The Certified CISO (CCISO) program is the first of its kind training and certification program aimed at producing top-level information security executives.
EC-Council Certified Cloud Security Engineer (CCSE) + Exam voucher (ECCCSE)
This course is the most comprehensive review of cloud security concepts and industry best practices covering the six domains of the CCSP Common Body of Knowledge (CBK®).
Certified CMMC Professional training course enables participants to acquire a comprehensive understanding of the Cybersecurity Maturity Model Certification (CMMC) model and its requirements.
The goal of this CWNA course is to add Wi-Fi expertise to a networking professional´s skillset, while covering all CWNA exam topics. The course begins with discussion topics and hands-on lab exercises covering the basic operation of 802.11 Wi-Fi technology.
The CISM (Certified Information Security Manager) course is a globally recognized certification program designed for professionals in the field of information security management.
Master the deployment and usage of Citrix Application Delivery Management with this two-day management and optimization course.
Citrix Web App Firewall protects web apps and sites from known and unknown attacks. This threeday course will teach you how to address application services security requirements with Web App Firewall.
Learn how to configure your Citrix networking environment to address application services security requirements with Citrix Web App Firewall: automate and manage network services for scale-out of application architectures with Citrix Application Delivery Management
In this course you will learn how to create a new Citrix DaaS deployment and how to migrate to Citrix DaaS from an on-premises Citrix Virtual Apps and Desktops Site.
Designed to learn how to set up scalability, redundancy and security configurations.
This advanced 5-day training course teaches the design principles for creating a Citrix Virtual Apps and Desktops virtualization solution. In this training, you will learn how to assess existing environments, explore different scenarios and make design decisions based on business requirements.
If you are new to Citrix or if you are planning a move to Citrix Cloud, this course is a necessary step in enabling you with the right training and skills to manage and deploy Citrix Workspace successfully.
Learn to support end-users accessing virtual apps and desktops as part of a Citrix solution. In this course, you will learn to use Citrix Director to interact with user sessions and to capture information for solving issues or escalating to the administration team.
This accelerated 5-day course is designed for experienced IT professionals to build the foundational administration aspects of installing, configuring and managing a Citrix Virtual Apps and Desktops 7 environment.
This Citrix Virtual Apps and Desktop course, designed for experienced IT professionals builds on the foundational implementation and management skills introducing scalability, redundancy, and security configurations.
Designed for experienced IT professionals, you will discover why WEM is the go-to system optimization and logon optimization solution for a Citrix deployment´s app and desktop workloads.
The PECB CMMC Foundations training course enables participants to understand the fundamental concepts and principles of the CMMC model.
Learn the skills required to implement Citrix ADC Essential components including secure Load Balancing, High Availability, and Citrix ADC Management.
In this course, you will learn how Citrix SD-WAN can simplify branch networking for your organization. You´ll walk away understanding how to configure and manage SD-WAN, including the SD-WAN architecture, deployment options, provisioning, and how to use Citrix SD-WAN Orchestrator in your environment
The CompTIA Security+ course is designed to help you prepare for the SY0-701 exam.
Learn to deploy and manage your Citrix DaaS deployment on Microsoft Azure. Gain the skills to plan your machine catalog and virtual machine design based in Microsoft´s public cloud and get hands-on practice deploying those machines using Machine Creation Services.
Expand your Citrix networking knowledge and skills by enrolling in this five-day course. It covers Citrix ADC essentials, including secure load balancing, high availability and operations management, and also focuses on Citrix Gateway.
Build your Citrix ADC knowledge and skills by enrolling in this five-day course. It covers Citrix ADC essentials– platforms, architecture, licensing and functionality – and also focuses on traffic management, including content switching, traffic optimization and global server load balancing (GSLB)
The Designing and Implementing Cloud Connectivity training helps you develop the skills required to design and implement enterprise cloud connectivity solutions. Learn how to leverage both private and public internet-based connectivity to extend the enterprise network to cloud providers
This 3-day EC-Council training is a course that will prepare you for the EC-Council´s Certified DevSecOps Engineer (E|CDE) certification.
The Certified Ethical Hacker has been battle-hardened over the last 20 years, creating hundreds of thousands of Certified Ethical Hackers employed by top companies, militaries, and governments worldwide.
The ECIH program focuses on a structured approach to the incident handling and response (IH&R) process.
The Certified SOC Analyst (CSA) program is the first step to joining a security operations center (SOC). It is engineered for current and aspiring Tier I and Tier II SOC analysts to achieve proficiency in performing entry-level and intermediate-level operations.
Computer forensics is simply the application of computer investigation and analysis techniques in the interests of determining potential legal evidence. The program is designed for IT professionals involved with information system security, computer forensics, and incident response.
This Fundamentals of Cisco Firewall Threat Defense and Intrusion Prevention (SFWIPF) course shows you how to implement and configure Cisco Secure Firewall Threat Defense for deployment as a next generation firewall at the internet edge.
