Administering and Positioning Cisco Umbrella Operations

Cisco Umbrella is a cloud security platform that provides the first line of defense against threats on the Internet. Being able to understand and position how Cisco Umbrella works and what the features are, is the key focus of this 3-day Cisco online IT class. Students who enter the course with a basic understanding of Cisco products and IT solutions will be able to describe Cisco Umbrella, understand Secure Internet Gateway and Ransomware Protection, discuss Threat Intelligence, use Cisco Roaming Client. Sign up with NterOne to get access to this Cisco online training course today.

leer más

CISSP Certification Preparation

This course is the most comprehensive review of information security concepts and industry best practices, and covers the eight domains of the CISSP CBK (Common Body of Knowledge). You will gain knowledge in information security that will increase your ability to successfully implement and manage security programs in any organization or government entity.

leer más

IBM Identity Governance and Intelligence Foundations

IBM Identity Governance and Intelligence is an advanced identity governance system. This course provides the foundational skills necessary to operate, administer, and accomplish the major business functions and analyses provided by Identity Governance and Intelligence. This course provides instruction and hands-on labs for managing the import of data and data exchange with target applications, managing the lifecycle role, modeling access risk control, running certification campaigns, designing workflow processes, and designing and administering reports.

leer más

Juniper Cloud Networking with AWS and Azure

This four-day course is designed to provide students with the knowledge required to implement Juniper Networks vSRX in AWS and Azure environments. Though demonstrations and hands-on labs, students will gain in-depth knowledge about the manual and automated methods used to deploy the vSRX in multicloud environments. This course uses various releases of the vSRX as well as Junos Space, Security Director, Policy Enforcer, and Sky ATP.

leer más

Red Hat Certified Specialist in Security: Containers and OpenShift Exam

The Red Hat Certified Specialist in Security: Containers and OpenShift Container Platform exam (EX425) tests your ability to identify and mitigate threats to OpenShift container-based infrastructure. The exam focuses on implementing and managing secure architecture, policies, and procedures for modern containerized applications and software-defined networking.

By passing this exam, you become a Red Hat Certified Specialist in Security: Containers and OpenShift Container Platform, which also counts toward becoming a Red Hat Certified Architect (RHCA).

This exam is based on Red Hat® OpenShift® Container Platform 3.11.

leer más

ServiceNow Vendor Risk Management (VRM) Implementation

Learn how to effectively manage a Vendor Risk Management Implementation.

This two-day course covers the domain knowledge, common implementation technical aspects, and various processes needed to effectively manage a Vendor Risk Management (VRM) implementation.

Attendees will learn and practice various tactical skills and strategies that will better prepare them to implement VRM. Through lectures, group discussion, hands-on labs and demonstrations, participants build on existing knowledge and skills by applying implementation best practices. Course topics include:

– Vendor Risk Management Review

– Core Configuration

– Assessment Configuration

– Vendor Risk Issues and Processes

– Vendor Portal Configuration

– Application Relationships

– Dashboards and Reports

leer más

Advanced Juniper Networks IPSec VPN Implementations

This two-day, intermediate-level course focuses on the wide range of options available when configuring virtual private networks (VPNs) using Juniper Networks firewall/VPN products. Students attending the course will learn these various deployments through detailed lectures and hands-on lab exercises. This course is based on ScreenOS AUDIENCE version 6.3r14.

leer más

CompTIA CySA+ Cybersecurity Analyst

Nuestra solución de formación remota o virtual, combina tecnologías de alta calidad y la experiencia de nuestros formadores, contenidos, ejercicios e interacción entre compañeros que estén atendiendo la formación, para garantizar una sesión formativa superior, independiente de la ubicación de los alumnos.

leer más

IBM QRadar SIEM Foundations

IBM Security QRadar enables deep visibility into network, endpoint, user, and application activity. It provides collection, normalization, correlation, and secure storage of events, flows, assets, and vulnerabilities. Suspected attacks and policy breaches are highlighted as offenses. In this course, you learn about the solution architecture, how to navigate the user interface, and how to investigate offenses. You search and analyze the information from which QRadar concluded a suspicious activity. Hands-on exercises reinforce the skills learned.

In this 3-day instructor-led course, you learn how to perform the following tasks:

Describe how QRadar collects data to detect suspicious activities
Describe the QRadar architecture and data flows
Navigate the user interface
Define log sources, protocols, and event details
Discover how QRadar collects and analyzes network flow information
Describe the QRadar Custom Rule Engine
Utilize the Use Case Manager app
Discover and manage asset information
Learn about a variety of QRadar apps, content extensions, and the App Framework
Analyze offenses by using the QRadar UI and the Analyst Workflow app
Search, filter, group, and analyze security data
Use AQL for advanced searches
Use QRadar to create customized reports
Explore aggregated data management
Define sophisticated reporting using Pulse Dashboards
Discover QRadar administrative tasks
Extensive lab exercises are provided to allow students an insight into the routine work of an IT Security Analyst operating the IBM QRadar SIEM platform. The exercises cover the following topics:

Architecture exercises
UI Overview exercises
Log Sources exercises
Flows and QRadar Network Insights exercises
Custom Rule Engine (CRE) exercises
Use Case Manager app exercises
Assets exercises
App Framework exercises
Working with Offenses exercises.
Search, filtering, and AQL exercises
Reporting and Dashboards exercises
QRadar Admin tasks exercises
The lab environment for this course uses the IBM QRadar SIEM 7.4 platform.

leer más

Junos Security

This five-day course covers the configuration, operation, and implementation of SRX Series Services Gateways in a typical network environment. Key topics within this course include security technologies such as security zones, security policies, Network Address Translation (NAT), IPsec VPNs, and high availability clusters, as well as how to implement these features by using Junos Space and Security Director.

Through demonstrations and hands-on labs, students will gain experience in configuring the Junos OS and monitoring device operations of Junos security devices. This course uses Juniper Networks SRX Series Services Gateways for the primary hands-on component. The course also includes some hands-on labs that use Junos Space and Security Director to configure and manage Junos security devices. This course is based on Junos OS Release 15.1X49-D70 and Junos Space Security Director 16.1R1.

leer más

Red Hat Certified Specialist in Security: Linux Exam

Con el examen Red Hat Certified Specialist in Security: Linux Exam, podrá validar su conocimiento y capacidad para proteger Red Hat® Enterprise Linux®.

Si aprueba este examen, obtendrá la certificación Red Hat Certified Specialist: Linux, que también cuenta para obtener la acreditación Red Hat Certified Architect (RHCA®).

