Vi tilbyr kurset "Anbefalt praksis for cybersikkerhet". En cybersikkerhetstrussel er et tilsiktet forsøk på å få tilgang til systemet til en enkeltperson eller organisasjon.
What is Security Awareness Training and examples of Security Awareness Training?
When we think of social engineer, we picture them sitting in the dark, in front of a computer screen, wearing black hoodie, but social engineers are not as obvious. Have you ever had a cute child sweet-talk you into doing something you wouldn`t normally do? Congrats, you`ve been socially engineered
Comptia advanced security practitioner (CASP+). You have experience in the increasingly crucial field of information security, and now you´re ready to take that experience to the next level.
ISO/IEC 27002 Foundation training enables you to learn the basic elements to implement Information Security Controls as specified in ISO/IEC 27002.
ISO/IEC 27001 Foundation training allows you to learn the basic elements to implement and manage an Information Security Management System as specified in ISO/IEC 27001.
The ISO/IEC 27001 Lead Auditor training enables you to develop the necessary expertise to perform an Information Security Management System (ISMS) audit by applying widely recognized audit principles, procedures and techniques.
This ISO/IEC 27001 Lead Implementer training enables you to develop the necessary expertise to support an organization in establishing, implementing, managing and maintaining an Information Security Management System (ISMS) based on ISO/IEC 27001.
The ISO/IEC 27002 Lead Manager training course enables participants to acquire a comprehensive knowledge and understanding of the implementation and management of information security controls based on ISO/IEC 27002.
ISO/IEC 27002 Manager training course provides information on the implementation and management of information security controls based on ISO/IEC 27002.
By attending this 2-day ISO/IEC 27005 Foundation training course, participants will learn more about the structure of the standard including information security risk assessment, treatment, acceptance, communication and consultation, and monitoring and review.
ISO/IEC 27005 Lead Risk Manager training enables you to acquire the necessary expertise to support an organization in the risk management process related to all assets of relevance for Information Security using the ISO/IEC 27005 standard as a reference framework.
ISO/IEC 27005 Risk Manager training enables you to develop the competence to master the risk management process related to all assets of relevance for Information Security using the ISO/IEC 27005 standard as a reference framework.
ISO/IEC 27035 Foundation training enables you to learn the basic elements to implement an Incident Management Plan and manage Information Security Incidents. During this training course, you will be able to understand Information Security Incident Management processes.
ISO/IEC 27035 Lead Incident Manager training enables you to acquire the necessary expertise to support an organization in implementing an Information Security Incident Management plan based on ISO/IEC 27035.
The ISO/IEC 27701 Foundation training course is designed to help participants understand the basic concepts and principles of a Privacy Information Management System (PIMS) based on ISO/IEC 27701
The ISO/IEC 27701 Lead Auditor training course enables you to develop the necessary skills to perform a Privacy Information Management System (PIMS) audit by applying widely recognized audit principles, procedures and techniques.
The ISO/IEC 27701 Lead Implementer training course enables you to develop the necessary expertise to assist an organization to establish, implement, maintain and continually improve a Privacy Information Management System (PIMS)
Prisma Cloud is the industry´s most complete Cloud Native Application Protection Platform (CNAPP), with the industry´s broadest security and compliance coverage—for infrastructure, workloads, and applications, across the entire cloud native technology stack—throughout the development lifecycle
The Prisma SD-WAN Design and Operation (EDU-238) course describes the next generation Prisma SD-WAN solution, the capability and value it provides over legacy WAN and SD-WAN implementations, and how to configure, operate, and troubleshoot the solution.
The Prisma Access SASE Security: Design and Operation (EDU-318) course describes Panorama Managed Prisma Access Secure Access Service Edge (SASE) and how it helps organizations embrace cloud and mobility by providing network and network security services from the cloud.
We offer course in Palo Alto Networks: Firewall 10.2: Troubleshooting (EDU-330).
