We provide virtual course about Administering Splunk Enterprise Security. This course prepares architects and systems administrators to install and configure Splunk Enterprise Security (ES).
We provide virtual course about CBRCOR: Performing CyberOps Using Cisco Security Technologies. The Performing CyberOps Using Cisco Security Technologies (CBRCOR) course guides you through cybersecurity operations fundamentals, methods, and automation.
We provide virtual course about CBROPS: Understanding Cisco Cybersecurity Operations Fundamentals. The course teaches an understanding of the network infrastructure devices, operations, and vulnerabilities of the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol suite.
We provide virtual course about CC: Certified in Cybersecurity. Course goals: After completing this course, the learners will have obtained awareness of the topics covered in the entry-level cybersecurity certification exam outline Domains, Modules & Chapters.
We provide virtual course about CCISO: Chief Information Security Officer. The CCISO Certification is an industry-leading program that recognizes the real-world experience necessary to succeed at the highest executive levels of information security.
(ISC)² developed the Certified Cloud Security Professional (CCSP) credential to ensure that cloud security professionals have the required knowledge, skills, and abilities in cloud security design, implementation, architecture, operations, controls, and compliance with regulatory frameworks.
We provide virtual course about CEH: Certified Ethical Hacker v12. The Certified Ethical Hacker has been battle-hardened over the last 20 years, creating hundreds of thousands of Certified Ethical Hackers employed by top companies, militaries, and governments worldwide.
We provide virtual course about CGRC: Certified in Governance, Risk and Compliance. Earn Your GRC Certification - Be a Governance, Risk and Compliance Leader! Capitalize on the rising demand for Governance, Risk and Compliance (GRC) expertise by earning the CGRC certification.
We provide course about CISA: Certified Information Systems Auditor. CISA is a globally acknowledged certification, which builds upon the previous experience of IS professionals, to produce valuable employees who possess exceptional knowledge of Information Systems Auditing, Control, and Security.
We offer virtual course about CNSE: Check Point Cloud Network Security Expert for Azure R81. The course provides an understanding of the concepts and skills necessary to deploy and manage CloudGuard Network and Cloud Security Posture Management security solution within an Azure security environment.
We provide virtual course about CNX-CFR: CyberSec First Responder. This course is designed to assist students in preparing for the CertNexus CyberSec First Responder (Exam CFR-410) certification examination. What you learn and practice in this course can be a significant part of your preparation.
We provide virtual course about CompTIA Advanced Security Practitioner (CASP+). CompTIA Advanced Security Practitioner (CASP+) is the ideal certification for technical professionals who wish to remain immersed in technology as opposed to strictly managing.
We provide virtual course about CompTIA Security+. CompTIA Security+ Certification SY0-701 provides the basic knowledge needed to plan, implement, and maintain information security in a vendor-neutral format.
We provide virtual course about CSSLP: Certified Secure Software Lifecycle Professional. The training provides a comprehensive review of the knowledge required to incorporate security practices, including authentication.
We provide virtual course about EDU-210: Palo Alto Firewall Essentials: Configuration and Management. Successful completion of this five-day, instructor-led course should enhance the student’s understanding of how to configure and manage Palo Alto Networks Next-Generation Firewalls.
We provide virtual course about EDU-220: Palo Alto Networks: Panorama managing firewalls at scale. This 2-day course from Palo Alto will help students to gain in-depth knowledge about how to configure and manage a Palo Alto Networks Panorama management server.
We provide virtual course about EDU-330: Palo Alto Networks: Firewall troubleshooting. Successful completion of this three-day, instructor-led course will enhance the participant’s understanding of how to troubleshoot the full line of Palo Alto Networks next-generation firewalls.
We provide virtual course about SC-100: Microsoft Cybersecurity Architect. The SC-100 course will lead towards the first expert level certification in the Microsoft Security, Compliance, and Identity portfolio.
We provide virtual course about SC-200: Microsoft Security Operations Analyst. Learn how to investigate, respond to, and hunt for threats using Microsoft Azure Sentinel, Azure Defender, and Microsoft 365 Defender.
Virtual course - This course provides IT Identity & Access Professionals and IT Security Professionals with the knowledge and skills needed to implement identity management solutions based on Microsoft Azure AD, and its connected identity technologies.
We provide virtual course about SC-400: Administering Information Protection and Compliance in Microsoft 365. Learn how to protect information in your Microsoft 365 deployment. This course focuses on data governance and information protection within your organization.
We provide virtual course about SC-900: Security, Compliance, and Identity Fundamentals. This course provides foundational level knowledge on security, compliance, and identity (SCI) concepts and related cloud-based Microsoft solutions.
