We provide virtual course about Administering Splunk Enterprise Security. This course prepares architects and systems administrators to install and configure Splunk Enterprise Security (ES).
We provide virtual course about CBRCOR: Performing CyberOps Using Cisco Security Technologies. The Performing CyberOps Using Cisco Security Technologies (CBRCOR) course guides you through cybersecurity operations fundamentals, methods, and automation.
We provide virtual course about CBROPS: Understanding Cisco Cybersecurity Operations Fundamentals. The course teaches an understanding of the network infrastructure devices, operations, and vulnerabilities of the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol suite.
We provide virtual course about CC: Certified in Cybersecurity. Course goals: After completing this course, the learners will have obtained awareness of the topics covered in the entry-level cybersecurity certification exam outline Domains, Modules & Chapters.
We provide virtual course about CCISO: Chief Information Security Officer. The CCISO Certification is an industry-leading program that recognizes the real-world experience necessary to succeed at the highest executive levels of information security.
(ISC)² developed the Certified Cloud Security Professional (CCSP) credential to ensure that cloud security professionals have the required knowledge, skills, and abilities in cloud security design, implementation, architecture, operations, controls, and compliance with regulatory frameworks.
We provide virtual course about CEH: Certified Ethical Hacker v12. The Certified Ethical Hacker has been battle-hardened over the last 20 years, creating hundreds of thousands of Certified Ethical Hackers employed by top companies, militaries, and governments worldwide.
We provide virtual course about Certified DORA Lead Manager. Attending the PECB Certified DORA Lead Manager training course offers a unique opportunity to engage with industry experts and peers, fostering valuable discussions and insights into best practices for digital operational resilience.
We provide virtual course about Certified ISO/IEC 42001 Lead Implementer. Artificial intelligence (AI) is becoming a driving force in today’s technology landscape. Its application has spanned across numerous sectors.
We provide virtual course about CGRC: Certified in Governance, Risk and Compliance. Earn Your GRC Certification - Be a Governance, Risk and Compliance Leader! Capitalize on the rising demand for Governance, Risk and Compliance (GRC) expertise by earning the CGRC certification.
We provide course about CISA: Certified Information Systems Auditor. CISA is a globally acknowledged certification, which builds upon the previous experience of IS professionals, to produce valuable employees who possess exceptional knowledge of Information Systems Auditing, Control, and Security.
We provide virtual course about CISM: Certified Information Security Manager. This Official ISACA Certified Information Security Manager (CISM) training course focuses on the construction, development, and governance of information security operations.
Virtual course - The Official ISC2® Certified Information Systems Security Professional (CISSP®) training provides a comprehensive review of the knowledge required to effectively design, engineer and manage the overall security posture of an organisation.
We provide virtual course about CND: Certified Network Defender. The Certified Network Defender v2 is a vendor-neutral, hands-on, instructor-led comprehensive network security certification training program.
We offer virtual course about CNSE: Check Point Cloud Network Security Expert for Azure R81. The course provides an understanding of the concepts and skills necessary to deploy and manage CloudGuard Network and Cloud Security Posture Management security solution within an Azure security environment.
We provide virtual course about CNX-CFR: CyberSec First Responder. This course is designed to assist students in preparing for the CertNexus CyberSec First Responder (Exam CFR-410) certification examination. What you learn and practice in this course can be a significant part of your preparation.
We provide virtual course about CompTIA Advanced Security Practitioner (CASP+). CompTIA Advanced Security Practitioner (CASP+) is the ideal certification for technical professionals who wish to remain immersed in technology as opposed to strictly managing.
We provide virtual course about CompTIA Cybersecurity Analyst (CySA+). The CompTIA Cybersecurity Analyst (CySA+) certification verifies that successful candidates have the knowledge and skills required to leverage intelligence and threat detection techniques.
We provide virtual course about CompTIA Security+. CompTIA Security+ Certification SY0-701 provides the basic knowledge needed to plan, implement, and maintain information security in a vendor-neutral format.
We provide virtual course about CSSLP: Certified Secure Software Lifecycle Professional. The training provides a comprehensive review of the knowledge required to incorporate security practices, including authentication.
We provide virtual course about EDU-210: Palo Alto Firewall Essentials: Configuration and Management. Successful completion of this five-day, instructor-led course should enhance the student’s understanding of how to configure and manage Palo Alto Networks Next-Generation Firewalls.
We provide virtual course about EDU-220: Palo Alto Networks: Panorama managing firewalls at scale. This 2-day course from Palo Alto will help students to gain in-depth knowledge about how to configure and manage a Palo Alto Networks Panorama management server.
We provide virtual course about EDU-330: Palo Alto Networks: Firewall troubleshooting. Successful completion of this three-day, instructor-led course will enhance the participant’s understanding of how to troubleshoot the full line of Palo Alto Networks next-generation firewalls.
