical hacking training Program that any information security professional will need. Since its inception in 2003, the Certified Ethical Hacker ... |
|
Register |
|
SYMANTEC SECURITY ANALYTICS 7.2.X PROFESSIONALThe Symantec Security Analytics Professional course is designed for participants who want to learn how to use the Symantec Security Analytics platform to perform virtually any type of network-based monitoring and forensi ... |
|
Register |
|
JNCIE-SEC BOOT CAMPThis five-day course is designed to serve as the ultimate preparation for the Juniper Networks Certified Internet Expert—Security (JNCIE-SEC) exam. The course focuses on caveats and tips useful for potential test candida ... |
|
Register |
|
CITRIX ENTERPRISE SECURITY SOLUTIONSLearn to secure your Citrix environment in this hands-on course that encompasses the core Citrix technologies, including Citrix Virtual Apps and Desktops, ADC, Endpoint Management, Content Collaboration and Citrix Cloud. ... |
|
Register |
|
RED HAT SECURITY: LINUX IN PHYSICAL, VIRTUAL, AND CLOUD WITH EXAM (EX415)Maintaining security of computing systems is a process of managing risk through the implementation of processes and standards backed by technologies and tools. In this course, you will learn about resources that can be u ... |
|
Register |
|
PERFORMANCE TUNING AND OPTIMIZING SQL DATABASESThis four-day instructor-led course provides students who manage and maintain SQL Server databases with the knowledge and skills to performance tune and optimize their databases. |
|
Register |
|
TREND MICRO APEX ONE TRAINING FOR CERTIFIED PROFESSIONALSIn this course, you will learn how to use Trend Micro Apex One™. This course details basic architecture, protection functionality, deployment scenarios, and troubleshooting. Through hands-on labs, participants practice c ... |
|
Register |
|
FIREWALL 8.1: TROUBLESHOOTING (EDU-330)Successful completion of this three-day, instructor-led course will enhance the participant’s understanding of how to troubleshoot the full line of Palo Alto Networks® next-generation firewalls. Participants will have o ... |
|
Register |
|
SYMANTEC ASSET MANAGEMENT SUITE 8.1 ADMINISTRATIONThe Symantec Asset Management Suite 8.1 Administration course is designed for professionals tasked with using Symantec Asset Management Suite (AMS) to manage their software and hardware resources in their organizations. ... |
|
Register |
|
SYMANTEC CONTROL COMPLIANCE SUITE VULNERABILITY MANAGER 12.0 ADMINISTRATIONThe Symantec Control Compliance Suite Vulnerability Manager (CCS-VM) 12.0 Administration Training is designed for the IT security professional tasked with installation, administering, monitoring and reporting on CCS-VM 1 ... |
|
Register |
|
SECURING NETWORKS WITH FIREPOWER THREAT DEFENSE NGFWThe Securing Networks with Cisco Firepower Threat Defense NGFW (FIREPOWER200) course demonstrates the powerful features of Cisco Firepower Threat Defense, including VPN configuration, traffic control, NAT configuration, ... |
|
Register |
|
CERTIFIED IN THE GOVERNANCE OF ENTERPRISE ITAs technology has become more and more vital to the achievement of business goals and value delivery, enterprise leaders have realized that enterprise governance must be extended to information technology and information ... |
|
Register |
|
EC-COUNCIL CERTIFIED NETWORK DEFENDERCertified Network Defender (CND) is a vendor-neutral, hands-on, instructor-led comprehensive network security certification training program. It is a skills-based, lab intensive program based on a job-task analysis and c ... |
|
Register |
|
SYMANTEC MESSAGING GATEWAY 10.6 ADMINISTRATIONThe Symantec Messaging Gateway 10.6: Administration course is designed to provide you with the fundamental knowledge to configure and administer the Symantec Messaging Gateway. This two-day, instructor-led, hand son clas ... |
|
Register |
|
TREND MICRO DEEP DISCOVERY TRAINING FOR CERTIFIED PROFESSIONALSTrend Micro™ Deep Discovery Training for Certified Professionals is a three-day, instructor-led training course where participants will learn how to deploy and manage a Trend Micro™ Deep Discovery threat protection solut ... |
|
Register |
|
CompTIA Pentest +As organizations scramble to protect themselves and their customers against privacy or security breaches, the ability to conduct penetration testing is an emerging skill set that is becoming ever more valuable to the org ... |
|
Register |
|
IBM ACCESS MANAGER PLATFORM FOUNDATIONSIBM Access Manager is a highly scalable and configurable access management solution. It simplifies and secures your user experience with single sign-on across applications and protects critical assets using strong multi- ... |
|
Register |
|
SYMANTEC PROXY SG V6.6: BASIC ADMINISTRATIONThe Proxy SG 6.6 Basic Administration course is an introduction to deployment options and management of the individual key features offered using the Proxy SG 6.6 solution. This an introductory course and is designed for ... |
|
Register |
|
MANAGING ENTERPRISE SECURITY WITH CISCO SECURITY MANAGERThe Managing Enterprise Security with Cisco Security Manager (SSECMGT) course is aimed at providing network security engineers with the knowledge and skills that are needed to configure and deploy Cisco Security Manager. ... |
|
Register |
|
SYMANTEC SSL VISIBILITY 4.3 ADMINISTRATIONThe SSL Visibility 4.3 administration course enables you to plan, implement, configure and managed your SSLV appliance(s). This is a lecture-only course, there will be no hands-on access to an SSLV appliance during the c ... |
|
Register |
|
SYMANTEC ENDPOINT ENCRYPTION 11.2 INSTALL, CONFIGURE AND DEPLOYThe Symantec Endpoint Encryption 11.2: Install, Configure, and Deploy course is designed for the network, IT security, systems administration, and support professional tasked with maintaining and troubleshooting a Symant ... |
|
Register |
|
EC-COUNCIL CERTIFIED SOC ANALYST (CSA)The Certified SOC Analyst (CSA) program is the first step to joining a security operations center (SOC). It is engineered for current and aspiring Tier I and Tier II SOC analysts to achieve proficiency in performing entr ... |
|
Register |
|
SECURING CISCO NETWORKS WITH OPEN SOURCE SNORTSecuring Cisco Networks with Open Source Snort is a lab-intensive course that introduces students to the open source Snort technology as well as rule writing. You will learn how to build and manage a Snort system using o ... |
|
Register |
|
CERTIFIED INFORMATION SYSTEMS SECURITY PROFESSIONALThe Official (ISC)2® CISSP® CBK® Review Seminar is the most comprehensive, complete review of information systems security concepts and industry best practices, and the only review course endorsed by (ISC)2. Review Semin ... |
|
Register |
|
Implementing Forefront Unified Access Gateway 2010This three-day instructor-led course prepares you to design and deploy remote access solutions using Microsoft Forefront Unified Access Gateway 2010 (UAG). Forefront UAG provides organizations with unparalleled flexibili ... |
|
Register |
|
SYMANTEC SSL VISIBILITY 5.0 ADMINISTRATIONThe SSL Visibility 5.0 Administration course enables you to plan, implement, configure and managed your SSLV virtual appliance. This course includes both lecture and hands-on labs that access the SSLV virtual appliance. ... |
|
Register |
|
CERTIFIED CHIEF INFORMATION SECURITY OFFICEREC-Council’s CCISO Program has certified leading information security professionals around the world. A core group of high-level information security executives, the CCISO Advisory Board, contributed by forming the found ... |
|
Register |
|
IMPLEMENTING CISCO NETWORK SECURITY V3.0This is a five-day instructor-led course that focuses on the design, implementation and monitoring of a comprehensive security policy, using Cisco IOS security features and technologies. All IOS examples and hands on exp ... |
|
Register |
|
CLIENT MANAGEMENT SUITE 8.1 ADMINISTRATIONThe Client Management Suite 8.1 Administration course is designed for professionals tasked with using Symantec’s Client Management Suite (CMS) to manage their software and hardware resources in their organizations. This ... |
|
Register |
|
SYMANTEC IDENTITY AND AUTHENTICATION SERVICES R1The Symantec Identity and Authentication Services R1 course is designed for the IT security professional needing to develop an understanding of the principles and use cases behind the Symantec VIP Service and VIP Access ... |
|
Register |
|
SYMANTEC CONTROL COMPLIANCE SUITE 12.0 ADMINISTRATIONThe Control Compliance Suite 12.0 Administration course is designed for professionals who are tasked with ensuring the security of their computing enterprise and compliance with both external and internal mandates. This ... |
|
Register |
|
SYMANTEC SECURITY ANALYTICS 7.2.X PROFESSIONALThe Symantec Security Analytics Professional course is designed for participants who want to learn how to use the Symantec Security Analytics platform to perform virtually any type of network-based monitoring and forensi ... |
|
Register |
|
CERTIFIED IN RISK AND INFORMATION SYSTEMS CONTROLThe CRISC Review Manual and CRISC Review, Questions, Answers and Explanation Manual will be provided to delegates booked on the course. |
|
Register |
|
RED TEAM VS BLUE TEAM CYBERWAR CHALLENGETwo Teams, two different approaches, Red Team vs Blue Team Cyberwar Challenge! The cyber kill chain - reconnaissance, attack planning and delivery, system exploitation, privilege escalation and lateral movement, anomalie ... |
|
Register |
|
COMPUTER HACKING FORENSICS INVESTIGATORThe CHFI course will give participants the necessary skills to identify an intruder's footprints and to properly gather the necessary evidence to prosecute. Many of today's top tools of the forensic trade will be taught ... |
|
Register |
|
CERTIFIED CHIEF INFORMATION SECURITY OFFICEREC-Council’s CCISO Program has certified leading information security professionals around the world. A core group of high-level information security executives, the CCISO Advisory Board, contributed by forming the found ... |
|
Register |
|
CYBERSECURITY FOUNDATIONSWhen you consider just a few of the consequences of a security breach - your proprietary information completely accessible, hefty fines for security lapses, news headlines about your company's security breach, it becomes ... |
|
Register |
|
CYBER SEC FIRST RESPONDER™ (CFR) CERTIFICATIONThis course covers network defense and incident response methods, tactics, and procedures are taught in alignment with industry frameworks such as NIST 800-61 r.2 (Computer Security Incident Handling), US-CERT’s NCISP (N ... |
|
Register |
|
IMPLEMENTING CISCO THREAT CONTROL SYSTEMSImplementing Cisco Threat Control Solutions is designed to provide security engineers with the knowledge and hands-on experience required to deploy Cisco’s Email Security (ESA); Web Security (CWS, WSA); Advanced Malware ... |
|
Register |
|
MASTERCLASS: PEN TESTING AND SECURING MOBILE AND WEB APPLICATIONSThe course teaches mobile and web application security concepts, including the techniques on how to attack and how to respond with an appropriate countermeasure implementation. Our course has been developed around profes ... |
|
Register |
|
NSX-T: INSTALL, CONFIGURE, MANAGEThis five-day, fast-paced course provides comprehensive training on how to install, configure, and manage a VMware NSX-T™ Data Center environment. This course covers key NSX-T Data Center features and functionality offer ... |
|
Register |
|
PALO ALTO NETWORKS® TRAPS™ ADVANCED ENDPOINT PROTECTION (PAN-EDU-281)This instructor-led course teaches strategies in defense against advanced threats. Successful completion of this course enables administrators to better understand the threat landscape. Students will learn the use of Pal ... |
|
Register |
|
CERTIFIED INFORMATION SYSTEMS AUDITORCISA® is a trademark of the Information Systems Audit and Control Association® (ISACA®) More than 60,000 security professionals hold CISA certification, which was awarded the "Best Professional Certification" for 2009 b ... |
|
Register |
|
SYMANTEC WEB SECURITY SERVICE CORE ADMINISTRATION R1The Web Security Service Core Administration course is intended for IT professionals who will be installing, configuring or administering the Symantec Web Security Service (WSS). |
|
Register |
|
RHS333-BUNDLE: RED HAT ENTERPRISE SECURITY: NETWORK SERVICES + EX333Red Hat® Enterprise Security: Network Services with Exam is an intensive course that provides 4 days of instruction and labs that show students how to use the latest technologies to secure services. This class advances b ... |
|
Register |
|
JUNOS SECURITYThis five-day course covers the configuration, operation, and implementation of SRX Series Services Gateways in a typical network environment. Key topics within this course include: security zones, security policies, Net ... |
|
Register |
|
SECURING EMAIL WITH CISCO EMAIL SECURITY APPLIANCEThe Securing Email with Cisco Email Security Appliance (SESA) v3.0 course shows you how to deploy and use Cisco® Email Security Appliance to establish protection for your email systems against phishing, business email co ... |
|
Register |
|
BLUE COAT CERTIFIED SECURITY ANALYTICS ADMINISTRATORThe Blue Coat Certified Security Analytics Administrator (BCSAA) course is intended for IT professionals who want to master the fundamentals of the Blue Coat Security Analytics solution. |
|
Register |
|
PALO ALTO EXTENDED FIREWALL MANAGEMENT (205)Extended Firewall Management is the next-level follow-on course to Palo Alto Networks® Installation, Configuration, and Management (PAN-EDU-201). Extended Firewall Management expands on 201 course topics, while introduci ... |
|
Register |
|
BLUE COAT CERTIFIED SECURITY ANALYTICS PROFESSIONALThe Blue Coat Certified Security Analytics Professional (BCSAP) course designed for participants who want to learn how to use the Blue Coat Security Analytics platform to perform virtually any type of network-based monit ... |
|
Register |
|
BLUE COAT PACKET SHAPER PROFESSIONALBlue Coat Certified Packet Shaper Administrator (BCPSA) certification or waiver exam; student should have practical experience with the Packet Shaper appliance in the field with a solid understanding of networking and ge ... |
|
Register |
|
IBM DIRECTORY SERVER 6.4 FUNDAMENTALSThis course describes the processes, procedures, and practices necessary to configure and administer IBM Directory Server. During the hand-on exercises, students will perform basic Directory Server configuration, setup r ... |
|
Register |
|
CISCO CCNA SECURITY BOOT CAMP (ACCELERATED)In this course, you will learn how to install, operate, configure, and verify a basic IPv4 and IPv6 network, including configuring a LAN switch, configuring an IP router, managing network devices. You will also learn abo ... |
|
Register |
Egypt , Cairo |
|||
---|---|---|---|
|
ADVANCED JUNOS SECURITYThis five-day course, which is designed to build off the current Junos Security (JSEC) offering, delves deeper into Junos security and next-generation security features. Through demonstrations and hands-on labs, you will ... |
|
Register |
|
MANAGING ENTERPRISE SECURITY WITH CISCO SECURITY MANAGERThe Managing Enterprise Security with Cisco Security Manager (SSECMGT) course is aimed at providing network security engineers with the knowledge and skills that are needed to configure and deploy Cisco Security Manager. ... |
|
Register |
|
BLUE COAT PACKET SHAPER PROFESSIONALBlue Coat Certified Packet Shaper Administrator (BCPSA) certification or waiver exam; student should have practical experience with the Packet Shaper appliance in the field with a solid understanding of networking and ge ... |
|
Register |
|
Implementing Cisco Secure MobilityThis course is designed to prepare network security engineers with the knowledge and skills they need to protect data traversing a public or shared infrastructure such as the Internet by implementing and maintaining Cisc ... |
|
Register |
|
IMPLEMENTING CISCO UNIFIED COMMUNICATIONS SECURITYThe Implementing Cisco Unified Communications Security (UCSEC) course is designed to provide students with the necessary knowledge and skills to implement security features in a Cisco Unified Communications environment. ... |
|
Register |
|
Implementing Forefront Unified Access Gateway 2010This three-day instructor-led course prepares you to design and deploy remote access solutions using Microsoft Forefront Unified Access Gateway 2010 (UAG). Forefront UAG provides organizations with unparalleled flexibili ... |
|
Register |
|
EC-COUNCIL CERTIFIED NETWORK DEFENDERCertified Network Defender (CND) is a vendor-neutral, hands-on, instructor-led comprehensive network security certification training program. It is a skills-based, lab intensive program based on a job-task analysis and c ... |
|
Register |
|
IMPLEMENTING FOREFRONT IDENTITY MANAGER 2010This four-day instructor-led course introduces and explains the features and capabilities of Microsoft Forefront Identity Manager 2010 (FIM), and provides an overview of the solution scenarios that FIM addresses. The cou ... |
|
Register |
|
MASTERCLASS: PEN TESTING AND SECURING MOBILE AND WEB APPLICATIONSThe course teaches mobile and web application security concepts, including the techniques on how to attack and how to respond with an appropriate countermeasure implementation. Our course has been developed around profes ... |
|
Register |
|
CERTIFIED INFORMATION SYSTEMS SECURITY PROFESSIONALThe Official (ISC)2® CISSP® CBK® Review Seminar is the most comprehensive, complete review of information systems security concepts and industry best practices, and the only review course endorsed by (ISC)2. Review Semin ... |
|
Register |
|
