C and C++ Secure Coding - Virtual. To put it bluntly, writing C/C++ code can be a minefield for reasons ranging from memory management or dealing with legacy code to sharp deadlines and code maintainability.
The CCISO Certification is an industry-leading program that recognizes the real-world experience necessary to succeed at the highest executive levels of information security.
CCSP: Certified Cloud Security Professional Certification Preparation. As powerful as cloud computing is for the organization, understanding its information security risks and mitigation strategies is critical.
CEH: Certified Ethical Hacker v12- Virtual. This course in its 12th iteration, is updated to provide you with the tools and techniques used by hackers and information security professionals alike to break into any computer system.
CHFI, the most soughtafter information security certification in the field of Computer Forensic Investigation. Designed to reinforce the skills of the new generation of cyber sleuths. EC-Council releases the most advanced Computer Forensic Investigation program in the world.
This Official ISACA Certified Information Security Manager (CISM) training course focuses on the construction, development, and governance of information security operations. Possession of this certification displays precise knowledge, practice
Now completely updated for 2020 with the latest material. (ISC)2 Certified Information Systems Security Professional (CISSP) is an independent information security certification governed by the not-for-profit International Information Systems Security Certification.
The Certified Network Defender v2 is a vendor-neutral, hands-on, instructor-led comprehensive network security certification training program. It is a skills-based, lab intensive program built to incorporate critical secure network skills - Protect, Detect, Respond and Predict Maps to NICE 2.0
Virtual - IT security is paramount to organizations as cloud computing and mobile devices have changed the way we do business. With the massive amounts of data transmitted and stored on networks throughout the world, it’s essential to have effective security practices in place.
CRISC is the only certification that prepares and enables IT professionals for the unique challenges of IT and enterprise risk management, and positions them to become strategic partners to the enterprise.
This training addresses all the stages involved in incident handling and the response process to enhance your skills as an incident handler and responder, increasing your employability.
ISO/IEC 27032 Lead Cybersecurity Manager training enables you to acquire the expertise and competence needed to support an organization in implementing and managing a Cybersecurity program based on ISO/IEC 27032 and NIST Cybersecurity framework.
ISO/IEC 27001 Foundation - Virtual. ISO/IEC 27001 provides requirements for organizations seeking to establish, implement, maintain and continually improve an information security management system.
Virtual - ISO/IEC 27001 Lead Auditor training enables you to develop the necessary expertise to perform an Information Security Management System (ISMS) audit by applying widely recognized audit principles, procedures and techniques.
Virtual - ISO/IEC 27001 Lead Implementer training enables you to develop the necessary expertise to support an organization in establishing, implementing, managing and maintaining an Information Security Management System (ISMS) based on ISO/IEC 27001.
ISO/IEC 27035 Lead Incident Manager training enables you to acquire the necessary expertise to support an organization in implementing an Information Security Incident Management plan based on ISO/IEC 27035.
The ISO/IEC 27701 Foundation training course is designed to help participants understand the basic concepts and principles of a Privacy Information Management System (PIMS) based on ISO/IEC 27701.
The ISO/IEC 27701 Lead Auditor training course enables you to develop the necessary skills to perform a Privacy Information Management System (PIMS) audit by applying widely recognized audit principles, procedures and techniques.
This training course is designed to prepare its participants implement a Privacy Information Management System (PIMS) in compliance with the requirements and guidance of the ISO/IEC 27701.
MasterClass: System Forensics and Incident Handling - Virtual. The secure infrastructure configuration should be the most important line of defense in every organization.
This Virtual course is a great workshop that teaches how to implement securing technologies one at a time. The course covers all aspects of Windows infrastructure security that everybody talks about and during the course you will learn how to implement them!
Vietual Masterclass: Internet Information Services 10 Management (IIS). Internet Information Services is a solution that can be delivered in a couple of hours as well as in 3 weeks - we practiced both options!
MasterClass: System Forensics and Incident Handling. The secure infrastructure configuration should be the most important line of defense in every organization.
SC-200: Microsoft Security Operations Analyst - Virtual. Learn how to investigate, respond to, and hunt for threats using Microsoft Azure Sentinel, Azure Defender, and Microsoft 365 Defender.
This course provides IT Identity & Access Professionals and IT Security Professionals with the knowledge and skills needed to implement identity management solutions based on Microsoft Azure AD, and its connected identity technologies.
SC-400: Microsoft Information Protection Administrator. Learn how to protect information in your Microsoft 365 deployment. This course focuses on data governance and information protection within your organization.