We provide virtual course about ISO 22301 Lead Implementer. ISO 22301 Lead Implementer training course enables you to develop the necessary expertise to support an organization in establishing, implementing, managing and maintaining a Business Continuity Management System (BCMS) based on ISO 22301.
We provide virtual course about ISO/IEC 27001 Foundation. ISO/IEC 27001 provides requirements for organizations seeking to establish, implement, maintain and continually improve an information security management system.
We provide virtual course about ISO/IEC 27001 Lead Auditor. ISO/IEC 27001 Lead Auditor training enables you to develop the necessary expertise to perform an Information Security Management System (ISMS) audit by applying widely recognized audit principles, procedures and techniques.
We provide virtual course about ISO/IEC 27001 Lead Implementer. The training enables you to develop the necessary expertise to support an organization in establishing, implementing, managing and maintaining an Information Security Management System (ISMS) based on ISO/IEC 27001.
We provide virtual course about ISO/IEC 27701 Lead Auditor. The ISO/IEC 27701 Lead Auditor training course enables you to develop the necessary skills to perform a Privacy Information Management System (PIMS) audit by applying widely recognized audit principles, procedures and techniques.
We provide virtual course about MasterClass: This training is not related to any specific certification. System Forensics and Incident Handling. Forensics and Incident Handling are constantly evolving and crucial topics in the area of cybersecurity.
We provide virtual course about NIS 2 Directive Foundation. The NIS 2 Directive Foundation training course outlines the essential insights necessary for understanding the requirements of NIS 2 Directive regarding cybersecurity measures.
The Certified NIS 2 Directive Lead Implementer training course enables participants to gain the necessary competencies to support organizations in effectively planning, implementing, managing, monitoring, and maintaining a cybersecurity program that meets the requirements of the NIS2 Directive.
We provide virtual course about PECB Certified Lead Cybersecurity Manager. The Lead Cybersecurity Manager training course enables participants to obtain the necessary competencies to effectively implement, manage, and continually improve a cybersecurity program.
We provide virtual course about SAUI: Implementing Automation for Cisco Security Solution. The Implementing Automation for Cisco Security Solutions (SAUI) course teaches you how to design advanced automated security solutions for your network.
We provide virtual course about SC-100: Microsoft Cybersecurity Architect. The SC-100 course will lead towards the first expert level certification in the Microsoft Security, Compliance, and Identity portfolio.
We provide virtual course about SC-200: Microsoft Security Operations Analyst. Learn how to investigate, respond to, and hunt for threats using Microsoft Azure Sentinel, Azure Defender, and Microsoft 365 Defender.
Virtual course - This course provides IT Identity & Access Professionals and IT Security Professionals with the knowledge and skills needed to implement identity management solutions based on Microsoft Azure AD, and its connected identity technologies.
We provide virtual course about SC-400: Administering Information Protection and Compliance in Microsoft 365. Learn how to protect information in your Microsoft 365 deployment. This course focuses on data governance and information protection within your organization.
We provide virtual course about SC-900: Security, Compliance, and Identity Fundamentals. This course provides foundational level knowledge on security, compliance, and identity (SCI) concepts and related cloud-based Microsoft solutions.
We provide virtual course about secure coding in C and C++ in english. Your application written in C and C++ works as intended, so you are done, right? But did you consider feeding in incorrect values? 16Gbs of data? A null? An apostrophe? Negative numbers, or specifically -2*32?
We provide virtual course about Security Engineering on AWS. This course allows you to test new skills and apply knowledge to your working environment through a variety of practical exercises. This course demonstrates how to efficiently use AWS security services to stay secure in the AWS Cloud.
We provide virtual course about security testing C and C++ applications in english. Your application written in C and C++ is tested functionally, so you are done, right? But did you consider feeding in incorrect values? 16Gbs of data? A null? An apostrophe? Negative numbers, or specifically -2^32?
We provide virtual course about SESA: Securing Email with Cisco Email Security Appliance. Learn how to deploy and use Cisco® Email Security Appliance to establish protection for your email systems against phishing, business email compromise and ransomware.
Virtual course - Become an SSCP - Systems Security Certified Practitioner! Earning a globally recognized IT security administration and operations certification like the SSCP is a great way to grow your career and better secure your organization’s critical assets.
We provide virtual course about Web Security for Developers. The web is a great software delivery platform, making your software available to users around the world with zero installation and easily deployed updates.
IPv6 Networking (NLT-IPV6-Datasenter) er et kurs som passer for tekniske ressurser i design og driftsavdelinger hos operatører og enterprise-kunder. Deltagerne bør ha grunnleggende IPv6-kjennskap, tilsvarende NLT-IPv6-Intro. IPv6 datasenterkurs kan kombineres med andre IPv6 kurs.