DEEP SECURITY TRAINING FOR CERTIFIED PROFESSIONALSIn this course, you will learn how to use Trend Micro™ Deep Security. This course provides information about the basic architecture, deployment scenarios, installation processes, policy configuration and administration o ... |
|
Register |
|
IBM IDENTITY GOVERNANCE AND INTELLIGENCE FOUNDATIONSIBM Identity Governance and Intelligence is an advanced identity governance system. This course provides the foundational skills necessary to operate, administer, and accomplish the major business functions and analyses ... |
|
Register |
|
BLUE COAT CERTIFIED SECURITY ANALYTICS ADMINISTRATORThe Blue Coat Certified Security Analytics Administrator (BCSAA) course is intended for IT professionals who want to master the fundamentals of the Blue Coat Security Analytics solution. |
|
Register |
|
FIREWALL 8.1: OPTIMIZING FIREWALL THREAT PREVENTION (EDU-214)Successful completion of this four-day, instructor-led course will enhance the student’s understanding of how to better configure, manage, and monitor PAN-OS® threat prevention features. The student will get hands-on exp ... |
|
Register |
|
Protecting Against Malware Threats with Cisco AMP for EndpointsThis lab-intensive course introduces students to the powerful features of Cisco AMP for Endpoints software. A number of step by step attack scenarios will provide an understanding of the operational uses of the product. ... |
|
Register |
|
COMPUTER HACKING FORENSICS INVESTIGATORThe CHFI course will give participants the necessary skills to identify an intruder's footprints and to properly gather the necessary evidence to prosecute. Many of today's top tools of the forensic trade will be taught ... |
|
Register |
|
IBM SECURITY QRADAR SIEM ADVANCED TOPICSThis is an advanced course for the QRadar Analyst and Administrator and is a follow-on to BQ103G. This course uses the IBM QRadar SIEM 7.3 platform for lab exercises. |
|
Register |
|
CONFIGURING JUNIPER NETWORKS FIREWALL/IPSEC VPN PRODUCTSThis course is the first in the Screen OS curriculum. It is a three-day, instructor-led course that focuses on configuration of the Screen OS firewall/virtual private network (VPN) products in a variety of situations, in ... |
|
Register |
|
CISSP CERTIFICATION PREP COURSE V1.0Gain core knowledge and experience to successfully implement and manage security programs and prepare for the CISSP certification. This course is the most comprehensive review of information security concepts and industr ... |
|
Register |
|
PALO ALTO NETWORKS® TRAPS™ ADVANCED ENDPOINT PROTECTION (PAN-EDU-281)This instructor-led course teaches strategies in defense against advanced threats. Successful completion of this course enables administrators to better understand the threat landscape. Students will learn the use of Pal ... |
|
Register |
|
SYMANTEC ENDPOINT ENCRYPTION 11.2 INSTALL, CONFIGURE AND DEPLOYThe Symantec Endpoint Encryption 11.2: Install, Configure, and Deploy course is designed for the network, IT security, systems administration, and support professional tasked with maintaining and troubleshooting a Symant ... |
|
Register |
|
SYMANTEC CONTROL COMPLIANCE SUITE 12.0 ADMINISTRATIONThe Control Compliance Suite 12.0 Administration course is designed for professionals who are tasked with ensuring the security of their computing enterprise and compliance with both external and internal mandates. This ... |
|
Register |
|
COMPUTER HACKING FORENSICS INVESTIGATORThe CHFI course will give participants the necessary skills to identify an intruder's footprints and to properly gather the necessary evidence to prosecute. Many of today's top tools of the forensic trade will be taught ... |
|
Register |
|
CLIENT MANAGEMENT SUITE 8.1 ADMINISTRATIONThe Client Management Suite 8.1 Administration course is designed for professionals tasked with using Symantec’s Client Management Suite (CMS) to manage their software and hardware resources in their organizations. This ... |
|
Register |
|
SECURING CISCO NETWORKS WITH SOURCE FIRE INTRUSION PREVENTION SYSTEMThe Securing Networks with Cisco Firepower Next-Generation IPS course shows you how to deploy and use Cisco Firepower Next-Generation Intrusion Prevention System (NGIPS). This hands-on course gives you the knowledge and ... |
|
Register |
|
CERTIFIED CHIEF INFORMATION SECURITY OFFICEREC-Council’s CCISO Program has certified leading information security professionals around the world. A core group of high-level information security executives, the CCISO Advisory Board, contributed by forming the found ... |
|
Register |
|
EC-COUNCIL NETWORK SECURITY ADMINISTRATORThis course looks at the network security in defensive view. The ENSA program is designed to provide fundamental skills needed to analyze the internal and external security threats against a network, and to develop secur ... |
|
Register |
|
DEEP SECURITY TRAINING FOR CERTIFIED PROFESSIONALSIn this course, you will learn how to use Trend Micro™ Deep Security. This course provides information about the basic architecture, deployment scenarios, installation processes, policy configuration and administration o ... |
|
Register |
|
Channel Partner Securing Email with Cisco Email Security ApplianceThis course is designed to help learners understand how to install, configure, and manage the Cisco Email Security Appliance in a small to medium-sized business and enterprise installation. Knowledge application and basi ... |
|
Register |
|
EC-COUNCIL CERTIFIED ENCRYPTION SPECIALISTThe EC-Council Certified Encryption Specialist (ECES) program introduces professionals and students to the field of cryptography. The participants will learn the foundations of modern symmetric and key cryptography inclu ... |
|
Register |
|
CISCO ASA WITH FIREPOWER SERVICES WORKSHOPThe Cisco Next-Generation Firewall (NGFW) is the industry’s first fully integrated, threat-focused NGFW. It delivers comprehensive, unified policy management of firewall functions, application control, threat prevention, ... |
|
Register |
|
CERTIFIED INTERNET OF THINGS PRACTITIONER (CIOTP) CERTIFICATIONThe Internet of Things (IoT) promises a wide range of benefits for industry, energy and utility companies, municipalities, healthcare, and consumers. Data can be collected in extraordinary volume and detail regarding alm ... |
|
Register |
|
CYBER SEC FIRST RESPONDER: THREAT DETECTION AND RESPONSEThis course covers the duties of those who are responsible for monitoring and detecting security incidents in information systems and networks, and for executing a proper response to such incidents. Depending on the size ... |
|
Register |
Oman , Muscat |
|||
---|---|---|---|
|
MANAGING AND DEFENDING AGAINST CURRENT THREATSThis is a deep dive course on security operations: vulnerability management, anomalies detection, discovery of industry attacks and threats, understanding how compromised system or solution looks like, defining the indic ... |
|
Register |
|
IMPLEMENTING CISCO NETWORK SECURITY V3.0This is a five-day instructor-led course that focuses on the design, implementation and monitoring of a comprehensive security policy, using Cisco IOS security features and technologies. All IOS examples and hands on exp ... |
|
Register |
|
CISCO ASA WITH FIREPOWER SERVICES WORKSHOPThe Cisco Next-Generation Firewall (NGFW) is the industry’s first fully integrated, threat-focused NGFW. It delivers comprehensive, unified policy management of firewall functions, application control, threat prevention, ... |
|
Register |
|
PERFORMANCE TUNING AND OPTIMIZING SQL DATABASESThis four-day instructor-led course provides students who manage and maintain SQL Server databases with the knowledge and skills to performance tune and optimize their databases. |
|
Register |
|
EC-COUNCIL CERTIFIED NETWORK DEFENDERCertified Network Defender (CND) is a vendor-neutral, hands-on, instructor-led comprehensive network security certification training program. It is a skills-based, lab intensive program based on a job-task analysis and c ... |
|
Register |
|
CITRIX ENTERPRISE SECURITY SOLUTIONSLearn to secure your Citrix environment in this hands-on course that encompasses the core Citrix technologies, including Citrix Virtual Apps and Desktops, ADC, Endpoint Management, Content Collaboration and Citrix Cloud. ... |
|
Register |
|
CompTIA Pentest +As organizations scramble to protect themselves and their customers against privacy or security breaches, the ability to conduct penetration testing is an emerging skill set that is becoming ever more valuable to the org ... |
|
Register |
|
SECURING NETWORKS WITH FIREPOWER THREAT DEFENSE NGFWThe Securing Networks with Cisco Firepower Threat Defense NGFW (FIREPOWER200) course demonstrates the powerful features of Cisco Firepower Threat Defense, including VPN configuration, traffic control, NAT configuration, ... |
|
Register |
|
RED HAT IDENTITY MANAGEMENT AND ACTIVE DIRECTORY INTEGRATION WITH EXAM (EX362)This course teaches you skills on the most requested Red Hat Identity Management (IdM) capabilities, including Active Directory trusts, multi-product federation, configuration management with Ansible, integrated certific ... |
|
Register |
|
MASTERCLASS: PEN TESTING AND SECURING MOBILE AND WEB APPLICATIONSThe course teaches mobile and web application security concepts, including the techniques on how to attack and how to respond with an appropriate countermeasure implementation. Our course has been developed around profes ... |
|
Register |
|
JUNOS SPACE-SECURITY DIRECTORThis two-day course is designed to provide students with the knowledge required to manage the Junos Space Security Director application and manage devices with that application. Students will gain in-depth knowledge of h ... |
|
Register |
|
SYMANTEC PROXY SG V6.6: ADVANCED ADMINISTRATIONThe Proxy SG v6.6 Advanced Administration course is intended for IT professionals who wish to learn to master the advanced features of Proxy SG. |
|
Register |
|
SYMANTEC ASSET MANAGEMENT SUITE 8.1 ADMINISTRATIONThe Symantec Asset Management Suite 8.1 Administration course is designed for professionals tasked with using Symantec Asset Management Suite (AMS) to manage their software and hardware resources in their organizations. ... |
|
Register |
|
BLUE COAT CERTIFIED PROXY PROFESSIONALIn the Blue Coat Certified Proxy Professional (BCCPP) course, you will learn to configure your Blue Coat Proxy appliance for high availability and multi-site deployments, advance policy features, web content control, P2P ... |
|
Register |
|
PALO ALTO NETWORKS® TRAPS™ ADVANCED ENDPOINT PROTECTION (PAN-EDU-281)This instructor-led course teaches strategies in defense against advanced threats. Successful completion of this course enables administrators to better understand the threat landscape. Students will learn the use of Pal ... |
|
Register |
|
SYMANTEC DEPLOYMENT SOLUTION 8.1 ADMINISTRATIONThe Symantec Deployment Solution 8.1: Administration course is designed for the professional tasked with installing, configuring, and managing a Deployment Solution system. This five-day, instructor-led, hands-on course ... |
|
Register |
|
CONFIGURING AND DEPLOYING A PRIVATE CLOUDThis course equips students with the skills they require to configure and deploy a cloud using Microsoft System Center 2012 R2. Using hands-on labs, students learn the following: - Produce a high-level design that acc ... |
|
Register |
|
WEB SECURITY SERVICE 6.10 DIAGNOSTICS AND TROUBLESHOOTINGThe WSS Diagnostics and Troubleshooting course is intended for IT professionals who will be diagnosing and troubleshooting the Symantec Web Security Service (WSS). |
|
Register |
|
CERTIFIED INFORMATION SYSTEMS SECURITY PROFESSIONALThe Official (ISC)2® CISSP® CBK® Review Seminar is the most comprehensive, complete review of information systems security concepts and industry best practices, and the only review course endorsed by (ISC)2. Review Semin ... |
|
Register |
|
CERTIFIED SECURE COMPUTER USER - AWARENESS TRAININGThe purpose of the CSCU training program is to provide individuals with the necessary knowledge and skills to protect their information assets. This class will immerse students into an interactive environment where they ... |
|
Register |
|
JNCIE-SEC BOOT CAMPThis five-day course is designed to serve as the ultimate preparation for the Juniper Networks Certified Internet Expert—Security (JNCIE-SEC) exam. The course focuses on caveats and tips useful for potential test candida ... |
|
Register |
|
SYMANTEC NET BACKUP 7.6.X: ADMINISTRATIONThis Symantec Net Backup 7.6.x: Administration course provides the IT professional with instruction on the functionality of Symantec NetBackup 7.6.1 software. This course covers the general principles of using NetBackup ... |
|
Register |
|
EC - COUNCIL CERTIFIED SECURE PROGRAMMERSoftware defects, bugs, and flaws in the logic of the program are consistently the cause for software vulnerabilities. Analysis by software security professionals has proven that most vulnerabilities are due to errors i ... |
|
Register |
|
SECURING CISCO NETWORKS WITH SOURCE FIRE INTRUSION PREVENTION SYSTEMThe Securing Networks with Cisco Firepower Next-Generation IPS course shows you how to deploy and use Cisco Firepower Next-Generation Intrusion Prevention System (NGIPS). This hands-on course gives you the knowledge and ... |
|
Register |
|
JUNOS INTRUSION PREVENTION SYSTEM FUNCTIONALITYThe Junos Intrusion prevention System Functionality (JIPS) course is designed to provide an introduction to the Intrusion Prevention System (IPS) feature set available on the Juniper Networks SRX Series Services Gateway. ... |
|
Register |
|
RHS333-BUNDLE: RED HAT ENTERPRISE SECURITY: NETWORK SERVICES + EX333Red Hat® Enterprise Security: Network Services with Exam is an intensive course that provides 4 days of instruction and labs that show students how to use the latest technologies to secure services. This class advances b ... |
|
Register |
|
IBM SECURITY IDENTITY MANAGER FOUNDATIONSThis is an instructor-led course that introduces students to the foundational skills required to install, configure, and administer IBM Security Identity Manager,. IBM Security Identity Manager can be deployed using the ... |
|
Register |
|
IBM GUARDIUM FOUNDATIONSAre you getting ready to administer database security policies? Learn how to configure Guardium to discover, classify, analyze, protect, and control access to sensitive data. You learn to perform vulnerability assessment ... |
|
Register |
|
SYMANTEC WEB SECURITY SERVICE CORE ADMINISTRATION R1The Web Security Service Core Administration course is intended for IT professionals who will be installing, configuring or administering the Symantec Web Security Service (WSS). |
|
Register |
|
PALO ALTO ADVANCED FIREWALL TROUBLESHOOTING (311)Advanced Firewall Troubleshooting is the next-level follow-on course to Palo Alto Networks® Essentials 1: Installation, Configuration, and Management (PAN-EDU-201) and Essentials 2: Extended Firewall Manager (PAN-EDU-205 ... |
|
Register |
|
CYBER SEC FIRST RESPONDER: THREAT DETECTION AND RESPONSEThis course covers the duties of those who are responsible for monitoring and detecting security incidents in information systems and networks, and for executing a proper response to such incidents. Depending on the size ... |
|
Register |
|
BLUE COAT CERTIFIED SECURITY ANALYTICS ADMINISTRATORThe Blue Coat Certified Security Analytics Administrator (BCSAA) course is intended for IT professionals who want to master the fundamentals of the Blue Coat Security Analytics solution. |
|
Register |
|
TREND MICRO APEX ONE TRAINING FOR CERTIFIED PROFESSIONALSIn this course, you will learn how to use Trend Micro Apex One™. This course details basic architecture, protection functionality, deployment scenarios, and troubleshooting. Through hands-on labs, participants practice c ... |
|
Register |
|
FIREWALL 8.1: TROUBLESHOOTING (EDU-330)Successful completion of this three-day, instructor-led course will enhance the participant’s understanding of how to troubleshoot the full line of Palo Alto Networks® next-generation firewalls. Participants will have o ... |
|
Register |
|
IBM QRADAR SIEM FOUNDATIONSIBM QRadar SIEM provides deep visibility into network, user, and application activity. It provides collection, normalization, correlation, and secure storage of events, flows, asset profiles, and vulnerabilities. QRadar ... |
|
Register |
|
ADVANCED JUNOS SECURITYThis five-day course, which is designed to build off the current Junos Security (JSEC) offering, delves deeper into Junos security and next-generation security features. Through demonstrations and hands-on labs, you will ... |
|
Register |
|
DEV SEC OPS ENGINEERINGA Dev Sec Ops Engineer is an IT Security professional who is skilled at “security as code” with the intent of making security and compliance consumable as a service. A Dev Sec Ops Engineer uses data and security science ... |
|
Register |
|
CERTIFIED IN RISK AND INFORMATION SYSTEMS CONTROLThe CRISC Review Manual and CRISC Review, Questions, Answers and Explanation Manual will be provided to delegates booked on the course. |
|
Register |
|
BLUE COAT PACKET SHAPER PROFESSIONALBlue Coat Certified Packet Shaper Administrator (BCPSA) certification or waiver exam; student should have practical experience with the Packet Shaper appliance in the field with a solid understanding of networking and ge ... |
|
Register |
|
RED HAT SERVER HARDENINGSecure a Red Hat Enterprise Linux system to comply with security policy requirements Red Hat® Server Hardening (RH413) builds on a student's Red Hat Certified Engineer (RHCE®) certification or equivalent experience to t ... |
|
Register |
|
SYMANTEC SSL VISIBILITY 4.3 ADMINISTRATIONThe SSL Visibility 4.3 administration course enables you to plan, implement, configure and managed your SSLV appliance(s). This is a lecture-only course, there will be no hands-on access to an SSLV appliance during the c ... |
|
Register |
