The Certified CISO (CCISO) program is the first of its kind training and certification program aimed at producing top-level information security executives.
EC-Council Certified Cloud Security Engineer (CCSE) + Exam voucher (ECCCSE)
This course is the most comprehensive review of cloud security concepts and industry best practices covering the six domains of the CCSP Common Body of Knowledge (CBK®).
Certified CMMC Professional training course enables participants to acquire a comprehensive understanding of the Cybersecurity Maturity Model Certification (CMMC) model and its requirements.
The goal of this CWNA course is to add Wi-Fi expertise to a networking professional´s skillset, while covering all CWNA exam topics. The course begins with discussion topics and hands-on lab exercises covering the basic operation of 802.11 Wi-Fi technology.
The CISM (Certified Information Security Manager) course is a globally recognized certification program designed for professionals in the field of information security management.
Master the deployment and usage of Citrix Application Delivery Management with this two-day management and optimization course.
Citrix Web App Firewall protects web apps and sites from known and unknown attacks.
This threeday course will teach you how to address application services security requirements with Web App Firewall.
Learn how to configure your Citrix networking environment to address application services security requirements with Citrix Web App Firewall: automate and manage network services for scale-out of application architectures with Citrix Application Delivery Management
In this course you will learn how to create a new Citrix DaaS deployment and how to migrate to Citrix DaaS from an on-premises Citrix Virtual Apps and Desktops Site.
Designed to learn how to set up scalability, redundancy and security configurations.
This advanced 5-day training course teaches the design principles for creating a Citrix Virtual Apps and Desktops virtualization solution. In this training, you will learn how to assess existing environments, explore different scenarios and make design decisions based on business requirements.
If you are new to Citrix or if you are planning a move to Citrix Cloud, this course is a necessary step in enabling you with the right training and skills to manage and deploy Citrix Workspace successfully.
Learn to support end-users accessing virtual apps and desktops as part of a Citrix solution. In this course, you will learn to use Citrix Director to interact with user sessions and to capture information for solving issues or escalating to the administration team.
This accelerated 5-day course is designed for experienced IT professionals to build the foundational administration aspects of installing, configuring and managing a Citrix Virtual Apps and Desktops 7 environment.
This Citrix Virtual Apps and Desktop course, designed for experienced IT professionals builds on the foundational implementation and management skills introducing scalability, redundancy, and security configurations.
Designed for experienced IT professionals, you will discover why WEM is the go-to system optimization and logon optimization solution for a Citrix deployment´s app and desktop workloads.
The PECB CMMC Foundations training course enables participants to understand the fundamental concepts and principles of the CMMC model.
Learn the skills required to implement Citrix ADC Essential components including secure Load Balancing, High Availability, and Citrix ADC Management.
In this course, you will learn how Citrix SD-WAN can simplify branch networking for your organization. You´ll walk away understanding how to configure and manage SD-WAN, including the SD-WAN architecture, deployment options, provisioning, and how to use Citrix SD-WAN Orchestrator in your environment
The CompTIA Security+ course is designed to help you prepare for the SY0-701 exam.
Learn to deploy and manage your Citrix DaaS deployment on Microsoft Azure. Gain the skills to plan your machine catalog and virtual machine design based in Microsoft´s public cloud and get hands-on practice deploying those machines using Machine Creation Services.
Expand your Citrix networking knowledge and skills by enrolling in this five-day course. It covers Citrix ADC essentials, including secure load balancing, high availability and operations management, and also focuses on Citrix Gateway.
Build your Citrix ADC knowledge and skills by enrolling in this five-day course.
It covers Citrix ADC essentials– platforms, architecture, licensing and functionality – and also focuses on traffic management, including content switching, traffic optimization and global server load balancing (GSLB)
The Designing and Implementing Cloud Connectivity training helps you develop the skills required to design and implement enterprise cloud connectivity solutions. Learn how to leverage both private and public internet-based connectivity to extend the enterprise network to cloud providers
This 3-day EC-Council training is a course that will prepare you for the EC-Council´s Certified DevSecOps Engineer (E|CDE) certification.
The Certified Ethical Hacker has been battle-hardened over the last 20 years, creating hundreds of thousands of Certified Ethical Hackers employed by top companies, militaries, and governments worldwide.
The ECIH program focuses on a structured approach to the incident handling and response (IH&R) process.
The Certified SOC Analyst (CSA) program is the first step to joining a security operations center (SOC). It is engineered for current and aspiring Tier I and Tier II SOC analysts to achieve proficiency in performing entry-level and intermediate-level operations.
Computer forensics is simply the application of computer investigation and analysis techniques in the interests of determining potential legal evidence.
The program is designed for IT professionals involved with information system security, computer forensics, and incident response.