Dette kurset (NLT-IPV6-Nettverk) dekker design og implementasjon av IPv6 i et bedriftsnettverk. Vi går gjennom nettverksdesign og tjenester som autokonfigurasjon av IPv6 (SLAAC og DHCP). Videre ser vi på VPN-løsninger og brannmurer. I tillegg går vi gjennom metoder for feilsøking og problemløsning.
«IPv6 The good, the bad and the ugly» (NLT-IPV6-Sikkerhet) er et kurs for deg som vil ha en større forståelse av hvilke sikkerhetsutfordringer IPv6 er ment å løse, men også hvilke nye problemstillinger som dukker opp ved overgang til IPv6.
Junos grunnkurs gir en innføring i bruk av Junos, Junipers operativsystem for rutere, switcher og brannmurer. Kurset gir grunnleggende kunnskap for å ta i bruk Junipers utstyr på en effektiv måte.
I samarbeid med Icotera inviterer vi til webinar 12. april kl 09:00-10:30. Vi presenterer FTTx CPE/ONT, WiFi 6 & 7 MESH Aksesspunkt samt ICONS for overvåking og provisjonering.
Vi inviterer til webinar i samarbeid med Kentik den 5. april der vi ser nærmere på hvordan Kentik tilbyr avanserte løsninger for nettverksanalyse.
nLogic webinar: XaaS cloud platform – tjenestesalg for Service Providers Vi inviterer til webinar tirsdag 9. april kl 09:00 – 10:00 der vi presenterer vår tjenesteportal for service providers. Med en tjenesteportal kan service providers videreselge sine tjenester til bedriftskunder.
De fleste bedrifter i dag har anskaffet seg produktet Microsoft 365, men det er bare et fåtall som utnytter potensialet i pakken. Microsoft 365 er mye mer enn lokalt installert programvare, det er programvare for moderne kommunikasjon, dokumentproduksjon og samhandling i skyen.
Vi tilbyr kurs i Teams - Next Level. På tide å komme videre med Microsoft Teams! Ja, absolutt, på dette kurset lærer du å utnytte Teams til å samarbeide og kommunisere effektivt, redusere bruk av epost, samhandle på dokumenter m.m.
Vi tilbyr onlinekurs om sikrere og enklere digital hverdag. Har du kontroll? Med informasjon i mange ulike kilder og steder er det ikke like lett å holde oversikten over din informasjon, bilder, filer og tjenester. Vi deler lett, men glemmer igjen informasjon over alt.
Vi tilbyr 1-dags kurs i WordPress: sikkerhet for bedrifter som ønsker å lære mer om hvordan du best sikrer websider som er basert på WordPress. Er din nettside sikker? Lær hvordan du sikrer din WordPress-løsning.
Vi tilbyr 1-dags onlinekurs i WordPress: sikkerhet for deg som ønsker å lære mer om hvordan du best sikrer websider som er basert på WordPress. Er din nettside sikker? Lær hvordan du sikrer din WordPress-løsning.
Vi tilbyr Bachelor i Applied Data Science som nettstudie. IT-utdanning som gjør deg svært ettertraktet innen maskinlæring, kunstig intelligens og big data-analyse. Gå rett i jobb som data scientist, det mest sexy yrket i det 21. århundret, ifølge Harvard Business Review.
Vi tilbyr Bachelor i Cyber Security som nettstudie. IT-utdanning som lærer deg å sikre digitale systemer mot cyberangrep, datakriminalitet og digital krigføring. Studiet gjør deg klar til å jobbe praktisk med IKT-sikkerhet og redusere digital sårbarhet.
Vi tilbyr Bachelor i digital etterforskning som nettstudie. IT-utdanning som lærer deg datasikkerhet og etterforskning av digital kriminalitet. Studiet gjør deg klar til å jobbe praktisk med digital sikkerhet og etterretning for politi og andre organisasjoner med behov for økt digital sikkerhet.
I løpet av første året på studiet vil du tilegne deg grunnleggende kunnskap om kjernefaglige tekniske grunnprinsipper og få en bred forståelse av forretningsstyring og -prosesser.
Vi tilbyr utdannelse i nettverk og IT-sikkerhet som nettstudie. Praktisk IT-utdanning som lærer deg å bekjempe hacking og datakriminalitet. Det akutte kompetansebehovet for IT-sikkerhet gir solide jobbmuligheter etter studiet.
Vi tilbyr onlinekurs om Cortex XDR: Prevention, Analysis and Response (EDU-260/EDU-262) på engelsk. På Cortex XDR-kurset lærer studentene hvordan agenten beskytter mot utnyttelser og malware-drevne angrep.