Este examen se basa en Red Hat Enterprise Linux versión 7.5.

leer más

ServiceNow Vulnerability Response Implementation

Learn the details of Vulnerability Response in ServiceNow.

This two-day course covers Vulnerability Response essentials such as why customers need Vulnerability Response, what Vulnerability Response is, and how to properly implement Vulnerability Response.

Participants will learn the common technical aspects of a Vulnerability Response implementation as well as experience various processes to effectively manage a Vulnerability Response implementation. Additionally, participants will learn tactical skills and strategies that will better prepare them to implement Vulnerability Response in a scalable, repeatable, and efficient manner.

Topics:

– Vulnerability Response Overview

– Getting Data into Vulnerability Response

– Tools to Manage Vulnerability Response Data

– Automating Vulnerability Response

– Vulnerability Response Data Visualization

– Vulnerability Response Delta for the Paris Release

– Capstone Project for Vulnerability Response Implementation

leer más

Advanced Junos Enterprise Security Troubleshooting

This one-day course is designed to provide students with information about troubleshooting SRX Series hardware, the Junos operating system, and more obscure problems like packet loss and latency, IPsec, security zones and policies, other security features, and chassis clustering. Students will gain experience in monitoring and troubleshooting these topics through demonstration as well as hands-on labs. The course exposes students to common troubleshooting commands and tools used to troubleshoot various intermediate to advanced issues.

This course uses Juniper Networks SRX Series Services Gateways for the hands-on component, but the lab environment does not preclude the course from being applicable to other Juniper hardware platforms running the Junos OS. This course is based on Junos OS Release 12.1R5.5.

leer más

Comptia Security+

This course is intended for those wishing to qualify with CompTIA Security+. CompTIA’s Security+ Certification is a foundation-level certificate designed for IT administrators with 2 years’ experience whose job role is focused on system security.

This course will teach you the fundamental principles of installing and configuring cybersecurity controls and participating in incident response and risk mitigation.

The CompTIA Security+ exam will certify the successful candidate has the knowledge and skills required to install and configure systems to secure applications, networks, and devices; perform threat analysis and respond with appropriate mitigation techniques; participate in risk mitigation activities; and operate with an awareness of applicable policies, laws, and regulations.

leer más

IBM Security Guardium Foundations (V11)

Are you getting ready to administer database security policies? Learn how to configure Guardium V11 to discover, classify, analyze, protect, and control access to sensitive data. You will learn to perform vulnerability assessment, and how to monitor data and file activity. This course also teaches you how to create reports, audits, alerts, metrics, and compliance oversight processes.

leer más

Junos Unified Threat Management

This one-day course includes detailed coverage of Web filtering, antivirus (AV), antispam, and content filtering. Through demonstrations and hands-on labs, students will gain experience in configuring and monitoring the Unified Threat Management (UTM) features of the Junos operating system.

leer más

Red Hat Security: Identity Management and Active Directory Integration

Con el curso Red Hat Security: Identity Management and Active Directory Integration (RH362), podrá adquirir las habilidades necesarias para configurar y gestionar IdM, la solución integral de gestión de identidades que se incluye con Red Hat® Enterprise Linux.

Este curso enseña las habilidades para utilizar las funciones más solicitadas de Red Hat Identity Management (IdM), que incluyen la relación de confianza establecida con Active Directory, el agrupamiento de productos múltiples, la gestión de configuraciones con Ansible, la gestión integrada de certificados, el inicio de sesión

leer más

Understanding Cisco Cybersecurity Operations Fundamentals

TheUnderstanding Cybersecurity Operations Fundamentals (CBROPS) course teaches an understanding of the network infrastructure devices, operations, and vulnerabilities of the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol suite. You will learn basic information about security concepts, common network application operations and attacks, the Windows and Linux operating systems, and the types of data used to investigate security incidents. After completing this course, you will have the basic knowledge required to perform the job role of an associate-level cybersecurity analyst in a threat-centric security operations center to strengthen network protocol, protect your devices and increase operational efficiency. This course prepares you for the Cisco Certified CyberOps Associate certification.

Please note that this course is a combination of Instructor-Led and Self-Paced Study – 5 days in the classroom and approx 1 day of self study. The self-study content will be provided as part of the digital courseware that you will recieve at the beginning of the course and should be part of your preparation for the exam.

leer más

Advanced Junos Security

This four-day course, which is designed to build off the current Juniper Security (JSEC) offering, delves deeper into Junos security, next-generation security features, and ATP supporting software. Through demonstrations and hands-on labs, you will gain experience in configuring and monitoring the advanced Junos OS security features with advanced coverage of advanced logging and reporting, next generation Layer 2 security, next generation advanced anti-malware with Juniper ATP On-Prem and SecIntel. This course uses Juniper Networks SRX Series Services Gateways for the hands-on component. This course is based on Junos OS Release 20.1R1.11, Junos Space Security Director 19.4, Juniper ATP On-Prem version 5.0.7.

leer más

Computer Hacking Forensics Investigator

El curso CHFI v9 cubre un enfoque metodológico detallado para la informática forense y el análisis de evidencias informáticas. Proporciona el conjunto de habilidades necesarias para la identificación de las huellas del intruso y para la recopilación de las evidencias necesarias para su enjuiciamiento. Todas las herramientas y teorías principales utilizadas por la industria cibernética están cubiertas en el plan de estudios. La certificación puede fortalecer el nivel de conocimiento práctico del personal de aplicación de la ley, administradores de sistemas, oficiales de seguridad, personal militar y de defensa, profesionales legales, banqueros, profesionales de seguridad informática y de red, así como de cualquier persona preocupada por la integridad de la red y las investigaciones digitales.

leer más

IBM Security Identity Manager Foundations

This is an instructor-led course that introduces students to the foundational skills required to install, configure, and administer IBM Security Identity Manager,. IBM Security Identity Manager can be deployed using the following formats software stack and virtual appliance. This course applies to both formats.

The course also includes many hands-on exercises to supplement the lecture. The hands-on labs are conducted using Identity Manager v.7.0.1.10.

leer más

Red Hat Security: Identity Management and Active Directory Integration with Exam

El curso Red Hat Security: Identity Management and Active Directory Integration with Exam (RH363) proporciona las habilidades necesarias para configurar y gestionar IdM, la solución integral de gestión de identidades que se incluye con Red Hat® Enterprise Linux.

