Vi tilbyr kurs i CCSP - Certified Cloud Security Professional. Målet med kurset er at man skal forstå og kunne anvende kunnskapene fra pensumet i sitt daglige arbeid umiddelbart etter avsluttet kurs. Experis Ciber AS hjelper deg hele veien frem til fullført sertifisering som CCSP.
Vi tilbyr onlinekurs i Certified Cloud Security Professional (CCSP). Målet med kurset er at man skal forstå og kunne anvende kunnskapene fra pensumet i sitt daglige arbeid umiddelbart etter avsluttet kurs.
Vi tilbyr kurs i CISSP - Certified Information System Security Professionals. CISSP kurset representerer starten på Experis Cibers kursvirksomhet. Kurset har oppstartsgaranti. Dette betyr at når du har meldt deg på, så går kurset. Oppstartsgaranti er noe Experis Ciber vil tilby på alle sine kurs.
Vi tilbyr onlinekurs i Certified Information Security Professional (CISSP). Målet er at man skal forstå og kunne anvende kunnskapene i sitt daglige arbeid umiddelbart etter avsluttet kurs. Dersom man ønsker et mer teknisk rettet kurs, anbefales det at man tar SSCP kurset fra (ISC)2 i stedet.
Vi tilbyr kurs i CSSLP - Certified Secure Software Lifecycle Professional. CSSLP fokuserer på at utviklere, arkitekter og prosjektledere skal ha den nødvendige ekspertisen til å utvikle sikker software.
Vi tilbyr onlinekurs i Certified Secure Software Lifecycle Professional (CSSLP). CSSLP fokuserer på at utviklere, arkitekter og prosjektledere skal ha den nødvendige ekspertisen til å utvikle sikker software.
Vi tilbyr kurs i Experis Ciber Security Foundation - Cybersikkerhet grunnleggende. Etter gjennomført ECSF har man et godt grunnlag for å gå videre på SSCP, CISSP eller CCSP kursene. Man har en grunnleggende forståelse av nøkkelteknologier innen sikkerhet.
Vi tilbyr kurs i Experis Ciber Security Introduction - Cybersikkerhet introduksjon. Kurset tar for seg grunnleggende risikostyring, virkemidler og fremgangsmåter for innføring av sikkerhet i en organisasjon basert på ivaretakelse av konfidensialitet, integritet og tilgjengelighet.
Vi tilbyr kurs i SSCP - System Security Certified Practitioner. Målet med kurset er at man skal forstå og kunne anvende kunnskapene fra pensumet i sitt daglige arbeid umiddelbart etter avsluttet kurs. Experis Ciber AS hjelper deg hele veien frem til fullført sertifisering som SSCP.
Vi tilbyr onlinekurs i Systems Security Certified Practitioner (SSCP). Målsettingen med kurset er at man skal kunne anvende kunnskapene fra pensumet i sitt daglige arbeid umiddelbart etter avsluttet kurs.
To put it bluntly, writing C/C++ code can be a minefield for reasons ranging from memory management or dealing with legacy code to sharp deadlines and code maintainability. Yet, beyond all that, what if we told you that attackers were trying to break into your code right now.
C and C++ Secure Coding - Virtual. To put it bluntly, writing C/C++ code can be a minefield for reasons ranging from memory management or dealing with legacy code to sharp deadlines and code maintainability.
The CCISO Certification is an industry-leading program that recognizes the real-world experience necessary to succeed at the highest executive levels of information security.
CCSP: Certified Cloud Security Professional Certification Preparation. As powerful as cloud computing is for the organization, understanding its information security risks and mitigation strategies is critical.
This course in its 12th iteration, is updated to provide you with the tools and techniques used by hackers and information security professionals alike to break into any computer system.
CEH: Certified Ethical Hacker v12- Virtual. This course in its 12th iteration, is updated to provide you with the tools and techniques used by hackers and information security professionals alike to break into any computer system.
CHFI, the most soughtafter information security certification in the field of Computer Forensic Investigation. Designed to reinforce the skills of the new generation of cyber sleuths. EC-Council releases the most advanced Computer Forensic Investigation program in the world.
This Official ISACA Certified Information Security Manager (CISM) training course focuses on the construction, development, and governance of information security operations. Possession of this certification displays precise knowledge, practice
Now completely updated for 2020 with the latest material. (ISC)2 Certified Information Systems Security Professional (CISSP) is an independent information security certification governed by the not-for-profit International Information Systems Security Certification.
The Certified Network Defender v2 is a vendor-neutral, hands-on, instructor-led comprehensive network security certification training program. It is a skills-based, lab intensive program built to incorporate critical secure network skills - Protect, Detect, Respond and Predict Maps to NICE 2.0
IT security is paramount to organizations as cloud computing and mobile devices have changed the way we do business. With the massive amounts of data transmitted and stored on networks throughout the world, it’s essential to have effective security practices in place.
