The CCISO Certification is an industry-leading program that recognizes the real-world experience necessary to succeed at the highest executive levels of information security.
CEH: Certified Ethical Hacker v12- Virtual. This course in its 12th iteration, is updated to provide you with the tools and techniques used by hackers and information security professionals alike to break into any computer system.
CHFI, the most soughtafter information security certification in the field of Computer Forensic Investigation. Designed to reinforce the skills of the new generation of cyber sleuths. EC-Council releases the most advanced Computer Forensic Investigation program in the world.
Virtual - IT security is paramount to organizations as cloud computing and mobile devices have changed the way we do business. With the massive amounts of data transmitted and stored on networks throughout the world, it’s essential to have effective security practices in place.
This training addresses all the stages involved in incident handling and the response process to enhance your skills as an incident handler and responder, increasing your employability.
SC-200: Microsoft Security Operations Analyst - Virtual. Learn how to investigate, respond to, and hunt for threats using Microsoft Azure Sentinel, Azure Defender, and Microsoft 365 Defender.
This course provides IT Identity & Access Professionals and IT Security Professionals with the knowledge and skills needed to implement identity management solutions based on Microsoft Azure AD, and its connected identity technologies.
SC-400: Microsoft Information Protection Administrator. Learn how to protect information in your Microsoft 365 deployment. This course focuses on data governance and information protection within your organization.
SC-900: Security, Compliance, and Identity Fundamentals - Virtual. This course provides foundational level knowledge on security, compliance, and identity (SCI) concepts and related cloud-based Microsoft solutions.
Security Engineering on AWS - Virtual. This course demonstrates how to efficiently use AWS security services to stay secure in the AWS Cloud. The course focuses on the security practices that AWS recommends for enhancing the security of your data and systems in the cloud.
Cyber-attacks on critical infrastructure are becoming more common, complex, and creative. Life, property, and the environment are at stake. This course is designed to prepare you to prevent and contain cyber-attacks by building fundamental awareness across your organization.
A cyber-attack often targets an organization’s users first. Make sure they are prepared. This one-day training ensures that each employee fully understands the nature and importance of information security and is able to identify common threats.
To ensure a harmonized and higher level of cyber security across the EU countries, The NIS2 Directive leads to new security requirements for the companies involved, this entails a minimum set of security controls and reporting measures of security incidents.
Vi tilbyr kurs i cybersikkerhet. Cybertrusselen mot norske bedrifter er stor og økende. Slik går du frem for å styrke dine ansattes kompetanse
We provide online course about security in Google Cloud Platform. Through lectures, demonstrations, and hands-on labs, participants explore and deploy the components of a secure GCP solution.
Vi tilbyr et kurs hvor du lærer sende, motta og oppbevare Crypto sikkert. Crypto er digitale eiendeler og kanskje fremtidens penger. En innføring i hvordan Bitcoin ble skapt og hvorfor. Sammen med litt praktisk informasjon om systemet. Ta kontakt for avtale!