Este curso enseña las habilidades para utilizar las funciones más solicitadas de Red Hat Identity Management (IdM), que incluyen la relación de confianza establecida con Active Directory, el agrupamiento de productos múltiples, la gestión de configuraciones con Ansible, la administración integrada de certificados, el inicio de sesión único, las contraseñas únicas y la conformidad con las políticas de ciberseguridad.

leer más

Understanding Cisco Wireless Foundations

The Understanding Cisco Wireless Foundations (WLFNDU) v1.0 course gives you the knowledge and skills you need to position, plan, implement, operate, and manage a Cisco WLAN network. This course teaches you how to design, install, configure, monitor, and conduct basic troubleshooting tasks on a Cisco WLAN network of any size.

This course will help you to learn the skills, technologies and best practices needed to manage a Cisco WLAN network, to understand and implement a Cisco wireless network architecture, and to design and implement WLAN maintenance and troubleshooting solutions.

leer más

Attack Prevention with Juniper Networks Firewalls

This one-day course meets the business need of customers who are deploying the attack prevention features of ScreenOS software. The course focuses specifically on the attack-related features and assumes familiarity with ScreenOS software. Upon completing this course, you should be able to return to work and successfully configure and verify the desired attack prevention features. This course is based on ScreenOS version 6.3r14

Course Level: This is an introductory-level course.

leer más

Configuring Juniper Networks Firewall/IPsec VPN Products

This course is the first in the ScreenOS curriculum. It is a three-day, instructor-led course that focuses on configuration of the ScreenOS firewall/virtual private network (VPN) products in a variety of situations, including basic administrative access, routing, firewall policies and policy options, attack prevention features, address translation, and VPN implementations. This course is based on ScreenOS version 6.3r14.

leer más

Masterclass: Advanced Active Directory Attacks

This is a deep dive workshop on Active Directory services security, a must-go for administrators, security officers and architects. It is delivered by one of the best people in the market in the security field – with practical knowledge from tons of successful projects, many years of real-world experience, great teaching skills and no mercy for misconfigurations or insecure solutions.

This workshop will present you the critical tasks performed by skilled attacker or pentester against Active Directory and its key components. The course focuses on attacks and security of Windows identity solutions.

Exploits are not the only way to get to the systems! We will go through the operating systems’ builtin problems and explore how they can be beneficial for hackers! One of the most important things to conduct a successful attack is to understand how the targets work. To the bones! Afterwards everything is clear and the tool is just a matter of our need.

The workshop covers all aspects of Active Directory identity security from the hacker’s mind perspective! Our goal is to show and teach you what kind of mechanisms are allowing to get inside the infrastructure and how to get into organization. You will gain penetration tester’s knowledge and tools.

The course is an intense workshop! During these 3 days you will not need your caffeine candies – this workshop is really intense and it will keep you awake all the time!

leer más

Red Hat Security: Linux in Physical, Virtual, and Cloud

El curso Red Hat Security: Linux in Physical, Virtual, and Cloud (RH415) está diseñado para los administradores de seguridad y de sistemas que necesiten gestionar la operación segura de los servidores que ejecutan Red Hat® Enterprise Linux®, ya sea que se encuentren implementados en el hardware físico, como máquinas virtuales o como instancias de nube.

Este se basa en Red Hat Enterprise Linux 7.5, Red Hat Satellite 6.3, Red Hat Ansible® Engine 2.5, Red Hat Ansible Tower 3.2 y Red Hat Insights.

El mantenimiento de la seguridad de los sistemas informáticos es un proceso de gestión de riesgos que implica implementar procesos y estándares con el respaldo de las tecnologías y las herramientas. En este curso, aprenderá sobre los recursos que se pueden utilizar para implementar requisitos de seguridad y cumplir con ellos.

leer más

VMware Carbon Black App Control Administrator

This one-day course teaches you how to use the VMware Carbon Black® App Control™ product and leverage the capabilities to configure and maintain the system according to their organization’s security posture and organizational policies. This course provides an in-depth, technical understanding of the Carbon Black App Control product through comprehensive coursework and hands-on scenario-based labs.

Product Alignment

VMware Carbon Black App Control

leer más

Certified Ethical Hacker + Examen

A Certified Ethical Hacker (CEH) is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems. A Ethical Hacker uses the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system(s). The CEH credential certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective.

CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so that you will be better positioned to set up your security infrastructure and defend future attacks. Understanding system weaknesses and vulnerabilities help organizations strengthen their system security controls to minimize the risk of an incident.

CEH was built to incorporate a hands-on environment and systematic process across everyethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to perform the job of an ethical hacker. You will be exposed to an entirely different posture towards the responsibilities and measures required to be secure.

The Certified Ethical Hacker course is regularly updated to ensure you are aware of the latest tools and techniques used by hackers and information security professionals.

Looking to obtain the CEH Master Accreditation, then why not purchase the CEH Pratical Exam aas well CEH Exam + CEH Practical Exam = CEH Master

A Pearson Vue exam voucher is included, although you will need to schedule the exam at a Pearson Vue testing faclity. An additional 6 months access to the CEHv11 (iLabs) is provided once you have completed the course.

leer más

Cortex XDR 2: Prevention, Analysis, and Response

This course is three days of instructor-led training that will help you to:

Differentiate the architecture and components of the Cortex XDR family
Describe Cortex, Cortex Data Lake, the Customer Support Portal, and the hub
Activate Cortex XDR, deploy the agents, and work with the management console
Work with the Cortex XDR management console, describe a typical management page, and work with the tables and filters
Create Cortex XDR agent installation packages, endpoint groups, policies, and profiles
Create and manage exploit and malware profiles, and perform response actions
Describe detection challenges with behavioral threats
Differentiate the Cortex XDR rules BIOC and IOC, and create and manage them
Describe the Cortex XDR causality analysis and analytics concepts
Triage and investigate alerts and incidents, and create alert starring and exclusion policies
Work with the Causality and Timeline Views and investigate threats in the Query Center

leer más

IBM Security Verify Access Foundations

IBM Security Verify Access helps you simplify your users’ access while more securely adopting web, mobile, IoT, and cloud technologies. It can be deployed on premises, in a virtual or hardware appliance, or containerized with Docker. Verify Access also directly connects with Verify SaaS for a modernized, hybrid IAM approach to enable your organization’s migration to identity as a service (IDaaS) at a comfortable pace. Using the skills taught in this course, you learn how to run Verify Access via Docker, configure authentication and authorization mechanisms, implement policy access control, and set up reverse proxy junctions to process web requests. Hands-on exercises reinforce the skills learned.