IPv6 grunnkurs (NLT-IPV6-Intro) er et kurs som passer for tekniske ressurser i design og driftsavdelinger hos operatører og Enterprise-kunder. Kurset vil gi deltagerne kunnskap og ferdigheter som er nødvendige for å designe og konfigurere nettverk. IPv6 introkurs kan kombineres med andre IPv6 kurs,
IPv6 Networking (NLT-IPV6-Datasenter) er et kurs som passer for tekniske ressurser i design og driftsavdelinger hos operatører og enterprise-kunder. Deltagerne bør ha grunnleggende IPv6-kjennskap, tilsvarende NLT-IPv6-Intro. IPv6 datasenterkurs kan kombineres med andre IPv6 kurs.
Dette kurset (NLT-IPV6-Nettverk) dekker design og implementasjon av IPv6 i et bedriftsnettverk. Vi går gjennom nettverksdesign og tjenester som autokonfigurasjon av IPv6 (SLAAC og DHCP). Videre ser vi på VPN-løsninger og brannmurer. I tillegg går vi gjennom metoder for feilsøking og problemløsning.
«IPv6 The good, the bad and the ugly» (NLT-IPV6-Sikkerhet) er et kurs for deg som vil ha en større forståelse av hvilke sikkerhetsutfordringer IPv6 er ment å løse, men også hvilke nye problemstillinger som dukker opp ved overgang til IPv6.
Junos grunnkurs er et av nLogics mest populære kurs, som vi har tilbudt i snart 10 år. Kurset er en del av nLogics education services. I tillegg til kurs tilbyr vi workshops, seminarer, sertifiseringsløp og POC-lab for å kunne bistå med opplæring og testning i alle faser av en leveranse.
Junos grunnkurs gir en innføring i bruk av Junos, Junipers operativsystem for rutere, switcher og brannmurer. Kurset gir grunnleggende kunnskap for å ta i bruk Junipers utstyr på en effektiv måte.
To innholdsrike dager med seminar og workshops, der vi presenterer siste nytt fra oss, våre kunder og utvalgte partnere.
Vi gjentar suksessen og inviterer til nLogic Summit, 13. juni 2024. Vårt utgangspunkt er å gi innblikk i reelle caser, problemstillinger og løsninger, der vår målsetningen for dagen er å styrke din kompetanse på nettverk, IT-sikkerhet og datasenter.
I samarbeid med Icotera inviterer vi til webinar 12. april kl 09:00-10:30. Vi presenterer FTTx CPE/ONT, WiFi 6 & 7 MESH Aksesspunkt samt ICONS for overvåking og provisjonering.
Vi inviterer til webinar i samarbeid med Kentik den 5. april der vi ser nærmere på hvordan Kentik tilbyr avanserte løsninger for nettverksanalyse.
nLogic webinar: XaaS cloud platform – tjenestesalg for Service Providers Vi inviterer til webinar tirsdag 9. april kl 09:00 – 10:00 der vi presenterer vår tjenesteportal for service providers. Med en tjenesteportal kan service providers videreselge sine tjenester til bedriftskunder.
Network X kombinerer 5G World, Broadband World Forum og den nylig lanserte Telco Cloud for å samle alt ett sted.
Vi har gleden av å invitere deg til å delta på Nutanix .Next 2024. Dette er den største og mest innovative konferansen til Nutanix!Dette året vil Barcelona være vertskap for et uforglemmelig arrangement fylt med foredrag, hands-on workshops,og en unik mulighet til å bli kjent med de nyeste trender
Vi tilbyr kurs om sikrere og enklere digital hverdag. Har du kontroll? Med informasjon i mange ulike kilder og steder er det ikke like lett å holde oversikten over din informasjon, bilder, filer og tjenester. Vi deler lett, men glemmer igjen informasjon over alt.
Vi tilbyr onlinekurs om sikrere og enklere digital hverdag. Har du kontroll? Med informasjon i mange ulike kilder og steder er det ikke like lett å holde oversikten over din informasjon, bilder, filer og tjenester. Vi deler lett, men glemmer igjen informasjon over alt.
Vi tilbyr 1-dags kurs i WordPress: sikkerhet for deg som ønsker å lære mer om hvordan du best sikrer websider som er basert på WordPress. Er din nettside sikker? Lær hvordan du sikrer din WordPress-løsning.