Nigeria , Abuja |
|||
---|---|---|---|
|
DEV SEC OPS ENGINEERINGA Dev Sec Ops Engineer is an IT Security professional who is skilled at “security as code” with the intent of making security and compliance consumable as a service. A Dev Sec Ops Engineer uses data and security science ... |
|
Register |
|
JUNOS SPACE-SECURITY DIRECTORThis two-day course is designed to provide students with the knowledge required to manage the Junos Space Security Director application and manage devices with that application. Students will gain in-depth knowledge of h ... |
|
Register |
|
LEAD AUDITOR TRAINING (IRCA CERTIFIED)This five-day intensive course enables participants to develop the expertise needed to audit an Information Security Management System (ISMS) and to manage a team of auditors by applying widely recognized audit principle ... |
|
Register |
|
PANORAMA 8.1: MANAGING FIREWALLS AT SCALE (EDU-220)This course will help students to gain in-depth knowledge about how to configure and manage their Palo Alto Networks® Panorama TM management server. Upon completion of this course, administrators should be familiar with ... |
|
Register |
|
BLUE COAT PACKET SHAPER PROFESSIONALBlue Coat Certified Packet Shaper Administrator (BCPSA) certification or waiver exam; student should have practical experience with the Packet Shaper appliance in the field with a solid understanding of networking and ge ... |
|
Register |
|
CERTIFIED SECURE COMPUTER USER - AWARENESS TRAININGThe purpose of the CSCU training program is to provide individuals with the necessary knowledge and skills to protect their information assets. This class will immerse students into an interactive environment where they ... |
|
Register |
|
JNCIE-SEC BOOT CAMPThis five-day course is designed to serve as the ultimate preparation for the Juniper Networks Certified Internet Expert—Security (JNCIE-SEC) exam. The course focuses on caveats and tips useful for potential test candida ... |
|
Register |
|
BLUE COAT CERTIFIED SECURITY ANALYTICS PROFESSIONALThe Blue Coat Certified Security Analytics Professional (BCSAP) course designed for participants who want to learn how to use the Blue Coat Security Analytics platform to perform virtually any type of network-based monit ... |
|
Register |
|
Implementing Cisco Identity Services Engine for Wireless EngineersThis course has been designed to enable wireless engineers understand the concepts, architecture, and use cases of the Cisco Identity Services Engine Solution. This course provides students with the knowledge and skills ... |
|
Register |
|
NETWORK AND SECURITY MANAGER FUNDAMENTALSThis two-day course discusses the basic operations of Network and Security Manager. Key topics include server and domain administration, device configuration, template creation and management, policy creation and managem ... |
|
Register |
|
SECURITY+The Security+ Certification Prep Course provides the basic knowledge needed to plan, implement, and maintain information security in a vendor-neutral format. This includes risk management, host and network security, auth ... |
|
Register |
|
SYMANTEC IT MANAGEMENT SUITE 8.1 DIAGNOSTICS AND TROUBLESHOOTINGThe Symantec IT Management Suite 8.1 Diagnostics and Troubleshooting course is designed for professionals tasked with maintaining and utilizing a Symantec IT Management Suite (ITMS) implementation in their organizations. ... |
|
Register |
|
SYMANTEC DATA LOSS PREVENTION 15.5 ADMINISTRATIONThe Symantec Data Loss Prevention 15.5 Administration course is designed to provide you with the fundamental knowledge to configure and administer the Symantec Data Loss Prevention Enforce platform. The hands‐on labs inc ... |
|
Register |
|
IBM SECURITY QRADAR SIEM ADVANCED TOPICSThis is an advanced course for the QRadar Analyst and Administrator and is a follow-on to BQ103G. This course uses the IBM QRadar SIEM 7.3 platform for lab exercises. |
|
Register |
|
DEEP SECURITY TRAINING FOR CERTIFIED PROFESSIONALSIn this course, you will learn how to use Trend Micro™ Deep Security. This course provides information about the basic architecture, deployment scenarios, installation processes, policy configuration and administration o ... |
|
Register |
|
CERTIFIED IN THE GOVERNANCE OF ENTERPRISE ITAs technology has become more and more vital to the achievement of business goals and value delivery, enterprise leaders have realized that enterprise governance must be extended to information technology and information ... |
|
Register |
|
FIREWALL 8.1: OPTIMIZING FIREWALL THREAT PREVENTION (EDU-214)Successful completion of this four-day, instructor-led course will enhance the student’s understanding of how to better configure, manage, and monitor PAN-OS® threat prevention features. The student will get hands-on exp ... |
|
Register |
|
SECURING CISCO NETWORKS WITH OPEN SOURCE SNORTSecuring Cisco Networks with Open Source Snort is a lab-intensive course that introduces students to the open source Snort technology as well as rule writing. You will learn how to build and manage a Snort system using o ... |
|
Register |
|
FIREWALL 8.1: TROUBLESHOOTING (EDU-330)Successful completion of this three-day, instructor-led course will enhance the participant’s understanding of how to troubleshoot the full line of Palo Alto Networks® next-generation firewalls. Participants will have o ... |
|
Register |
|
CERTIFIED INTERNET OF THINGS PRACTITIONER (CIOTP) CERTIFICATIONThe Internet of Things (IoT) promises a wide range of benefits for industry, energy and utility companies, municipalities, healthcare, and consumers. Data can be collected in extraordinary volume and detail regarding alm ... |
|
Register |
|
CYBER SEC FIRST RESPONDER: THREAT DETECTION AND RESPONSEThis course covers the duties of those who are responsible for monitoring and detecting security incidents in information systems and networks, and for executing a proper response to such incidents. Depending on the size ... |
|
Register |
|
CLIENT MANAGEMENT SUITE 8.1 ADMINISTRATIONThe Client Management Suite 8.1 Administration course is designed for professionals tasked with using Symantec’s Client Management Suite (CMS) to manage their software and hardware resources in their organizations. This ... |
|
Register |
|
EC-COUNCIL CERTIFIED INCIDENT HANDLERThe EC-Council Certified Incident Handler (ECIH) program is designed to provide the fundamental skills to handle and respond to the computer security incidents in an information system. The course addresses various under ... |
|
Register |
|
NSX-T: INSTALL, CONFIGURE, MANAGEThis five-day, fast-paced course provides comprehensive training on how to install, configure, and manage a VMware NSX-T™ Data Center environment. This course covers key NSX-T Data Center features and functionality offer ... |
|
Register |
|
SYMANTEC CLOUD SOC ADMINISTRATION R2The Cloud SOC R2 Administration course provides an overview of the Cloud SOC service, covering initial setup, deployment options and service configuration. The courseware introduces each topic with an accompanying workfl ... |
|
Register |
|
SYMANTEC PROXY SG V6.6: BASIC ADMINISTRATIONThe Proxy SG 6.6 Basic Administration course is an introduction to deployment options and management of the individual key features offered using the Proxy SG 6.6 solution. This an introductory course and is designed for ... |
|
Register |
|
EC-COUNCIL CERTIFIED SECURITY ANALYST V.10The ECSA program offers a seamless learning progress continuing where the CEH program left off. The new ECSAv10 includes updated curricula and an industry recognized comprehensive step-by step penetration testing method ... |
|
Register |
|
SYMANTEC CONTROL COMPLIANCE SUITE VULNERABILITY MANAGER 12.0 ADMINISTRATIONThe Symantec Control Compliance Suite Vulnerability Manager (CCS-VM) 12.0 Administration Training is designed for the IT security professional tasked with installation, administering, monitoring and reporting on CCS-VM 1 ... |
|
Register |
|
CERTIFIED IN RISK AND INFORMATION SYSTEMS CONTROLThe CRISC Review Manual and CRISC Review, Questions, Answers and Explanation Manual will be provided to delegates booked on the course. |
|
Register |
|
IMPLEMENTING CISCO UNIFIED COMMUNICATIONS SECURITYThe Implementing Cisco Unified Communications Security (UCSEC) course is designed to provide students with the necessary knowledge and skills to implement security features in a Cisco Unified Communications environment. ... |
|
Register |
|
IBM ACCESS MANAGER PLATFORM FOUNDATIONSIBM Access Manager is a highly scalable and configurable access management solution. It simplifies and secures your user experience with single sign-on across applications and protects critical assets using strong multi- ... |
|
Register |
|
TREND MICRO DEEP DISCOVERY TRAINING FOR CERTIFIED PROFESSIONALSTrend Micro™ Deep Discovery Training for Certified Professionals is a three-day, instructor-led training course where participants will learn how to deploy and manage a Trend Micro™ Deep Discovery threat protection solut ... |
|
Register |
|
COMPTIA CSA+ CYBERSECURITY ANALYSTThe CompTIA CSA+ certification is a vendor-neutral credential. The CompTIA CSA+ exam (Exam CS0-001) is an internationally targeted validation of intermediate-level security skills and knowledge. The course has a technica ... |
|
Register |
|
VMWARE NSX-T DATA CENTER: INSTALL, CONFIGURE, MANAGEThis five-day, fast-paced course provides comprehensive training on how to install, configure, and manage a VMware NSX-T™ Data Center environment. This course covers key NSX-T Data Center features and functionality offer ... |
|
Register |
South Africa , Cape Town |
|||
---|---|---|---|
|
IBM GUARDIUM FOUNDATIONSAre you getting ready to administer database security policies? Learn how to configure Guardium to discover, classify, analyze, protect, and control access to sensitive data. You learn to perform vulnerability assessment ... |
|
Register |
|
RED HAT SECURITY: LINUX IN PHYSICAL, VIRTUAL, AND CLOUD WITH EXAM (EX415)Maintaining security of computing systems is a process of managing risk through the implementation of processes and standards backed by technologies and tools. In this course, you will learn about resources that can be u ... |
|
Register |
|
RED HAT IDENTITY MANAGEMENT AND ACTIVE DIRECTORY INTEGRATION WITH EXAM (EX362)This course teaches you skills on the most requested Red Hat Identity Management (IdM) capabilities, including Active Directory trusts, multi-product federation, configuration management with Ansible, integrated certific ... |
|
Register |
|
EC-COUNCIL CERTIFIED SOC ANALYST (CSA)The Certified SOC Analyst (CSA) program is the first step to joining a security operations center (SOC). It is engineered for current and aspiring Tier I and Tier II SOC analysts to achieve proficiency in performing entr ... |
|
Register |
|
IMPLEMENTING CISCO THREAT CONTROL SYSTEMSImplementing Cisco Threat Control Solutions is designed to provide security engineers with the knowledge and hands-on experience required to deploy Cisco’s Email Security (ESA); Web Security (CWS, WSA); Advanced Malware ... |
|
Register |
|
IBM IDENTITY GOVERNANCE AND INTELLIGENCE FOUNDATIONSIBM Identity Governance and Intelligence is an advanced identity governance system. This course provides the foundational skills necessary to operate, administer, and accomplish the major business functions and analyses ... |
|
Register |
|
MASTER CLASS ISO 27001 IMPLEMENTATIONThis five-day intensive course enables the participants to develop the expertise to support an organization in implementing and managing an Information Security Management System (ISMS) as specified in ISO/IEC 27001:2013 ... |
|
Register |
|
CERTIFIED INFORMATION SYSTEMS SECURITY PROFESSIONALThe Official (ISC)2® CISSP® CBK® Review Seminar is the most comprehensive, complete review of information systems security concepts and industry best practices, and the only review course endorsed by (ISC)2. Review Semin ... |
|
Register |
|
IMPLEMENTING AND MANAGING WINDOWS 10This course is designed to provide students with the knowledge and skills required to install and configure Windows 10 desktops and devices in a Windows Server domain corporate environment. These skills include learning ... |
|
Register |
|
JUNOS SECURITYThis five-day course covers the configuration, operation, and implementation of SRX Series Services Gateways in a typical network environment. Key topics within this course include: security zones, security policies, Net ... |
|
Register |
|
MASTERCLASS: RED TEAM - BLUE TEAM OPERATIONSThis is a deep dive course on Red Team – Blue Team Operations: The cyber kill chain Security is a business enabler, and it is only when it is viewed from a business perspective that we can truly make the right decision ... |
|
Register |
|
SYMANTEC DATA CENTER SECURITY SERVER ADVANCED 6.7 DIAGNOSTICS AND TROUBLESHOOTINGThe Symantec Data Center Server Advanced 6.7 Diagnostics and Troubleshooting course is designed for the IT security management professional tasked with troubleshooting Data Center Security Server Advanced (SDCSSA). Stud ... |
|
Register |
|
SYMANTEC NET BACKUP 7.6.X: ADMINISTRATIONThis Symantec Net Backup 7.6.x: Administration course provides the IT professional with instruction on the functionality of Symantec NetBackup 7.6.1 software. This course covers the general principles of using NetBackup ... |
|
Register |
|
IBM SECURITY IDENTITY MANAGER FOUNDATIONSThis is an instructor-led course that introduces students to the foundational skills required to install, configure, and administer IBM Security Identity Manager,. IBM Security Identity Manager can be deployed using the ... |
|
Register |
|
IMPLEMENTING ADVANCED CISCO ASA SECURITY V2.0This course provides up-to-date training on the key features of the Cisco ASA 5500-X Series next-Generation Firewall, including ASAv, ASA IDFW, ASA Fire POWER Service Module, ASA Cloud Web Security and ASA Clustering. Ex ... |
|
Register |
|
DEPLOYING AND MANAGING WINDOWS 10 USING ENTERPRISE SERVICESThis 5-day course provides administrators with the knowledge and skills needed to deploy and manage Windows 10 desktops, devices, and applications in an enterprise environment. Students learn how to plan and implement Wi ... |
|
Register |
|
LEAD AUDITOR TRAINING (IRCA CERTIFIED)This five-day intensive course enables participants to develop the expertise needed to audit an Information Security Management System (ISMS) and to manage a team of auditors by applying widely recognized audit principle ... |
|
Register |
|
SYMANTEC CONTROL COMPLIANCE SUITE VULNERABILITY MANAGER 12.0 ADMINISTRATIONThe Symantec Control Compliance Suite Vulnerability Manager (CCS-VM) 12.0 Administration Training is designed for the IT security professional tasked with installation, administering, monitoring and reporting on CCS-VM 1 ... |
|
Register |
|
ETHICAL HACKING AND COUNTERMEASURES V.10The Certified Ethical Hacker (C|EH v10) program is a trusted and respected ethical hacking training Program that any information security professional will need. Since its inception in 2003, the Certified Ethical Hacker ... |
|
Register |
|
SYMANTEC SSL VISIBILITY 4.3 ADMINISTRATIONThe SSL Visibility 4.3 administration course enables you to plan, implement, configure and managed your SSLV appliance(s). This is a lecture-only course, there will be no hands-on access to an SSLV appliance during the c ... |
|
Register |
|
Protecting Against Malware Threats with Cisco AMP for EndpointsThis lab-intensive course introduces students to the powerful features of Cisco AMP for Endpoints software. A number of step by step attack scenarios will provide an understanding of the operational uses of the product. ... |
|
Register |
|
SYMANTEC SECURITY ANALYTICS 7.2.X PROFESSIONALThe Symantec Security Analytics Professional course is designed for participants who want to learn how to use the Symantec Security Analytics platform to perform virtually any type of network-based monitoring and forensi ... |
|
Register |
|
SYMANTEC NETBACKUP 7.5: MAINTAIN AND TROUBLESHOOTThe three day Symantec Net Backup Maintain and Troubleshoot course provides the IT professional with instruction on troubleshooting Symantec NetBackup 7.5 software. This course covers general error detection tools and t ... |
|
Register |
|
SECURING CISCO NETWORKS WITH SOURCE FIRE INTRUSION PREVENTION SYSTEMThe Securing Networks with Cisco Firepower Next-Generation IPS course shows you how to deploy and use Cisco Firepower Next-Generation Intrusion Prevention System (NGIPS). This hands-on course gives you the knowledge and ... |
|
Register |
|
JUNOS INTRUSION PREVENTION SYSTEM FUNCTIONALITYThe Junos Intrusion prevention System Functionality (JIPS) course is designed to provide an introduction to the Intrusion Prevention System (IPS) feature set available on the Juniper Networks SRX Series Services Gateway. ... |
|
Register |
|
PALO ALTO ADVANCED FIREWALL TROUBLESHOOTING (311)Advanced Firewall Troubleshooting is the next-level follow-on course to Palo Alto Networks® Essentials 1: Installation, Configuration, and Management (PAN-EDU-201) and Essentials 2: Extended Firewall Manager (PAN-EDU-205 ... |
|
Register |
|
EC - COUNCIL CERTIFIED SECURE PROGRAMMERSoftware defects, bugs, and flaws in the logic of the program are consistently the cause for software vulnerabilities. Analysis by software security professionals has proven that most vulnerabilities are due to errors i ... |
|
Register |
|
TREND MICRO APEX ONE TRAINING FOR CERTIFIED PROFESSIONALSIn this course, you will learn how to use Trend Micro Apex One™. This course details basic architecture, protection functionality, deployment scenarios, and troubleshooting. Through hands-on labs, participants practice c ... |
|
Register |
|