We provide virtual course about Security Engineering on AWS. This course allows you to test new skills and apply knowledge to your working environment through a variety of practical exercises. This course demonstrates how to efficiently use AWS security services to stay secure in the AWS Cloud.
Virtual course - Become an SSCP - Systems Security Certified Practitioner! Earning a globally recognized IT security administration and operations certification like the SSCP is a great way to grow your career and better secure your organization’s critical assets.
The Certified CISO (CCISO) program is the first of its kind training and certification program aimed at producing top-level information security executives.
EC-Council Certified Cloud Security Engineer (CCSE) + Exam voucher (ECCCSE)
This course is the most comprehensive review of cloud security concepts and industry best practices covering the six domains of the CCSP Common Body of Knowledge (CBK®).
Certified CMMC Professional training course enables participants to acquire a comprehensive understanding of the Cybersecurity Maturity Model Certification (CMMC) model and its requirements.
The goal of this CWNA course is to add Wi-Fi expertise to a networking professional´s skillset, while covering all CWNA exam topics. The course begins with discussion topics and hands-on lab exercises covering the basic operation of 802.11 Wi-Fi technology.
The CISM (Certified Information Security Manager) course is a globally recognized certification program designed for professionals in the field of information security management.
Master the deployment and usage of Citrix Application Delivery Management with this two-day management and optimization course.
Citrix Web App Firewall protects web apps and sites from known and unknown attacks. This threeday course will teach you how to address application services security requirements with Web App Firewall.
Learn how to configure your Citrix networking environment to address application services security requirements with Citrix Web App Firewall: automate and manage network services for scale-out of application architectures with Citrix Application Delivery Management
In this course you will learn how to create a new Citrix DaaS deployment and how to migrate to Citrix DaaS from an on-premises Citrix Virtual Apps and Desktops Site.
Designed to learn how to set up scalability, redundancy and security configurations.
This advanced 5-day training course teaches the design principles for creating a Citrix Virtual Apps and Desktops virtualization solution. In this training, you will learn how to assess existing environments, explore different scenarios and make design decisions based on business requirements.
If you are new to Citrix or if you are planning a move to Citrix Cloud, this course is a necessary step in enabling you with the right training and skills to manage and deploy Citrix Workspace successfully.
Learn to support end-users accessing virtual apps and desktops as part of a Citrix solution. In this course, you will learn to use Citrix Director to interact with user sessions and to capture information for solving issues or escalating to the administration team.
This accelerated 5-day course is designed for experienced IT professionals to build the foundational administration aspects of installing, configuring and managing a Citrix Virtual Apps and Desktops 7 environment.
This Citrix Virtual Apps and Desktop course, designed for experienced IT professionals builds on the foundational implementation and management skills introducing scalability, redundancy, and security configurations.
Designed for experienced IT professionals, you will discover why WEM is the go-to system optimization and logon optimization solution for a Citrix deployment´s app and desktop workloads.
The PECB CMMC Foundations training course enables participants to understand the fundamental concepts and principles of the CMMC model.
Learn the skills required to implement Citrix ADC Essential components including secure Load Balancing, High Availability, and Citrix ADC Management.
In this course, you will learn how Citrix SD-WAN can simplify branch networking for your organization. You´ll walk away understanding how to configure and manage SD-WAN, including the SD-WAN architecture, deployment options, provisioning, and how to use Citrix SD-WAN Orchestrator in your environment
The CompTIA Security+ course is designed to help you prepare for the SY0-701 exam.
Learn to deploy and manage your Citrix DaaS deployment on Microsoft Azure. Gain the skills to plan your machine catalog and virtual machine design based in Microsoft´s public cloud and get hands-on practice deploying those machines using Machine Creation Services.
Expand your Citrix networking knowledge and skills by enrolling in this five-day course. It covers Citrix ADC essentials, including secure load balancing, high availability and operations management, and also focuses on Citrix Gateway.
Build your Citrix ADC knowledge and skills by enrolling in this five-day course. It covers Citrix ADC essentials– platforms, architecture, licensing and functionality – and also focuses on traffic management, including content switching, traffic optimization and global server load balancing (GSLB)
The Designing and Implementing Cloud Connectivity training helps you develop the skills required to design and implement enterprise cloud connectivity solutions. Learn how to leverage both private and public internet-based connectivity to extend the enterprise network to cloud providers
This 3-day EC-Council training is a course that will prepare you for the EC-Council´s Certified DevSecOps Engineer (E|CDE) certification.
