Cyber Security Training Courses

Cyber Security Training Courses

Online or onsite, instructor-led live Cyber Security (also known as Cybersecurity, Internet Security or IT Security) training courses demonstrate through interactive discussion and hands-on practice how to understand, plan and implement an Cybersecurity strategy within their organization. Special focus is given to setting up the proper systems and procedures needed to detect and mitigate threats. Internet Security courses are available as interactive trainings and a number of them include a testing and certification component.

Cybersecurity training is available as "online live training" or "onsite live training". Online live training (aka "remote live training") is carried out by way of an interactive, remote desktop. Onsite live Cyber Security trainings in the US can be carried out locally on customer premises or in NobleProg corporate training centers.

NobleProg -- Your Local Training Provider

Testimonials

★★★★★
★★★★★

Cyber Security Course Outlines

Course Name
Duration
Overview
Course Name
Duration
Overview
7 hours
Overview
This is a one day Introduction to ISO27001
35 hours
Overview
ISO/IEC 27002 Lead Manager training enables you to develop the necessary expertise and knowledge to support an organization in implementing and managing Information Security controls as specified in [ISO/IEC 27002](https://pecb.com/en/education-and-certification-for-individuals/iso-iec-27002).

After completing this course, you can sit for the exam and apply for the “PECB Certified ISO/IEC 27002 Lead Manager” credential. A PECB Lead Manager Certification, proves that you have mastered the principles and techniques for the implementation and management of Information Security Controls based on ISO/IEC 27002.

Who should attend?

- Managers or consultants seeking to implement an Information Security Management System (ISMS) based on ISO/IEC 27001 and ISO/IEC 27002
- Project managers or consultants seeking to master the Information Security Management System implementation process
- Individuals responsible for the information security, compliance, risk, and governance, in an organization
- Members of information security teams
- Expert advisors in information technology
- Information Security officers
- Privacy officers
- IT professionals
- CTOs, CIOs and CISOs

Learning objectives

- Master the implementation of Information Security controls by adhering to the framework and principles of ISO/IEC 27002
- Gain a comprehensive understanding of the concepts, approaches, standards, methods and techniques required for the effective implementation and management of Information Security controls
- Comprehend the relationship between the components of Information Security controls, including responsibility, strategy, acquisition, performance, conformance, and human behavior
- Understand the importance of information security for the strategy of the organization
- Master the implementation of information security management processes
- Master the formulation and implementation of security requirements and objectives

Educational approach

- This training is based on both theory and practice
- Sessions of lectures illustrated with examples based on real cases
- Practical exercises based on case studies
- Review exercises to assist the exam preparation
- Practice test similar to the certification exam

General Information

- Certification fees are included on the exam price
- Training material containing over 500 pages of information and practical examples will be distributed to the participants
- A participation certificate of 31 CPD (Continuing Professional Development) credits will be issued to the participants
- In case of exam failure, you can retake the exam within 12 months for free
7 hours
Overview
This instructor-led, live training in the US (online or onsite) is aimed at information system analysts who wish to use MITRE ATT&CK to decrease the risk of a security compromise.

By the end of this training, participants will be able to:

- Set up the necessary development environment to start implementing MITRE ATT&CK.
- Classify how attackers interact with systems.
- Document adversary behaviors within systems.
- Track attacks, decipher patterns, and rate defense tools already in place.
35 hours
Overview
ISO 27799 Lead Manager training enables you to acquire the necessary expertise to support an organization in implementing and managing Information Security controls based on ISO 27799 and [ISO/IEC 27002](https://pecb.com/en/education-and-certification-for-individuals/iso-iec-27002). During this training course, you will also gain a comprehensive knowledge of the best practices of Information Security Controls and how to improve Information Security within a healthcare organization. Additionally, this training enables you to develop the necessary expertise to support healthcare organizations in establishing, implementing, managing and maintaining an Information Security Management System (ISMS). Furthermore, during this training you will learn the complex and different factors that should be taken into account when dealing with information security issues within a healthcare organization.

After mastering all the necessary concepts of Information Security Controls, you can sit for the exam and apply for a “PECB Certified ISO 27799 Lead Manager” credential. By holding a PECB Lead Manager Certificate, you will be able to demonstrate that you have the practical knowledge and professional capabilities to support and lead a team in implementing and managing Information Security Controls in healthcare organizations based on ISO 27799 and ISO/IEC 27002.