Comptia advanced security practitioner (CASP+). You have experience in the increasingly crucial field of information security, and now you´re ready to take that experience to the next level.
Learn the skills required to configure and manage Citrix Gateway features. At the end of the course, students will be able to configure their Citrix Gateway environments to address remote access requirements for Apps and Desktops.
ISO/IEC 27002 Foundation training enables you to learn the basic elements to implement Information Security Controls as specified in ISO/IEC 27002.
With the ever-increasing numbers of security breaches, both human and machine-based, significantly more understanding is required from testers to ensure that the proper quality assurance measures are in place for assuring the security of IT systems.
The ISTQB Advanced Technical Test Analyst course extends the broad understanding of testing acquired at Foundation Level to enable the role of Technical Test Analyst to be performed.
The ISTQB Advanced Test Automation Engineer Certificate Course is a three-day course explaining the tasks of a test automation engineer (TAE) in designing, developing, and maintaining test automation solutions.
The ISTQB Advanced Test Manager course extends the broad understanding of testing acquired at Foundation Level to enable the role of Test Manager to be performed.
Established the International Software Testing Qualification Board (ISTQB) with, among other things, the goal of further internationalization and harmonization of test certification programs.
The ISTQB Foundation Level Model Based Tester Extension course extends the broad understanding of testing acquired at Foundation Level to enable the role of Model Based Test Analyst to be performed.
The certification for the ISTQB Mobile Application Testing Foundation Level is intended for professionals who are working with mobile technology. The certification provides an insight into methods, techniques and tools a professional may use to test mobile applications.
This is a deep dive course on infrastructure services configuration, increasing their level of security and windows internals. It is a must–go for enterprise administrators, security officers and architects.
Learn how to investigate, respond to, and hunt for threats using Microsoft Azure Sentinel, Azure Defender, and Microsoft 365 Defender. In this course you will learn how to mitigate cyberthreats using these technologies.
This course provides foundational level knowledge on security, compliance, and identity concepts and related cloud-based Microsoft solutions.
This instructor-led training enables you to prevent attacks on your endpoints. After an overview of the Cortex XDR components, the training introduces the Cortex XDR management console and demonstrates how to install agents on your endpoints and how to create Security profiles and policies.
This instructor-led course teaches you how to use the Incidents pages of the Cortex XDR management console to investigate attacks. It explains causality chains, detectors in the Analytics Engine, alerts versus logs, log stitching, and the concepts of causality and analytics.
The Cortex™ XSOAR 6.8: Automation and Orchestration (EDU-380) course is four days of instructor-led training
We offer course about Palo Alto Networks: Firewall 10.2 Essentials: Configuration and Management (EDU-210).
This course should help students gain in-depth knowledge about configuring and managing a Palo Alto Networks Panorama management server. Administrators that complete this course should become familiar with the Panorama management server´s role in managing and securing the overall network.
Prisma Cloud is the industry´s most complete Cloud Native Application Protection Platform (CNAPP), with the industry´s broadest security and compliance coverage—for infrastructure, workloads, and applications, across the entire cloud native technology stack—throughout the development lifecycle
The Prisma SD-WAN Design and Operation (EDU-238) course describes the next generation Prisma SD-WAN solution, the capability and value it provides over legacy WAN and SD-WAN implementations, and how to configure, operate, and troubleshoot the solution.
The Prisma Access SASE Security: Design and Operation (EDU-318) course describes Panorama Managed Prisma Access Secure Access Service Edge (SASE) and how it helps organizations embrace cloud and mobility by providing network and network security services from the cloud.
We offer course in Palo Alto Networks: Firewall 10.2: Troubleshooting (EDU-330).
This is a deep dive course on security operations: vulnerability management, anomalies detection, discovery of industry attacks and threats, understanding how compromised system or solution looks like, defining the indicators of the attack, incident handling also daily servicing on SIEM platform.
The Veeam® Backup & Replication™ v12: Configure, Manage and Recover training course is a three-day technical course focused on teaching IT professionals the skills to configure, manage and support a Veeam Backup & Replication v12 solution.
The two-day, Veeam® Backup & Replication™ v11: Architecture and Design training course, is focused on teaching IT professionals how to effectively architect a Veeam solution through attaining technical excellence following the Veeam Architecture Methodology used by Veeam´s own Solution Architects.
Vi tilbyr digitalt kurs om cybersikkerhet for alle. Cybersikkerhet eller IT-sikkerhet er i nyhetene nesten hver dag, men hva er fakta og hva er fiksjon? Kan du bli hacket når som helst? Er alle ute etter din virksomhet? Hva er de største risikoene, og hvordan kan man effektivt redusere dem?
Vi tilbyr Teknologi- og digitaliseringskurs - digitalt. Arbeidslivet digitaliseres i høyt tempo. Med våre teknologi og digitaliseringskurs får du kompetanse til å holde følge med utviklingen. Vi har kurs i AI, IoT, kryptovaluta, nettsider, wordpress og Hubspot.