Vi tilbyr onlinekurs om Cortex XSOAR: Automation and Orchestration (EDU-380) på engelsk. Dette kurset vil gjøre det mulig for en SOC-, CERT-, CSIRT- eller SOAR-ingeniør å starte arbeider med Cortex XSOAR-integrasjoner.
Vi tilbyr onlinekurs om Firewall: Configuration and Management (EDU-210) på engelsk over 10 dager. Kurset dekker det grunnleggende man må vite for å forstå Palo Alto Networks Next-Generation FireWall.
Vi tilbyr onlinekurs om Firewall: Configuration and Management (EDU-210) på engelsk. Kurset dekker det grunnleggende man må vite for å forstå Palo Alto Networks Next-Generation FireWall.
Vi tilbyr onlinekurs om Firewall: Improving Security Posture and Hardening PAN-OS (EDU-214). Brannmuradministratorer står nå overfor utfordringen med å identifisere skadelig programvare som allerede har infisert nettverket.
Vi tilbyr onlinekurs om Palo Alto Networks: Firewall Troubleshooting (EDU-330) på engelsk. Lær hvordan feilsøke problemer relatert til brannmuren. På dette kurset vil du lære alt om hvordan man konfigurerer Next Generation Firewall, og hva man skal gjøre dersom alt ikke fungerer som det skal.
Vi tilbyr 5-dagers nettkurs om Palo Alto Networks: Firewall Troubleshooting (EDU-330) på engelsk. Lær hvordan feilsøke problemer relatert til brannmuren. På dette kurset vil du lære alt om hvordan man konfigurerer Next Generation Firewall, og hva man skal gjøre dersom alt ikke fungerer som det skal.
Vi tilbyr onlinekurs om Prisma Access SASE Security: Design and Operation (EDU-318) på engelsk. Lær å sikre eksterne nettverk og mobilbrukere i skyen. Kurset forklarer Prisma Secure Access Service Edge (SASE og er et kurs for alle som ønsker å lære å sikre eksterne nettverk og mobile brukere.
We provide online course about (In)Security in C++. The course teaches C++ developers fundamental concepts from Exploit Development and Reverse Engineering, and uses these concepts to demonstrate common vulnerabilities in C++ codebases.
We provide online course about a builder’s guide to single page application security. Frontend JavaScript frameworks such as Angular and React disrupt the traditional web security landscape, and finding reliable security advice is hard.
Securing modern web applications is hard, really hard. Not only do you have to make the right architectural security decisions, but you also have to be aware of various implementation vulnerabilities in both frontend apps and APIs.
We provide a 2-day online course about Attack and Defense: API and Web Application Security. The major cause of webservice and web application insecurity is insecure software development practices.
We provide online course about build your own application security program. As much as we wish it would, secure software doesn’t happen overnight. There’s no single action you can take or technology you can deploy that will solve this complex problem for you.
We provide online course about Building Secure API´s and Web Applications. The major cause of webservice, microservice, and web application insecurity is insecure software development practices.
We provide online course about Hack Yourself First: How to go on the Cyber-Offence. Cyber-attacks have become a reality of running software on the web today. We find ourselves under a constant barrage of malicious activity from hacktivists, online criminals and increasingly, nation states.
We provide online course about High Security OAuth. Since its publication in RFC 6749 and RFC 6750, OAuth 2.0 has gotten massive traction in the market.
We provide online course about Keynote: securing the future. Laura Bell Main graduated with a degree in Computer Science and Artificial Intelligence before that was a thing you could get a job in. It wasn’t her finest piece of planning.
We provide online course about Linux security and isolation APIs fundamentals. This workshop provides an introduction to the low-level Linux features - set-UID/set-GID programs, capabilities, and namespaces, cgroups (control groups).
ISO 27001 er standarden for Informasjonssikkerhet. Det har nå kommet en ny versjon av standarden, og for å sikre at du har den kompetansen du trenger for overgangen har vi utviklet et kurs som tar for seg endringene fra tidligere versjon til ny versjon. Kurset har varighet på 1/2 dag.
Vi tilbyr nettkurs om Introduksjonskurs ISO27001 – Informasjonssikkerhet. Kurset vil gi et solid fundament for videre praktisk arbeid med forberedelsene til sertifisering, eller innføring av et styringssystem for informasjonssikkerhet.
ISO/IEC 27701 is designed to specify requirements and provide guidance for establishing, implementing, maintaining, and continually improving a PIMS in the form of an extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy management within the context of your organization.
This course aims to provide you with the opportunity to learn about the subject of internal auditing of information security management systems, specifically those based on the ISO 27001:2022 international standard.
Additional course benefits: Gain free access to our online self-assessment tool where you can quickly implement and practice learnings as well as to measure your company performance against specific management system standards