Who should attend?

- Managers or consultants seeking to implement an Information Security Management System (ISMS) based on ISO/IEC 27001, ISO/IEC 27002 and ISO 27799
- Project managers or consultants seeking to master the Information Security Management System implementation process in healthcare organizations
- Individuals responsible for Information Security, compliance, risk, and governance in a healthcare organization
- Information Security team members
- Expert advisors in information technology
- Information Security officers
- Information Security managers
- Privacy officers
- IT professionals
- CTOs, CIOs and CISOs

Learning objectives

- Master the implementation of Information Security controls in healthcare organizations by adhering to the framework and principles of ISO 27799 and ISO/IEC 27002
- Master the concepts, approaches, standards, methods and techniques required for the implementation and effective management of Information Security controls in healthcare organizations
- Comprehend the relationship between the components of Information Security controls, including responsibility, strategy, acquisition, performance, conformance, and human behavior
- Understand the importance of Information Security for the strategy of a healthcare organization
- Master the implementation of Information Security management processes
- Master the expertise to support a healthcare organization to effectively implement, manage and maintain Information Security Controls
- Master the formulation and implementation of Information Security requirements and objectives
- Master the development and administration of a health information security program, including: policies, procedures, risk assessment, security architectures etc.
14 hours
Overview
ISO 27799 Foundation training enables you to learn the basic elements of Information security management and Information Security Controls in healthcare organizations as specified in ISO 27799 and ISO/IEC 27002. During this training course, you will be able to understand how ISO 27799 is related to [ISO/IEC 27001](https://pecb.com/en/education-and-certification-for-individuals/iso-iec-27001) and [ISO/IEC 27002](https://pecb.com/en/education-and-certification-for-individuals/iso-iec-27002).

After completing this course, you can sit for the exam and apply for the “PECB Certified ISO 27799 Foundation” credential. A PECB Foundation Certificate shows that you have understood the fundamental methodologies and management approach.

Who should attend?

- Individuals interested in Information Security Management applicable to the healthcare industry
- Individuals seeking to gain knowledge about the main processes of an Information Security Management System and Information Security Controls relevant to healthcare organizations
- Individuals interested to pursue a career in Information Security Management

Learning objectives

- Understand the implementation of Information Security Controls in accordance with ISO 27799 and ISO/IEC 27002
- Acknowledge the correlation between ISO ISO/IEC 27001, ISO 27799, ISO/IEC 27002 and other standards and regulatory frameworks
- Understand the approaches, methods and techniques used for the implementation of Information Security Controls in healthcare organizations

Educational Approach

- Lecture sessions are illustrated with practical questions and examples
- Practical exercises include examples and discussions
- Practice tests are similar to the Certification Exam

General Information

- Certification fees are included on the exam price
- Training material containing over 200 pages of information and practical examples will be distributed
- A participation certificate of 14 CPD (Continuing Professional Development) credits will be issued
- In case of exam failure, you can retake the exam within 12 months for free
35 hours
Overview
The ISO/IEC 27701 Lead Implementer training course enables you to develop the necessary expertise to assist an organization to establish, implement, maintain and continually improve a Privacy Information Management System (PIMS) based on ISO/IEC 27701 by enhancing an existing ISMS based on ISO/IEC 27001 and the guidance of ISO/IEC 27002.

Why should you attend?

This training course is designed to prepare its participants implement a Privacy Information Management System (PIMS) in compliance with the requirements and guidance of the ISO/IEC 27701. Moreover, you will gain a comprehensive understanding of the best practices of privacy information management and learn how to manage and process data while complying with various data privacy regimes.

After mastering the implementation and management of a Privacy Information Management System (PIMS), you can sit for the exam and apply for a “PECB Certified ISO/IEC 27701 Lead Implementer” credential. The internationally recognized PECB Lead Implementer Certificate proves that you have the practical knowledge and professional capabilities to implement the ISO/IEC 27701 requirements in an organization.

Who should attend?

- Managers and consultants involved in privacy and data management
- Expert advisors seeking to master the implementation of a Privacy Information Management System
- Individuals responsible and accountable for Personally Identifiable Information (PII) within organizations
- Individuals responsible for maintaining conformance with data privacy regimes requirements
- PIMS team members

Learning objectives

- Master the concepts, approaches, methods and techniques used for the implementation and effective management of a PIMS.
- Learn about the correlation between ISO/IEC 27701, ISO/IEC 27001, ISO/IEC 27002 and other standards and regulatory frameworks.
- Understand the operation of a PIMS based on ISO/IEC 27701 and its principal processes.
- Learn how to interpret the requirements of ISO/IEC 27701 in the specific context of an organization.
- Develop the expertise to support an organization in effectively planning, implementing, managing, monitoring and maintaining a PIMS.