leer más

Masterclass: Advanced Malware Hunting

This course teaches the ways of identifying how malware looks like, what malicious activities you should look out for and the ways of removing it. You will also learn how to implement and manage preventive solutions both for small and medium sized for enterprises and organizations. During this course you learn what makes piece of code malicious, go through historic examples and get familiar with different kinds of malware and how to identify various cases. Once we have sufficient understanding of techniques and capabilities of malware, we will start system and network hardening – you will implement security in depth solutions, such as whitelisting or virtualization, in order to protect assets.

leer más

Red Hat Security: Linux in Physical, Virtual, and Cloud with Exam

El curso Red Hat Security: Linux in Physical, Virtual, and Cloud with Exam (RH416) está diseñado para los administradores de seguridad y de sistemas que necesiten gestionar la operación segura de los servidores que ejecutan Red Hat® Enterprise Linux®, ya sea que se encuentren implementados en el hardware físico, como máquinas virtuales o como instancias en la nube.

El curso se basa en Red Hat Enterprise Linux 7.5, Red Hat Satellite 6.3, Red Hat Ansible® Engine 2.5, Red Hat Ansible Tower 3.2 y Red Hat Insights. Además, incluye el examen Red Hat Certified Specialist in Security: Linux Exam (EX415).

El mantenimiento de la seguridad de los sistemas informáticos es un proceso de gestión de riesgos que implica implementar procesos y estándares con el respaldo de las tecnologías y las herramientas. En este curso, conocerá cuáles son los recursos que se pueden utilizar para implementar requisitos de seguridad y para cumplir con ellos.

leer más

VMware Carbon Black App Control Advanced Administrator

This one-day course teaches you how to configure and scope the rules within VMware Carbon Black® App ControlTM product to maintain the system according to your organization’s security posture and organizational policies. Additionally, this course covers troubleshooting both the server and the agent for Carbon Black App Control and how to identify issues that impact normal operations. This course provides an in-depth, technical understanding of the Carbon Black App Control product through comprehensive coursework and hands-on scenario-based labs.

Product Alignment

VMware Carbon Black App Control

leer más

Certified in Risk and Information Systems Control

The Certified in Risk and Information Systems Control™ certification is designed for IT professionals who have hands-on experience with risk identification, assessment, and evaluation; risk response; risk monitoring; IS control design and implementation; and IS control monitoring and maintenance.

The CRISC designation will not only certify professionals who have knowledge and experience identifying and evaluating entity-specific risk, but also aid them in helping enterprises accomplish business objectives by designing, implementing, monitoring and maintaining risk-based, efficient and effective IS controls.

leer más

Cybersecurity Foundations

In this cybersecurity course, you will gain a global perspective of the challenges of designing a secure system, touching on all the cyber roles needed to provide a cohesive security solution. Through lecture, labs, and breakout discussion groups, you will learn about current threat trends across the Internet and their impact on organizational security. You will review standard cybersecurity terminology and compliance requirements, examine sample exploits, and gain hands-on experience mitigating controls. In a contained lab environment, you will work with live viruses, including botnets, worms, and Trojans.

leer más

Implementing an Integrated Threat Defense Solution

This lab-intensive course introduces you to Ciscos Integrated Threat Defense solution with a focus on product integration. The skills you will learn include: Integration of solution components with existing network services: Integration of solution components with the pxGrid framework: Integration of network- and endpoint-based malware protection: Observation of security data flow after introduction of malware.

The course begins with an analysis of the current cybersecurity landscape and includes details on why networks today need an integrated threat defense architecture. You will integrate and verify proper operation of the key Cisco Integrated Threat Defense products, including Cisco Identity Services Engine (ISE), Cisco Stealthwatch®, Cisco Firepower® NGFW, and Cisco AMP for Endpoints. Verification includes the introduction of malware into the network to ensure proper identification, analysis, and quarantine. This course combines lecture materials and hands-on labs that give you practice in configuring the solution integrations.

leer más

Microsoft Identity and Access Administrator

This course provides IT Identity and Access Professional, along with IT Security Professional, with the knowledge and skills needed to implement identity management solutions based on Microsoft Azure AD, and it connected identity technologies. This course includes identity content for Azure AD, enterprise application registration, conditional access, identity governance, and other identity tools.

leer más

Safe Migration from IPv4 to IPv6

This class shows you both base and advanced technical knowledge about the internet protocol of the next generation IPv6. The delegates should be prepared for the change to IPv6 based networks soon and because of this they should understand the function and addressing of IPv6.

The content of this class covers the possibilities of addressing, autoconfiguration with DHCP, use of DNS, configuration rules for your enterprise network, the configuration of Cisco Routers, Win7 clients and Win2008R2 Servers for IPv6, IPv6 transition mechanism and the deployment of IPv6 for enterprise networks. The address allocation, a working IPv6 address design, solutions for the Dual Homing problem and the necessary precautions for the migration from IPv4 to IPv6 for your enterprise network are filling the course content. This class supports network system engineers with the configuration and support of Cisco IOS Routers and the Microsoft operating systems Windows 7 and Server 2008R2.

The themes autoconfiguration with SLAAC and DHCP and on top DNS are learned theoretical and with pratical labs, IPv6 routing protocols like OSPF and EIGRP, first hop redundancy protocols like HSRP and GLBP, IPv6 transition mechanisms including Tunnels like ISATAP, TEREDO and 6to4 as well as NAT64 are covered within this class. The most important design aspects of this class covering in detail the IPv6 design for enterprise networks, using of DHCP and DNS, integration von IPv6 in a IPv4 network, addressing examples and much more.

leer más

VMware Carbon Black EDR Administrator

This one-day course teaches you how to use the VMware Carbon Black® EDR™ product and leverage the capabilities to configure and maintain the system according to your organization’s security posture and policies. This course provides an in-depth, technical understanding of the Carbon Black EDR product through comprehensive coursework and hands-on scenario-based labs.

Product Alignment

VMware Carbon Black EDR

leer más

Certified Information Security Manager

CISM® is the most prestigious and demanding qualification for Information Security Managers around the globe today. This qualification provides you with a platform to become part of an elite peer network who have the ability to constantly learn and relearn the growing opportunities/ challenges in Information Security Management.