Virtual - IT security is paramount to organizations as cloud computing and mobile devices have changed the way we do business. With the massive amounts of data transmitted and stored on networks throughout the world, it’s essential to have effective security practices in place.
CRISC is the only certification that prepares and enables IT professionals for the unique challenges of IT and enterprise risk management, and positions them to become strategic partners to the enterprise.
This training addresses all the stages involved in incident handling and the response process to enhance your skills as an incident handler and responder, increasing your employability.
ISO/IEC 27032 Lead Cybersecurity Manager training enables you to acquire the expertise and competence needed to support an organization in implementing and managing a Cybersecurity program based on ISO/IEC 27032 and NIST Cybersecurity framework.
ISO/IEC 27001 provides requirements for organizations seeking to establish, implement, maintain and continually improve an information security management system.
ISO/IEC 27001 Foundation - Virtual. ISO/IEC 27001 provides requirements for organizations seeking to establish, implement, maintain and continually improve an information security management system.
ISO/IEC 27001 Introduction training course enables you to become familiar with the basic concepts of an Information Security Management System (ISMS).
ISO/IEC 27001 Lead Auditor training enables you to develop the necessary expertise to perform an Information Security Management System (ISMS) audit by applying widely recognized audit principles, procedures and techniques.
Virtual - ISO/IEC 27001 Lead Auditor training enables you to develop the necessary expertise to perform an Information Security Management System (ISMS) audit by applying widely recognized audit principles, procedures and techniques.
ISO/IEC 27001 Lead Implementer training enables you to develop the necessary expertise to support an organization in establishing, implementing, managing and maintaining an Information Security Management System (ISMS) based on ISO/IEC 27001.
Virtual - ISO/IEC 27001 Lead Implementer training enables you to develop the necessary expertise to support an organization in establishing, implementing, managing and maintaining an Information Security Management System (ISMS) based on ISO/IEC 27001.
ISO/IEC 27035 Lead Incident Manager training enables you to acquire the necessary expertise to support an organization in implementing an Information Security Incident Management plan based on ISO/IEC 27035.
The ISO/IEC 27701 Foundation training course is designed to help participants understand the basic concepts and principles of a Privacy Information Management System (PIMS) based on ISO/IEC 27701.
The ISO/IEC 27701 Lead Auditor training course enables you to develop the necessary skills to perform a Privacy Information Management System (PIMS) audit by applying widely recognized audit principles, procedures and techniques.
This training course is designed to prepare its participants implement a Privacy Information Management System (PIMS) in compliance with the requirements and guidance of the ISO/IEC 27701.
MasterClass: System Forensics and Incident Handling - Virtual. The secure infrastructure configuration should be the most important line of defense in every organization.
This course is a great workshop that teaches how to implement securing technologies one at a time. The course covers all aspects of Windows infrastructure security that everybody talks about and during the course you will learn how to implement them!
This Virtual course is a great workshop that teaches how to implement securing technologies one at a time. The course covers all aspects of Windows infrastructure security that everybody talks about and during the course you will learn how to implement them!
Masterclass: Internet Information Services 10 Management (IIS). Internet Information Services is a solution that can be delivered in a couple of hours as well as in 3 weeks - we practiced both options!
Vietual Masterclass: Internet Information Services 10 Management (IIS). Internet Information Services is a solution that can be delivered in a couple of hours as well as in 3 weeks - we practiced both options!
MasterClass: System Forensics and Incident Handling. The secure infrastructure configuration should be the most important line of defense in every organization.
SC-200: Microsoft Security Operations Analyst. Learn how to investigate, respond to, and hunt for threats using Microsoft Azure Sentinel, Azure Defender, and Microsoft 365 Defender.
SC-200: Microsoft Security Operations Analyst - Virtual. Learn how to investigate, respond to, and hunt for threats using Microsoft Azure Sentinel, Azure Defender, and Microsoft 365 Defender.
This course provides IT Identity & Access Professionals and IT Security Professionals with the knowledge and skills needed to implement identity management solutions based on Microsoft Azure AD, and its connected identity technologies.
SC-400: Microsoft Information Protection Administrator. Learn how to protect information in your Microsoft 365 deployment. This course focuses on data governance and information protection within your organization.
SC-900: Security, Compliance, and Identity Fundamentals. This course provides foundational level knowledge on security, compliance, and identity (SCI) concepts and related cloud-based Microsoft solutions.
SC-900: Security, Compliance, and Identity Fundamentals - Virtual. This course provides foundational level knowledge on security, compliance, and identity (SCI) concepts and related cloud-based Microsoft solutions.
Your application written in C and C++ works as intended, so you are done, right? But did you consider feeding in incorrect values? 16Gbs of data? A null? An apostrophe? Negative numbers, or specifically -2*32?