Education approach

- This training course is based on both theory and best practices used in the implementation of PIMS.
- Lecture sessions are illustrated with examples based on case studies.
- Practical exercises are based on a case study which includes role playing and discussions.
- Practice tests are similar to the Certification Exam

General information

- Certification fees are included on the exam price.
- Training materials and practical examples will be distributed.
- A participation certificate of 31 CPD (Continuing Professional Development) credits will be issued.
- In case of exam failure, you can retake the exam within 12 months for free.
35 hours
Overview
The ISO/IEC 27701 Lead Auditor training course enables you to develop the necessary skills to perform a Privacy Information Management System (PIMS) audit by applying widely recognized audit principles, procedures and techniques.

Why should you attend?

During this training course, you will obtain the knowledge and skills to plan and carry out audits in compliance with ISO 19011 and ISO/IEC 17021-1 certification process.

Based on practical exercises, you will be able to acquire knowledge on the protection of privacy in the context of processing personally identifiable information (PII), as well as master audit techniques and become competent to manage an audit program, audit team, establish communication with customers and resolve potential conflicts.

After completing this training course, you can sit for the exam and, if you successfully pass the exam, you can apply for the “PECB Certified ISO/IEC 27701 Lead Auditor” credential. The internationally recognized PECB Lead Auditor certificate proves that you have the capabilities and competences to audit organizations based on best practices.

Who should attend?

- Auditors seeking to perform and lead Privacy Information Management System (PIMS) certification audits
- Managers or consultants seeking to master a PIMS audit process
- Individuals responsible for maintaining conformance with PIMS requirements
- Technical experts seeking to prepare for a PIMS audit
- Expert advisors in the protection of Personally Identifiable Information (PII)

Learning objectives

- Understand a Privacy Information Management System (PIMS) and its processes based on ISO/IEC 27701
- Identify the relationship between ISO/IEC 27701, ISO/IEC 27001, ISO/IEC 27002, and other standards and regulatory frameworks
- Acquire the competences of the auditor’s role in planning, leading, and following up on a management system audit in accordance with ISO 19011.
- Learn how to interpret the requirements of ISO/IEC 27701 in the context of a PIMS audit

Education approach

- This training is based on both theory and best practices used in PIMS audits
- Lecture sessions are illustrated with examples based on case studies
- Practical exercises are based on a case study which includes role-playing and discussions
- Practice tests are similar to the Certification Exam

General information

- Participants will be provided with the training material containing over 400 pages of explanatory information, discussion topics, examples and exercises.
- An attendance record certificate of 31 CPD (Continuing Professional Development) credits will be issued to the participants who have attended the training course.
14 hours
Overview
The ISO/IEC 27701 Foundation training course is designed to help participants understand the basic concepts and principles of a Privacy Information Management System (PIMS) based on ISO/IEC 27701. Moreover, during this training course, students will learn more on the structure of the standard including its requirements, guidance and controls on the protection of the privacy of Personally Identifiable Information (PII) principals and the relationship of the standard with ISO/IEC 27001 and ISO/IEC 27002.

After completing this training course, you can sit for the exam and, if you successfully pass it, you can apply for the “PECB Certified ISO/IEC 27701 Foundation” credential. A PECB Foundation certificate proves that you have comprehended the fundamental methodologies, requirements, guidelines, framework and managerial approach.

Who should attend?