IBM QRADAR SIEM FOUNDATIONSIBM QRadar SIEM provides deep visibility into network, user, and application activity. It provides collection, normalization, correlation, and secure storage of events, flows, asset profiles, and vulnerabilities. QRadar ... |
|
Register |
|
IMPLEMENTING AND CONFIGURING CISCO IDENTITY SERVICES ENGINEThe Implementing and Configuring Cisco Identity Services Engine course shows you how to deploy and use Cisco Identity Services Engine (ISE) v2.4, an identity and access control policy platform that simplifies the deliver ... |
|
Register |
|
RED HAT SERVER HARDENINGSecure a Red Hat Enterprise Linux system to comply with security policy requirements Red Hat® Server Hardening (RH413) builds on a student's Red Hat Certified Engineer (RHCE®) certification or equivalent experience to t ... |
|
Register |
|
UNDERSTANDING CISCO CYBER SECURITY FUNDAMENTALSThe Understanding Cisco Cyber security Fundamentals (SECFND) v1.0 course provides you with an understanding of network infrastructure devices, operations and vulnerabilities of the TCP/IP protocol suite, basic informatio ... |
|
Register |
|
Implementing Forefront Unified Access Gateway 2010This three-day instructor-led course prepares you to design and deploy remote access solutions using Microsoft Forefront Unified Access Gateway 2010 (UAG). Forefront UAG provides organizations with unparalleled flexibili ... |
|
Register |
|
SECURING THE WEB WITH CISCO WEB SECURITY APPLIANCEThis course has been designed to help learners understand how to install, configure, manage, and troubleshoot a Cisco Web Security Appliance (WSA). Students will learn how to design, configure, administer, monitor, and t ... |
|
Register |
|
IMPLEMENTING CISCO NETWORK SECURITY V3.0This is a five-day instructor-led course that focuses on the design, implementation and monitoring of a comprehensive security policy, using Cisco IOS security features and technologies. All IOS examples and hands on exp ... |
|
Register |
|
SECURING CISCO NETWORKS WITH SNORT RULE WRITING BEST PRACTICESSecuring Cisco Networks with Snort Rule Writing Best Practices is a lab-intensive course that introduces students to the open source Snort community and rule-writing best practices. Users focus exclusively on the Snort r ... |
|
Register |
|
SYMANTEC MESSAGING GATEWAY 10.5: ADMINISTRATIONThe Symantec Messaging Gateway 10.5: Administration course is designed to provide you with the fundamental knowledge to configure and administer the Symantec Messaging Gateway. This three-day, instructor-led, hands-on cl ... |
|
Register |
|
SYMANTEC CONTROL COMPLIANCE SUITE 12.0 ADMINISTRATIONThe Control Compliance Suite 12.0 Administration course is designed for professionals who are tasked with ensuring the security of their computing enterprise and compliance with both external and internal mandates. This ... |
|
Register |
|
CONFIGURING JUNIPER NETWORKS FIREWALL/IPSEC VPN PRODUCTSThis course is the first in the Screen OS curriculum. It is a three-day, instructor-led course that focuses on configuration of the Screen OS firewall/virtual private network (VPN) products in a variety of situations, in ... |
|
Register |
|
Implementing Cisco Secure MobilityThis course is designed to prepare network security engineers with the knowledge and skills they need to protect data traversing a public or shared infrastructure such as the Internet by implementing and maintaining Cisc ... |
|
Register |
|
FIREWALL 8.1: OPTIMIZING FIREWALL THREAT PREVENTION (EDU-214)Successful completion of this four-day, instructor-led course will enhance the student’s understanding of how to better configure, manage, and monitor PAN-OS® threat prevention features. The student will get hands-on exp ... |
|
Register |
|
EC-COUNCIL CERTIFIED ENCRYPTION SPECIALISTThe EC-Council Certified Encryption Specialist (ECES) program introduces professionals and students to the field of cryptography. The participants will learn the foundations of modern symmetric and key cryptography inclu ... |
|
Register |
|
CompTIA Pentest +As organizations scramble to protect themselves and their customers against privacy or security breaches, the ability to conduct penetration testing is an emerging skill set that is becoming ever more valuable to the org ... |
|
Register |
|
MASTERCLASS: RED TEAM - BLUE TEAM OPERATIONSThis is a deep dive course on Red Team – Blue Team Operations: The cyber kill chain Security is a business enabler, and it is only when it is viewed from a business perspective that we can truly make the right decision ... |
|
Register |
|
CYBERSECURITY FOUNDATIONSWhen you consider just a few of the consequences of a security breach - your proprietary information completely accessible, hefty fines for security lapses, news headlines about your company's security breach, it becomes ... |
|
Register |
|
SYMANTEC MESSAGING GATEWAY 10.6 ADMINISTRATIONThe Symantec Messaging Gateway 10.6: Administration course is designed to provide you with the fundamental knowledge to configure and administer the Symantec Messaging Gateway. This two-day, instructor-led, hand son clas ... |
|
Register |
|
PALO ALTO EXTENDED FIREWALL MANAGEMENT (205)Extended Firewall Management is the next-level follow-on course to Palo Alto Networks® Installation, Configuration, and Management (PAN-EDU-201). Extended Firewall Management expands on 201 course topics, while introduci ... |
|
Register |
|
RED HAT SECURITY: SECURING CONTAINERS AND OPEN SHIFT WITH EXAMYou will learn and validate your skills in using secure and trusted container images, registries, and source code; managing network and storage isolation; implementing application single sign-on; and configuring appropri ... |
|
Register |
|
MANAGING ENTERPRISE SECURITY WITH CISCO SECURITY MANAGERThe Managing Enterprise Security with Cisco Security Manager (SSECMGT) course is aimed at providing network security engineers with the knowledge and skills that are needed to configure and deploy Cisco Security Manager. ... |
|
Register |
|
IMPLEMENTING FOREFRONT IDENTITY MANAGER 2010This four-day instructor-led course introduces and explains the features and capabilities of Microsoft Forefront Identity Manager 2010 (FIM), and provides an overview of the solution scenarios that FIM addresses. The cou ... |
|
Register |
|
COMPUTER HACKING FORENSICS INVESTIGATORThe CHFI course will give participants the necessary skills to identify an intruder's footprints and to properly gather the necessary evidence to prosecute. Many of today's top tools of the forensic trade will be taught ... |
|
Register |
|
SYMANTEC IDENTITY AND AUTHENTICATION SERVICES R1The Symantec Identity and Authentication Services R1 course is designed for the IT security professional needing to develop an understanding of the principles and use cases behind the Symantec VIP Service and VIP Access ... |
|
Register |
|
Channel Partner Securing Email with Cisco Email Security ApplianceThis course is designed to help learners understand how to install, configure, and manage the Cisco Email Security Appliance in a small to medium-sized business and enterprise installation. Knowledge application and basi ... |
|
Register |
Kuwait , Kuwait |
|||
---|---|---|---|
|
PERFORMANCE TUNING AND OPTIMIZING SQL DATABASESThis four-day instructor-led course provides students who manage and maintain SQL Server databases with the knowledge and skills to performance tune and optimize their databases. |
|
Register |
|
JUNOS SECURITYThis five-day course covers the configuration, operation, and implementation of SRX Series Services Gateways in a typical network environment. Key topics within this course include: security zones, security policies, Net ... |
|
Register |
|
EC-COUNCIL NETWORK SECURITY ADMINISTRATORThis course looks at the network security in defensive view. The ENSA program is designed to provide fundamental skills needed to analyze the internal and external security threats against a network, and to develop secur ... |
|
Register |
|
PALO ALTO ADVANCED FIREWALL TROUBLESHOOTING (311)Advanced Firewall Troubleshooting is the next-level follow-on course to Palo Alto Networks® Essentials 1: Installation, Configuration, and Management (PAN-EDU-201) and Essentials 2: Extended Firewall Manager (PAN-EDU-205 ... |
|
Register |
|
BLUE COAT CERTIFIED SECURITY ANALYTICS PROFESSIONALThe Blue Coat Certified Security Analytics Professional (BCSAP) course designed for participants who want to learn how to use the Blue Coat Security Analytics platform to perform virtually any type of network-based monit ... |
|
Register |
|
DEV SEC OPS ENGINEERINGA Dev Sec Ops Engineer is an IT Security professional who is skilled at “security as code” with the intent of making security and compliance consumable as a service. A Dev Sec Ops Engineer uses data and security science ... |
|
Register |
|
MANAGING AND DEFENDING AGAINST CURRENT THREATSThis is a deep dive course on security operations: vulnerability management, anomalies detection, discovery of industry attacks and threats, understanding how compromised system or solution looks like, defining the indic ... |
|
Register |
|
IBM GUARDIUM FOUNDATIONSAre you getting ready to administer database security policies? Learn how to configure Guardium to discover, classify, analyze, protect, and control access to sensitive data. You learn to perform vulnerability assessment ... |
|
Register |
|
SYMANTEC ENDPOINT ENCRYPTION 11.2 INSTALL, CONFIGURE AND DEPLOYThe Symantec Endpoint Encryption 11.2: Install, Configure, and Deploy course is designed for the network, IT security, systems administration, and support professional tasked with maintaining and troubleshooting a Symant ... |
|
Register |
|
CERTIFIED IN RISK AND INFORMATION SYSTEMS CONTROLThe CRISC Review Manual and CRISC Review, Questions, Answers and Explanation Manual will be provided to delegates booked on the course. |
|
Register |
|
SYMANTEC DATA CENTER SECURITY SERVER ADVANCED 6.7 DIAGNOSTICS AND TROUBLESHOOTINGThe Symantec Data Center Server Advanced 6.7 Diagnostics and Troubleshooting course is designed for the IT security management professional tasked with troubleshooting Data Center Security Server Advanced (SDCSSA). Stud ... |
|
Register |
|
RED HAT SECURITY: LINUX IN PHYSICAL, VIRTUAL, AND CLOUD WITH EXAM (EX415)Maintaining security of computing systems is a process of managing risk through the implementation of processes and standards backed by technologies and tools. In this course, you will learn about resources that can be u ... |
|
Register |
|
ETHICAL HACKING AND COUNTERMEASURES V.10The Certified Ethical Hacker (C|EH v10) program is a trusted and respected ethical hacking training Program that any information security professional will need. Since its inception in 2003, the Certified Ethical Hacker ... |
|
Register |
|
MASTERCLASS: PEN TESTING AND SECURING MOBILE AND WEB APPLICATIONSThe course teaches mobile and web application security concepts, including the techniques on how to attack and how to respond with an appropriate countermeasure implementation. Our course has been developed around profes ... |
|
Register |
|
IMPLEMENTING AND MANAGING WINDOWS 10This course is designed to provide students with the knowledge and skills required to install and configure Windows 10 desktops and devices in a Windows Server domain corporate environment. These skills include learning ... |
|
Register |
|
CYBER SEC FIRST RESPONDER™ (CFR) CERTIFICATIONThis course covers network defense and incident response methods, tactics, and procedures are taught in alignment with industry frameworks such as NIST 800-61 r.2 (Computer Security Incident Handling), US-CERT’s NCISP (N ... |
|
Register |
|
SYMANTEC DATA LOSS PREVENTION 14.6 ADMINISTRATIONThe Symantec Data Loss Prevention 14.X: Administration course is designed to provide you with the fundamental knowledge to configure and administer the Symantec Data Loss Prevention Enforce platform. The hands-on labs i ... |
|
Register |
|
SECURITY+The Security+ Certification Prep Course provides the basic knowledge needed to plan, implement, and maintain information security in a vendor-neutral format. This includes risk management, host and network security, auth ... |
|
Register |
|
CISSP CERTIFICATION PREP COURSE V1.0Gain core knowledge and experience to successfully implement and manage security programs and prepare for the CISSP certification. This course is the most comprehensive review of information security concepts and industr ... |
|
Register |
|
MASTER CLASS ISO 27001 IMPLEMENTATIONThis five-day intensive course enables the participants to develop the expertise to support an organization in implementing and managing an Information Security Management System (ISMS) as specified in ISO/IEC 27001:2013 ... |
|
Register |
|
Certified Cloud Security Professional Certification PreparationAs powerful as cloud computing is for the organization, understanding its information security risks and mitigation strategies is critical. Legacy approaches are inadequate, and organizations need competent, experienced ... |
|
Register |
|
DEPLOYING AND MANAGING WINDOWS 10 USING ENTERPRISE SERVICESThis 5-day course provides administrators with the knowledge and skills needed to deploy and manage Windows 10 desktops, devices, and applications in an enterprise environment. Students learn how to plan and implement Wi ... |
|
Register |
|
UNDERSTANDING CISCO CYBER SECURITY FUNDAMENTALSThe Understanding Cisco Cyber security Fundamentals (SECFND) v1.0 course provides you with an understanding of network infrastructure devices, operations and vulnerabilities of the TCP/IP protocol suite, basic informatio ... |
|
Register |
|
CLIENT MANAGEMENT SUITE 8.1 ADMINISTRATIONThe Client Management Suite 8.1 Administration course is designed for professionals tasked with using Symantec’s Client Management Suite (CMS) to manage their software and hardware resources in their organizations. This ... |
|
Register |
|
EC-COUNCIL CERTIFIED NETWORK DEFENDERCertified Network Defender (CND) is a vendor-neutral, hands-on, instructor-led comprehensive network security certification training program. It is a skills-based, lab intensive program based on a job-task analysis and c ... |
|
Register |
|
LEAD AUDITOR TRAINING (IRCA CERTIFIED)This five-day intensive course enables participants to develop the expertise needed to audit an Information Security Management System (ISMS) and to manage a team of auditors by applying widely recognized audit principle ... |
|
Register |
|
SYMANTEC SECURITY ANALYTICS 7.2.X PROFESSIONALThe Symantec Security Analytics Professional course is designed for participants who want to learn how to use the Symantec Security Analytics platform to perform virtually any type of network-based monitoring and forensi ... |
|
Register |
|
CERTIFIED INFORMATION SYSTEMS AUDITORCISA® is a trademark of the Information Systems Audit and Control Association® (ISACA®) More than 60,000 security professionals hold CISA certification, which was awarded the "Best Professional Certification" for 2009 b ... |
|
Register |
|
BLUE COAT CERTIFIED SECURITY ANALYTICS PROFESSIONALThe Blue Coat Certified Security Analytics Professional (BCSAP) course designed for participants who want to learn how to use the Blue Coat Security Analytics platform to perform virtually any type of network-based monit ... |
|
Register |
Bahrain , Manama |
|||
---|---|---|---|
|
JNCIE-SEC BOOT CAMPThis five-day course is designed to serve as the ultimate preparation for the Juniper Networks Certified Internet Expert—Security (JNCIE-SEC) exam. The course focuses on caveats and tips useful for potential test candida ... |
|
Register |
|
CYBER SEC FIRST RESPONDER™ (CFR) CERTIFICATIONThis course covers network defense and incident response methods, tactics, and procedures are taught in alignment with industry frameworks such as NIST 800-61 r.2 (Computer Security Incident Handling), US-CERT’s NCISP (N ... |
|
Register |
|
IMPLEMENTING FOREFRONT IDENTITY MANAGER 2010This four-day instructor-led course introduces and explains the features and capabilities of Microsoft Forefront Identity Manager 2010 (FIM), and provides an overview of the solution scenarios that FIM addresses. The cou ... |
|
Register |
|
EC-COUNCIL CERTIFIED SECURITY ANALYST V.10The ECSA program offers a seamless learning progress continuing where the CEH program left off. The new ECSAv10 includes updated curricula and an industry recognized comprehensive step-by step penetration testing method ... |
|
Register |
|
NSX-T: INSTALL, CONFIGURE, MANAGEThis five-day, fast-paced course provides comprehensive training on how to install, configure, and manage a VMware NSX-T™ Data Center environment. This course covers key NSX-T Data Center features and functionality offer ... |
|
Register |
|
IMPLEMENTING CISCO NETWORK SECURITY V3.0This is a five-day instructor-led course that focuses on the design, implementation and monitoring of a comprehensive security policy, using Cisco IOS security features and technologies. All IOS examples and hands on exp ... |
|
Register |
|
Channel Partner Securing Email with Cisco Email Security ApplianceThis course is designed to help learners understand how to install, configure, and manage the Cisco Email Security Appliance in a small to medium-sized business and enterprise installation. Knowledge application and basi ... |
|
Register |
|
RED HAT SECURITY: LINUX IN PHYSICAL, VIRTUAL, AND CLOUD WITH EXAM (EX415)Maintaining security of computing systems is a process of managing risk through the implementation of processes and standards backed by technologies and tools. In this course, you will learn about resources that can be u ... |
|
Register |
|
SYMANTEC DEPLOYMENT SOLUTION 8.1 ADMINISTRATIONThe Symantec Deployment Solution 8.1: Administration course is designed for the professional tasked with installing, configuring, and managing a Deployment Solution system. This five-day, instructor-led, hands-on course ... |
|
Register |
|