Vi tilbyr 1-dags kurs i WordPress: sikkerhet for bedrifter som ønsker å lære mer om hvordan du best sikrer websider som er basert på WordPress. Er din nettside sikker? Lær hvordan du sikrer din WordPress-løsning.
Vi tilbyr 1-dags onlinekurs i WordPress: sikkerhet for deg som ønsker å lære mer om hvordan du best sikrer websider som er basert på WordPress. Er din nettside sikker? Lær hvordan du sikrer din WordPress-løsning.
To put it bluntly, writing C/C++ code can be a minefield for reasons ranging from memory management or dealing with legacy code to sharp deadlines and code maintainability. Yet, beyond all that, what if we told you that attackers were trying to break into your code right now.
C and C++ Secure Coding - Virtual. To put it bluntly, writing C/C++ code can be a minefield for reasons ranging from memory management or dealing with legacy code to sharp deadlines and code maintainability.
The CCISO Certification is an industry-leading program that recognizes the real-world experience necessary to succeed at the highest executive levels of information security.
CCSP: Certified Cloud Security Professional Certification Preparation. As powerful as cloud computing is for the organization, understanding its information security risks and mitigation strategies is critical.
This course in its 12th iteration, is updated to provide you with the tools and techniques used by hackers and information security professionals alike to break into any computer system.
CEH: Certified Ethical Hacker v12- Virtual. This course in its 12th iteration, is updated to provide you with the tools and techniques used by hackers and information security professionals alike to break into any computer system.
CHFI, the most soughtafter information security certification in the field of Computer Forensic Investigation. Designed to reinforce the skills of the new generation of cyber sleuths. EC-Council releases the most advanced Computer Forensic Investigation program in the world.
This Official ISACA Certified Information Security Manager (CISM) training course focuses on the construction, development, and governance of information security operations. Possession of this certification displays precise knowledge, practice
Now completely updated for 2020 with the latest material. (ISC)2 Certified Information Systems Security Professional (CISSP) is an independent information security certification governed by the not-for-profit International Information Systems Security Certification.
The Certified Network Defender v2 is a vendor-neutral, hands-on, instructor-led comprehensive network security certification training program. It is a skills-based, lab intensive program built to incorporate critical secure network skills - Protect, Detect, Respond and Predict Maps to NICE 2.0
IT security is paramount to organizations as cloud computing and mobile devices have changed the way we do business. With the massive amounts of data transmitted and stored on networks throughout the world, it’s essential to have effective security practices in place.
Virtual - IT security is paramount to organizations as cloud computing and mobile devices have changed the way we do business. With the massive amounts of data transmitted and stored on networks throughout the world, it’s essential to have effective security practices in place.
CRISC is the only certification that prepares and enables IT professionals for the unique challenges of IT and enterprise risk management, and positions them to become strategic partners to the enterprise.
This training addresses all the stages involved in incident handling and the response process to enhance your skills as an incident handler and responder, increasing your employability.
ISO/IEC 27032 Lead Cybersecurity Manager training enables you to acquire the expertise and competence needed to support an organization in implementing and managing a Cybersecurity program based on ISO/IEC 27032 and NIST Cybersecurity framework.
ISO/IEC 27001 provides requirements for organizations seeking to establish, implement, maintain and continually improve an information security management system.
ISO/IEC 27001 Foundation - Virtual. ISO/IEC 27001 provides requirements for organizations seeking to establish, implement, maintain and continually improve an information security management system.
ISO/IEC 27001 Introduction training course enables you to become familiar with the basic concepts of an Information Security Management System (ISMS).
ISO/IEC 27001 Lead Auditor training enables you to develop the necessary expertise to perform an Information Security Management System (ISMS) audit by applying widely recognized audit principles, procedures and techniques.
Virtual - ISO/IEC 27001 Lead Auditor training enables you to develop the necessary expertise to perform an Information Security Management System (ISMS) audit by applying widely recognized audit principles, procedures and techniques.
ISO/IEC 27001 Lead Implementer training enables you to develop the necessary expertise to support an organization in establishing, implementing, managing and maintaining an Information Security Management System (ISMS) based on ISO/IEC 27001.