- Individuals involved in information security and privacy management
- Individuals seeking to gain knowledge on the main processes of a privacy information management system
- Individuals interested in pursuing a career in privacy information management
- Individuals responsible for personally identifiable information (PII) within organizations
- Information security team members

Learning objectives

- Understand the fundamental concepts and principles of a privacy information management system (PIMS) based on ISO/IEC 27701
- Identify the relationship between ISO/IEC 27701, ISO/IEC 27001, ISO/IEC 27002, and other standards and regulatory frameworks
- Understand the approaches, standards, methods, and techniques used for the implementation and management of a PIMS

Educational approach

- Lecture sessions are complemented by discussions questions and examples
- The exercises include multiple-choice quizzes and essay-type exercises
- Exercise questions and quizzes are similar to the certification exam

General Information

- Participants will be provided with the training material containing over 200 pages of explanatory information, discussion topics, examples and exercises.
- An attendance record certificate of 14 CPD (Continuing Professional Development) credits will be issued to the participants who have attended the training course.
35 hours
Overview
ISO/IEC 27035 Lead Incident Manager training enables you to acquire the necessary expertise to support an organization in implementing an Information Security Incident Management plan based on [ISO/IEC 27035](https://pecb.com/en/education-and-certification-for-individuals/iso-iec-27035). During this training course, you will gain a comprehensive knowledge of a process model for designing and developing an organizational incident management plan. The compatibility of this training course with ISO/IEC 27035 also supports the ISO/IEC 27001 by providing guidance for Information Security Incident Management.

After mastering all the necessary concepts of Information Security Incident Management, you can sit for the exam and apply for a “PECB Certified ISO/IEC 27035 Lead Incident Manager” credential. By holding a PECB Lead Incident Manager Certificate, you will be able to demonstrate that you have the practical knowledge and professional capabilities to support and lead a team in managing Information Security Incidents.

Who should attend?

- Information Security Incident managers
- IT Managers
- IT Auditors
- Managers seeking to establish an Incident Response Team (IRT)
- Managers seeking to learn more about operating effective IRTs
- Information Security risk managers
- IT system administration professionals
- IT network administration professionals
- Members of Incident Response Teams
- Individuals responsible for Information Security within an organization

Learning objectives

- Master the concepts, approaches, methods, tools and techniques that enable an effective Information Security Incident Management according to ISO/IEC 27035
- Acknowledge the correlation between ISO/IEC 27035 and other standards and regulatory frameworks
- Acquire the expertise to support an organization to effectively implement, manage and maintain an Information Security Incident Response plan
- Acquire the competence to effectively advise organizations on the best practices of Information Security Incident Management
- Understand the importance of establishing well-structured procedures and policies for Incident Management processes
- Develop the expertise to manage an effective Incident Response Team

Educational approach

- This training is based on both theory and best practices used in the implementation of an Information Security Incident Management plan
- Lecture sessions are illustrated with examples based on case studies
- Practical exercises are based on a case study which includes role playing and discussions
- Practice tests are similar to the Certification Exam

General Information

- Certification fees are included on the exam price
- Training material containing over 450 pages of information and practical examples will be distributed
- A participation certificate of 31 CPD (Continuing Professional Development) credits will be issued
- In case of exam failure, you can retake the exam within 12 months for free
7 hours
Overview
[ISO/IEC 27035](https://pecb.com/en/education-and-certification-for-individuals/iso-iec-27035) Introduction training course enables you to comprehend the basic concepts of managing Information Security Incidents.

By attending the ISO/IEC 27035 Introduction course, you will understand the importance of an Information Security Incident Management and the benefits that businesses, society and governments can obtain.

Who should attend?

- Individuals interested in Information Security Incident Management
- Individuals seeking to gain knowledge about the main processes of Information Security Incident Management

Learning objectives

- Understand the concepts, approaches, methods, and techniques used to manage Information Security Incidents
- Understand the Information Security Incident Management practices

General Information

- Training material containing over 100 pages of information and practical examples will be distributed
- A participation certificate of 7 CPD (Continuing Professional Development) credits will be issued
14 hours
Overview
[ISO/IEC 27035](https://pecb.com/en/education-and-certification-for-individuals/iso-iec-27035) Foundation training enables you to learn the basic elements to implement an Incident Management Plan and manage Information Security Incidents. During this training course, you will be able to understand Information Security Incident Management processes.

After completing this course, you can sit for the exam and apply for the “PECB Certified ISO/IEC 27035 Foundation” credential. A PECB Foundation Certificate shows that you have understood the fundamental methodologies, requirements, and management approach.

Who should attend?