CONFIGURING AND DEPLOYING A PRIVATE CLOUDThis course equips students with the skills they require to configure and deploy a cloud using Microsoft System Center 2012 R2. Using hands-on labs, students learn the following: - Produce a high-level design that acc ... |
|
Register |
|
MANAGING ENTERPRISE SECURITY WITH CISCO SECURITY MANAGERThe Managing Enterprise Security with Cisco Security Manager (SSECMGT) course is aimed at providing network security engineers with the knowledge and skills that are needed to configure and deploy Cisco Security Manager. ... |
|
Register |
|
SYMANTEC MESSAGING GATEWAY 10.5: ADMINISTRATIONThe Symantec Messaging Gateway 10.5: Administration course is designed to provide you with the fundamental knowledge to configure and administer the Symantec Messaging Gateway. This three-day, instructor-led, hands-on cl ... |
|
Register |
|
CYBERSECURITY FOUNDATIONSWhen you consider just a few of the consequences of a security breach - your proprietary information completely accessible, hefty fines for security lapses, news headlines about your company's security breach, it becomes ... |
|
Register |
|
PALO ALTO EXTENDED FIREWALL MANAGEMENT (205)Extended Firewall Management is the next-level follow-on course to Palo Alto Networks® Installation, Configuration, and Management (PAN-EDU-201). Extended Firewall Management expands on 201 course topics, while introduci ... |
|
Register |
|
RHS333-BUNDLE: RED HAT ENTERPRISE SECURITY: NETWORK SERVICES + EX333Red Hat® Enterprise Security: Network Services with Exam is an intensive course that provides 4 days of instruction and labs that show students how to use the latest technologies to secure services. This class advances b ... |
|
Register |
|
COMPUTER HACKING FORENSICS INVESTIGATORThe CHFI course will give participants the necessary skills to identify an intruder's footprints and to properly gather the necessary evidence to prosecute. Many of today's top tools of the forensic trade will be taught ... |
|
Register |
|
BLUE COAT CERTIFIED SECURITY ANALYTICS ADMINISTRATORThe Blue Coat Certified Security Analytics Administrator (BCSAA) course is intended for IT professionals who want to master the fundamentals of the Blue Coat Security Analytics solution. |
|
Register |
|
SYMANTEC SSL VISIBILITY 5.0 ADMINISTRATIONThe SSL Visibility 5.0 Administration course enables you to plan, implement, configure and managed your SSLV virtual appliance. This course includes both lecture and hands-on labs that access the SSLV virtual appliance. ... |
|
Register |
|
CERTIFIED INFORMATION SYSTEMS AUDITORCISA® is a trademark of the Information Systems Audit and Control Association® (ISACA®) More than 60,000 security professionals hold CISA certification, which was awarded the "Best Professional Certification" for 2009 b ... |
|
Register |
|
IBM ACCESS MANAGER PLATFORM FOUNDATIONSIBM Access Manager is a highly scalable and configurable access management solution. It simplifies and secures your user experience with single sign-on across applications and protects critical assets using strong multi- ... |
|
Register |
|
EC-COUNCIL CERTIFIED ENCRYPTION SPECIALISTThe EC-Council Certified Encryption Specialist (ECES) program introduces professionals and students to the field of cryptography. The participants will learn the foundations of modern symmetric and key cryptography inclu ... |
|
Register |
|
EC-COUNCIL NETWORK SECURITY ADMINISTRATORThis course looks at the network security in defensive view. The ENSA program is designed to provide fundamental skills needed to analyze the internal and external security threats against a network, and to develop secur ... |
|
Register |
|
COMPTIA CSA+ CYBERSECURITY ANALYSTThe CompTIA CSA+ certification is a vendor-neutral credential. The CompTIA CSA+ exam (Exam CS0-001) is an internationally targeted validation of intermediate-level security skills and knowledge. The course has a technica ... |
|
Register |
|
PANORAMA 8.1: MANAGING FIREWALLS AT SCALE (EDU-220)This course will help students to gain in-depth knowledge about how to configure and manage their Palo Alto Networks® Panorama TM management server. Upon completion of this course, administrators should be familiar with ... |
|
Register |
|
SYSTEMS SECURITY CERTIFIED PRACTITIONERLooking to move up in the information security field? If you have at least one year of security experience, you qualify for the Systems Security Certified Practitioner (SSCP) certification, which offers junior security p ... |
|
Register |
|
Blue Coat Certified Proxy AdministratorThe Blue Coat Certified Proxy SG Professional (BCCPP) Course is intended for IT professionals who wish to master the advance features of the Blue Coat Proxy SG. |
|
Register |
|
IMPLEMENTING CISCO THREAT CONTROL SYSTEMSImplementing Cisco Threat Control Solutions is designed to provide security engineers with the knowledge and hands-on experience required to deploy Cisco’s Email Security (ESA); Web Security (CWS, WSA); Advanced Malware ... |
|
Register |
|
SYMANTEC SECURITY ANALYTICS 7.2.X ADMINISTRATORThe Symantec Security Analytics Administrator course is intended for IT professionals who want to master the fundamentals of the Symantec Security Analytics solution. Hands-On This course includes practical hands-on exe ... |
|
Register |
|
SYMANTEC DATA LOSS PREVENTION 15.0 ADMINISTRATIONThe Symantec Data Loss Prevention 15.0 Administration course is designed to provide you with the fundamental knowledge to configure and administer the Symantec Data Loss Prevention Enforce platform. The hands-on labs inc ... |
|
Register |
|
NETWORK AND SECURITY MANAGER FUNDAMENTALSThis two-day course discusses the basic operations of Network and Security Manager. Key topics include server and domain administration, device configuration, template creation and management, policy creation and managem ... |
|
Register |
|
SYMANTEC ASSET MANAGEMENT SUITE 8.5 ADMINISTRATIONThe Symantec Asset Management Suite 8.5 Administration course is designed for professionals tasked with using Symantec Asset Management Suite (AMS) to manage their software and hardware resources in their organizations. ... |
|
Register |
|
DEEP SECURITY TRAINING FOR CERTIFIED PROFESSIONALSIn this course, you will learn how to use Trend Micro™ Deep Security. This course provides information about the basic architecture, deployment scenarios, installation processes, policy configuration and administration o ... |
|
Register |
|
IBM IDENTITY GOVERNANCE AND INTELLIGENCE FOUNDATIONSIBM Identity Governance and Intelligence is an advanced identity governance system. This course provides the foundational skills necessary to operate, administer, and accomplish the major business functions and analyses ... |
|
Register |
|
IBM SECURITY QRADAR SIEM ADVANCED TOPICSThis is an advanced course for the QRadar Analyst and Administrator and is a follow-on to BQ103G. This course uses the IBM QRadar SIEM 7.3 platform for lab exercises. |
|
Register |
|
IMPLEMENTING AND CONFIGURING CISCO IDENTITY SERVICES ENGINEThe Implementing and Configuring Cisco Identity Services Engine course shows you how to deploy and use Cisco Identity Services Engine (ISE) v2.4, an identity and access control policy platform that simplifies the deliver ... |
|
Register |
|
ADVANCED JUNOS SECURITYThis five-day course, which is designed to build off the current Junos Security (JSEC) offering, delves deeper into Junos security and next-generation security features. Through demonstrations and hands-on labs, you will ... |
|
Register |
|
JUNOS SECURITYThis five-day course covers the configuration, operation, and implementation of SRX Series Services Gateways in a typical network environment. Key topics within this course include: security zones, security policies, Net ... |
|
Register |
|
SYMANTEC NETBACKUP 7.5: MAINTAIN AND TROUBLESHOOTThe three day Symantec Net Backup Maintain and Troubleshoot course provides the IT professional with instruction on troubleshooting Symantec NetBackup 7.5 software. This course covers general error detection tools and t ... |
|
Register |
|
SYMANTEC DATA LOSS PREVENTION 15.5 ADMINISTRATIONThe Symantec Data Loss Prevention 15.5 Administration course is designed to provide you with the fundamental knowledge to configure and administer the Symantec Data Loss Prevention Enforce platform. The hands‐on labs inc ... |
|
Register |
|
SYMANTEC CLIENT MANAGEMENT SUITE 8.5 ADMINISTRATIONThe Client Management Suite 8.5 Administration course is designed for professionals tasked with using Symantec’s Client Management Suite (CMS) to manage their software and hardware resources in their organizations. This ... |
|
Register |
|
SECURITY FUNDAMENTALSIn this course, you will be introduced to security concepts for today's business and technology professionals. You will cover layered security philosophy, physical security, Internet security, and wireless security princ ... |
|
Register |
|
CERTIFIED INTERNET OF THINGS PRACTITIONER (CIOTP) CERTIFICATIONThe Internet of Things (IoT) promises a wide range of benefits for industry, energy and utility companies, municipalities, healthcare, and consumers. Data can be collected in extraordinary volume and detail regarding alm ... |
|
Register |
|
VMWARE NSX-T DATA CENTER: INSTALL, CONFIGURE, MANAGEThis five-day, fast-paced course provides comprehensive training on how to install, configure, and manage a VMware NSX-T™ Data Center environment. This course covers key NSX-T Data Center features and functionality offer ... |
|
Register |
|
SYMANTEC ASSET MANAGEMENT SUITE 8.1 ADMINISTRATIONThe Symantec Asset Management Suite 8.1 Administration course is designed for professionals tasked with using Symantec Asset Management Suite (AMS) to manage their software and hardware resources in their organizations. ... |
|
Register |
|
IBM SECURITY IDENTITY MANAGER FOUNDATIONSThis is an instructor-led course that introduces students to the foundational skills required to install, configure, and administer IBM Security Identity Manager,. IBM Security Identity Manager can be deployed using the ... |
|
Register |
|
SYMANTEC CLOUD SOC ADMINISTRATION R2The Cloud SOC R2 Administration course provides an overview of the Cloud SOC service, covering initial setup, deployment options and service configuration. The courseware introduces each topic with an accompanying workfl ... |
|
Register |
|
SYMANTEC NETBACKUP 7.5: MAINTAIN AND TROUBLESHOOTThe three day Symantec Net Backup Maintain and Troubleshoot course provides the IT professional with instruction on troubleshooting Symantec NetBackup 7.5 software. This course covers general error detection tools and t ... |
|
Register |
|
SYMANTEC IT MANAGEMENT SUITE 8.1 DIAGNOSTICS AND TROUBLESHOOTINGThe Symantec IT Management Suite 8.1 Diagnostics and Troubleshooting course is designed for professionals tasked with maintaining and utilizing a Symantec IT Management Suite (ITMS) implementation in their organizations. ... |
|
Register |
|
Blue Coat Certified Proxy AdministratorThe Blue Coat Certified Proxy SG Professional (BCCPP) Course is intended for IT professionals who wish to master the advance features of the Blue Coat Proxy SG. |
|
Register |
|
RED TEAM VS BLUE TEAM CYBERWAR CHALLENGETwo Teams, two different approaches, Red Team vs Blue Team Cyberwar Challenge! The cyber kill chain - reconnaissance, attack planning and delivery, system exploitation, privilege escalation and lateral movement, anomalie ... |
|
Register |
|
SYMANTEC SECURITY ANALYTICS 7.2.X ADMINISTRATORThe Symantec Security Analytics Administrator course is intended for IT professionals who want to master the fundamentals of the Symantec Security Analytics solution. Hands-On This course includes practical hands-on exe ... |
|
Register |
|
IBM GUARDIUM FOUNDATIONSAre you getting ready to administer database security policies? Learn how to configure Guardium to discover, classify, analyze, protect, and control access to sensitive data. You learn to perform vulnerability assessment ... |
|
Register |
|
IMPLEMENTING CISCO THREAT CONTROL SYSTEMSImplementing Cisco Threat Control Solutions is designed to provide security engineers with the knowledge and hands-on experience required to deploy Cisco’s Email Security (ESA); Web Security (CWS, WSA); Advanced Malware ... |
|
Register |
|
FIREWALL 8.1: OPTIMIZING FIREWALL THREAT PREVENTION (EDU-214)Successful completion of this four-day, instructor-led course will enhance the student’s understanding of how to better configure, manage, and monitor PAN-OS® threat prevention features. The student will get hands-on exp ... |
|
Register |
|
SYMANTEC DATA CENTER SECURITY SERVER ADVANCED 6.7 DIAGNOSTICS AND TROUBLESHOOTINGThe Symantec Data Center Server Advanced 6.7 Diagnostics and Troubleshooting course is designed for the IT security management professional tasked with troubleshooting Data Center Security Server Advanced (SDCSSA). Stud ... |
|
Register |
|
WORKSHOP: WINDOWS SERVER 2019Learn about the new enhanced capabilities of the Windows 2019 starting from server virtualization, storage, software-defined networking, server management and automation, web and application platform, access to informati ... |
|
Register |
|
SYMANTEC PROXY SG V6.6: ADVANCED ADMINISTRATIONThe Proxy SG v6.6 Advanced Administration course is intended for IT professionals who wish to learn to master the advanced features of Proxy SG. |
|
Register |
|
IMPLEMENTING ADVANCED CISCO ASA SECURITY V2.0This course provides up-to-date training on the key features of the Cisco ASA 5500-X Series next-Generation Firewall, including ASAv, ASA IDFW, ASA Fire POWER Service Module, ASA Cloud Web Security and ASA Clustering. Ex ... |
|
Register |
|
CERTIFIED CHIEF INFORMATION SECURITY OFFICEREC-Council’s CCISO Program has certified leading information security professionals around the world. A core group of high-level information security executives, the CCISO Advisory Board, contributed by forming the found ... |
|
Register |
|
SYMANTEC ASSET MANAGEMENT SUITE 8.5 ADMINISTRATIONThe Symantec Asset Management Suite 8.5 Administration course is designed for professionals tasked with using Symantec Asset Management Suite (AMS) to manage their software and hardware resources in their organizations. ... |
|
Register |
|
IMPLEMENTING AND CONFIGURING CISCO IDENTITY SERVICES ENGINEThe Implementing and Configuring Cisco Identity Services Engine course shows you how to deploy and use Cisco Identity Services Engine (ISE) v2.4, an identity and access control policy platform that simplifies the deliver ... |
|
Register |
|
JUNOS SPACE-SECURITY DIRECTORThis two-day course is designed to provide students with the knowledge required to manage the Junos Space Security Director application and manage devices with that application. Students will gain in-depth knowledge of h ... |
|
Register |
|
JNCIE-SEC BOOT CAMPThis five-day course is designed to serve as the ultimate preparation for the Juniper Networks Certified Internet Expert—Security (JNCIE-SEC) exam. The course focuses on caveats and tips useful for potential test candida ... |
|
Register |
|
WEB SECURITY SERVICE 6.10 DIAGNOSTICS AND TROUBLESHOOTINGThe WSS Diagnostics and Troubleshooting course is intended for IT professionals who will be diagnosing and troubleshooting the Symantec Web Security Service (WSS). |
|
Register |
|
RED HAT SECURITY: LINUX IN PHYSICAL, VIRTUAL, AND CLOUD WITH EXAM (EX415)Maintaining security of computing systems is a process of managing risk through the implementation of processes and standards backed by technologies and tools. In this course, you will learn about resources that can be u ... |
|
Register |
|
MANAGING AND DEFENDING AGAINST CURRENT THREATSThis is a deep dive course on security operations: vulnerability management, anomalies detection, discovery of industry attacks and threats, understanding how compromised system or solution looks like, defining the indic ... |
|
Register |
|
TREND MICRO APEX ONE TRAINING FOR CERTIFIED PROFESSIONALSIn this course, you will learn how to use Trend Micro Apex One™. This course details basic architecture, protection functionality, deployment scenarios, and troubleshooting. Through hands-on labs, participants practice c ... |
|
Register |
|
IMPLEMENTING FOREFRONT IDENTITY MANAGER 2010This four-day instructor-led course introduces and explains the features and capabilities of Microsoft Forefront Identity Manager 2010 (FIM), and provides an overview of the solution scenarios that FIM addresses. The cou ... |
|
Register |
|
DEPLOYING AND MANAGING WINDOWS 10 USING ENTERPRISE SERVICESThis 5-day course provides administrators with the knowledge and skills needed to deploy and manage Windows 10 desktops, devices, and applications in an enterprise environment. Students learn how to plan and implement Wi ... |
|
Register |
|
EC-COUNCIL CERTIFIED SOC ANALYST (CSA)The Certified SOC Analyst (CSA) program is the first step to joining a security operations center (SOC). It is engineered for current and aspiring Tier I and Tier II SOC analysts to achieve proficiency in performing entr ... |
|
Register |
|
CompTIA Pentest +As organizations scramble to protect themselves and their customers against privacy or security breaches, the ability to conduct penetration testing is an emerging skill set that is becoming ever more valuable to the org ... |
|
Register |
|
Protecting Against Malware Threats with Cisco AMP for EndpointsThis lab-intensive course introduces students to the powerful features of Cisco AMP for Endpoints software. A number of step by step attack scenarios will provide an understanding of the operational uses of the product. ... |
|
Register |
|
Implementing Cisco Secure MobilityThis course is designed to prepare network security engineers with the knowledge and skills they need to protect data traversing a public or shared infrastructure such as the Internet by implementing and maintaining Cisc ... |