We offer course about Palo Alto Networks: Firewall 10.2 Essentials: Configuration and Management (EDU-210).
This Fundamentals of Cisco Firewall Threat Defense and Intrusion Prevention (SFWIPF) course shows you how to implement and configure Cisco Secure Firewall Threat Defense for deployment as a next generation firewall at the internet edge.
Comptia advanced security practitioner (CASP+). You have experience in the increasingly crucial field of information security, and now you´re ready to take that experience to the next level.
Learn the skills required to configure and manage Citrix Gateway features. At the end of the course, students will be able to configure their Citrix Gateway environments to address remote access requirements for Apps and Desktops.
ISO/IEC 27002 Foundation training enables you to learn the basic elements to implement Information Security Controls as specified in ISO/IEC 27002.
With the ever-increasing numbers of security breaches,
both human and machine-based, significantly more understanding is required from
testers to ensure that the proper quality assurance measures are in place for
assuring the security of IT systems.
The ISTQB Advanced Technical Test Analyst course extends the broad understanding of testing acquired at Foundation Level to enable the role of Technical Test Analyst to be performed.
The ISTQB Advanced Test Automation Engineer Certificate Course is a three-day course explaining the tasks of a test automation engineer (TAE) in designing, developing, and maintaining test automation solutions.
The ISTQB Advanced Test Manager course extends the broad understanding of testing acquired at Foundation Level to enable the role of Test Manager to be performed.
Established the International Software Testing Qualification Board (ISTQB) with, among other things, the goal of further internationalization and harmonization of test certification programs.
The ISTQB Foundation Level Model Based Tester Extension course extends the broad understanding of testing acquired at Foundation Level to enable the role of Model Based Test Analyst to be performed.
The certification for the ISTQB Mobile Application Testing Foundation Level is intended for professionals who are working with mobile technology. The certification provides an insight into methods, techniques and tools a professional may use to test mobile applications.
We offer course in Palo Alto Networks: Prisma Access Sase Security: Design and operation (EDU-318).
We offer course in Palo Alto Networks: Firewall 10.2: Troubleshooting (EDU-330).
The CCISO Certification is an industry-leading program that recognizes the real-world experience necessary to succeed at the highest executive levels of information security.
This course in its 12th iteration, is updated to provide you with the tools and techniques used by hackers and information security professionals alike to break into any computer system.
CEH: Certified Ethical Hacker v12- Virtual. This course in its 12th iteration, is updated to provide you with the tools and techniques used by hackers and information security professionals alike to break into any computer system.
CHFI, the most soughtafter information security certification in the field of Computer Forensic Investigation. Designed to reinforce the skills of the new generation of cyber sleuths. EC-Council releases the most advanced Computer Forensic Investigation program in the world.
IT security is paramount to organizations as cloud computing and mobile devices have changed the way we do business. With the massive amounts of data transmitted and stored on networks throughout the world, it’s essential to have effective security practices in place.
Virtual - IT security is paramount to organizations as cloud computing and mobile devices have changed the way we do business. With the massive amounts of data transmitted and stored on networks throughout the world, it’s essential to have effective security practices in place.
This training addresses all the stages involved in incident handling and the response process to enhance your skills as an incident handler and responder, increasing your employability.
SC-200: Microsoft Security Operations Analyst. Learn how to investigate, respond to, and hunt for threats using Microsoft Azure Sentinel, Azure Defender, and Microsoft 365 Defender.
SC-200: Microsoft Security Operations Analyst - Virtual. Learn how to investigate, respond to, and hunt for threats using Microsoft Azure Sentinel, Azure Defender, and Microsoft 365 Defender.
This course provides IT Identity & Access Professionals and IT Security Professionals with the knowledge and skills needed to implement identity management solutions based on Microsoft Azure AD, and its connected identity technologies.
SC-400: Microsoft Information Protection Administrator. Learn how to protect information in your Microsoft 365 deployment. This course focuses on data governance and information protection within your organization.
SC-900: Security, Compliance, and Identity Fundamentals. This course provides foundational level knowledge on security, compliance, and identity (SCI) concepts and related cloud-based Microsoft solutions.
SC-900: Security, Compliance, and Identity Fundamentals - Virtual. This course provides foundational level knowledge on security, compliance, and identity (SCI) concepts and related cloud-based Microsoft solutions.
This course demonstrates how to efficiently use AWS security services to stay secure in the AWS Cloud. The course focuses on the security practices that AWS recommends for enhancing the security of your data and systems in the cloud.
Security Engineering on AWS - Virtual. This course demonstrates how to efficiently use AWS security services to stay secure in the AWS Cloud. The course focuses on the security practices that AWS recommends for enhancing the security of your data and systems in the cloud.