- Individuals interested in Information Security Incident Management process approaches
- Individuals seeking to gain knowledge about the main principles and concepts of Information Security Incident Management
- Individuals interested to pursue a career in Information Security Incident Management

Learning objectives

- Understand the basic concepts of Information Security Incident Management
- Acknowledge the correlation between ISO/IEC 27035 and other standards and regulatory frameworks
- Understand the process approaches used to effectively manage Information Security Incidents

Educational approach

- Lecture sessions are illustrated with practical questions and examples
- Practical exercises include examples and discussions
- Practice tests are similar to the Certification Exam

General Information

- Certification fees are included on the exam price
- Training material containing over 200 pages of information and practical examples will be distributed
- A participation certificate of 14 CPD (Continuing Professional Development) credits will be issued
- In case of exam failure, you can retake the exam within 12 months for free
21 hours
Overview
This course will give you the skills to build up information security according to ISO 27005, which is dedicated to information security risk management based on ISO 27001.
14 hours
Overview
In this instructor-led, live training in the US, participants will understand Internet of Things (IoT) architectures and learn the different IoT security solutions applicable to their organization.

By the end of this training, participants will be able to:

- Understand IoT architectures.
- Understand emerging IoT security threats and solutions.
- Implement technologies for IoT security in their organization.
7 hours
Overview
In this instructor-led, live training in the US, participants will learn about the various aspects of NB-IoT (also known as LTE Cat NB1) as they develop and deploy a sample NB-IoT based application.

By the end of this training, participants will be able to:

- Identify the different components of NB-IoT and how to fit together to form an ecosystem.
- Understand and explain the security features built into NB-IoT devices.
- Develop a simple application to track NB-IoT devices.
14 hours
Overview
Interactive Application Security Testing (IAST) is a form of application security testing that combines Static Application Security Testing (SAST) and Dynamic Application Security Testing (DAST) or Runtime Application Self-protection (RASP) techniques. IAST is able to report the specific lines of code responsible for a security exploit and replay the behaviors leading to and following such an exploit.

In this instructor-led, live training, participants will learn how to secure an application by instrumenting runtime agents and attack inducers to simulate application behavior during an attack.

By the end of this training, participants will be able to:

- Simulate attacks against applications and validate their detection and protection capabilities
- Use RASP and DAST to gain code-level visibility into the data path taken by an application under different runtime scenarios
- Quickly and accurately fix the application code responsible for detected vulnerabilities
- Prioritize the vulnerability findings from dynamic scans
- Use RASP real-time alerts to protect applications in production against attacks.
- Reduce application vulnerability risks while maintaining production schedule targets
- Devise an integrated strategy for overall vulnerability detection and protection

Audience

- DevOps engineers
- Security engineers
- Developers

Format of the course

- Part lecture, part discussion, exercises and heavy hands-on practice
7 hours
Overview
HIPAA (Health Insurance Portability and Accountability Act of 1996) is a legislation in the United States that provides provisions for data privacy and security for handling and storing medical information. These guidelines are a good standard to follow in developing health applications, regardless of territory. HIPAA compliant applications are recognized and more trusted globally.

In this instructor-led, live training (remote), participants will learn the fundamentals of HIPAA as they step through a series of hands-on live-lab exercises.

By the end of this training, participants will be able to:

- Understand the basics of HIPAA
- Develop health applications that are compliant with HIPAA
- Use developer tools for HIPAA compliance

Audience

- Developers
- Product Managers
- Data Privacy Officers

Format of the Course

- Part lecture, part discussion, exercises and heavy hands-on practice.

Note

- To request a customized training for this course, please contact us to arrange.
21 hours
Overview
Course goal:

To ensure that an individual has the core understanding of GRC processes and capabilities, and the skills to integrate governance, performance management, risk management, internal control, and compliance activities.

Overview:

- GRC Basic terms and definitions
- Principles of GRC
- Core components, practices and activities
- Relationship of GRC to other disciplines
7 hours
Overview
This course provides leaders and managers an overview of issues and activities associated with cybersecurity.

Leaders will receive information in various topics that will build their knowledge and hone executive decision-making in regard to the cybersecurity threat.
35 hours
Overview
This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

The purpose of the Ethical Hacking Training is to:

- Establish and govern minimum standards for credentialing professional information security specialists in ethical hacking measures.
- Inform the public that credentialed individuals meet or exceed the minimum standards.
- Reinforce ethical hacking as a unique and self-regulating profession.

Audience:

The Course is ideal for those working in positions such as, but not limited to:

- Security Engineers
- Security Consultants
- Security Managers
- IT Director/Managers
- Security Auditors
- IT Systems Administrators
- IT Network Administrators
- Network Architects
- Developers
14 hours
Overview
This course is designed to show delegates how easy it can be for others to obtain data about ourselves through various means, but also how much of this can be stopped with a few tweaks to our machines and our online behavior.
21 hours
Overview
This instructor-led, live training in the US introduces the system architectures, operating systems, networking, storage, and cryptographic issues that should be considered when designing secure embedded systems.