The Certified Ethical Hacker has been battle-hardened over the last 20 years, creating hundreds of thousands of Certified Ethical Hackers employed by top companies, militaries, and governments worldwide.
The ECIH program focuses on a structured approach to the incident handling and response (IH&R) process.
The Certified SOC Analyst (CSA) program is the first step to joining a security operations center (SOC). It is engineered for current and aspiring Tier I and Tier II SOC analysts to achieve proficiency in performing entry-level and intermediate-level operations.
Computer forensics is simply the application of computer investigation and analysis techniques in the interests of determining potential legal evidence. The program is designed for IT professionals involved with information system security, computer forensics, and incident response.
This Fundamentals of Cisco Firewall Threat Defense and Intrusion Prevention (SFWIPF) course shows you how to implement and configure Cisco Secure Firewall Threat Defense for deployment as a next generation firewall at the internet edge.
Comptia advanced security practitioner (CASP+). You have experience in the increasingly crucial field of information security, and now you´re ready to take that experience to the next level.
Learn the skills required to configure and manage Citrix Gateway features. At the end of the course, students will be able to configure their Citrix Gateway environments to address remote access requirements for Apps and Desktops.
ISO/IEC 27002 Foundation training enables you to learn the basic elements to implement Information Security Controls as specified in ISO/IEC 27002.
With the ever-increasing numbers of security breaches, both human and machine-based, significantly more understanding is required from testers to ensure that the proper quality assurance measures are in place for assuring the security of IT systems.
The ISTQB Advanced Technical Test Analyst course extends the broad understanding of testing acquired at Foundation Level to enable the role of Technical Test Analyst to be performed.
The ISTQB Advanced Test Automation Engineer Certificate Course is a three-day course explaining the tasks of a test automation engineer (TAE) in designing, developing, and maintaining test automation solutions.
The ISTQB Advanced Test Manager course extends the broad understanding of testing acquired at Foundation Level to enable the role of Test Manager to be performed.
Established the International Software Testing Qualification Board (ISTQB) with, among other things, the goal of further internationalization and harmonization of test certification programs.
The ISTQB Foundation Level Model Based Tester Extension course extends the broad understanding of testing acquired at Foundation Level to enable the role of Model Based Test Analyst to be performed.
The certification for the ISTQB Mobile Application Testing Foundation Level is intended for professionals who are working with mobile technology. The certification provides an insight into methods, techniques and tools a professional may use to test mobile applications.
This is a deep dive course on infrastructure services configuration, increasing their level of security and windows internals. It is a must–go for enterprise administrators, security officers and architects.
Learn how to investigate, respond to, and hunt for threats using Microsoft Azure Sentinel, Azure Defender, and Microsoft 365 Defender. In this course you will learn how to mitigate cyberthreats using these technologies.
This course provides foundational level knowledge on security, compliance, and identity concepts and related cloud-based Microsoft solutions.
This instructor-led training enables you to prevent attacks on your endpoints. After an overview of the Cortex XDR components, the training introduces the Cortex XDR management console and demonstrates how to install agents on your endpoints and how to create Security profiles and policies.
This instructor-led course teaches you how to use the Incidents pages of the Cortex XDR management console to investigate attacks. It explains causality chains, detectors in the Analytics Engine, alerts versus logs, log stitching, and the concepts of causality and analytics.
The Cortex™ XSOAR 6.8: Automation and Orchestration (EDU-380) course is four days of instructor-led training
We offer course about Palo Alto Networks: Firewall 10.2 Essentials: Configuration and Management (EDU-210).
This course should help students gain in-depth knowledge about configuring and managing a Palo Alto Networks Panorama management server. Administrators that complete this course should become familiar with the Panorama management server´s role in managing and securing the overall network.
Prisma Cloud is the industry´s most complete Cloud Native Application Protection Platform (CNAPP), with the industry´s broadest security and compliance coverage—for infrastructure, workloads, and applications, across the entire cloud native technology stack—throughout the development lifecycle
The Prisma SD-WAN Design and Operation (EDU-238) course describes the next generation Prisma SD-WAN solution, the capability and value it provides over legacy WAN and SD-WAN implementations, and how to configure, operate, and troubleshoot the solution.
The Prisma Access SASE Security: Design and Operation (EDU-318) course describes Panorama Managed Prisma Access Secure Access Service Edge (SASE) and how it helps organizations embrace cloud and mobility by providing network and network security services from the cloud.
We offer course in Palo Alto Networks: Firewall 10.2: Troubleshooting (EDU-330).
This is a deep dive course on security operations: vulnerability management, anomalies detection, discovery of industry attacks and threats, understanding how compromised system or solution looks like, defining the indicators of the attack, incident handling also daily servicing on SIEM platform.