Vi tilbyr digitalt kurs om tingenes internett (IoT). IoT - Tingenes internett omgir oss på alle kanter, men vet du egentlig hva det er for noe? I dette kurset får du et innblikk i arkitektur, kommunikasjonsteknologi og forskjellige forretningsmodeller som er bygget rundt tingenes internett.
The CCISO Certification is an industry-leading program that recognizes the real-world experience necessary to succeed at the highest executive levels of information security.
CEH: Certified Ethical Hacker v12- Virtual. This course in its 12th iteration, is updated to provide you with the tools and techniques used by hackers and information security professionals alike to break into any computer system.
CHFI, the most soughtafter information security certification in the field of Computer Forensic Investigation. Designed to reinforce the skills of the new generation of cyber sleuths. EC-Council releases the most advanced Computer Forensic Investigation program in the world.
Virtual - IT security is paramount to organizations as cloud computing and mobile devices have changed the way we do business. With the massive amounts of data transmitted and stored on networks throughout the world, it’s essential to have effective security practices in place.
This training addresses all the stages involved in incident handling and the response process to enhance your skills as an incident handler and responder, increasing your employability.
SC-200: Microsoft Security Operations Analyst - Virtual. Learn how to investigate, respond to, and hunt for threats using Microsoft Azure Sentinel, Azure Defender, and Microsoft 365 Defender.
This course provides IT Identity & Access Professionals and IT Security Professionals with the knowledge and skills needed to implement identity management solutions based on Microsoft Azure AD, and its connected identity technologies.
SC-400: Microsoft Information Protection Administrator. Learn how to protect information in your Microsoft 365 deployment. This course focuses on data governance and information protection within your organization.
SC-900: Security, Compliance, and Identity Fundamentals - Virtual. This course provides foundational level knowledge on security, compliance, and identity (SCI) concepts and related cloud-based Microsoft solutions.
Security Engineering on AWS - Virtual. This course demonstrates how to efficiently use AWS security services to stay secure in the AWS Cloud. The course focuses on the security practices that AWS recommends for enhancing the security of your data and systems in the cloud.
IPv6 Networking (NLT-IPV6-Datasenter) er et kurs som passer for tekniske ressurser i design og driftsavdelinger hos operatører og enterprise-kunder. Deltagerne bør ha grunnleggende IPv6-kjennskap, tilsvarende NLT-IPv6-Intro. IPv6 datasenterkurs kan kombineres med andre IPv6 kurs.
Dette kurset (NLT-IPV6-Nettverk) dekker design og implementasjon av IPv6 i et bedriftsnettverk. Vi går gjennom nettverksdesign og tjenester som autokonfigurasjon av IPv6 (SLAAC og DHCP). Videre ser vi på VPN-løsninger og brannmurer. I tillegg går vi gjennom metoder for feilsøking og problemløsning.
«IPv6 The good, the bad and the ugly» (NLT-IPV6-Sikkerhet) er et kurs for deg som vil ha en større forståelse av hvilke sikkerhetsutfordringer IPv6 er ment å løse, men også hvilke nye problemstillinger som dukker opp ved overgang til IPv6.
Junos grunnkurs gir en innføring i bruk av Junos, Junipers operativsystem for rutere, switcher og brannmurer. Kurset gir grunnleggende kunnskap for å ta i bruk Junipers utstyr på en effektiv måte.
Vi tar med oss våre teknologipartnere og inviterer til tech updates og workshops, for faglig påfyll og lærerike diskusjoner.
Telecom World arrangeres i Tromsø 25. – 26. april 2024. Rundt 300 deltakere fra ledersjiktet i hele verdikjeden i den norske bredbåndsbransjen er forventet å delta i Tromsø.
Vi tilbyr et kurs hvor du lærer sende, motta og oppbevare Crypto sikkert. Crypto er digitale eiendeler og kanskje fremtidens penger. En innføring i hvordan Bitcoin ble skapt og hvorfor. Sammen med litt praktisk informasjon om systemet. Ta kontakt for avtale!
Vi tilbyr kurs i cybersikkerhet. Cybertrusselen mot norske bedrifter er stor og økende. Slik går du frem for å styrke dine ansattes kompetanse
Aldri før har det vært viktigere med gode rutiner for it-sikkerhet i norske bedrifter. Og her er et nettkurs om IT sikkerhet som lar deg gjøre noe med det. Du har kanskje opplevd det selv.
Cyber-attacks on critical infrastructure are becoming more common, complex, and creative. Life, property, and the environment are at stake. This course is designed to prepare you to prevent and contain cyber-attacks by building fundamental awareness across your organization.
A cyber-attack often targets an organization’s users first. Make sure they are prepared. This one-day training ensures that each employee fully understands the nature and importance of information security and is able to identify common threats.
To ensure a harmonized and higher level of cyber security across the EU countries, The NIS2 Directive leads to new security requirements for the companies involved, this entails a minimum set of security controls and reporting measures of security incidents.