Our CISM exam preparation course provides an in-depth coverage of contents across the Four CISM domains with a clear focus on building concepts and solving ISACA released CISM exam questions. The course is an intense training and hard-core exam preparation for ISACA’s Certified Information Security Manager (CISM®) Examination.

leer más

EC-Council Certified Incident Handler

The latest revision of EC-Council’s Certified Incident Handler (E|CIH) certified program has been designed and developed in collaboration with cybersecurity and incident handling/response practitioners across the globe.

This is a three-day course.

The ECIH program focuses on a structured approach to the incident handling and response (IH&R) process. This IH&R process includes stages such as; incident handling and response preparation, incident validation and prioritization, incident escalation and notification, forensic evidence gathering and analysis, incident containment, systems recovery, and incident eradication. This systematic incident handling and response process creates awareness among the incident responders in knowing how to respond to various types of security incidents happening in organisations today.The types of cybersecurity incidents covered include malware incidents, email security incidents, network security incidents, web application security incidents, cloud security incidents, and insider threat-related incidents.

It is a comprehensive specialist level program, that imparts knowledge and skills on how organisations can effectively handle post breach consequences by reducing the impact of the incident, both financially and reputationally. The learning objectives are emphasised through practical learning with 40% of this course covering hands-on experience of the latest incident handling and response tools, techniques, methodologies, frameworks, etc.

The E|CIH lab environment consists of the latest and patched operating systems including Windows 10, Windows Server 2016, Ubuntu Linux, and OSSIM for performing labs.

Students will have access to over 50 labs, 800 tools, and 4 OSs! as well as a large array of templates, check lists, and cheat sheets.

The ECIH Program is 100% Complaint with the NICE 2.0 Framework AND CREST Framework.

Curso Remoto (Abierto)

Nuestra solución de formación remota o virtual, combina tecnologías de alta calidad y la experiencia de nuestros formadores, contenidos, ejercicios e interacción entre compañeros que estén atendiendo la formación, para garantizar una sesión formativa superior, independiente de la ubicación de los alumnos.

leer más

Implementing and Configuring Cisco Identity Services Engine

The Implementing and Configuring Cisco Identity Services Engine course shows you how to deploy and use Cisco Identity Services Engine (ISE) v2.4, an identity and access control policy platform that simplifies the delivery of consistent, highly secure access control across wired, wireless and VPN connections. This hands-on course provides you with the knowledge and skills required to implement and use Cisco ISE, including policy enforcement, profiling services, web authentication and guest access services, BYOD, endpoint compliance services, and TACACS+ device administration. Through expert instruction and hands-on practice, you will learn how to use Cisco ISE to gain visibility into what is happening in your network, streamline security policy management and contribute to operational efficiency.

Delegates will be expected to work in groups and share lab equipment, If you are attending virtually you may also be required to work in virtual breakout rooms. Extended hours may also be required to cover all of the content included in this class.

leer más

Microsoft Security Operations Analyst

Learn how to investigate, respond to, and hunt for threats using Microsoft Azure Sentinel, Azure Defender, and Microsoft 365 Defender. In this course you will learn how to mitigate cyberthreats using these technologies. Specifically, you will configure and use Azure Sentinel as well as utilize Kusto Query Language (KQL) to perform detection, analysis, and reporting. The course was designed for people who work in a Security Operations job role and helps learners prepare for the exam SC-200: Microsoft Security Operations Analyst.

leer más

Securing Email with Cisco Email Security Appliance

Learn how to deploy and use Cisco® Email Security Appliance to establish protection for your email systems against phishing, business email compromise and ransomware. Help streamline email security policy management. This hands-on course provides you with the knowledge and skills to implement, troubleshoot, and administer Cisco Email Security Appliance, including key capabilities such as advanced malware protection, spam blocking, anti-virus protection, outbreak filtering, encryption, quarantines, and data loss prevention.

leer más

VMware Carbon Black Portfolio: Configure and Manage

This 5-day course teaches you how to install, configure, and manage the VMware Carbon Black® Portfolio suite of products, which include:

VMware Carbon Black® App Control™ Administrator
VMware Carbon Black® EDR™ Administrator
VMware Carbon Black Cloud Endpoint™ Standard
VMware Carbon Black® Cloud Audit and Remediation
VMware Carbon Black® Cloud Enterprise EDR™

You learn how to use the capabilities of the products according to the organization’s security posture and organizational policies. This course provides an in-depth, technical understanding of the Carbon Black Portfolio through comprehensive coursework, hands-on labs, and scenario-based exercises.

Product Alignment

VMware Carbon Black App Control
VMware Carbon Black EDR
VMware Carbon Black Cloud Endpoint Standard
VMware Carbon Black Cloud Endpoint Advanced
VMware Carbon Black Cloud Endpoint Enterprise
VMware Carbon Black Cloud Audit and Remediation

leer más

Certified Information Systems Auditor

ISA® is a trademark of the Information Systems Audit and Control Association® (ISACA®)

More than 60,000 security professionals hold CISA certification, which was awarded the «Best Professional Certification» for 2009 by SC Magazine. Global Knowledge was also recognized for the fourth year in a row as a finalist for the «Best Professional Training Program.» Join the elite ranks of the CISA certified with the help of our CISA Prep training course.
In this course, you’ll cover all six domains of the Certified Information Systems Auditor (CISA) exam and gain the knowledge and technical concepts required to obtain CISA certification. Since its inception in 1978, the CISA exam has become the gold standard of excellence in IS auditing, control, and security. Our experts have created a study guide of relevant, up-to-date information, including summary charts, insightful data, and practice exams.

leer más

EC-Council Certified Network Defender

The Certified Network Defender v2 is a vendor-neutral, hands-on, instructor-led comprehensive network security certification training program. It is a skills-based, lab intensive program built to incorporate critical secure network skills – Protect, Detect, Respond and Predict Maps to NICE 2.0. Comes packed with the latest tools, technologies, and techniques, Deploys a hands-on approach to learning, Designed with an enhanced focus on Threat Prediction, Business Continuity and Disaster Recovery .The course is designed and developed after extensive market research and surveys.

leer más

Implementing and Operating Cisco Security Core Technologies

The Implementing and Operating Cisco Security Core Technologies (SCOR) course helps you prepare for the Cisco® CCNP® Security and CCIE® Security certifications and for senior-level security roles. In this course, you will master the skills and technologies you need to implement core Cisco security solutions to provide advanced threat protection against cybersecurity attacks. You will learn security for networks, cloud and content, endpoint protection, secure network access, visibility and enforcements. You will get extensive hands-on experience deploying Cisco Firepower Next-Generation Firewall and Cisco ASA Firewall; configuring access control policies, mail policies, and 802.1X Authentication; and more. You will get introductory practice on Cisco Stealthwatch Enterprise and Cisco Stealthwatch Cloud threat detection features.