Virtual - ISO/IEC 27001 Lead Implementer training enables you to develop the necessary expertise to support an organization in establishing, implementing, managing and maintaining an Information Security Management System (ISMS) based on ISO/IEC 27001.
The ISO/IEC 27701 Foundation training course is designed to help participants understand the basic concepts and principles of a Privacy Information Management System (PIMS) based on ISO/IEC 27701.
This training course is designed to prepare its participants implement a Privacy Information Management System (PIMS) in compliance with the requirements and guidance of the ISO/IEC 27701.
MasterClass: System Forensics and Incident Handling - Virtual. The secure infrastructure configuration should be the most important line of defense in every organization.
This course is a great workshop that teaches how to implement securing technologies one at a time. The course covers all aspects of Windows infrastructure security that everybody talks about and during the course you will learn how to implement them!
This Virtual course is a great workshop that teaches how to implement securing technologies one at a time. The course covers all aspects of Windows infrastructure security that everybody talks about and during the course you will learn how to implement them!
Vietual Masterclass: Internet Information Services 10 Management (IIS). Internet Information Services is a solution that can be delivered in a couple of hours as well as in 3 weeks - we practiced both options!
Masterclass: Internet Information Services 10 Management (IIS). Internet Information Services is a solution that can be delivered in a couple of hours as well as in 3 weeks - we practiced both options!
MasterClass: System Forensics and Incident Handling. The secure infrastructure configuration should be the most important line of defense in every organization.
SC-200: Microsoft Security Operations Analyst. Learn how to investigate, respond to, and hunt for threats using Microsoft Azure Sentinel, Azure Defender, and Microsoft 365 Defender.
SC-200: Microsoft Security Operations Analyst - Virtual. Learn how to investigate, respond to, and hunt for threats using Microsoft Azure Sentinel, Azure Defender, and Microsoft 365 Defender.
This course provides IT Identity & Access Professionals and IT Security Professionals with the knowledge and skills needed to implement identity management solutions based on Microsoft Azure AD, and its connected identity technologies.
SC-400: Microsoft Information Protection Administrator. Learn how to protect information in your Microsoft 365 deployment. This course focuses on data governance and information protection within your organization.
SC-900: Security, Compliance, and Identity Fundamentals. This course provides foundational level knowledge on security, compliance, and identity (SCI) concepts and related cloud-based Microsoft solutions.
SC-900: Security, Compliance, and Identity Fundamentals - Virtual. This course provides foundational level knowledge on security, compliance, and identity (SCI) concepts and related cloud-based Microsoft solutions.
Your application written in C and C++ works as intended, so you are done, right? But did you consider feeding in incorrect values? 16Gbs of data? A null? An apostrophe? Negative numbers, or specifically -2*32?
Your medical device written in C and C++ works as intended, so you are done, right? But did you consider feeding in incorrect values? 16Gbs of data? A null? An apostrophe? Negative numbers, or specifically -1 or -231?
Protecting applications that are accessible via the web requires well-prepared security professional who are at all time aware of current attack methods and trends. Plethora of technologies and environments exist that allow comfortable development of web applications.
After getting familiar with the vulnerabilities and the attack methods, participants learn about the general approach and the methodology for security testing, and the techniques that can be applied to reveal specific vulnerabilities.
Learn how to think about security as part of agile development, and uncover security defects and requirements before they cost you time, money and feature velocity.
As a developer, your duty is to write bulletproof code. However... What if we told you that despite all of your efforts, the code you have been writing your entire career is full of weaknesses you never knew existed? What if, as you are reading this, hackers were trying to break into your code?
As a developer, your duty is to write bulletproof code. However.. What if we told you that despite all of your efforts, the code you have been writing your entire career is full of weaknesses you never knew existed?What if, as you are reading this, hackers were trying to break into your code?
Your Web application written in C# works as intended, so you are done, right? But did you consider feeding in incorrect values? 16Gbs of data? A null? An apostrophe? Negative numbers, or specifically -1 or -231?
The web is a great software delivery platform, making your software available to users around the world with zero installation and easily deployed updates. Unfortunately, it also exposes you to an army of adversaries