By the end of this course, participants will have a solid understanding of security principles, concerns, and technologies. More importantly, participants will be equipped with the techniques needed for developing safe and secure embedded software.
35 hours
Overview
Description:

This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defences work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how Intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation.

Target Audience:

This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.
14 hours
Overview
This two days course s designed for those with some data protection responsibilities in an
organization or who, for other reasons, wish to achieve and demonstrate a broad
understanding of the law, including the EU General Data Protection Regulation (GDPR) and
the UK Data Protection Bill and their practical application. It is recognized that those with
overall responsibility for data protection within an organization will need to develop a detailed
understanding of the law"
14 hours
Overview
Digital Forensics and Investigations is a comprehensive entry level course to teach the basic theoretical concepts of digital forensics as well as the practical side of digital forensics, i.e. how to conduct digital forensic investigations.

This course is designed for a wide range of people such as law enforcers, crime investigators, managers in larger organizations, technical personnel in larger organizations, and anyone else interested in a general background of digital forensics.
21 hours
Overview
This instructor-led, live training in the US is aimed at engineers in telecommunication companies who wish to set up an end-to-end digital identity management system.

By the end of this training, participants will be able to:

- Understand, evaluate and adopt different approaches to managing usernames and passwords.
- Setup a single login system that works across all applications used in a telecom environment.
- Use identity technology to get a clear understanding of their customers and their needs.
- Implement an authentication system that works across different platforms (laptop, mobile, etc.).
7 hours
Overview
This course was put together focusing on what today’s Mobile Forensics practitioner requires, Basics of Android and iOS areas this course will be cover & the analysis using reverse engineering understanding how the popular Mobile OSs are hardened to defend against common attacks and exploits.
7 hours
Overview
NetNORAD is a system built by Facebook to troubleshoot network problems via end-to-end probing, independent of device polling.

In this instructor-led, live training, participants will learn how NetNORAD and active path testing can help them improve their network troubleshooting methods.

By the end of this training, participants will be able to:

- Understand how NetNORAD works
- Learn the design principles behind NetNORAD
- Use open-source NetNORAD tools with their own code to implement a fault detection system

Audience

- Network engineers
- Developers
- System engineers

Format of the course

- Part lecture, part discussion, exercises and heavy hands-on practice
7 hours
Overview
In this instructor-led, live course in the US, participants will learn how to formulate the proper security strategy to face the DevOps security challenge.
14 hours
Overview
This instructor-led, live training in the US (online or onsite) is aimed at security engineers who wish to use IBM Qradar SIEM to address pressing security use cases.

By the end of this training, participants will be able to:

- Gain visibility into enterprise data across on-premise and cloud environments.
- Automate security intelligence to hunt threats and to contain risks.
- Detect, identify, and prioritize threats.
7 hours
Overview
This course covers the basic concepts of security and IT Security, with an emphasis on defending against network attacks. Participants will gain an understanding of essential security protocols and security concepts of web services. Recent attacks against cryptosystems and some recent related vulnerabilities will be referrenced
Online Cybersecurity courses, Weekend Cyber Security courses, Evening Cyber Security training, Cybersecurity boot camp, Cybersecurity instructor-led, Weekend Cyber Security training, Evening Cyber Security courses, Cybersecurity coaching, Cybersecurity instructor, Cybersecurity trainer, Cybersecurity training courses, Cybersecurity classes, Cybersecurity on-site, Cyber Security private courses, Cyber Security one on one training

Course Discounts

Course Discounts Newsletter

We respect the privacy of your email address. We will not pass on or sell your address to others.
You can always change your preferences or unsubscribe completely.

Some of our clients

is growing fast!

We are looking to expand our presence in the US!

As a Business Development Manager you will:

  • expand business in the US
  • recruit local talent (sales, agents, trainers, consultants)
  • recruit local trainers and consultants

We offer:

  • Artificial Intelligence and Big Data systems to support your local operation
  • high-tech automation
  • continuously upgraded course catalogue and content
  • good fun in international team

If you are interested in running a high-tech, high-quality training and consulting business.

Apply now!

This site in other countries/regions