Please note that this course is a combination of Instructor-Led and Self-Paced Study – 5 days in the classroom and approx 3 days of self study. The self-study content will be provided as part of the digital courseware that you will recieve at the beginning of the course and should be part of your preparation for the exam.

leer más

Securing Cisco Networks with Open Source Snort®

The Securing Cisco Networks with Open Source Snort course shows you how to deploy a network intrusion detection system based on Snort. Through a combination of expert instruction and hands-on practice, you will learn how to install, configure, operate, and manage a Snort system, rules writing with an overview of basic options, advanced rules writing, how to configure Pulled Pork, and how to use OpenAppID to provide protection of your network from malware. You will learn techniques of tuning and performance monitoring, traffic flow through Snort rules, and more.

e-Learning

Los servicios de e-learning y recursos on-demand que ofrece Global Knowledge, están diseñadas para permitir el acceso a los recursos de aprendizaje en cualquier lugar y en cualquier momento que convenga al alumno. Nuestra solución incluye la posibilidad de acceder a los equipos cuando se necesita para practicar sus habilidades y la oportunidad de ver y escuchar a nuestros expertos en la materia, ya que destacan las áreas clave de la formación.

leer más

VMware NSX-T Data Center for Intrinsic Security

This five-day, hands-on VMware NSX-T Security training course provides you with the knowledge, skills, and tools to achieve competency in configuring, operating, and troubleshooting VMware NSX-T™ Data Center for intrinsic security. In this course, you are introduced to all the security features in NSX-T Data Center, including distributed and gateway firewall, Intrusion Detection and Prevention (IDS/IPS), VMware NSX® Intelligence™, and Network Detection and Response (NDR).

In addition, you are presented with common configuration issues and given a methodology to resolve them.

Product Alignment:

VMware NSX-T Data Center 3.1

leer más

Certified Penetration Testing Professional

EC-Council’s Certified Penetration Tester (CPENT) program teaches you how to perform an effective penetration test in an enterprise network environment that must be attacked, exploited, evaded, and defended. If you have only been working in flat networks, CPENT’s live practice range will teach you to take your skills to the next level by teaching you how to pen test IoT systems, OT systems, how to write your own exploits, build your own tools, conduct advanced binaries exploitation, double pivot to access hidden networks, and also customize scripts/exploits to get into the innermost segments of the network.

The CPENT range consists of entire network segments that replicate an enterprise network — this is not a computer game simulation; this is an accurate representation of an enterprise network that will present the latest challenges to the pen tester. The benefit of hands on learning in a live cyber range is that candidates will encounter multiple layers of network segmentation, and the CPENT course will teach candidates how to navigate these layers, so that once access is gained in one segment, a candidate will know the latest pivoting techniques required to reach the next. However, that won’t be enough on its own as the targets and segments are progressive in nature, so once you get into one machine and or segment, the next one will challenge you even more

CPENT is a fully online, remotely proctored practical exam that challenges candidates through a grueling 24-hour performance-based, hands-on exam. The exam is broken into 2 practical exams of 12-hours each that will test your perseverance and focus by forcing you to outdo yourself with each new challenge. Candidates have the option to choose either 2 12-hour exams or one 24-hour exam.

Candidates who score more than 70% will earn the CPENT certification. Candidates who score more than 90% attain the prestigious LPT (Master) credential!

leer más

EC-Council Certified Security Analyst

The ECSA program offers a seamless learning progress continuing where the CEH program left off.

The new ECSAv10 includes updated curricula and an industry recognized comprehensive step-bystep penetration testing methodology. This allows a learner to elevate their ability in applying new skills learned through intensive practical labs and challenges.

Unlike most other pen testing programs that only follow a generic kill chain methodology; the ECSA presents a set of distinguishable comprehensive methodologies that are able to cover different pentesting requirements across different verticals.

It is a highly interactive, comprehensive, standards based, intensive 5-days training program that teaches information security professionals how professional real-life penetration testing are conducted.

Building on the knowledge, skills and abilities covered in the new CEH v10 program, we have simultaneously re-engineered the ECSA program as a progression from the former.

Organizations today demand a professional level pentesting program and not just pentesting programs that provide training on how to hack through applications and networks.

Such professional level programs can only be achieved when the core of the curricula maps with and is compliant to government and/or industry published pentesting frameworks

This course is a part of the VAPT Track of EC-Council. This is a “Professional” level course, with the Certified Ethical Hacker being the “Core” and the Licensed Penetration Tester being the “Master” level certification.

In the new ECSAv10 course, students that passes the knowledge exam are given an option to pursue a fully practical exam that provides an avenue for them to test their skills, earning them the ECSA (Practical) credential. This new credential allows employers to validate easily the skills of the student.

*Exam included on the price

Curso Remoto (Abierto)

Nuestra solución de formación remota o virtual, combina tecnologías de alta calidad y la experiencia de nuestros formadores, contenidos, ejercicios e interacción entre compañeros que estén atendiendo la formación, para garantizar una sesión formativa superior, independiente de la ubicación de los alumnos.

leer más

Implementing Cisco Identity Services Engine for Wireless Engineers

The Implementing Cisco Identity Services Engine for Wireless Engineers (SWISE) version 1.0 course is a 2-day Instructor-led Training course. Cisco Identity Services Engine (ISE) combined with the Cisco Wireless LAN Controller (WLC), access point (AP), and end devices provide the comprehensive Cisco ISE deployment capabilities and solution into one system. This training course will enable Cisco end customers and authorized Cisco System Engineers (SEs) to understand the concepts, architecture, and use cases that are related to the Cisco ISE. This course will also prepare learners to implement basic Cisco ISE solutions. The focus is to ensure that students can implement the core features of Cisco ISE that most implementations require. Students should already be familiar with basic Cisco WLC and AP configuration.

leer más

Network and Security Manager Fundamentals

This two-day course discusses the basic operations of Network and Security Manager. Key topics include server and domain administration, device configuration, template creation and management, policy creation and management, logging, and report generation. Through demonstrations and hands-on labs, students gain experience in configuring, testing, and troubleshooting features of Network and Security Manager.