|
Register |
|
PANORAMA 8.1: MANAGING FIREWALLS AT SCALE (EDU-220)This course will help students to gain in-depth knowledge about how to configure and manage their Palo Alto Networks® Panorama TM management server. Upon completion of this course, administrators should be familiar with ... |
|
Register |
|
MASTER CLASS ISO 27001 IMPLEMENTATIONThis five-day intensive course enables the participants to develop the expertise to support an organization in implementing and managing an Information Security Management System (ISMS) as specified in ISO/IEC 27001:2013 ... |
|
Register |
|
EC-COUNCIL CERTIFIED INCIDENT HANDLERThe EC-Council Certified Incident Handler (ECIH) program is designed to provide the fundamental skills to handle and respond to the computer security incidents in an information system. The course addresses various under ... |
|
Register |
|
SYMANTEC PROXY SG V6.6: BASIC ADMINISTRATIONThe Proxy SG 6.6 Basic Administration course is an introduction to deployment options and management of the individual key features offered using the Proxy SG 6.6 solution. This an introductory course and is designed for ... |
|
Register |
United Kingdom , London |
|||
---|---|---|---|
|
WORKSHOP: WINDOWS SERVER 2019Learn about the new enhanced capabilities of the Windows 2019 starting from server virtualization, storage, software-defined networking, server management and automation, web and application platform, access to informati ... |
|
Register |
|
CERTIFIED INFORMATION SYSTEMS SECURITY PROFESSIONALThe Official (ISC)2® CISSP® CBK® Review Seminar is the most comprehensive, complete review of information systems security concepts and industry best practices, and the only review course endorsed by (ISC)2. Review Semin ... |
|
Register |
|
BLUE COAT CERTIFIED SECURITY ANALYTICS PROFESSIONALThe Blue Coat Certified Security Analytics Professional (BCSAP) course designed for participants who want to learn how to use the Blue Coat Security Analytics platform to perform virtually any type of network-based monit ... |
|
Register |
|
SYMANTEC PROXY SG V6.6: BASIC ADMINISTRATIONThe Proxy SG 6.6 Basic Administration course is an introduction to deployment options and management of the individual key features offered using the Proxy SG 6.6 solution. This an introductory course and is designed for ... |
|
Register |
|
FIREWALL 8.1: OPTIMIZING FIREWALL THREAT PREVENTION (EDU-214)Successful completion of this four-day, instructor-led course will enhance the student’s understanding of how to better configure, manage, and monitor PAN-OS® threat prevention features. The student will get hands-on exp ... |
|
Register |
|
RED HAT SECURITY: LINUX IN PHYSICAL, VIRTUAL, AND CLOUD WITH EXAM (EX415)Maintaining security of computing systems is a process of managing risk through the implementation of processes and standards backed by technologies and tools. In this course, you will learn about resources that can be u ... |
|
Register |
|
BLUE COAT CERTIFIED SECURITY ANALYTICS ADMINISTRATORThe Blue Coat Certified Security Analytics Administrator (BCSAA) course is intended for IT professionals who want to master the fundamentals of the Blue Coat Security Analytics solution. |
|
Register |
|
RED HAT IDENTITY MANAGEMENT AND ACTIVE DIRECTORY INTEGRATION WITH EXAM (EX362)This course teaches you skills on the most requested Red Hat Identity Management (IdM) capabilities, including Active Directory trusts, multi-product federation, configuration management with Ansible, integrated certific ... |
|
Register |
|
CISSP CERTIFICATION PREP COURSE V1.0Gain core knowledge and experience to successfully implement and manage security programs and prepare for the CISSP certification. This course is the most comprehensive review of information security concepts and industr ... |
|
Register |
|
PANORAMA 8.1: MANAGING FIREWALLS AT SCALE (EDU-220)This course will help students to gain in-depth knowledge about how to configure and manage their Palo Alto Networks® Panorama TM management server. Upon completion of this course, administrators should be familiar with ... |
|
Register |
|
NSX-T: INSTALL, CONFIGURE, MANAGEThis five-day, fast-paced course provides comprehensive training on how to install, configure, and manage a VMware NSX-T™ Data Center environment. This course covers key NSX-T Data Center features and functionality offer ... |
|
Register |
|
UNDERSTANDING CISCO CYBER SECURITY FUNDAMENTALSThe Understanding Cisco Cyber security Fundamentals (SECFND) v1.0 course provides you with an understanding of network infrastructure devices, operations and vulnerabilities of the TCP/IP protocol suite, basic informatio ... |
|
Register |
|
JUNOS SECURITYThis five-day course covers the configuration, operation, and implementation of SRX Series Services Gateways in a typical network environment. Key topics within this course include: security zones, security policies, Net ... |
|
Register |
|
PALO ALTO ADVANCED FIREWALL TROUBLESHOOTING (311)Advanced Firewall Troubleshooting is the next-level follow-on course to Palo Alto Networks® Essentials 1: Installation, Configuration, and Management (PAN-EDU-201) and Essentials 2: Extended Firewall Manager (PAN-EDU-205 ... |
|
Register |
|
JUNOS INTRUSION PREVENTION SYSTEM FUNCTIONALITYThe Junos Intrusion prevention System Functionality (JIPS) course is designed to provide an introduction to the Intrusion Prevention System (IPS) feature set available on the Juniper Networks SRX Series Services Gateway. ... |
|
Register |
|
Protecting Against Malware Threats with Cisco AMP for EndpointsThis lab-intensive course introduces students to the powerful features of Cisco AMP for Endpoints software. A number of step by step attack scenarios will provide an understanding of the operational uses of the product. ... |
|
Register |
|
IBM SECURITY IDENTITY MANAGER FOUNDATIONSThis is an instructor-led course that introduces students to the foundational skills required to install, configure, and administer IBM Security Identity Manager,. IBM Security Identity Manager can be deployed using the ... |
|
Register |
|
SYMANTEC MESSAGING GATEWAY 10.5: ADMINISTRATIONThe Symantec Messaging Gateway 10.5: Administration course is designed to provide you with the fundamental knowledge to configure and administer the Symantec Messaging Gateway. This three-day, instructor-led, hands-on cl ... |
|
Register |
|
SYMANTEC DEPLOYMENT SOLUTION 8.1 ADMINISTRATIONThe Symantec Deployment Solution 8.1: Administration course is designed for the professional tasked with installing, configuring, and managing a Deployment Solution system. This five-day, instructor-led, hands-on course ... |
|
Register |
|
SECURITY+The Security+ Certification Prep Course provides the basic knowledge needed to plan, implement, and maintain information security in a vendor-neutral format. This includes risk management, host and network security, auth ... |
|
Register |
|
Implementing Cisco Identity Services Engine for Wireless EngineersThis course has been designed to enable wireless engineers understand the concepts, architecture, and use cases of the Cisco Identity Services Engine Solution. This course provides students with the knowledge and skills ... |
|
Register |
|
CERTIFIED INFORMATION SYSTEMS AUDITORCISA® is a trademark of the Information Systems Audit and Control Association® (ISACA®) More than 60,000 security professionals hold CISA certification, which was awarded the "Best Professional Certification" for 2009 b ... |
|
Register |
|
IBM QRADAR SIEM FOUNDATIONSIBM QRadar SIEM provides deep visibility into network, user, and application activity. It provides collection, normalization, correlation, and secure storage of events, flows, asset profiles, and vulnerabilities. QRadar ... |
|
Register |
|
SECURING THE WEB WITH CISCO WEB SECURITY APPLIANCEThis course has been designed to help learners understand how to install, configure, manage, and troubleshoot a Cisco Web Security Appliance (WSA). Students will learn how to design, configure, administer, monitor, and t ... |
|
Register |
|
SYMANTEC SECURITY ANALYTICS 7.2.X ADMINISTRATORThe Symantec Security Analytics Administrator course is intended for IT professionals who want to master the fundamentals of the Symantec Security Analytics solution. Hands-On This course includes practical hands-on exe ... |
|
Register |
|
SYMANTEC DATA LOSS PREVENTION 14.6 ADMINISTRATIONThe Symantec Data Loss Prevention 14.X: Administration course is designed to provide you with the fundamental knowledge to configure and administer the Symantec Data Loss Prevention Enforce platform. The hands-on labs i ... |
|
Register |
|
MASTERCLASS: RED TEAM - BLUE TEAM OPERATIONSThis is a deep dive course on Red Team – Blue Team Operations: The cyber kill chain Security is a business enabler, and it is only when it is viewed from a business perspective that we can truly make the right decision ... |
|
Register |
|
CONFIGURING JUNIPER NETWORKS FIREWALL/IPSEC VPN PRODUCTSThis course is the first in the Screen OS curriculum. It is a three-day, instructor-led course that focuses on configuration of the Screen OS firewall/virtual private network (VPN) products in a variety of situations, in ... |
|
Register |
|
SYMANTEC NET BACKUP 7.6.X: ADMINISTRATIONThis Symantec Net Backup 7.6.x: Administration course provides the IT professional with instruction on the functionality of Symantec NetBackup 7.6.1 software. This course covers the general principles of using NetBackup ... |
|
Register |
|
Blue Coat Certified Proxy AdministratorThe Blue Coat Certified Proxy SG Professional (BCCPP) Course is intended for IT professionals who wish to master the advance features of the Blue Coat Proxy SG. |
|
Register |
|
SYMANTEC CONTROL COMPLIANCE SUITE VULNERABILITY MANAGER 12.0 ADMINISTRATIONThe Symantec Control Compliance Suite Vulnerability Manager (CCS-VM) 12.0 Administration Training is designed for the IT security professional tasked with installation, administering, monitoring and reporting on CCS-VM 1 ... |
|
Register |
|
DEV SEC OPS ENGINEERINGA Dev Sec Ops Engineer is an IT Security professional who is skilled at “security as code” with the intent of making security and compliance consumable as a service. A Dev Sec Ops Engineer uses data and security science ... |
|
Register |
|
TREND MICRO DEEP DISCOVERY TRAINING FOR CERTIFIED PROFESSIONALSTrend Micro™ Deep Discovery Training for Certified Professionals is a three-day, instructor-led training course where participants will learn how to deploy and manage a Trend Micro™ Deep Discovery threat protection solut ... |
|
Register |
|
EC-COUNCIL CERTIFIED NETWORK DEFENDERCertified Network Defender (CND) is a vendor-neutral, hands-on, instructor-led comprehensive network security certification training program. It is a skills-based, lab intensive program based on a job-task analysis and c ... |
|
Register |
|
IBM DIRECTORY SERVER 6.4 FUNDAMENTALSThis course describes the processes, procedures, and practices necessary to configure and administer IBM Directory Server. During the hand-on exercises, students will perform basic Directory Server configuration, setup r ... |
|
Register |
|
CISCO ASA EXPRESS SECURITY 1.5This course has been designed to provide an understanding of Cisco's ASA solution portfolio. Students will learn how to successfully configure various aspects of the Cisco ASA components including Cisco ASA firewall feat ... |
|
Register |
Turkey , Istanbul |
|||
---|---|---|---|
|
SECURING NETWORKS WITH FIREPOWER THREAT DEFENSE NGFWThe Securing Networks with Cisco Firepower Threat Defense NGFW (FIREPOWER200) course demonstrates the powerful features of Cisco Firepower Threat Defense, including VPN configuration, traffic control, NAT configuration, ... |
|
Register |
|
CERTIFIED INFORMATION SYSTEMS AUDITORCISA® is a trademark of the Information Systems Audit and Control Association® (ISACA®) More than 60,000 security professionals hold CISA certification, which was awarded the "Best Professional Certification" for 2009 b ... |
|
Register |
|
CLIENT MANAGEMENT SUITE 8.1 ADMINISTRATIONThe Client Management Suite 8.1 Administration course is designed for professionals tasked with using Symantec’s Client Management Suite (CMS) to manage their software and hardware resources in their organizations. This ... |
|
Register |
|
SYMANTEC MESSAGING GATEWAY 10.6 ADMINISTRATIONThe Symantec Messaging Gateway 10.6: Administration course is designed to provide you with the fundamental knowledge to configure and administer the Symantec Messaging Gateway. This two-day, instructor-led, hand son clas ... |
|
Register |
|
IBM SECURITY QRADAR SIEM ADVANCED TOPICSThis is an advanced course for the QRadar Analyst and Administrator and is a follow-on to BQ103G. This course uses the IBM QRadar SIEM 7.3 platform for lab exercises. |
|
Register |
|
IMPLEMENTING CISCO NETWORK SECURITY V3.0This is a five-day instructor-led course that focuses on the design, implementation and monitoring of a comprehensive security policy, using Cisco IOS security features and technologies. All IOS examples and hands on exp ... |
|
Register |
|
MASTERCLASS: PEN TESTING AND SECURING MOBILE AND WEB APPLICATIONSThe course teaches mobile and web application security concepts, including the techniques on how to attack and how to respond with an appropriate countermeasure implementation. Our course has been developed around profes ... |
|
Register |
|
SYMANTEC MESSAGING GATEWAY 10.5: ADMINISTRATIONThe Symantec Messaging Gateway 10.5: Administration course is designed to provide you with the fundamental knowledge to configure and administer the Symantec Messaging Gateway. This three-day, instructor-led, hands-on cl ... |
|
Register |
|
JUNOS SPACE-SECURITY DIRECTORThis two-day course is designed to provide students with the knowledge required to manage the Junos Space Security Director application and manage devices with that application. Students will gain in-depth knowledge of h ... |
|
Register |
|
CITRIX ENTERPRISE SECURITY SOLUTIONSLearn to secure your Citrix environment in this hands-on course that encompasses the core Citrix technologies, including Citrix Virtual Apps and Desktops, ADC, Endpoint Management, Content Collaboration and Citrix Cloud. ... |
|
Register |
|
EC-COUNCIL CERTIFIED SOC ANALYST (CSA)The Certified SOC Analyst (CSA) program is the first step to joining a security operations center (SOC). It is engineered for current and aspiring Tier I and Tier II SOC analysts to achieve proficiency in performing entr ... |
|
Register |
|
CERTIFIED IN RISK AND INFORMATION SYSTEMS CONTROLThe CRISC Review Manual and CRISC Review, Questions, Answers and Explanation Manual will be provided to delegates booked on the course. |
|
Register |
|
PERFORMANCE TUNING AND OPTIMIZING SQL DATABASESThis four-day instructor-led course provides students who manage and maintain SQL Server databases with the knowledge and skills to performance tune and optimize their databases. |
|
Register |
|
BLUE COAT CERTIFIED PROXY PROFESSIONALIn the Blue Coat Certified Proxy Professional (BCCPP) course, you will learn to configure your Blue Coat Proxy appliance for high availability and multi-site deployments, advance policy features, web content control, P2P ... |
|
Register |
|
ADVANCED JUNOS SECURITYThis five-day course, which is designed to build off the current Junos Security (JSEC) offering, delves deeper into Junos security and next-generation security features. Through demonstrations and hands-on labs, you will ... |
|
Register |
|
SYMANTEC ASSET MANAGEMENT SUITE 8.5 ADMINISTRATIONThe Symantec Asset Management Suite 8.5 Administration course is designed for professionals tasked with using Symantec Asset Management Suite (AMS) to manage their software and hardware resources in their organizations. ... |
|
Register |
|
SECURING CISCO NETWORKS WITH SOURCE FIRE INTRUSION PREVENTION SYSTEMThe Securing Networks with Cisco Firepower Next-Generation IPS course shows you how to deploy and use Cisco Firepower Next-Generation Intrusion Prevention System (NGIPS). This hands-on course gives you the knowledge and ... |
|
Register |
|
CONFIGURING AND DEPLOYING A PRIVATE CLOUDThis course equips students with the skills they require to configure and deploy a cloud using Microsoft System Center 2012 R2. Using hands-on labs, students learn the following: - Produce a high-level design that acc ... |
|
Register |
|
SECURING THE WEB WITH CISCO WEB SECURITY APPLIANCEThis course has been designed to help learners understand how to install, configure, manage, and troubleshoot a Cisco Web Security Appliance (WSA). Students will learn how to design, configure, administer, monitor, and t ... |
|
Register |
|
IBM IDENTITY GOVERNANCE AND INTELLIGENCE FOUNDATIONSIBM Identity Governance and Intelligence is an advanced identity governance system. This course provides the foundational skills necessary to operate, administer, and accomplish the major business functions and analyses ... |
|
Register |
|
JNCIE-SEC BOOT CAMPThis five-day course is designed to serve as the ultimate preparation for the Juniper Networks Certified Internet Expert—Security (JNCIE-SEC) exam. The course focuses on caveats and tips useful for potential test candida ... |
|
Register |
|
TREND MICRO APEX ONE TRAINING FOR CERTIFIED PROFESSIONALSIn this course, you will learn how to use Trend Micro Apex One™. This course details basic architecture, protection functionality, deployment scenarios, and troubleshooting. Through hands-on labs, participants practice c ... |
|
Register |
|
SYMANTEC CONTROL COMPLIANCE SUITE 12.0 ADMINISTRATIONThe Control Compliance Suite 12.0 Administration course is designed for professionals who are tasked with ensuring the security of their computing enterprise and compliance with both external and internal mandates. This ... |
|
Register |
|