The Veeam® Backup & Replication™ v12: Configure, Manage and Recover training course is a three-day technical course focused on teaching IT professionals the skills to configure, manage and support a Veeam Backup & Replication v12 solution.
The two-day, Veeam® Backup & Replication™ v11: Architecture and Design training course, is focused on teaching IT professionals how to effectively architect a Veeam solution through attaining technical excellence following the Veeam Architecture Methodology used by Veeam´s own Solution Architects.
Cyber-attacks on critical infrastructure are becoming more common, complex, and creative. Life, property, and the environment are at stake. This course is designed to prepare you to prevent and contain cyber-attacks by building fundamental awareness across your organization.
A cyber-attack often targets an organization’s users first. Make sure they are prepared. This one-day training ensures that each employee fully understands the nature and importance of information security and is able to identify common threats.
To ensure a harmonized and higher level of cyber security across the EU countries, The NIS2 Directive leads to new security requirements for the companies involved, this entails a minimum set of security controls and reporting measures of security incidents.
Vi tilbyr kurs i Microsoft 365 Dokumentbehandling. Hvor bør vi lagre dokumentene våre ? Microsoft 365 består av en rekke tjenester som er beregnet på fil og dokumentlagring, men hvor bør vi legge våre dokumenter, og hvorfor det.
Vi tilbyr kurs i Personlig effektivitet. På dette kurset lærer du å ta kontroll på digital hverdag og få ting gjort effektivt. Få kontroll på innboks og organiser epost og gjøremål slik at du få en effektiv og stressfri hverdag. Spar 30 min. hver dag. Praktisk kurs – Nyttige tips – Konkrete verktøy
Vi tilbyr digitalt kurs om cybersikkerhet for alle. Cybersikkerhet eller IT-sikkerhet er i nyhetene nesten hver dag, men hva er fakta og hva er fiksjon? Kan du bli hacket når som helst? Er alle ute etter din virksomhet? Hva er de største risikoene, og hvordan kan man effektivt redusere dem?
Vi tilbyr digitalt kurs om tingenes internett (IoT). IoT - Tingenes internett omgir oss på alle kanter, men vet du egentlig hva det er for noe? I dette kurset får du et innblikk i arkitektur, kommunikasjonsteknologi og forskjellige forretningsmodeller som er bygget rundt tingenes internett.
IPv6 Networking (NLT-IPV6-Datasenter) er et kurs som passer for tekniske ressurser i design og driftsavdelinger hos operatører og enterprise-kunder. Deltagerne bør ha grunnleggende IPv6-kjennskap, tilsvarende NLT-IPv6-Intro. IPv6 datasenterkurs kan kombineres med andre IPv6 kurs.
Dette kurset (NLT-IPV6-Nettverk) dekker design og implementasjon av IPv6 i et bedriftsnettverk. Vi går gjennom nettverksdesign og tjenester som autokonfigurasjon av IPv6 (SLAAC og DHCP). Videre ser vi på VPN-løsninger og brannmurer. I tillegg går vi gjennom metoder for feilsøking og problemløsning.
«IPv6 The good, the bad and the ugly» (NLT-IPV6-Sikkerhet) er et kurs for deg som vil ha en større forståelse av hvilke sikkerhetsutfordringer IPv6 er ment å løse, men også hvilke nye problemstillinger som dukker opp ved overgang til IPv6.
Junos grunnkurs gir en innføring i bruk av Junos, Junipers operativsystem for rutere, switcher og brannmurer. Kurset gir grunnleggende kunnskap for å ta i bruk Junipers utstyr på en effektiv måte.
Vi tar med oss våre teknologipartnere og inviterer til tech updates og workshops, for faglig påfyll og lærerike diskusjoner.
Telecom World arrangeres i Tromsø 25. – 26. april 2024. Rundt 300 deltakere fra ledersjiktet i hele verdikjeden i den norske bredbåndsbransjen er forventet å delta i Tromsø.
Vi tilbyr et kurs hvor du lærer sende, motta og oppbevare Crypto sikkert. Crypto er digitale eiendeler og kanskje fremtidens penger. En innføring i hvordan Bitcoin ble skapt og hvorfor. Sammen med litt praktisk informasjon om systemet. Ta kontakt for avtale!
Vi tilbyr onlinekurs om sikrere og enklere digital hverdag. Har du kontroll? Med informasjon i mange ulike kilder og steder er det ikke like lett å holde oversikten over din informasjon, bilder, filer og tjenester. Vi deler lett, men glemmer igjen informasjon over alt.