leer más

Securing Cisco Networks with Snort Rule Writing Best Practices

Securing Cisco Networks with Snort Rule Writing Best Practices is a lab-intensive course that introduces students to the open source Snort community and rule-writing best practices.Users focus exclusively on the Snort rules language and rule writing. Starting from rule syntax and structure to advanced rule-option usage, you will analyze exploit packet captures and put the rule writing theories learned to work—implementing rule-language features to trigger alerts on the offending network traffic.This course also provides instruction and lab exercises on how to detect certain types of attacks, such as buffer overflows, utilizing various rule-writing techniques. You will test your rule-writing skills in two challenges: a theoretical challenge that tests knowledge of rule syntax and usage, and a practical challenge in which we present an exploit for you to analyze and research so you can defend your installations against the attack.This course combines lecture materials and hands-on labs throughout to make sure that you are able to successfully understand and implement open source rules.

leer más

VMware NSX-T Data Center: Install Configure Manage

This five-day, fast-paced VMware NSX-T Data Center course provides comprehensive training on how to install, configure, and manage a VMware NSX-T™ Data Center environment. This course covers key NSX-T Data Center features and functionality offered in the NSX-T Data Center 3.0 release, including the overall infrastructure, logical switching, logical routing, networking and security services, micro-segmentation and firewalls, and more. Access to a software-defined data center environment is provided through hands-on labs to reinforce the skills and concepts presented in the course.

Product Alignment:

NSX-T Data Center 3.0

leer más

Certified Threat Intelligence Analyst + Examen

Certified Threat Intelligence Analyst (C|TIA) is a training and credentialing program designed and developed in collaboration with cybersecurity and threat intelligence experts across the globe to help organizations identify and mitigate business risks by converting unknown internal and external threats into known threats. It is a comprehensive specialist-level program that teaches a structured approach for building effective threat intelligence.

The program was based on a rigorous Job Task Analysis (JTA) of the job roles involved in the field of threat intelligence. This program differentiates threat intelligence professionals from other information security professionals. It is a highly interactive, comprehensive, standards-based, intensive 3-day training program that teaches information security professionals to build professional threat intelligence.

More than 40 percent of class time is dedicated to the learning of practical skills, and this is achieved through EC-Council labs. Theory to practice ratio for C|TIA program is 60:40, providing students with a hands-on experience of the latest threat intelligence tools, techniques, methodologies, frameworks, scripts, etc. C|TIA comes integrated with labs to emphasize the learning objectives.

The C|TIA lab environment consists of the latest operating systems including Windows 10 and Kali Linux for planning, collecting, analyzing, evaluating, and disseminating threat intelligence.

leer más

EC-COUNCIL CERTIFIED SECURITY SPECIALIST

EC-Council Certified Security Specialist (ECSS) allows students to enhance their skills in three different areas namely information security, network security, and computer forensics.

EC-Council Certified Security Specialist (ECSS) is an entry level security program covering the fundamental concepts of information security, computer forensics, and network security. It enables students to identify information security threats which reflect on the security posture of the organization and implement general security controls. This program will give a holistic overview of the key components of information security, computer forensics, and network security. This program provides a solid fundamental knowledge required for a career in information security.

leer más

Implementing Cisco Unified Communications Security

Implementing Cisco Unified Communications Security (UCSEC) v1.0 is a new 5-day ILT class designed to provide students with the necessary knowledge and skills to implement security features in a Cisco Unified Communications environment. Cisco Unified Communications support several features and mechanisms to secure voice signaling and communications and to mitigate attacks against Cisco Unified Communications networks. The Implementing Cisco Unified Communications Security (UCSEC) v1.0 course introduces security mechanisms and describes different implementation scenarios that increase the security level of Cisco Unified Communications networks.

leer más

NGFW Technical Workshop

The Cisco Next-Generation Firewall (NGFW) is the industry’s first fully integrated, threat-focused NGFW. It delivers comprehensive, unified policy management of firewall functions, application control, threat prevention, and advanced malware protection from the network to the endpoint. This course focuses on the key components of the Cisco NGFW Firepower Threat Defense portfolio and the new unified policy management available with v6.X. The 4100 and 9300 applicances are included within this course.

leer más

Securing Networks with Cisco Firepower Next Generation Firewall

The Securing Networks with Cisco Firepower Next Generation Firewall (SSNGFW) v1.0.2 course shows you how to deploy and use Cisco Firepower® Threat Defense system. This hands-on course gives you knowledge and skills to use and configure Cisco® Firepower Threat Defense technology, beginning with initial device setup and configuration and including routing, high availability, Cisco Adaptive Security Appliance (ASA) to Cisco Firepower Threat Defense migration, traffic control, and Network Address Translation (NAT). You will learn how to implement advanced Next-Generation Firewall (NGFW) and Next-Generation Intrusion Prevention System (NGIPS) features, including network intelligence, file type detection, network-based malware detection, and deep packet inspection. You will also learn how to configure site-to-site VPN, remote-access VPN, and SSL decryption before moving on to detailed analysis, system administration, and troubleshooting.

This course helps you prepare to take the exam, Securing Networks with Cisco Firepower (300-710 SNCF), which leads to CCNP Security and Cisco Certified Specialist – Network Security Firepower certifications. The 300-710 SNCF exam has a second preparation course as well, Securing Networks with Cisco Firepower Next-Generation Intrusion Prevention System (SSFIPS). You can take these courses in any order.

leer más

Cisco Identity Services Engine Essentials

In this course, you will learn about the Cisco Identity Services Engine (ISE) a next-generation identity and access control policy platform that provides a single policy plane across the entire organization combining multiple services, including authentication, authorization, and accounting (AAA) using 802.1x and MAB. The training provides learners with the knowledge and skills to implement 802.1X and MAB for wired and wireless endpoints. The class focuses on configuring Network Access Devices (IOS switches, and Wireless Lan Controllers) with commands necessary for ISE integration. The class also covers configuration of endpoints to use the native Microsoft supplicant with PEAP and EAP-TLS, as well as the Cisco NAM supplicant with EAP-FAST. Time is taken to explore Microsoft Active Directory group policy for endpoint configuration, and to cover integration of an enterprise CA for certificate based authentication.