RHS333-BUNDLE: RED HAT ENTERPRISE SECURITY: NETWORK SERVICES + EX333Red Hat® Enterprise Security: Network Services with Exam is an intensive course that provides 4 days of instruction and labs that show students how to use the latest technologies to secure services. This class advances b ... |
|
Register |
|
TREND MICRO DEEP DISCOVERY TRAINING FOR CERTIFIED PROFESSIONALSTrend Micro™ Deep Discovery Training for Certified Professionals is a three-day, instructor-led training course where participants will learn how to deploy and manage a Trend Micro™ Deep Discovery threat protection solut ... |
|
Register |
|
SYMANTEC SECURITY ANALYTICS 7.2.X ADMINISTRATORThe Symantec Security Analytics Administrator course is intended for IT professionals who want to master the fundamentals of the Symantec Security Analytics solution. Hands-On This course includes practical hands-on exe ... |
|
Register |
|
IMPLEMENTING CISCO THREAT CONTROL SYSTEMSImplementing Cisco Threat Control Solutions is designed to provide security engineers with the knowledge and hands-on experience required to deploy Cisco’s Email Security (ESA); Web Security (CWS, WSA); Advanced Malware ... |
|
Register |
|
CISCO ASA WITH FIREPOWER SERVICES WORKSHOPThe Cisco Next-Generation Firewall (NGFW) is the industry’s first fully integrated, threat-focused NGFW. It delivers comprehensive, unified policy management of firewall functions, application control, threat prevention, ... |
|
Register |
|
DEV SEC OPS ENGINEERINGA Dev Sec Ops Engineer is an IT Security professional who is skilled at “security as code” with the intent of making security and compliance consumable as a service. A Dev Sec Ops Engineer uses data and security science ... |
|
Register |
|
SYMANTEC CONTROL COMPLIANCE SUITE VULNERABILITY MANAGER 12.0 ADMINISTRATIONThe Symantec Control Compliance Suite Vulnerability Manager (CCS-VM) 12.0 Administration Training is designed for the IT security professional tasked with installation, administering, monitoring and reporting on CCS-VM 1 ... |
|
Register |
|
SYMANTEC PROXY SG V6.6: ADVANCED ADMINISTRATIONThe Proxy SG v6.6 Advanced Administration course is intended for IT professionals who wish to learn to master the advanced features of Proxy SG. |
|
Register |
|
SECURING CISCO NETWORKS WITH OPEN SOURCE SNORTSecuring Cisco Networks with Open Source Snort is a lab-intensive course that introduces students to the open source Snort technology as well as rule writing. You will learn how to build and manage a Snort system using o ... |
|
Register |
|
RED HAT SERVER HARDENINGSecure a Red Hat Enterprise Linux system to comply with security policy requirements Red Hat® Server Hardening (RH413) builds on a student's Red Hat Certified Engineer (RHCE®) certification or equivalent experience to t ... |
|
Register |
|
SYMANTEC SSL VISIBILITY 5.0 ADMINISTRATIONThe SSL Visibility 5.0 Administration course enables you to plan, implement, configure and managed your SSLV virtual appliance. This course includes both lecture and hands-on labs that access the SSLV virtual appliance. ... |
|
Register |
|
SYMANTEC DATA LOSS PREVENTION 15.5 ADMINISTRATIONThe Symantec Data Loss Prevention 15.5 Administration course is designed to provide you with the fundamental knowledge to configure and administer the Symantec Data Loss Prevention Enforce platform. The hands‐on labs inc ... |
|
Register |
|
DEPLOYING AND MANAGING WINDOWS 10 USING ENTERPRISE SERVICESThis 5-day course provides administrators with the knowledge and skills needed to deploy and manage Windows 10 desktops, devices, and applications in an enterprise environment. Students learn how to plan and implement Wi ... |
|
Register |
|
COMPTIA CSA+ CYBERSECURITY ANALYSTThe CompTIA CSA+ certification is a vendor-neutral credential. The CompTIA CSA+ exam (Exam CS0-001) is an internationally targeted validation of intermediate-level security skills and knowledge. The course has a technica ... |
|
Register |
|
SYMANTEC NET BACKUP 7.6.X: ADMINISTRATIONThis Symantec Net Backup 7.6.x: Administration course provides the IT professional with instruction on the functionality of Symantec NetBackup 7.6.1 software. This course covers the general principles of using NetBackup ... |
|
Register |
|
EC-COUNCIL CERTIFIED SECURITY ANALYST V.10The ECSA program offers a seamless learning progress continuing where the CEH program left off. The new ECSAv10 includes updated curricula and an industry recognized comprehensive step-by step penetration testing method ... |
|
Register |
|
VMWARE NSX-T DATA CENTER: INSTALL, CONFIGURE, MANAGEThis five-day, fast-paced course provides comprehensive training on how to install, configure, and manage a VMware NSX-T™ Data Center environment. This course covers key NSX-T Data Center features and functionality offer ... |
|
Register |
|
CERTIFIED INTERNET OF THINGS PRACTITIONER (CIOTP) CERTIFICATIONThe Internet of Things (IoT) promises a wide range of benefits for industry, energy and utility companies, municipalities, healthcare, and consumers. Data can be collected in extraordinary volume and detail regarding alm ... |
|
Register |
|
CISSP CERTIFICATION PREP COURSE V1.0Gain core knowledge and experience to successfully implement and manage security programs and prepare for the CISSP certification. This course is the most comprehensive review of information security concepts and industr ... |
|
Register |
|
CERTIFIED IN THE GOVERNANCE OF ENTERPRISE ITAs technology has become more and more vital to the achievement of business goals and value delivery, enterprise leaders have realized that enterprise governance must be extended to information technology and information ... |
|
Register |
|
CYBER SECURE CODER (CSC) CERTIFICATIONThe stakes for software security are very high, and yet many development teams deal with software security only after the code has been developed and the software is being prepared for delivery. As with any aspect of sof ... |
|
Register |
|
Certified Threat Intelligence AnalystCertified Threat Intelligence Analyst (C|TIA) is a training and credentialing program designed and developed in collaboration with cybersecurity and threat intelligence experts across the globe to help organizations iden ... |
|
Register |
|
IMPLEMENTING CISCO CYBERSECURITY OPERATIONSThis is the second course in Cisco's CCNA Cyber Ops Curriculum and is designed to provide students with an understanding of how a Security Operations Center (SOC) functions and the knowledge required in this environment. ... |
|
Register |
Malaysia , Kuala-Lumpur |
|||
---|---|---|---|
|
CERTIFIED IN THE GOVERNANCE OF ENTERPRISE ITAs technology has become more and more vital to the achievement of business goals and value delivery, enterprise leaders have realized that enterprise governance must be extended to information technology and information ... |
|
Register |
|
COMPUTER HACKING FORENSICS INVESTIGATORThe CHFI course will give participants the necessary skills to identify an intruder's footprints and to properly gather the necessary evidence to prosecute. Many of today's top tools of the forensic trade will be taught ... |
|
Register |
|
SYMANTEC SSL VISIBILITY 5.0 ADMINISTRATIONThe SSL Visibility 5.0 Administration course enables you to plan, implement, configure and managed your SSLV virtual appliance. This course includes both lecture and hands-on labs that access the SSLV virtual appliance. ... |
|
Register |
|
CERTIFIED INTERNET OF THINGS PRACTITIONER (CIOTP) CERTIFICATIONThe Internet of Things (IoT) promises a wide range of benefits for industry, energy and utility companies, municipalities, healthcare, and consumers. Data can be collected in extraordinary volume and detail regarding alm ... |
|
Register |
|
SYMANTEC SECURITY ANALYTICS 7.2.X PROFESSIONALThe Symantec Security Analytics Professional course is designed for participants who want to learn how to use the Symantec Security Analytics platform to perform virtually any type of network-based monitoring and forensi ... |
|
Register |
|
RED TEAM VS BLUE TEAM CYBERWAR CHALLENGETwo Teams, two different approaches, Red Team vs Blue Team Cyberwar Challenge! The cyber kill chain - reconnaissance, attack planning and delivery, system exploitation, privilege escalation and lateral movement, anomalie ... |
|
Register |
|
IBM ACCESS MANAGER PLATFORM FOUNDATIONSIBM Access Manager is a highly scalable and configurable access management solution. It simplifies and secures your user experience with single sign-on across applications and protects critical assets using strong multi- ... |
|
Register |
|
SYMANTEC ENDPOINT ENCRYPTION 11.2 INSTALL, CONFIGURE AND DEPLOYThe Symantec Endpoint Encryption 11.2: Install, Configure, and Deploy course is designed for the network, IT security, systems administration, and support professional tasked with maintaining and troubleshooting a Symant ... |
|
Register |
|
PALO ALTO NETWORKS® TRAPS™ ADVANCED ENDPOINT PROTECTION (PAN-EDU-281)This instructor-led course teaches strategies in defense against advanced threats. Successful completion of this course enables administrators to better understand the threat landscape. Students will learn the use of Pal ... |
|
Register |
|
BLUE COAT PACKET SHAPER PROFESSIONALBlue Coat Certified Packet Shaper Administrator (BCPSA) certification or waiver exam; student should have practical experience with the Packet Shaper appliance in the field with a solid understanding of networking and ge ... |
|
Register |
|
JUNOS SECURITYThis five-day course covers the configuration, operation, and implementation of SRX Series Services Gateways in a typical network environment. Key topics within this course include: security zones, security policies, Net ... |
|
Register |
|
SYMANTEC IDENTITY AND AUTHENTICATION SERVICES R1The Symantec Identity and Authentication Services R1 course is designed for the IT security professional needing to develop an understanding of the principles and use cases behind the Symantec VIP Service and VIP Access ... |
|
Register |
|
SYMANTEC MESSAGING GATEWAY 10.6 ADMINISTRATIONThe Symantec Messaging Gateway 10.6: Administration course is designed to provide you with the fundamental knowledge to configure and administer the Symantec Messaging Gateway. This two-day, instructor-led, hand son clas ... |
|
Register |
|
MANAGING ENTERPRISE SECURITY WITH CISCO SECURITY MANAGERThe Managing Enterprise Security with Cisco Security Manager (SSECMGT) course is aimed at providing network security engineers with the knowledge and skills that are needed to configure and deploy Cisco Security Manager. ... |
|
Register |
|
FIREWALL 8.1: TROUBLESHOOTING (EDU-330)Successful completion of this three-day, instructor-led course will enhance the participant’s understanding of how to troubleshoot the full line of Palo Alto Networks® next-generation firewalls. Participants will have o ... |
|
Register |
|
SECURING NETWORKS WITH FIREPOWER THREAT DEFENSE NGFWThe Securing Networks with Cisco Firepower Threat Defense NGFW (FIREPOWER200) course demonstrates the powerful features of Cisco Firepower Threat Defense, including VPN configuration, traffic control, NAT configuration, ... |
|
Register |
|
IMPLEMENTING AND MANAGING WINDOWS 10This course is designed to provide students with the knowledge and skills required to install and configure Windows 10 desktops and devices in a Windows Server domain corporate environment. These skills include learning ... |
|
Register |
|
SYMANTEC DATA CENTER SECURITY SERVER ADVANCED 6.7 DIAGNOSTICS AND TROUBLESHOOTINGThe Symantec Data Center Server Advanced 6.7 Diagnostics and Troubleshooting course is designed for the IT security management professional tasked with troubleshooting Data Center Security Server Advanced (SDCSSA). Stud ... |
|
Register |
|
IMPLEMENTING CISCO NETWORK SECURITY V3.0This is a five-day instructor-led course that focuses on the design, implementation and monitoring of a comprehensive security policy, using Cisco IOS security features and technologies. All IOS examples and hands on exp ... |
|
Register |
|
CYBERSECURITY FOUNDATIONSWhen you consider just a few of the consequences of a security breach - your proprietary information completely accessible, hefty fines for security lapses, news headlines about your company's security breach, it becomes ... |
|
Register |
|
SECURING EMAIL WITH CISCO EMAIL SECURITY APPLIANCEThe Securing Email with Cisco Email Security Appliance (SESA) v3.0 course shows you how to deploy and use Cisco® Email Security Appliance to establish protection for your email systems against phishing, business email co ... |
|
Register |
|
IMPLEMENTING ADVANCED CISCO ASA SECURITY V2.0This course provides up-to-date training on the key features of the Cisco ASA 5500-X Series next-Generation Firewall, including ASAv, ASA IDFW, ASA Fire POWER Service Module, ASA Cloud Web Security and ASA Clustering. Ex ... |
|
Register |
|
SYSTEMS SECURITY CERTIFIED PRACTITIONERLooking to move up in the information security field? If you have at least one year of security experience, you qualify for the Systems Security Certified Practitioner (SSCP) certification, which offers junior security p ... |
|
Register |
|
IMPLEMENTING FOREFRONT IDENTITY MANAGER 2010This four-day instructor-led course introduces and explains the features and capabilities of Microsoft Forefront Identity Manager 2010 (FIM), and provides an overview of the solution scenarios that FIM addresses. The cou ... |
|
Register |
|
IMPLEMENTING AND CONFIGURING CISCO IDENTITY SERVICES ENGINEThe Implementing and Configuring Cisco Identity Services Engine course shows you how to deploy and use Cisco Identity Services Engine (ISE) v2.4, an identity and access control policy platform that simplifies the deliver ... |
|
Register |
|
SECURITY FUNDAMENTALSIn this course, you will be introduced to security concepts for today's business and technology professionals. You will cover layered security philosophy, physical security, Internet security, and wireless security princ ... |
|
Register |
|
PALO ALTO EXTENDED FIREWALL MANAGEMENT (205)Extended Firewall Management is the next-level follow-on course to Palo Alto Networks® Installation, Configuration, and Management (PAN-EDU-201). Extended Firewall Management expands on 201 course topics, while introduci ... |
|
Register |
|
EC-COUNCIL CERTIFIED ENCRYPTION SPECIALISTThe EC-Council Certified Encryption Specialist (ECES) program introduces professionals and students to the field of cryptography. The participants will learn the foundations of modern symmetric and key cryptography inclu ... |
|
Register |
|
SYMANTEC DATA LOSS PREVENTION 14.6 ADMINISTRATIONThe Symantec Data Loss Prevention 14.X: Administration course is designed to provide you with the fundamental knowledge to configure and administer the Symantec Data Loss Prevention Enforce platform. The hands-on labs i ... |
|
Register |
|
SECURING CISCO NETWORKS WITH SNORT RULE WRITING BEST PRACTICESSecuring Cisco Networks with Snort Rule Writing Best Practices is a lab-intensive course that introduces students to the open source Snort community and rule-writing best practices. Users focus exclusively on the Snort r ... |
|
Register |
|
Implementing Cisco Secure MobilityThis course is designed to prepare network security engineers with the knowledge and skills they need to protect data traversing a public or shared infrastructure such as the Internet by implementing and maintaining Cisc ... |
|
Register |
|
IMPLEMENTING CISCO UNIFIED COMMUNICATIONS SECURITYThe Implementing Cisco Unified Communications Security (UCSEC) course is designed to provide students with the necessary knowledge and skills to implement security features in a Cisco Unified Communications environment. ... |
|
Register |
|
SYMANTEC WEB SECURITY SERVICE CORE ADMINISTRATION R1The Web Security Service Core Administration course is intended for IT professionals who will be installing, configuring or administering the Symantec Web Security Service (WSS). |
|
Register |
|
IBM IDENTITY GOVERNANCE AND INTELLIGENCE FOUNDATIONSIBM Identity Governance and Intelligence is an advanced identity governance system. This course provides the foundational skills necessary to operate, administer, and accomplish the major business functions and analyses ... |
|
Register |
|
UNDERSTANDING CISCO CYBER SECURITY FUNDAMENTALSThe Understanding Cisco Cyber security Fundamentals (SECFND) v1.0 course provides you with an understanding of network infrastructure devices, operations and vulnerabilities of the TCP/IP protocol suite, basic informatio ... |
|
Register |
|
CYBER SEC FIRST RESPONDER: THREAT DETECTION AND RESPONSEThis course covers the duties of those who are responsible for monitoring and detecting security incidents in information systems and networks, and for executing a proper response to such incidents. Depending on the size ... |
|
Register |
|
SYMANTEC NETBACKUP 7.5: MAINTAIN AND TROUBLESHOOTThe three day Symantec Net Backup Maintain and Troubleshoot course provides the IT professional with instruction on troubleshooting Symantec NetBackup 7.5 software. This course covers general error detection tools and t ... |
|
Register |
|
PERFORMANCE TUNING AND OPTIMIZING SQL DATABASESThis four-day instructor-led course provides students who manage and maintain SQL Server databases with the knowledge and skills to performance tune and optimize their databases. |
|
Register |
|
EC-COUNCIL CERTIFIED SECURITY ANALYST V.10The ECSA program offers a seamless learning progress continuing where the CEH program left off. The new ECSAv10 includes updated curricula and an industry recognized comprehensive step-by step penetration testing method ... |
|
Register |
|
RED HAT IDENTITY MANAGEMENT AND ACTIVE DIRECTORY INTEGRATION WITH EXAM (EX362)This course teaches you skills on the most requested Red Hat Identity Management (IdM) capabilities, including Active Directory trusts, multi-product federation, configuration management with Ansible, integrated certific ... |