Your medical device written in C and C++ works as intended, so you are done, right? But did you consider feeding in incorrect values? 16Gbs of data? A null? An apostrophe? Negative numbers, or specifically -1 or -231?
Protecting applications that are accessible via the web requires well-prepared security professional who are at all time aware of current attack methods and trends. Plethora of technologies and environments exist that allow comfortable development of web applications.
After getting familiar with the vulnerabilities and the attack methods, participants learn about the general approach and the methodology for security testing, and the techniques that can be applied to reveal specific vulnerabilities.
Learn how to think about security as part of agile development, and uncover security defects and requirements before they cost you time, money and feature velocity.
As a developer, your duty is to write bulletproof code. However... What if we told you that despite all of your efforts, the code you have been writing your entire career is full of weaknesses you never knew existed? What if, as you are reading this, hackers were trying to break into your code?
As a developer, your duty is to write bulletproof code. However.. What if we told you that despite all of your efforts, the code you have been writing your entire career is full of weaknesses you never knew existed?What if, as you are reading this, hackers were trying to break into your code?
Your Web application written in C# works as intended, so you are done, right? But did you consider feeding in incorrect values? 16Gbs of data? A null? An apostrophe? Negative numbers, or specifically -1 or -231?
Vi tilbyr kurset "Anbefalt praksis for cybersikkerhet". En cybersikkerhetstrussel er et tilsiktet forsøk på å få tilgang til systemet til en enkeltperson eller organisasjon.
What is Security Awareness Training and examples of Security Awareness Training?
When we think of social engineer, we picture them sitting in the dark, in front of a computer screen, wearing black hoodie, but social engineers are not as obvious. Have you ever had a cute child sweet-talk you into doing something you wouldn`t normally do? Congrats, you`ve been socially engineered
Vi tilbyr kurs i cybersikkerhet. Cybertrusselen mot norske bedrifter er stor og økende. Slik går du frem for å styrke dine ansattes kompetanse
KPMG har gleden av å kunne tilby et internasjonalt anerkjent kurs tilknyttet EUs personvernforordning (GDPR). Lær deg systematisk ledelse og kontroll av personvern.
KPMG har gleden av å kunne tilby et internasjonalt anerkjent innføringskurs i den populære beste praksis standarden ISO/IEC 27001:2022. Lær deg systematisk ledelse og kontroll av informasjonssikkerhet.
KPMG har gleden av å kunne tilby et internasjonalt anerkjent revisorkurs tilknyttet den populære beste praksis standarden ISO/IEC 27001:2022. Lær deg hvordan systematisk revidere virksomhetens ledelse og kontroll av informasjonssikkerhet.
KPMG har gleden av å kunne tilby et internasjonalt anerkjent implementeringskurs i den populære beste praksis standarden ISO/IEC 27001:2022. Lær deg hvordan systematisere virksomhetens ledelse og kontroll av informasjonssikkerhet.
KPMG har gleden av å kunne tilby et internasjonalt anerkjent kurs i den populære beste praksis standarden ISO/IEC 27005:2018. Lær deg informasjonssikkerhetsmessig risikostyring.
Vi tilbyr kurs om sikrere og enklere digital hverdag. Har du kontroll? Med informasjon i mange ulike kilder og steder er det ikke like lett å holde oversikten over din informasjon, bilder, filer og tjenester. Vi deler lett, men glemmer igjen informasjon over alt.
Vi tilbyr onlinekurs om sikrere og enklere digital hverdag. Har du kontroll? Med informasjon i mange ulike kilder og steder er det ikke like lett å holde oversikten over din informasjon, bilder, filer og tjenester. Vi deler lett, men glemmer igjen informasjon over alt.
Vi tilbyr 1-dags kurs i WordPress: sikkerhet for deg som ønsker å lære mer om hvordan du best sikrer websider som er basert på WordPress. Er din nettside sikker? Lær hvordan du sikrer din WordPress-løsning.
Vi tilbyr 1-dags kurs i WordPress: sikkerhet for bedrifter som ønsker å lære mer om hvordan du best sikrer websider som er basert på WordPress. Er din nettside sikker? Lær hvordan du sikrer din WordPress-løsning.
Vi tilbyr 1-dags onlinekurs i WordPress: sikkerhet for deg som ønsker å lære mer om hvordan du best sikrer websider som er basert på WordPress. Er din nettside sikker? Lær hvordan du sikrer din WordPress-løsning.
Det gis en grunnutdannelse i datateknologi og samtidig spisskompetanse rettet mot 1. og 2. linje support. Studiet omfatter datamaskinens oppbygning og virkemåte, maskinvare, operativsystem og kontorapplikasjoner med brukerspesifikk konfigurasjon og feilsøking.
Dette er et ettårig studie som gir dypere kunnskap og ferdigheter innen drift og administrasjon av nettverk og servere. Studiet bygger videre på emner fra studiet IT Drift og Supportteknikk.