This course is an intensive hands-on experience. With enhanced hands-on labs, you will setup and patch an ISE node, and use and enterprise CA to configure certificate services for use in a distributed deployment. You will integrate ISE with Active Directory and configure Group Policy to automatically enroll endpoints with an enterprise CA for TLS based authentication. You will configure and test AAA and 802.1X on an IOS switch using classical commands to integrate with ISE. You will migrate and test an IOS switch configuration to use the new-mode IBNS 2.0 Cisco Common Classification Policy Language (C3PL). You will configure and test a Cisco Wireless LAN Controller (WLC) with advanced ISE features. The class also covers the new ISE 2.3 conditions studio and its use in Policy Sets for Authentication/Authorization rules, Profiling of endpoints on the network, and Device Administration using TACACS+.

leer más

EC-Council Certified SOC Analyst (CSA)

El programa de Certified SOC Analyst (CSA) es el primer paso para poder formar parte de un centro de operaciones de seguridad (SOC). Está diseñado para que los actuales y futuros analistas SOC de nivel I y II alcancen la competencia para realizar operaciones de nivel básico e intermedio.

El CSA es un programa de formación y certificación que ayuda al candidato a adquirir habilidades técnicas altamente demandadas a través de la formación. El programa se centra en la creación de nuevas oportunidades de carrera a través de un conocimiento extenso y meticuloso con capacidades de nivel mejoradas para contribuir de forma dinámica a un equipo SOC. Siendo un programa intenso de 3 días, cubre a fondo los fundamentos de las operaciones del SOC, además de transmitir los conocimientos de gestión y correlación de registros, despliegue de SIEM, detección avanzada de incidentes y respuesta a incidentes. Además, el candidato aprenderá a gestionar varios procesos SOC y a colaborar con el CSIRT en el momento que lo necesite.

Esta es la formación recomendada para aquellos estudiantes que buscan alcanzar la certificación de analista SOC certificado por el EC-Council

leer más

Implementing Forefront Identity Manager 2010

Este curso de cuatro días dirigido por un instructor presenta y explica las características y capacidades de Microsoft Forefront Identity Manager 2010 (FIM), y proporciona una visión general de los escenarios de solución que aborda el FIM. El formato del curso incluye presentación, debate, demostración y muchos ejercicios prácticos. Está dirigido a los estudiantes que no tienen experiencia previa con Forefront Identity Manager 2010 o Microsoft Identity Lifecycle Manager 2007 (ILM).

leer más

Palo Alto Networks: Firewall 10.1 Essentials: Configuration and Management (EDU-210)

The Palo Alto Networks Firewall 10.1 Essentials: Configuration and Management (EDU-210) course is five days of instructor-led training that will help you to:

Configure and manage the essential features of Palo Alto Networks next-generation firewalls

Configure and manage Security and NAT policies to enable approved traffic to and from zones

Configure and manage Threat Prevention strategies to block traffic from known and unknown IP addresses, domains, and URLs

Monitor network traffic using the interactive web interface and firewall reports

leer más

Securing Networks with Cisco Firepower Next-Generation IPS

The Securing Networks with Cisco Firepower Next-Generation IPS course shows you how to deploy and use Cisco Firepower Next-Generation Intrusion Prevention System (NGIPS). This hands-on course gives you the knowledge and skills required to use the platform features and includes firewall security concepts, platform architecture and key features; in-depth event analysis including detection of network-based malware and file type, NGIPS tuning and configuration including application control, security intelligence, firewall, and network-based malware and file controls; Snort® rules language; file and malware inspection, security intelligence, and network analysis policy configuration designed to detect traffic patterns; configuration and deploypment of correleation policies to take action based on events detected; troubleshooting; system and user administration tasks, and more.

leer más

Cisco Stealthwatch Administration

The Stealthwatch for System Administrators (SSA) two-day course focuses on a framework to follow for completing the initial configuration tasks required to get Stealthwatch up and running. These tasks include, but are not limited to, creating host groups and classifying services and applications found in the network. These critical initial configuration steps allow the Stealthwatch System to begin monitoring flows and network behavior and to provide customers with data they can use to determine next steps, such as what policies (tuning) need to be put in place for managing the amount of data presented.

leer más

Firewall 10.0: Troubleshooting

La finalización con éxito de este curso de tres días, dirigido por un instructor, mejorará la comprensión del participante de cómo solucionar los problemas de la línea completa de cortafuegos de próxima generación de Palo Alto Networks. Los participantes realizarán la solución de problemas prácticos relacionados con la configuración y el funcionamiento del cortafuegos de Palo Alto Networks.

La finalización de esta clase ayudará a los participantes a desarrollar un conocimiento profundo de cómo solucionar problemas de visibilidad y control sobre las aplicaciones, los usuarios y el contenido.

leer más

Implementing Forefront Unified Access Gateway 2010

Este curso de tres días dirigido por un instructor te prepara para diseñar e implementar soluciones de acceso remoto utilizando Microsoft Forefront Unified Access Gateway 2010 (UAG). Forefront UAG proporciona a las organizaciones flexibilidad para proporcionar acceso a los recursos de la red (como sitios web y aplicaciones internas) con control de acceso granular, protección de contenido personalizado y validación de puntos finales. Forefront UAG también se integra con DirectAccess, una nueva tecnología de Windows 7 que proporciona un acceso remoto sin problemas a todos los recursos corporativos sin necesidad de conectarse a una red privada virtual. Este curso está dirigido a arquitectos, consultores, administradores de redes y profesionales de ventas técnicas que son responsables de vender, diseñar e implementar soluciones de acceso de borde para empresas.

leer más

Palo Alto Networks: Firewall 10.1 Improving Security Posture and Hardening PAN OS-Firewalls (EDU-214)

The Palo Alto Networks Panorama 10.1: Managing Firewalls at Scale (EDU-220) course is two days of instructor-led training that should help you:

Learn how to configure and manage the next-generation Panorama management server

 Gain experience configuring templates (including template variables) and device groups

 Gain experience with administration, log collection, and logging and reporting

Become familiar with planning and design considerations for Panorama deployment

leer más

Securing the Web with Cisco Web Security Applicance

Learn how to implement, use, and maintain a Cisco® Web Security Appliance (WSA), powered by Cisco Talos, to provide advanced protection for business email and control against web security threats. Through a combination of expert instruction and hands-on practice, you’ll learn how to deploy proxy services, use authentication, implement policies to control HTTPS traffic and access, implement use control settings and policies, use the solution’s anti-malware features, implement data security and data loss prevention, perform administration of Cisco WSA solution, and more.

This course is worth 16 Credits in the Continuing Education Program

Virtual and Classroom learning – V&C Select™

V&C Select™ is a simple concept and a flexible approach to delivery. You can ‘select’ a course from our public schedule and attend in person or as a virtual delegate. Virtual delegates do not travel to this course, we will send you all the information you need before the start of the course and you can test the logins.

leer más