SC-900: Security, Compliance, and Identity Fundamentals - Virtual. This course provides foundational level knowledge on security, compliance, and identity (SCI) concepts and related cloud-based Microsoft solutions.
Your application written in C and C++ works as intended, so you are done, right? But did you consider feeding in incorrect values? 16Gbs of data? A null? An apostrophe? Negative numbers, or specifically -2*32?
Your medical device written in C and C++ works as intended, so you are done, right? But did you consider feeding in incorrect values? 16Gbs of data? A null? An apostrophe? Negative numbers, or specifically -1 or -231?
After getting familiar with the vulnerabilities and the attack methods, participants learn about the general approach and the methodology for security testing, and the techniques that can be applied to reveal specific vulnerabilities.
As a developer, your duty is to write bulletproof code. However.. What if we told you that despite all of your efforts, the code you have been writing your entire career is full of weaknesses you never knew existed?What if, as you are reading this, hackers were trying to break into your code?
Your Web application written in C# works as intended, so you are done, right? But did you consider feeding in incorrect values? 16Gbs of data? A null? An apostrophe? Negative numbers, or specifically -1 or -231?
We provide online course about (In)Security in C++. The course teaches C++ developers fundamental concepts from Exploit Development and Reverse Engineering, and uses these concepts to demonstrate common vulnerabilities in C++ codebases.
We provide online course about a builder’s guide to single page application security. Frontend JavaScript frameworks such as Angular and React disrupt the traditional web security landscape, and finding reliable security advice is hard.
Securing modern web applications is hard, really hard. Not only do you have to make the right architectural security decisions, but you also have to be aware of various implementation vulnerabilities in both frontend apps and APIs.
We provide online course about Attack and Defense: API and Web Application Security. The major cause of webservice and web application insecurity is insecure software development practices.
We provide online course about build your own application security program. As much as we wish it would, secure software doesn’t happen overnight. There’s no single action you can take or technology you can deploy that will solve this complex problem for you.
We provide online course about Building Secure API´s and Web Applications. The major cause of webservice, microservice, and web application insecurity is insecure software development practices.
We provide online course about Keynote: securing the future. Laura Bell Main graduated with a degree in Computer Science and Artificial Intelligence before that was a thing you could get a job in. It wasn’t her finest piece of planning.
We provide online course about Linux security and isolation APIs fundamentals. This workshop provides an introduction to the low-level Linux features - set-UID/set-GID programs, capabilities, and namespaces, cgroups (control groups).
We provide online course about secure programming for the Enterprise in .NET and .NET Core. Not encrypting your data is a risky move and just relying on hope that you won´t get hacked and compromised is not a winning strategy.
We provide online course about Secure Programming for the Enterprise in .NET Framework / .NET Core. Not encrypting your data is a risky move and just relying on the hope that you won´t get hacked and compromised is not a winning strategy.
We provide online course about Secure Programming for the Enterprise in .NET, .NET Core and Future. Not encrypting your data is a risky move and just relying on hope that you won´t get hacked and compromised is not a winning strategy.
We provide online course about TLS / HTTPS Security for Web Developers. Spend two days to understand both the theory and practice of SSL / TLS and Internet PKI.
Vi tilbyr onlinekurs i Certified Cloud Security Professional (CCSP). Målet med kurset er at man skal forstå og kunne anvende kunnskapene fra pensumet i sitt daglige arbeid umiddelbart etter avsluttet kurs.
Vi tilbyr onlinekurs i Certified Information Security Professional (CISSP). Målet er at man skal forstå og kunne anvende kunnskapene i sitt daglige arbeid umiddelbart etter avsluttet kurs. Dersom man ønsker et mer teknisk rettet kurs, anbefales det at man tar SSCP kurset fra (ISC)2 i stedet.
Vi tilbyr onlinekurs i Certified Secure Software Lifecycle Professional (CSSLP). CSSLP fokuserer på at utviklere, arkitekter og prosjektledere skal ha den nødvendige ekspertisen til å utvikle sikker software.
Vi tilbyr onlinekurs i Systems Security Certified Practitioner (SSCP). Målsettingen med kurset er at man skal kunne anvende kunnskapene fra pensumet i sitt daglige arbeid umiddelbart etter avsluttet kurs.