|
Register |
|
RED HAT SECURITY: SECURING CONTAINERS AND OPEN SHIFT WITH EXAMYou will learn and validate your skills in using secure and trusted container images, registries, and source code; managing network and storage isolation; implementing application single sign-on; and configuring appropri ... |
|
Register |
|
Certified Cloud Security Professional Certification PreparationAs powerful as cloud computing is for the organization, understanding its information security risks and mitigation strategies is critical. Legacy approaches are inadequate, and organizations need competent, experienced ... |
|
Register |
|
COMPTIA CSA+ CYBERSECURITY ANALYSTThe CompTIA CSA+ certification is a vendor-neutral credential. The CompTIA CSA+ exam (Exam CS0-001) is an internationally targeted validation of intermediate-level security skills and knowledge. The course has a technica ... |
|
Register |
|
PALO ALTO ADVANCED FIREWALL TROUBLESHOOTING (311)Advanced Firewall Troubleshooting is the next-level follow-on course to Palo Alto Networks® Essentials 1: Installation, Configuration, and Management (PAN-EDU-201) and Essentials 2: Extended Firewall Manager (PAN-EDU-205 ... |
|
Register |
|
NETWORK AND SECURITY MANAGER FUNDAMENTALSThis two-day course discusses the basic operations of Network and Security Manager. Key topics include server and domain administration, device configuration, template creation and management, policy creation and managem ... |
|
Register |
|
JUNOS INTRUSION PREVENTION SYSTEM FUNCTIONALITYThe Junos Intrusion prevention System Functionality (JIPS) course is designed to provide an introduction to the Intrusion Prevention System (IPS) feature set available on the Juniper Networks SRX Series Services Gateway. ... |
|
Register |
|
LEAD AUDITOR TRAINING (IRCA CERTIFIED)This five-day intensive course enables participants to develop the expertise needed to audit an Information Security Management System (ISMS) and to manage a team of auditors by applying widely recognized audit principle ... |
|
Register |
|
Implementing Cisco Identity Services Engine for Wireless EngineersThis course has been designed to enable wireless engineers understand the concepts, architecture, and use cases of the Cisco Identity Services Engine Solution. This course provides students with the knowledge and skills ... |
|
Register |
|
IMPLEMENTING CISCO EDGE NETWORK SECURITY SOLUTIONSThis course has been designed to provide students with the knowledge and skills required to implement and manage security on Cisco ASA firewalls, Cisco Routers with the firewall feature set and Cisco Switches. Students w ... |
|
Register |
|
Certified Threat Intelligence AnalystCertified Threat Intelligence Analyst (C|TIA) is a training and credentialing program designed and developed in collaboration with cybersecurity and threat intelligence experts across the globe to help organizations iden ... |
|
Register |
Nethersland , Amsterdam |
|||
---|---|---|---|
|
DEEP SECURITY TRAINING FOR CERTIFIED PROFESSIONALSIn this course, you will learn how to use Trend Micro™ Deep Security. This course provides information about the basic architecture, deployment scenarios, installation processes, policy configuration and administration o ... |
|
Register |
|
Channel Partner Securing Email with Cisco Email Security ApplianceThis course is designed to help learners understand how to install, configure, and manage the Cisco Email Security Appliance in a small to medium-sized business and enterprise installation. Knowledge application and basi ... |
|
Register |
|
EC-COUNCIL CERTIFIED NETWORK DEFENDERCertified Network Defender (CND) is a vendor-neutral, hands-on, instructor-led comprehensive network security certification training program. It is a skills-based, lab intensive program based on a job-task analysis and c ... |
|
Register |
|
RED HAT SECURITY: SECURING CONTAINERS AND OPEN SHIFT WITH EXAMYou will learn and validate your skills in using secure and trusted container images, registries, and source code; managing network and storage isolation; implementing application single sign-on; and configuring appropri ... |
|
Register |
|
IBM GUARDIUM FOUNDATIONSAre you getting ready to administer database security policies? Learn how to configure Guardium to discover, classify, analyze, protect, and control access to sensitive data. You learn to perform vulnerability assessment ... |
|
Register |
|
IMPLEMENTING CISCO UNIFIED COMMUNICATIONS SECURITYThe Implementing Cisco Unified Communications Security (UCSEC) course is designed to provide students with the necessary knowledge and skills to implement security features in a Cisco Unified Communications environment. ... |
|
Register |
|
SYMANTEC SSL VISIBILITY 4.3 ADMINISTRATIONThe SSL Visibility 4.3 administration course enables you to plan, implement, configure and managed your SSLV appliance(s). This is a lecture-only course, there will be no hands-on access to an SSLV appliance during the c ... |
|
Register |
|
SECURING CISCO NETWORKS WITH SNORT RULE WRITING BEST PRACTICESSecuring Cisco Networks with Snort Rule Writing Best Practices is a lab-intensive course that introduces students to the open source Snort community and rule-writing best practices. Users focus exclusively on the Snort r ... |
|
Register |
|
Implementing Forefront Unified Access Gateway 2010This three-day instructor-led course prepares you to design and deploy remote access solutions using Microsoft Forefront Unified Access Gateway 2010 (UAG). Forefront UAG provides organizations with unparalleled flexibili ... |
|
Register |
|
MASTERCLASS: RED TEAM - BLUE TEAM OPERATIONSThis is a deep dive course on Red Team – Blue Team Operations: The cyber kill chain Security is a business enabler, and it is only when it is viewed from a business perspective that we can truly make the right decision ... |
|
Register |
|
MANAGING AND DEFENDING AGAINST CURRENT THREATSThis is a deep dive course on security operations: vulnerability management, anomalies detection, discovery of industry attacks and threats, understanding how compromised system or solution looks like, defining the indic ... |
|
Register |
|
MASTERCLASS: PEN TESTING AND SECURING MOBILE AND WEB APPLICATIONSThe course teaches mobile and web application security concepts, including the techniques on how to attack and how to respond with an appropriate countermeasure implementation. Our course has been developed around profes ... |
|
Register |
|
NETWORK AND SECURITY MANAGER FUNDAMENTALSThis two-day course discusses the basic operations of Network and Security Manager. Key topics include server and domain administration, device configuration, template creation and management, policy creation and managem ... |
|
Register |
|
EC - COUNCIL CERTIFIED SECURE PROGRAMMERSoftware defects, bugs, and flaws in the logic of the program are consistently the cause for software vulnerabilities. Analysis by software security professionals has proven that most vulnerabilities are due to errors i ... |
|
Register |
|
SYMANTEC CLOUD SOC ADMINISTRATION R2The Cloud SOC R2 Administration course provides an overview of the Cloud SOC service, covering initial setup, deployment options and service configuration. The courseware introduces each topic with an accompanying workfl ... |
|
Register |
|
MASTER CLASS ISO 27001 IMPLEMENTATIONThis five-day intensive course enables the participants to develop the expertise to support an organization in implementing and managing an Information Security Management System (ISMS) as specified in ISO/IEC 27001:2013 ... |
|
Register |
|
EC-COUNCIL CERTIFIED INCIDENT HANDLERThe EC-Council Certified Incident Handler (ECIH) program is designed to provide the fundamental skills to handle and respond to the computer security incidents in an information system. The course addresses various under ... |
|
Register |
|
CONFIGURING AND DEPLOYING A PRIVATE CLOUDThis course equips students with the skills they require to configure and deploy a cloud using Microsoft System Center 2012 R2. Using hands-on labs, students learn the following: - Produce a high-level design that acc ... |
|
Register |
|
IBM SECURITY QRADAR SIEM ADVANCED TOPICSThis is an advanced course for the QRadar Analyst and Administrator and is a follow-on to BQ103G. This course uses the IBM QRadar SIEM 7.3 platform for lab exercises. |
|
Register |
|
PALO ALTO NETWORKS® TRAPS™ ADVANCED ENDPOINT PROTECTION (PAN-EDU-281)This instructor-led course teaches strategies in defense against advanced threats. Successful completion of this course enables administrators to better understand the threat landscape. Students will learn the use of Pal ... |
|
Register |
|
EC-COUNCIL NETWORK SECURITY ADMINISTRATORThis course looks at the network security in defensive view. The ENSA program is designed to provide fundamental skills needed to analyze the internal and external security threats against a network, and to develop secur ... |
|
Register |
|
SYMANTEC DATA LOSS PREVENTION 15.0 ADMINISTRATIONThe Symantec Data Loss Prevention 15.0 Administration course is designed to provide you with the fundamental knowledge to configure and administer the Symantec Data Loss Prevention Enforce platform. The hands-on labs inc ... |
|
Register |
|
LEAD AUDITOR TRAINING (IRCA CERTIFIED)This five-day intensive course enables participants to develop the expertise needed to audit an Information Security Management System (ISMS) and to manage a team of auditors by applying widely recognized audit principle ... |
|
Register |
|
IMPLEMENTING AND MANAGING WINDOWS 10This course is designed to provide students with the knowledge and skills required to install and configure Windows 10 desktops and devices in a Windows Server domain corporate environment. These skills include learning ... |
|
Register |
|
ETHICAL HACKING AND COUNTERMEASURES V.10The Certified Ethical Hacker (C|EH v10) program is a trusted and respected ethical hacking training Program that any information security professional will need. Since its inception in 2003, the Certified Ethical Hacker ... |
|
Register |
|
SYMANTEC DATA LOSS PREVENTION 15.5 ADMINISTRATIONThe Symantec Data Loss Prevention 15.5 Administration course is designed to provide you with the fundamental knowledge to configure and administer the Symantec Data Loss Prevention Enforce platform. The hands‐on labs inc ... |
|
Register |
|
SECURITY FUNDAMENTALSIn this course, you will be introduced to security concepts for today's business and technology professionals. You will cover layered security philosophy, physical security, Internet security, and wireless security princ ... |
|
Register |
|
BLUE COAT CERTIFIED PROXY PROFESSIONALIn the Blue Coat Certified Proxy Professional (BCCPP) course, you will learn to configure your Blue Coat Proxy appliance for high availability and multi-site deployments, advance policy features, web content control, P2P ... |
|
Register |
|
CERTIFIED INFORMATION SYSTEMS SECURITY PROFESSIONALThe Official (ISC)2® CISSP® CBK® Review Seminar is the most comprehensive, complete review of information systems security concepts and industry best practices, and the only review course endorsed by (ISC)2. Review Semin ... |
|
Register |
|
SYSTEMS SECURITY CERTIFIED PRACTITIONERLooking to move up in the information security field? If you have at least one year of security experience, you qualify for the Systems Security Certified Practitioner (SSCP) certification, which offers junior security p ... |
|
Register |
|
CITRIX ENTERPRISE SECURITY SOLUTIONSLearn to secure your Citrix environment in this hands-on course that encompasses the core Citrix technologies, including Citrix Virtual Apps and Desktops, ADC, Endpoint Management, Content Collaboration and Citrix Cloud. ... |
|
Register |
|
CONFIGURING AND DEPLOYING A PRIVATE CLOUDThis course equips students with the skills they require to configure and deploy a cloud using Microsoft System Center 2012 R2. Using hands-on labs, students learn the following: - Produce a high-level design that acc ... |
|
Register |
|
MANAGING ENTERPRISE SECURITY WITH CISCO SECURITY MANAGERThe Managing Enterprise Security with Cisco Security Manager (SSECMGT) course is aimed at providing network security engineers with the knowledge and skills that are needed to configure and deploy Cisco Security Manager. ... |
|
Register |
|
IMPLEMENTING CISCO CYBERSECURITY OPERATIONSThis is the second course in Cisco's CCNA Cyber Ops Curriculum and is designed to provide students with an understanding of how a Security Operations Center (SOC) functions and the knowledge required in this environment. ... |
|
Register |
|
CERTIFIED INFORMATION SECURITY MANAGERFive years of experience with audit, IT systems, and security of information systems; systems administration experience; familiarity with TCP/IP; and an understanding of UNIX, Linux, and Windows. This advanced course als ... |
|
Register |
|
CISCO CCNA SECURITY BOOT CAMP (ACCELERATED)In this course, you will learn how to install, operate, configure, and verify a basic IPv4 and IPv6 network, including configuring a LAN switch, configuring an IP router, managing network devices. You will also learn abo ... |
|
Register |
France , Paris |
|||
---|---|---|---|
|
CYBER SEC FIRST RESPONDER™ (CFR) CERTIFICATIONThis course covers network defense and incident response methods, tactics, and procedures are taught in alignment with industry frameworks such as NIST 800-61 r.2 (Computer Security Incident Handling), US-CERT’s NCISP (N ... |
|
Register |
|
CYBERSECURITY FOUNDATIONSWhen you consider just a few of the consequences of a security breach - your proprietary information completely accessible, hefty fines for security lapses, news headlines about your company's security breach, it becomes ... |
|
Register |
|
CISCO ASA EXPRESS SECURITY 1.5This course has been designed to provide an understanding of Cisco's ASA solution portfolio. Students will learn how to successfully configure various aspects of the Cisco ASA components including Cisco ASA firewall feat ... |
|
Register |
|
CYBER SECURE CODER (CSC) CERTIFICATIONThe stakes for software security are very high, and yet many development teams deal with software security only after the code has been developed and the software is being prepared for delivery. As with any aspect of sof ... |
|
Register |
|
IMPLEMENTING CISCO EDGE NETWORK SECURITY SOLUTIONSThis course has been designed to provide students with the knowledge and skills required to implement and manage security on Cisco ASA firewalls, Cisco Routers with the firewall feature set and Cisco Switches. Students w ... |
|
Register |
Indonesia , Indonesia |
|||
---|---|---|---|
|
SYMANTEC CLIENT MANAGEMENT SUITE 8.5 ADMINISTRATIONThe Client Management Suite 8.5 Administration course is designed for professionals tasked with using Symantec’s Client Management Suite (CMS) to manage their software and hardware resources in their organizations. This ... |
|
Register |
|
SYMANTEC IT MANAGEMENT SUITE 8.1 DIAGNOSTICS AND TROUBLESHOOTINGThe Symantec IT Management Suite 8.1 Diagnostics and Troubleshooting course is designed for professionals tasked with maintaining and utilizing a Symantec IT Management Suite (ITMS) implementation in their organizations. ... |
|
Register |
|
ADVANCED JUNOS SECURITYThis five-day course, which is designed to build off the current Junos Security (JSEC) offering, delves deeper into Junos security and next-generation security features. Through demonstrations and hands-on labs, you will ... |
|
Register |
|
EC - COUNCIL CERTIFIED SECURE PROGRAMMERSoftware defects, bugs, and flaws in the logic of the program are consistently the cause for software vulnerabilities. Analysis by software security professionals has proven that most vulnerabilities are due to errors i ... |
|
Register |
|
CYBER SEC FIRST RESPONDER™ (CFR) CERTIFICATIONThis course covers network defense and incident response methods, tactics, and procedures are taught in alignment with industry frameworks such as NIST 800-61 r.2 (Computer Security Incident Handling), US-CERT’s NCISP (N ... |
|
Register |
|
CERTIFIED SECURE COMPUTER USER - AWARENESS TRAININGThe purpose of the CSCU training program is to provide individuals with the necessary knowledge and skills to protect their information assets. This class will immerse students into an interactive environment where they ... |
|
Register |
|
COMPTIA ADVANCED SECURITY PRACTITIONER (CASP) PREP COURSEYou have experience in the increasingly crucial field of information security, and now you're ready to take that experience to the next level. CompTIA® Advanced Security Practitioner (CASP) (Exam CAS-002) is the course y ... |
|
Register |
|
CERTIFIED INFORMATION SECURITY MANAGERFive years of experience with audit, IT systems, and security of information systems; systems administration experience; familiarity with TCP/IP; and an understanding of UNIX, Linux, and Windows. This advanced course als ... |
|
Register |
Ireland , Ireland |
|||
---|---|---|---|
|
COMPTIA ADVANCED SECURITY PRACTITIONER (CASP) PREP COURSEYou have experience in the increasingly crucial field of information security, and now you're ready to take that experience to the next level. CompTIA® Advanced Security Practitioner (CASP) (Exam CAS-002) is the course y ... |
|
Register |
Providing services with a high quality that are satisfying the requirements
Appling the specifications and legalizations to ensure the quality of service.
Best utilization of resources for continually improving the business activities.
CDGA keen to selects highly technical instructors based on professional field experience
Since CDGA was established, it considered a training partner for world class oil & gas institution
3012, Block 3, 30 Euro Business Park, Little Island, Co. Cork, T45 V220, Ireland
Mon to Fri 09:00 AM to 06:00 PM
Contact Us anytime!