Vi tilbyr nettkurs om Introduksjonskurs ISO27001 – Informasjonssikkerhet. Kurset vil gi et solid fundament for videre praktisk arbeid med forberedelsene til sertifisering, eller innføring av et styringssystem for informasjonssikkerhet.
ISO 27001 er standarden for Informasjonssikkerhet. Det har nå kommet en ny versjon av standarden, og for å sikre at du har den kompetansen du trenger for overgangen har vi utviklet et kurs som tar for seg endringene fra tidligere versjon til ny versjon. Kurset har varighet på 1/2 dag.
Kurset tar for seg kunnskaper og ferdigheter som er nødvendige for å kunne håndtere oppgavene, pliktene og ansvaret til en sikkerhetsanalytiker som jobber i et Security Operations Center (SOC).
Vi tilbyr webinaret FTTH Gateway CPE & Wi-Fi 6. nLogic og Icotera inviterer til webinar. Vi presenterer FTTH Gateways CPE & Wi-Fi 6, MESH Wi-Fi Akksesspunkt og ICONS for overvåking
Vi tilbyr webinaret GPON og akselerasjon til 10G XGS-PON. nLogic og Calix inviterer til Webinar, hvor vi presenterer aksessløsninger innen GPON, XGS-PON og NG-PON2. Calix har en bred portefølje innen aksess, hovedsakelig innen PON teknologi
IPv6 Networking (NLT-IPV6-Datasenter) er et kurs som passer for tekniske ressurser i design og driftsavdelinger hos operatører og enterprise-kunder. Deltagerne bør ha grunnleggende IPv6-kjennskap, tilsvarende NLT-IPv6-Intro. IPv6 datasenterkurs kan kombineres med andre IPv6 kurs.
Dette kurset (NLT-IPV6-Nettverk) dekker design og implementasjon av IPv6 i et bedriftsnettverk. Vi går gjennom nettverksdesign og tjenester som autokonfigurasjon av IPv6 (SLAAC og DHCP). Videre ser vi på VPN-løsninger og brannmurer. I tillegg går vi gjennom metoder for feilsøking og problemløsning.
«IPv6 The good, the bad and the ugly» (NLT-IPV6-Sikkerhet) er et kurs for deg som vil ha en større forståelse av hvilke sikkerhetsutfordringer IPv6 er ment å løse, men også hvilke nye problemstillinger som dukker opp ved overgang til IPv6.
Junos grunnkurs er et av nLogics mest populære kurs, som vi har tilbudt i snart 10 år. Kurset er en del av nLogics education services. I tillegg til kurs tilbyr vi workshops, seminarer, sertifiseringsløp og POC-lab for å kunne bistå med opplæring og testning i alle faser av en leveranse.
Junos grunnkurs gir en innføring i bruk av Junos, Junipers operativsystem for rutere, switcher og brannmurer. Kurset gir grunnleggende kunnskap for å ta i bruk Junipers utstyr på en effektiv måte.
Vi tilbyr webinaret Monitorering, overvåking og Performance Element. I samarbeid med Accedian har vi satt opp et webinar, med fokus på monitorering, overvåking og Performance Elements (MEF Carrier Ethernet CPEs).
nLogic inviterer til webinar Nutanix Enterprise Cloud Bootcamp. Hvordan ser hverdagen til en Nutanix Cloud administrator ut? Vi dekker tema som nettverk og sikkerhet, automasjon, intelligent drift og filtjenester på en Nutanix Enterprise Cloud plattform.
nLogic inviterer til webinar Rubrik Hands-on Labs. Ransomware har preget overskriftene den siste tiden, med beskrivelser av organisasjoner som ikke lenger har tilgang til forretningskritiske data. Sikkerhetskopi er et av de viktigste - om ikke det viktigste - forsvaret mot løsepenger.
Vi tilbyr webinaret Transceivers & WDM mux/demux. nLogic og Smartoptics inviterer til webinar med fokus på Transceivers og WDM mux/demux.
Vi tilbyr kurs i cybersikkerhet. Cybertrusselen mot norske bedrifter er stor og økende. Slik går du frem for å styrke dine ansattes kompetanse
We provide online course about AZ-104 Microsoft Azure Administrator. This course teaches IT Professionals how to manage their Azure subscriptions, secure identities, administer the infrastructure, configure virtual networking, connect Azure and on-premises sites.
We provide online course about AZ-500 Microsoft Azure Security Technologies. In this course students will gain the knowledge and skills needed to implement security controls, maintain the security posture, and identify and remediate vulnerabilities by using a variety of security tools.